• Importance of crypto performance (quick Q)

    4
    0 Votes
    4 Posts
    858 Views
    H
    Just like HTTPS, the cost of the encryption is borne by the end-points that terminate the connections. If the VPN is done by the clients through the firewall/router, it doesn't cause any additional load. They're just packets.
  • 0 Votes
    5 Posts
    6k Views
    P
    Thanks again, for your most recent comments….much appreciated! I will go ahead and implement your suggestions. So, I just received the wireless card, stuck it in the pfSense box, and voila, it seems to get recognized pretty well. Other than assigning the interface to OPT2, I haven't done anything with it as yet (still have to figure out how to setup the pfSense box as a router). Alongwith the wireless card I had also ordered a second "StarTech 1-Port 10/100/1000Mbps PCI Ethernet Card - Model #: ST1000BT32", which I also stuck into the pfSense box at the same time. Assigned OPT1 to this interface. The cost of each of these cards is approx. $15....so I've invested #30 for the 2 cards. I know it's a cheaper option, but would it be wise to stick with these 2 cards (having spent just $30) versus purchasing a used HP 4-port card for $48  + tax + shipping (approx. $60) from eBay? In other words, would I ever need 5 gigabit ports (as opposed to just 3), and also bear in mind that these 2 single port cards are just PCI (not PCIe), whereas the used HP card is PCIe. Would that make a big difference, and therefore would make more sense for me to pay more and just buy the 4-port card?
  • Detecting intruders

    3
    0 Votes
    3 Posts
    1k Views
    KOMK
    I'm not sure how to tell what is visible from the outside world. Look at your firewall rules on the WAN tab.  That's what is visible to the outside world.
  • Subnetting theory for added security

    4
    0 Votes
    4 Posts
    992 Views
    DerelictD
    Yeah, that works for one AP.
  • [SOLVED] Need help setting up second Subnet.

    6
    0 Votes
    6 Posts
    1k Views
    DerelictD
    Yeah because when you're bridging you have to get everything just right. Because you're trying to use a router as a switch, you might have to tell the filter to let traffic into an interface for the same subnet if you built the bridge wrong. Just get a switch. A $24 one from Fry's will be better than a bridge. Complete waste of a good router interface.
  • LAN & OPT1 share a Chromecast?

    4
    0 Votes
    4 Posts
    1k Views
    M
    Well, I seem to have it working. I'll have to get a sanity check on my firewall rules for all my networks later this week. Since the two auxiliary APs get turned off when not in use they aren't exactly a security risk all the time.
  • Pfsense default security question

    2
    0 Votes
    2 Posts
    612 Views
    V
    It would be equal. pfSense allows by default any traffic from LAN to WAN, but no one from WAN to LAN. A consumer router does the same, unless there is no "service port" opened or something like that. You should take a look at the configuration to be on the safe side.
  • Adding new interface - getting DHCP addess but no connectivity

    7
    0 Votes
    7 Posts
    1k Views
    I
    Thanks for your help but need to cut my losses and resetting to factory. I may have made a setting change along the way that's causing the issue. If not, this will help me narrow down my problem anyway.
  • What makes the 32-bit version 2.1.5 the fastest openvpn performer?

    8
    0 Votes
    8 Posts
    2k Views
    T
    How can a VPN get real world throughput of 125Mbit/s on a 100Mbit/s capped connection? My ISP most of time gives you a bit room over the cap. As can be seen when openvpn is off. Why would your speedtest server not be in area of your exit point? Chicago is the vpn exit point. more than 400 miles away from me. The test without openvpn was with a local server. That is why I cut that part away. Are you using UDP or TCP?  What cipher? etc.. UDP and ase-128-cbc And then check it going through the vpn I did not do a traceroute, but I always do DNS leak test making sure my IP is the IP as the VPN provider's IP, in this case the Chicago. If you really want to test then you need to make sure everything is same other than changing version I know this is not scientific testing. However, all the tests I ran were done with exactly the same setting and in the same way. I understand it will vary. But i have been consistently getting better result with this version. I am not the only one observed this. Here is another thread reporting vpn speed drop after upgrading from 2.1.5 to 2.2.2. https://forum.pfsense.org/index.php?topic=88758.msg490684#msg490684
  • Admin Account Disabled, can still use credentials for SSH Access

