• [Removed]

    4
    0 Votes
    4 Posts
    1k Views
    H
    @Carreswag: … but im pretty sure it should still connect ... Well no, you have to decide a sensical setup first. Trial & Horror, with double routers, doesn't cut it. Suggest make it work with Bell-router, if signal true then replace Bell-router with pfSense.
  • Migrate from TMG Server 2010 Firewall rules and Policies to Pfsense

    3
    0 Votes
    3 Posts
    1k Views
    S
    If you are looking for a consultant, then I suggest you hire one. Otherwise RTFM. Its a 2-4hr job if they know what to do and can easily be done remotely. You just need one sitting at the office to establish the remote connection when switching from TMG to pfSense. @germain.safari: Hello, Currently we using TMG Server 2010 for publish our company website (using https and http), Exchange email, VPN for staffs to access company from outside, internet access and etc…. Kindly advice how can i take all those rules and policies from TMG to PFsense. Regards, GS
  • Weird issue haproxy behind ipsec tunnel

    3
    0 Votes
    3 Posts
    1k Views
    X
    Yes I know this but how can I get the log of connection without it ? I mean that if I disable the transparent ip I will read that connection are coming from pf. I need that only for ipsec tunnel or for a specific address webservers that are behind haproxy have to answer back directly. I mean that if I'm on 192.168.x.x and connected via ipsec to pf the LAN side of pf having 10.1.x.x , on this network we have  haproxy working on port 80 and 443, if i try to do an http://10.1.x.x it won't respond back ( any other port like ssh do ). Best regards
  • RRD Graph - System tab question

    4
    0 Votes
    4 Posts
    985 Views
    dennypageD
    https://redmine.pfsense.org/issues/4664
  • Bandwith Usage Per User

    4
    0 Votes
    4 Posts
    955 Views
    DerelictD
    Like I just said, pfSense's captive portal is time-based, not usage-based.  There is nothing in the gui that will tell you how much a user has transferred because pfSense doesn't care.  It cares how long a user has been connected.
  • Ping Response of PFsense Firewall

    3
    0 Votes
    3 Posts
    1k Views
    A
    Many Thanks for your reply. Worked like a charm.
  • MOVED: squid and squidguard not working after reboot

    Locked
    1
    0 Votes
    1 Posts
    397 Views
    No one has replied
  • Pf_test: kif == NULL, if_xname pppoe0

    3
    0 Votes
    3 Posts
    1k Views
    E
    Hi hsale, Disabling ACPI in BIOS worked for me. Anyhow "Thermal Sensors" monitoring wouldn't work.
  • Bios HHD pwd changed on pfsense machine, backdoor?

    16
    0 Votes
    16 Posts
    3k Views
    F
    @cmb: @firewalluser: Govt's especially the military have far greater resources than most businesses. Which was exactly my point. They also likely wouldn't be so sloppy about it as to get caught repeatedly. You have to be deploying systems over and over again with the same security hole(s) that eventually someone scanning finds and owns. Unless you're a high profile target, no one's going to waste a high value 0 day on you. Every time you use it, it's more likely to be found out. Who needs a 0 day as you rightly point out below, but then do you buy the stories the Govt dont have the money for xyz? @firewalluser: I think that only one device namely a rpi was used to access and configure pfsense on the default lan and all other additional nics to internal machines had to be enabled to the extent I have detailed here https://forum.pfsense.org/index.php?topic=92804.msg517267#msg517267 would suggest reasonable precautions had been taken? I would call that reasonable precautions. That's far better than most people. Still plenty of ways to be compromised. Some incident response definitely would be justified to figure out how that's happening to you. Well if my hd's with packet capture data and others werent being trashed I'd be able to provide something, unfortunately my hd's keep being trashed, making it difficult to provide any such data for analysis. But if you needed a backdoor into a system, hardware is where I'd put it as its virtually impossible to inspect as this vid explains from 2007. https://www.youtube.com/watch?v=VV_v_OEOhH0 Wake on lan has been around years since 1996. http://en.wikipedia.org/wiki/Wake-on-LAN#History So do you (or anyone else*) have any suggestions to overcome the hw issues? Apart from using older hw and perhaps usb nics (although some would suggest not using them) I dont have any other ideas to avoid getting hacked which could prove the hacking methods used especially considering this post of mine from earlier on in the year. https://forum.pfsense.org/index.php?topic=88180.msg486376#msg486376 *Like I said to Kejianshi, the logical thing to do is unplug from the net.
  • Firewall logging stopped

    6
    0 Votes
    6 Posts
    1k Views
    S
    I turned off ipv6 (deselect allow ipv6), and now firewall logging is working fine.  ???
  • Can you change the wireless MAC address of a SG-2440 Security Appliance?

    10
    0 Votes
    10 Posts
    1k Views
    C
    @hal99: I asked in case it had any restriction or the wireless card has something else weird that prevents you from changing the MAC. The only situation where I've ever heard of MAC spoofing being a problem is on a minority of the crap Realtek 8139 100 Mb NICs. Even then it works, but you have to keep the NIC in promiscuous mode all the time for it to function with a MAC other than its own. The NICs we sell, wired or wireless, certainly won't have any such issues. @firewalluser: Without all the data how can you form a judgement? It's really far-fetched to think there are wifi exploits out there so awesome they can own you through the air (a type of vulnerability that's proven very rare to date), but so lame they're foiled by changing your MAC address.
  • Error 128 lba 24852783 after power outage

    2
    0 Votes
    2 Posts
    1k Views
    C
    There's a very good chance that drive is dead. You can try a reinstall, but that's about as low level of a failure as you'll see short of the drive not being detected at all. I'd run the HD diag tool from the vendor of the hard drive first, and only reinstall if thorough tests come back clean.
  • PfSense on exploit DB

    4
    0 Votes
    4 Posts
    2k Views
    C
    @wifiuk: I'm assuming 2.2.2 fixes these? from that link: "Solution: Update to pfSense 2.2.1" 2.2.1 fixed that one.
  • Alerts and monitoring of IPSec tunnel

    2
    0 Votes
    2 Posts
    1k Views
    F
    If you can see some sort of notice in the logs, perhaps one method would be to use some browser automation like http://www.seleniumhq.org/ to log in and check every few minutes, download the log, parse it and if error message is detected raise an alert via a variety of means beit email, phone or text. https://freeswitch.org/ could help you raise the alerts quite easily and runs on a few OS's. fwiw.
  • DNS probe finished error

    2
    0 Votes
    2 Posts
    4k Views
    D
    WTH is DNS probe? Did you install some "helpful" plugin? Ping pfSense by IP works? Ping 8.8.8.8 works? Ping www.google.com works? traceroute, nslookup? No info here.
  • MOVED: DNS config for local webserver with subdomains

    Locked
    1
    0 Votes
    1 Posts
    349 Views
    No one has replied
  • This doesn't look good –- Cam Scanner---- listed under System Activity

    Locked
    9
    0 Votes
    9 Posts
    3k Views
    N
    Well, technology, more often than wanted, makes me a bit paranoid. Why is it whenever you jump to conclusions, those conclusions are rarely good?
  • No loader.conf.local in freash 2.2.2 install

    3
    0 Votes
    3 Posts
    889 Views
    C
    If you never created one, it's not there. If you need to put something there, create the file.
  • MOVED: dar Internet sin tener habilitado dhcp

    Locked
    1
    0 Votes
    1 Posts
    342 Views
    No one has replied
  • Solarwinds Config Backup stop working with 2.2.2

    1
    0 Votes
    1 Posts
    438 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.