• PowerD freezes system: Xeon E3110, Intel DG41TY MB, 4GB, 2.1.3

    2
    0 Votes
    2 Posts
    904 Views
    J
    Well, it's not the E3110, as it works fine on an Optiplex 755.  Apparently I stumbled upon 2 motherboards PowerD does not like.
  • To check pps performance source code in RRD graph?

    2
    0 Votes
    2 Posts
    857 Views
    stephenw10S
    In the RRD graphs 'm' means milli (10^-3). It uses that for numbers smaller than 1. 'M' means Mega (10^6). Steve Edit: Typo
  • Port forwarding not working

    14
    0 Votes
    14 Posts
    2k Views
    johnpozJ
    So is this UDP or TCP.. You have both setup in the forward and firewall rules. Nat reflection IMHO should always be last option..  Clients on the local network, should resolve the host of the service your trying to use to its local IP.  Clients on the outside should resolve to your public, and then yes be forwarded in. AFIAK udp reflection doesn't even work, or there were issues with it that may have been resolved?  As to details your missing - for starters what version of pfsense are you using?  Is this pfsense a physical box or a VM?
  • Simple Routing Question

    3
    0 Votes
    3 Posts
    900 Views
    stephenw10S
    You don't need a firewall rule. That traffic doesn't go through the firewall. But if that interface is wireless then you need to enable communication between wireless clients. If it's a wifi NIC in the pfSense box that setting is called 'Allow intra-BSS communication' and it's on the interface setup page. If you have a wifi access point connected then it will probably also have a similar setting. Edit: Typed too slow!  ::) Steve
  • Cached download files for Internet Download Manager

    1
    0 Votes
    1 Posts
    715 Views
    No one has replied
  • Upnp/nat stopped working with recent update.

    10
    0 Votes
    10 Posts
    3k Views
    C
    @stephenw10: Have a read through this thread: https://forum.pfsense.org/index.php?topic=76538.0 Steve @razzfazz: If you're on 2.1.3, you can use the "System Patches" package to either either revert the original commit, or to apply my fix until a new build is released. I went in and changed the two files in https://github.com/pfsense/pfsense/commit/d973a602abeab78803fce467198c571ba25ec0cb Everything is working perfectly now. Thanks again everyone. This case can be closed and marked as solved. Remember to make note of this if others come in with the same issue.
  • Remove Old Interface

    2
    0 Votes
    2 Posts
    2k Views
    V
    The RRD graph will be displayed as long as the relevant log file exists. Reset RRD data will remove all log files and resolve your issue. If you want to remove a single log file and keep the other data you have to remove it manually. To do so, in Diagnostic > Command prompt execute "ls /var/db/rrd/*.rrd" to display all existing RRD log files. Then remove the one you want by executing "rm /var/db/rrd/<rrd file="">.rrd".</rrd>
  • View active connections

    3
    0 Votes
    3 Posts
    9k Views
    BBcan177B
    Hi Hell0s, If you edit the rule that you created to allow the Web access, scroll to the bottom of the rule and you will see a checkbox for logging. "Log packets that are handled by this rule Hint: the firewall has limited local log space. Don't turn on logging for everything. If you want to do a lot of logging, consider using a remote syslog server (see the Diagnostics: System logs: Settings page)."
  • 0 Votes
    4 Posts
    1k Views
    M
    Thanks kpa. Like most errors where you bang your head in the wall for hours w/out any progress, it turned out to be stupid simple: lack of gateway. It was that, combined with shitty consumer grade hardware with very poor configuration options.
  • PfSense Upgrade system or Packages first

    4
    0 Votes
    4 Posts
    1k Views
    G
    After update pfSense always installs the latest versions of the packages, not the same versions that were installed before update, right?
  • IGMP Proxy IPTV Enable Downstream locks web interface

    12
    0 Votes
    12 Posts
    4k Views
    G
    Hi Yes I'm using BT, will checkout the link thanks. Andy
  • # of processes increasing

    2
    0 Votes
    2 Posts
    841 Views
    jimpJ
    Run "ps uxawww" and then save that somewhere, come back in a couple days and run it again. See what is in the second list but not the first.
  • Something is causing High CPU load

    6
    0 Votes
    6 Posts
    2k Views
    stephenw10S
    Yup, that's a better solution that just blocking things in the firewall. It seems likely that your previous router did support IPv6 and was doing so correctly, hence no errors on pfSense. Your new router is inferior!  ;) There might be more recent firmware available for it. Steve
  • PfSense as VPN Concentrator/Server

    2
    0 Votes
    2 Posts
    1k Views
    D
    My first instinct would be to suggest that you simply replace the SonicWall with pfsense….. 8) I understand that may be an ambitious start, and while I'm no expert at SonicWall, I seem to recall you can create a DMZ port in SonicWall. You should be able to present that port to the WAN port on pfsense much as you would to an internet facing Web server. That should let you create an IPSec tunnel to the pfsense box.  The LAN side of pfsense will have to "merge" with your existing LAN subnet, unless you're willing to dedicate a new subnet just for the pfsense IPSec. If you can give some more details (and/or diagrams) about what you envision this setup to look like, maybe we can help you arrive at a solution.
  • 503 - Service not available in Dashboard

    4
    0 Votes
    4 Posts
    1k Views
    M
    Reset to factory defaults got me going here.  couldn't find anything less invasive …. :(
  • Daily (or weekly, or monthly) quotas per user?

    5
    0 Votes
    5 Posts
    2k Views
    T
    @jimp: You'd have to use Captive Portal + RADIUS accounting and then the RADIUS setup would handle the bandwidth tracking and long-term decisions. Well, that sound complicated!
  • Limiter works sporadically, works after states reset

    1
    0 Votes
    1 Posts
    665 Views
    No one has replied
  • Access control at the network level

    6
    0 Votes
    6 Posts
    4k Views
    jimpJ
    Correct.
  • PfSense as a stratum 1 time server

    6
    0 Votes
    6 Posts
    2k Views
    mcdonnjdM
    @stephenw10: Conversely I would be less likely to do it on a work box just because the consequences of some yet undiscovered NTPd exploit would be so much worse. If my home firewall goes down for whatever reason I get grief but I'm unlikely to find the locks have changed when I get back. If a firewall I'm managing for a business goes down (or worse gets owned) because I opened NTPd to WAN as a public service that's a different matter. You could see this as simply increasing the attack surface of a the firewall which is never a good thing. If you want to run a public NTP server the firewall should not be your first choice.  ;) Or there's always the possibility some company could make a consumer router and hard code your IP address in the firmware and set a ridiculous refresh rate when it can't reach the server and end up having you be flooded by tons of NTP traffic, bringing your network to a grinding halt. (This actually happened to the University of Wisconsin, courtesy of Netgear: http://pages.cs.wisc.edu/~plonka/netgear-sntp/) But as mentioned, at work, I would not be running this on the firewall. (We run an ASA at work, though I've mentioned switching to pfSense when the discussion of replacing it has come up. Though I believe the last word on it was simply increasing the memory on it instead, though I don't believe that has happened yet.) My FreeRADIUS (on FreeBSD) server would be the most likely candidate for being a stratum 1 server (currently I believe it's a stratum 3) unless I special built a machine specifically for NTP.
  • Will this be Fixed?

    6
    0 Votes
    6 Posts
    1k Views
    stephenw10S
    That's unlikely to work because the pfSense box will not route the traffic with only one IP. You could do it if you don't have Squid in transparent mode. Steve
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.