• Unable to access Internet from WIFI AP

    28
    0 Votes
    28 Posts
    3k Views
    johnpozJ

    192.168.3.1.53: UDP, length 39

    So that is your client at 192.168.3.3 asking for dns.. Pfsense does not answer - so no how would the client go to any website? if can not look it up.  So looks you do not have unbound running or forwarder working at all.

    Or you don't have any firewall rules on this interface to allow access?  The lan interface would have a default any any rule on it.  Some new interface you created would not have any rules you would have to put either an any any or the rules you would like to allow.

    Pfsense will create behind the scene firewall rules to allow for dhcp to work.. But I only see this
    23:37:25.457114 IP 0.0.0.0.68 > 255.255.255.255.67: UDP, length 300
    23:37:25.457435 IP 192.168.3.1.67 > 192.168.3.3.68: UDP, length 300

    there should be more.. from what have to assume is the discover there to FF:67, the answer would be a offer - but you should then see a request and ack..

    But clearly from this whatever .3 is sending traffic to .1 (pfsense)..  I take it .3 is a wifi client?  So where are the rules on this interface on pfsense?

  • 0 Votes
    4 Posts
    2k Views
    E

    After to clear the cache, the problem was solved.

    Thanks.

  • Firewall want boot

    4
    0 Votes
    4 Posts
    577 Views
    GertjanG

    It is always usefull to run a fsck on a system.
    At best, it finds nothing to do. Your disk is marked clean again and the system will boot.
    At worst, it will tell you it could repair things and you know you won a trip to the local "new disk store".

    The situation is pretty identical to what we have been seen the last two decades with a non-clean shutdown of a Windows PC. It's CHKDSK time ;)

  • Captive Portal User Problem Can't Directly or Automatically Disconnect?

    2
    0 Votes
    2 Posts
    783 Views
    GertjanG

    Hi,

    Can you detail what method you have chosen for authentication ?

    Try this:

    Read https://doc.pfsense.org/index.php/Captive_Portal_Troubleshooting (this is the doc that explains everything - never leave home without it)

    Access console and run

    ipfw table all list

    See that _auth_up tableand _auth_down table contains IP AND MAC of every authenticated device.

    Disconnect all users.

    Set soft time out on portal interface to 10 minutes.
    Set hard time out on portal interface to 15 minutes.

    Use a device (the PC, Smartphone, pad, whatever) to authenticate.
    Run

    ipfw table all list

    again and see that your device is on the list - the two tables. Is this MAC and IP the IP and MAC of your device ??

    Shut down wifi on your device.

    After 10 minutes probably and 15 minutes sure the tables will be empty.
    Run

    ipfw table all list

    every minute or so to to check.

    Activate wifi on device and check that connection to the Internet is lost.

  • Wireless LAN Controller

    2
    0 Votes
    2 Posts
    348 Views
    DerelictD

    No.

  • General Setup with Home Router

    4
    0 Votes
    4 Posts
    873 Views
    1

    Thanks Guys

    actually got it to work :)

  • Blocking Google Images Search

    3
    0 Votes
    3 Posts
    1k Views
    I

    I have a same issue

  • Image Blocking

    1
    0 Votes
    1 Posts
    242 Views
    No one has replied
  • Should i disable the dhcp on my router when i enabled dhcp on pfsense?

    7
    0 Votes
    7 Posts
    1k Views
    JKnottJ

    I'm not saying more than one DHCP server is needed on a small network, but many people are of the opinion that you can't have more than one and that's nonsense.  As I mentioned, it is possible and is done for redundancy.  Incidentally, today I was working in the Bell Canada lab, and guess what I saw.  Lots of redundant everything, including DNS servers.  I didn't specifically see them for DHCP, but I wouldn't be surprised if they were there..

    As I mentioned, one issue that may occur with DHCP servers is multiple servers handing out the same address.  These days, the trend is to Duplicate Address Detection, which avoids that problem.  While DAD is mandatory on IPv6 and commonly used on IPv4, you can't guarantee every IPv4 device uses it, so it's best to have different address ranges for each DHCPv4 server.

  • OpenVPN - TLS error

    1
    0 Votes
    1 Posts
    277 Views
    No one has replied
  • Firewall Rules

    4
    0 Votes
    4 Posts
    556 Views
    R

    Thanks guys! =)

  • WebUI unaccessible after Phase 1 configuration

    1
    0 Votes
    1 Posts
    168 Views
    No one has replied
  • URLs Aliases causing system (or rather network) downtime

    3
    0 Votes
    3 Posts
    426 Views
    KOMK

    Start a new thread if you have a problem instead of digging up this zombie.

  • How to block HTTPS Facebook and Youtube in a specific time and IP range??

    5
    0 Votes
    5 Posts
    5k Views
    I

    @pf$george how did you get all IPs of Facebook? Did you list down all IP ranges stated in the https://ipinfo.io/AS32934 website?

  • Migrate VLAN to a dedicated network port

    4
    0 Votes
    4 Posts
    384 Views
    F

    Thanks it was as easy as changing the Interface > Assignments to a new different port.

  • IMAP, SMTP traffic problem

    4
    0 Votes
    4 Posts
    885 Views
    KOMK

    Those spurious retransmission and Dup ACK errors are going to hang your connection and cause the issues you are seeing.  Do you see those errors for any other communications, or just with this mail server?

  • Chatty logs and most in err log level

    2
    0 Votes
    2 Posts
    504 Views
    G

    Still no insights?

  • Unsure where to put this

    1
    0 Votes
    1 Posts
    257 Views
    No one has replied
  • Install cron on 2.3.4: no way

    2
    0 Votes
    2 Posts
    330 Views
    H

    change the update settings to stay on the 2.3 branch

  • Monitoring local traffic?

    4
    0 Votes
    4 Posts
    719 Views
    I

    Thank you both. This was the "not an expert" qualification, although this seems pretty basic so I am embarrassed! It would appear that this traffic is simply between source and dest and pfSense isn't seeing anything.

    I don't have a managed switch, though will be getting one soon to set up VLANs. Maybe I can try again then.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.