• Any way to hide disabled rules?

    1
    0 Votes
    1 Posts
    436 Views
    No one has replied
  • PfSense and logging to RAM

    2
    0 Votes
    2 Posts
    855 Views
    P
    There is a new advanced option in 2.1 that will allow the creation of a RAM disk to store logs on. It is documented somewhere, just search for it.
  • IPs added to sshlockout even with SSH not exposed to WAN

    1
    0 Votes
    1 Posts
    563 Views
    No one has replied
  • Need help with Squid transparent proxy

    10
    0 Votes
    10 Posts
    2k Views
    M
    It sounds like the transparent proxy is blocking port 443 which the game login might be using to authenticate. You either need to apply the proxy settings in the game itself or create an exception in the firewall rules for the game server IP address. Just my thoughts. Look at this post: https://forum.pfsense.org/index.php?topic=62256.msg405719#msg405719  and reply #243. This should also work for your situation.
  • Lost internet connectivity (Possible NAT issue) [[SOLVED]]

    1
    0 Votes
    1 Posts
    523 Views
    No one has replied
  • Monitoring a lan ip

    1
    0 Votes
    1 Posts
    587 Views
    No one has replied
  • Active Directory Authentication

    2
    0 Votes
    2 Posts
    1k Views
    D
    Reinstall the box.
  • Neoware E100 with Pfsense

    4
    0 Votes
    4 Posts
    1k Views
    GruensFroeschliG
    Some random lawyer sending your bills doesn't sound to me like something that stands any ground. In switzerland there are various places to get help with situations like this. I'm sure in germany there are similar agencies available (see http://www.beobachter.ch/justiz-behoerde/gesetze-recht/artikel/rechtsstreitigkeiten_rechtsberatung-zum-nulltarif/ )
  • IGMP Proxy with IPTV

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • PFsense 2.1.1 with RANCID

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Access Point setup

    7
    0 Votes
    7 Posts
    1k Views
    M
    Okay guys, I found out that the router has an option to use as an access point. It disables everything except for wireless. Thanks for the help. No double NAT or a different subnet
  • 0 Votes
    10 Posts
    2k Views
    stephenw10S
    Under Firewall: Virtual IPs: https://doc.pfsense.org/index.php/What_are_Virtual_IP_Addresses%3F#Proxy_ARP Steve
  • 2 minutes or more delay opening Dashboard

    4
    0 Votes
    4 Posts
    881 Views
    johnpozJ
    try disable the automatic update dashboard check In system-firmware-upgrade settings Dashboard check Disable the automatic dashboard auto-update check. If your connections are down your going to have issues with dns as mentioned, you could see if turning this off helps the dashboard display faster.
  • Kernel arp issue knocking out connectivity

    2
    0 Votes
    2 Posts
    920 Views
    jimpJ
    If that really is the MAC of the firewall, then look for a layer 2 loop. Something is causing the packets to come back into pfSense on that interface after it sends them out.
  • Pfsense on Alix 2D13

    15
    0 Votes
    15 Posts
    3k Views
    stephenw10S
    I don't have an Alix box to compare that behaviour to and I agree it's not what I'd expect to see on other equipment but if both boxes are doing it and one is working then it seems unlikely to be the cause of your problem. @opalit: less than 512M detected, disabling APC. That's normal on the Alix which has 256MB. Steve
  • PfSense hung: where do I start to debug?

    14
    0 Votes
    14 Posts
    4k Views
    M
    As an update: I by now have my replacement Dell, so I could test my pfSense1 to the memory test. It has been running memtest86 for 24 hours with no problem whatsoever. I also discovered in the bios the motherboard will automatically scale back the frequency; the bios said 'RAM 1600, actual 1333'. A wise man who knows many, many things whispered in my ear I should try the PSU (thank you, wise man  ;D), so this is what I will do next. And else I will remove pfblocker, since that appeared to keep on crashing on line 262 constantly. Thank you for your help  ;D
  • Unable to Send Traffic Across VPN

    3
    0 Votes
    3 Posts
    918 Views
    S
    Thanks, Phil! As it turns out, the only thing that was wrong was NAT (I already had the PIAGW assigned to LAN2). I really appreciate the explanation for the NAT situation.  I had read somewhere about setting NAT to manual but I didn't understand why.  When the rules automatically appeared upon selecting Manual, I assumed that the rules were present in Automatic and if they were present in Automatic, why change to Manual?  Since I'm not a NAT expert by any stretch of the imagination, it made sense to go back to Automatic rather than rely on a Manual set of rules. I've now assigned LAN1 to WANGW an it seems that the two LAN ports are working as I had hoped.  There a bunch more functionality I want to learn so I'll probably be posting more dumb questions; but that was a major hurdle. Thank again!
  • Pfsense vs CISCO ASA5510-SEC-BUN-K9

    5
    0 Votes
    5 Posts
    2k Views
    stephenw10S
    You can operate pfSense as a transparent firewall but if you do that it will not route or NAT. I guess the obvious answer to your original question is; it's much cheaper.  ;) Steve
  • Notification

    7
    0 Votes
    7 Posts
    2k Views
    D
    @jimp: 2. You have a cron job that generates an error or output Cron will email any output, not just error. Adding /sbin/sendmail to arpwatch pckage caused many emails sent from newsyslog job, which is left for some reason in pfSense 2.1 even if newsyslog is not included. But besides that, there are other packages, which may generate email - Snort is one example. The best workaround is to inlclude empty MAILTO in crontab file, however I do not think it was the best idea to include /sbin/sendmail in arpwatch without a way to turn emails off in the first place.
  • Created two new subnets but can't get them access to the internet

    4
    0 Votes
    4 Posts
    1k Views
    P
    For future readers - in pfSense 2.2 onwards you will be able to have a "hybrid" outbound NAT. That will leave Automatic Outbound NAT to generate the default outbound NAT rules and then you can add 1 or more manual outbound NAT rules to that. That means you can have some extra manual outbound NAT rules for special stuff (like for private subnets that are "hidden" behind another internal router), but then if you add another directly-connected LAN interface+subnet to pfSense you do not have to remember to add outbound NAT rules for it. It will "just happen" because automatic outbound NAT rule generation is still in effect.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.