• Very strange DNS / Routing Issues

    3
    0 Votes
    3 Posts
    2k Views
    S
    @Gertjan I'm sorry. I'm not understanding what you wrote. Unbound has forwarding disabled so it should be doing it's own resolving. I'm not sure what else you would want me to detail. Network Interfaces: LAN+All VLANS Outgoing Network Interfaces: LAN + OPT1 DNSSEC: ON Forwarding: OFF DHCP Registration: ON Static DHCP: ON OpenVPN Clients: ON As for the version issue. Just refreshing changes whether it says I'm on the latest or if there is a new version available. If i keep refreshing it switches back and forth. I'm assuming that is because sometimes there is response on the WAN and sometimes on the OPT1, however, I would expect it to either be correct in showing 2.4.5 or just fail. Since I've disabled OPT1 it's been correct every time I refresh. I know there is some kind of DNS issue on the AT&T side. I'm facing 2 issues that I see: Why DNS queries are sent out of OPT1 when the routing is still going out of WAN. Why DNS is failing and returning the wrong info over the DSL where it shows google.com at 192.168.1.254 and the Arris modem is trying to pass off the certificates. I assume that is because that is what the modem is sending. My best guess at this moment is that the DSL modem has been reset and is intercepting all of the traffic because it's waiting for a user to log in and activate. That's the only thing I can think of that would cause it to behave in this way. (I HATE DSL). I suppose what I need to know, then, is how to limit DNS queries to go out the interface that is the current route. I don't want queries going out OPT1 when routing has the data going over the WAN.
  • How to detect ISP Throttling / Shaping?

    1
    0 Votes
    1 Posts
    254 Views
    No one has replied
  • IGMP proxy not working properly, 2.4.5

    9
    0 Votes
    9 Posts
    2k Views
    P
    @penguin-nut Brilliant mate - many thanks - thats the starter for 10 i needed. I'll give it a shot at some point.
  • Export the Local User Database and Certificates.

    4
    0 Votes
    4 Posts
    900 Views
    R
    @viktor_g, the only solution is? pfSense-01: Export the Certificate and the Key. pfSense-02: Import the Certificate and the Key exported. Create a new User identical to the User in the pfSense-01. To edit the new User and select to use the Certificate imported. It's right? The problem is the password of the new User, isn't it? Regards, Ramsés
  • 0 Votes
    5 Posts
    595 Views
    viktor_gV
    What is your RADIUS server? FreeRADIUS or AD? Any 2FA features (like DIGIPASS)? can you check it with simple shared secret and userpass (like '123')?
  • Bypass openVPN with static route

    1
    0 Votes
    1 Posts
    301 Views
    No one has replied
  • Internet alias

    11
    0 Votes
    11 Posts
    2k Views
    johnpozJ
    And what sort of rules would you put in this group... Keep in mind rules on a network.. Quite a few of them you would want to be specific to that network... Pinging the specific interface for example - so you clients can validate they can actually talk to the gateway.. Maybe use dns to that interface... Sure you could allow dns to this firewall sort of rule.. Or you could use this firewall alias if you don't care if client pings another IP on the firewall.. How best to do the rules would depend on your specific setup and your specific wants and needs for what is allowed and what is not allowed. Do you even know what these are as of now? If so spell them out, and we can go through how you can do what you want with the min amount of rules. But smallest amount of rules is not always the best case.. Its very handy to put the rules on each interface so you can easy check with simple glance at that interface what that network can do.. Example... Here is a common sort of lock down that you might do for a network. [image: 1590528761374-rules.jpg] I can look at that, and in seconds understand exactly what this network can an can not do.. It can ping pfsense IP on that network, it can ask it for dns, it can talk to it for ntp.. Any other port it can not talk to the firewall on.. That would be any other vlan, or the wan.. It can not talk to any rfc1918 address - ie any other network at all.. Then anywhere else - Ie the internet, it can do anything it wants.. Those rules take all of like 1 minute to setup.. And are easy and clear and easy to understand. I don't have to check floating tab and look to see if a specific rule as interface X in it.. I don't have to check an interface group.. Here is a group rule... But what interfaces are in that? [image: 1590529041911-group.jpg] If I would just take the extra 15 seconds and put the rule directly on the interface - I can easy see on any network EXACTLY what the rules are for that network... I don't have to jump all over looking to see if floating rule applies or if group has interface X in it, etc.. So while these features are handy if you have 100's of interfaces.. If your managing a handful.. Its easier to just do the rules on the interfaces directly - even if you might have to duplicate a bit of work.. It will make your life easier going forward!!!
  • Why the extra NTP servers?

    9
    0 Votes
    9 Posts
    1k Views
    JKnottJ
    @jimp said in Why the extra NTP servers?: Best practice is to use no less than three NTP servers, for accuracy and redundancy. With one, you have no assurance the server is accurate. With two, you can't tell which one is wrong if they don't agree. With three, you can at least have a good chance at excluding an outlier. Yep. I have 3 stratum 1 servers and the pool. I figure that should be good enough. Also, according to what I read about multiple servers is the average is used, which results in better precision. BTW, here's an interesting book about accurate time from the NIST: From Sundials To Atomic Clocks
  • Connecting external drive via USB ?