    3
    0 Votes
    3 Posts
    1k Views
    D
    Sincere apologies for the late response, The device is not yet in production, so i will test disabling the FreeRadius and again disabling the admin account and test SSH, will let you know the outcome. Thanks for your support it is appreciated. Regards Darren
  • Pfsense wiki

    2
    0 Votes
    2 Posts
    716 Views
    V
    https://doc.pfsense.org/index.php/Main_Page These?
  • Need your advice

    11
    0 Votes
    11 Posts
    3k Views
    G
    ESX has a minimal performance hit. You won't notice it so long as you don't overload it. You don't need pfsense and Sophos UTM. They each have their strengths and weaknesses, but trying to use both would be complicated. You don't need a LAGG capable switch to use multiple physical NICs in an ESX box. You can configure ESX so that it keeps the same virtual machine MAC address associated with the same physical NIC. That way, a non-LAGG switch sees the same MAC addresses on the same ports and doesn't get unhappy. I may be wrong, but I think that is actually the default (I haven't looked for a while). With the setup you describe, you don't need multiple ports anyway. Your clients only hit the ESX box to hit the Internet, and you are limited to way less than gigabit speed there anyway. You clients will talk directly to each other, so you don't need high bandwidth to ESX/pfsense for that. Don't worry about the two unused NIC ports. Trying to force them into use won't make anything perform better, and will just make things more complicated.
  • 0 Votes
    1 Posts
    569 Views
    No one has replied
  • WAN interface losing connectivity 5-10x daily - uber-thread!

    3
    0 Votes
    3 Posts
    2k Views
    D
    All the log extracts in the original post show is the link cycling on the igb0 interface, with the inevitable consequences of pfSense stopping, starting and reloading various services. The original post is now 13 months old and refers to an obsolete and end of life version of pfSense that is based on an obsolete and end of life version of FreeBSD. If you have an issue with link cycling, it would be best if you describe your issue afresh, enclosing relevant log extracts.
  • Resolver vs Forwarder? Difference

    5
    0 Votes
    5 Posts
    1k Views
    F
    @johnpoz: If your worried about dns queries being tracked by a specific dns provider.. Why would you not just use the resolver and send it out your vpn connection?? Would you care to explain how that works?  Not understanding still how the resolver would work in this case?  If it's still using root DNS to queries, then there is still logs of websites being accessed, though not by my IP, only through VPN's IP.
  • Best way to Set this Up.

    3
    0 Votes
    3 Posts
    957 Views
    johnpozJ
    if you want to put those servers on their own network, just create a vlan in pfsense and move them there.  Then you can firewall those servers and your normal 192.168.1.0/24 and as KOM already stated vpn into your network would be the best way, then have rules so he can only rdp to those 2 specific servers in pfsense firewall rules for you openvpn connection.
  • NFS client

    8
    0 Votes
    8 Posts
    2k Views
    B
    @johnpoz: couldn't you just add sshfs and then mount what you want that way?  I know there is a fusefs-sshfs package.. Never heard of sshfs but will investigate
  • ARP and llinfo error on interface drop when interface has a static route.

    2
    0 Votes
    2 Posts
    814 Views
    D
    An old thread on the Overclockers forum suggests that this is a problem with apinger, the monitoring daemon. apinger is a very troublesome piece of code. In 2.3, apinger has been replaced by dpinger, which is vastly superior. Repeat your tests with the latest 2.3 beta snapshot - if the issue cannot be reproduced there, then the issue is resolved in a forthcoming version and no further effort need be expended on investigating the issue. Though it is still a beta version, the pfSense 2.3 base system is now pretty stable and contains numerous valuable fixes over pfSense 2.2. The main shortcoming of 2.3 at this time is with packages - some packages are unavailable for 2.3 whilst others do not have a fully functional GUI. To get a failed pre-2.3 system back into operation, the chances are that all you need to do is restart apinger (for example using Status -> Services). If you don't need gateway monitoring, you may be best choosing "Disable gateway monitoring" for the affected gateway(s) until such time as you can upgrade to 2.3.
  • Spurious DNS Servers

    3
    0 Votes
    3 Posts
    790 Views
    B
    Thanks, that worked.
  • Create bridge 2 vlan

    1
    0 Votes
    1 Posts
    573 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.