Subcategories

  • Discussions and feedback related to this forum

    610 Topics
    3k Posts
    G
    @stephenw10 This is my final note since it seem you will always look at this as an endpoint. It doesn't appear, it actually is, the facts are the facts. Still, moderator usually have a way to remove posts and ban single users, not just the entire herd, or at least the ones use. Perhaps those are more advance, or perhaps netgate forums lack that functionality. I never said negate took this issue lightly, I was just looking for some feedback. I have seen this process many times and for the looks of it, pfsense CE is very much in maintenance mode. Just because netgate wants to be politically correct does not mean it is not. The fact are there and they are fallowing the same path as others did. Again, this subject is just becoming redundant and it is affecting other users in the forum.
  • Community Hiring and For Hire postings related to jobs that require pfSense software skills

    29 Topics
    117 Posts
    w0wW
    @sef1414 Name it "run.sh", copy to pf and chmod according documentation https://docs.netgate.com/pfsense/en/latest/development/boot-commands.html#shell-script-option You will see messages in the system log like those quoted in the script after logger command.
  • 2º disk

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • OPT1 no internet access

    13
    0 Votes
    13 Posts
    4k Views
    N
    Hey john, you make me laugh :) I have been there this weekend and what I could find was not the best :/ situation: WAN -> WAN OPT1 -> (direct line)PoE switch -> several ProCurve M5M310 AP and Linksys (was installed years ago by a company) (IP 192.168.2.xxx) LAN -> simple (dumb) switch, from here it goes 4 ways: (IP 192.168.0.xxx) 1: phone box (currently disabled) 2: to reception -> dumb switch -> computers, printers. 3: to office -> dumb switch -> printers, computers 4: camera the ISP is even more horrible then i thought, they got a DSL line that has a maximum of 28Mbps and if we are lucky we get 6Mbps at night. I have told them to change this ASAP this month, and going to change this to a 125Mbps line to start with.
  • It takes 15 minutes to start

    2
    0 Votes
    2 Posts
    1k Views
    K
    [image: 20160923_092048_1.jpg]
  • The Router Rumble

    14
    0 Votes
    14 Posts
    4k Views
    H
    I myself prefer meritocratic forums. Not a huge fan of democratic, everyone's opinion matters, everyone gets a trophy forums. But I do frequent support forums where the target audience are the general public and need help.
  • Captive portal using a facebook accout for free wifi

    2
    0 Votes
    2 Posts
    2k Views
    W
    Hi, i like your captive portal design, I am setting up one for elementary school I was wondering if you are will to share the code. thank you!
  • Https blocking

    2
    0 Votes
    2 Posts
    911 Views
    KOMK
    This forum is for General Discussion.  if you need technical support, try the Support forums, specifically the Cache/Proxy forum.
  • RRD Graphs: Quality

    3
    0 Votes
    3 Posts
    1k Views
    H
    Don't rule out that the gateway itself just doesn't like responding to pings. While highly correlated, some hardware accelerated devices can forward packets fine, but actually responding to pings requires the severely limited host CPU to do work.
  • Internet upgrade

    14
    0 Votes
    14 Posts
    3k Views
    L
    You could always look for 2Gb fiber from Comcast, but for $300/mo.
  • Gold@pfsense.org [user unknown]

    5
    0 Votes
    5 Posts
    1k Views
    P
    ;)
  • Upcoming versions

    2
    0 Votes
    2 Posts
    928 Views
    H
    Pretty much answered here https://forum.pfsense.org/index.php?topic=117943.msg653538#msg653538 FreeBSD 11 is making things crazy
  • PFSENSE TROUBLE

    6
    0 Votes
    6 Posts
    2k Views
    johnpozJ
    So you answered this thread a year later??  Kind of pointless…
  • Pfsense blocks traffic on and off

    4
    0 Votes
    4 Posts
    1k Views
    KOMK
    am wondering of there is any one trying to help otherwise am still waiting Perhaps you should post your problems in the pfSense English Support section, and not General Discussion.
  • Nat and routing

    2
    0 Votes
    2 Posts
    987 Views
    P
    By default you will get automatic NAT rules for traffic from each internal LAN as it goes out WAN. You can change to manual NAT if you like, and then put whatever NAT rules you like (or no NAT rules). Since server2, server3, server4 have IPs in private address space, then I assume they only talk within your intranet (because without NAT assistance they cannot talk to public IPs). If that is so, then you probably should put block rules on lan1, lan2, lan3 to stop any packets with source server1,server2,server3 and destination public IP. If you don't do that, then the servers can still try to access public IPs, the traffic will not be NAT'd and packets with private source IPs will head out WAN. The internet routers will drop them, but it seems a waste to even send them in the first place.
  • Gateway works on one NIC but not another

    1
    0 Votes
    1 Posts
    792 Views
    No one has replied
  • PfblockerNG ADs Filters!

    3
    0 Votes
    3 Posts
    2k Views
    T
    BBCan177, confused only two easy list from DNBS EasyList inbuilt? [image: 7.png_thumb] [image: 7.png]
  • 0 Votes
    1 Posts
    1k Views
    No one has replied
  • Busy Opensource week

    1
    0 Votes
    1 Posts
    810 Views
    No one has replied
  • Sharing across multiple vlans

    9
    0 Votes
    9 Posts
    4k Views
    P
    (Not related to the printer/FreeNAS topic) - you do not need all those "extra" rules on each interface, with source=SOMEOTHERnet destination=THISnet - nothing will ever match those, because traffic arriving from THISnet will have source in THISnet (not in SOMEOTHERnet) You have general pass-all rules at the top of each net, good for getting the printer/FreeNAS working. But you also have rules down the bottom that direct general traffic to a gateway (those rules will not have any effect just now, because the top pass-all rule will be matching all the traffic). But if you do remove the top pass-all rule at some point, then all the traffic is going to get dire cted to a gateway or gateway-group. That will mess up access to the printer/FreeNAS. So you will need a rule at the top with source THISnet, destination LANnet to pass "local" traffic between subnets without pushing it to a gateway. Your rules should work OK (and they do, because you can do other stuff between subnets). So you really need to setup your printer to have the pfSense LANnet IP address as its gateway - you have to do that somewhere on the printer setup screen or whatever.
  • Exclude sites from VPN connection?

    3
    0 Votes
    3 Posts
    3k Views
    Q
    yup its that easy - worth also thinking about using pfblockerng to maintain the lists which allows use of AS numbers which can be helpful for larger sites etc.
  • Lcd firebox x750e pfsense 2.3

    2
    0 Votes
    2 Posts
    2k Views
    F
    Hi, new to this as well. Im going to try this next weekend hopefully. https://forum.pfsense.org/index.php?topic=110177.0 See the post in the middle by treer.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.