    1
    0 Votes
    1 Posts
    150 Views
    No one has replied
  • 0 Votes
    2 Posts
    586 Views
    N
    Your modules don't need to 'vendor match' on each end, but they'll need to negotiate a link speed between them. SFP+ modules are typically 10G, while SFP are 1G. You CAN plug an SFP into a SFP+ slot, but you can't do the reverse. You'll have to look at module specifics if you want a 10G fiber to negotiate down to 1G, I've never done it and I don't know how well it's supported. Since it's a Supermicro chassis, and not something proprietary like Cisco, you should be able to pretty much use any vendor module on that side; I can't speak to UniFi on what modules they accept. So in a nutshell, you should be fine getting two 1G SFP UniFi (Ubiquiti) modules. Personally, I wouldn't pay $15+ for a 1G fiber module.
  • 0 Votes
    2 Posts
    367 Views
    N
    @chidmas said in Low bandwidth extremely low for local network to WAN however normal for pfsense box to WAN.: N3050 I'm wondering if your CPU is getting choked out, it's pretty low spec with only two threads. Have you tried, and can you provide, the following: Monitored the CPU load while doing the hard-wired speed test Provide the model of the Intel nic Do a direct connect speed test (remove all hardware, just pfsense + workstation) check your logs for any errors
  • No internet access with pfsense on my virtual machine (VirtualBox)

    6
    0 Votes
    6 Posts
    3k Views
    N
    @Gertjan Oh god! I did change what you suggested and it fixed my issue! I am not sure myself why i did change it but i'm defininitely learning from my mistake. Thank you so much!
  • High Availability in pfSense 2.4.5. Incongruity and BUG?

    6
    0 Votes
    6 Posts
    587 Views
    R
    @jimp, I'm sorry but I'm afraid that something is wrong because in "Firewall > NAT > Port Forward" works well, when I change the value of the Virtual IP (CARP) in "Firewall > Virtual IP" It updates dinamically in "Firewall > NAT > Port Forward" but not in "Firewall > NAT > Outbound". Example. Firewall > Virtual IP > VIP CARP DEDI_NIC_FO (Type: CARP) => 80.80.80.80 Firewall > NAT > Port Forward: In the NAT Port Forward Rule We select Destination: VIP CARP DEDI_NIC_FO [image: 1590508941581-01-nat-pf.png] In the Rule appears the correct value of VIP CARP DEDI_NIC_FO. [image: 1590508950882-02-nat-pf.png] Firewall > NAT > Outbound: In the NAT Outbound Rule We select Translation > Address: VIP CARP DEDI_NIC_FO. [image: 1590509285180-03-nat-out.png] In the Rule appears the correct value of VIP CARP DEDI_NIC_FO. [image: 1590509397980-04-nat-out.png] We Edit and Change Firewall > Virtual IP > VIP CARP DEDI_NIC_FO (Type: CARP) => 90.90.90.90 Firewall > NAT > Port Forward: In the Rule appears the correct value of VIP CARP DEDI_NIC_FO. It's changed dinamically. [image: 1590509542613-05-nat-pf.png] Firewall > NAT > Outbound: In the Rule appears the old value of VIP CARP DEDI_NIC_FO. It's not changed dinamically. [image: 1590509637187-06-nat-out.png] I think that It's not correct. Is this the correct way of operating or should It change dinamically too? Regards, Ramsés
  • Increasing quality graph resolution

    quality monitoring rrd logging resolution
    2
    0 Votes
    2 Posts
    827 Views
    DerelictD
    RRD intentionally aggregates data into larger intervals as the data gets older. The monitoring graphs are intended to provide troubleshooting information, not be a high-resolution, historical archive. For that you can query the device using something like cacti or zabbix or a plethora of others. Setting 8 hours x 1 minute resolution is pretty comprehensive. Anything longer than 8 hours and the resolution will be reduced.
  • fails to get WAN IPv6 address ( was wrong date and time)

    48
    0 Votes
    48 Posts
    4k Views
    JKnottJ
    @lifespeed So, don't select that. I don't know what you've done, but sometimes it's best to start from scratch, in case you did something you shouldn't have. Perhaps there's someone else here, who can help you with Comcast. My experience is with Rogers, where IPv6 works well.
  • Auto Config Backup not uploading

    11
    0 Votes
    11 Posts
    1k Views
    M
    I don't know why, but it started again on Sunday: Tue, 03 Mar 2020 02:00:18 +0100 (system): Scheduled backup Wed, 04 Mar 2020 02:00:19 +0100 (system): Scheduled backup ------- Sun, 24 May 2020 02:00:38 +0200 (system): Scheduled backup Mon, 25 May 2020 02:00:37 +0200 (system): Scheduled backup I haven't changed anything (not even a reboot).
  • Intermittent pfSense partial outage

    7
    0 Votes
    7 Posts
    546 Views
    R
    I have no good reason for using 8.8.8.8; I did this as part of trying to diagnose this issue, as the behaviour I was observing was that the internet was unavailable, but the gateway was still reporting as up, my supposition was that the ISP was prone to upstream failures - but I can revert this. I don't follow the recommendation (my lack of knowledge). Are you saying that the gateway alarm is result in openvpn restarting, and (for some reason) - that this resulting in being me unable to make connections outbound from LAN to WAN?
  • dev.ix.0.fc not persistent

    3
    0 Votes
    3 Posts
    509 Views
    V
    Yes found that yesterday while fiddling with sysctl ;) Made a PR to update the doc : https://github.com/pfsense/docs/pull/125
  • PPPOE weird Issue

    2
    0 Votes
    2 Posts
    521 Views
    L
    So I created a script in /usr/local/etc/rc.d/ containing /sbin/ifconfig re0 promisc which solves the problem. But why all of a sudden pfsense started behaving like this?
  • Clear interface statistics

    5
    0 Votes
    5 Posts
    5k Views
    RicoR
    AFAIK the Interface statistics are pulled from netstat counters and there is no way to reset them from the command line. The one and only way is to reboot. -Rico
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.