• Traffic Graph from pfSense live on website?

    1
    0 Votes
    1 Posts
    833 Views
    No one has replied
  • No automatic Outbound NAT

    5
    0 Votes
    5 Posts
    2k Views
    johnpozJ
    Not sure where helper got the idea that manual rules have to be empty in the first place?  When you switch back to automatic, the manual rules are not even looked at. You can verify that for yourself with a simple look see with  pfctl -s nat So in manual mode you will notice very specific rules pfctl -s nat no nat proto carp all nat-anchor "natearly/" all nat-anchor "natrules/" all nat on em1 inet from 192.168.1.0/24 to any port = isakmp -> 24.13.xx.xx static-port nat on em1 inet from 192.168.1.0/24 to any -> 24.13.xx.xx port 1024:65535 nat on em1 inet from 192.168.2.0/24 to any port = isakmp -> 24.13.xx.xx static-port nat on em1 inet from 192.168.2.0/24 to any -> 24.13.xx.xx port 1024:65535 snipped the rest xx out part of my wan address. Now look at same rules while in automatic mode pfctl -s nat no nat proto carp all nat-anchor "natearly/" all nat-anchor "natrules/" all nat on em1 inet from <tonatsubnets>port = isakmp to any port = isakmp -> 24.13.xx.xx port 500 nat on em1 inet from <tonatsubnets>to any -> 24.13.xx.xx port 1024:65535 no rdr proto carp all I assure you my manual nats are still there and what do you no the nat rules changed to generic rules using <tonatsubnets>So what I suggest you do is take a direct look at what your nat rules are via  pfctl -s nat when you switch between manual and automatic. [image: manualruleslistedwhileautomatic.png] [image: manualruleslistedwhileautomatic.png_thumb]</tonatsubnets></tonatsubnets></tonatsubnets>
  • Set mtu 1492 on WAN

    1
    0 Votes
    1 Posts
    795 Views
    No one has replied
  • Intermittent system hang

    3
    0 Votes
    3 Posts
    826 Views
    S
    Well, After 15 hours hunting, it turned out to be a digital asset management system (photo and video management) that had gone odd. It runs in a virtual machine hidden in the depths of our system. I ended up turning connections off at the routing switch in the heart of our network until the firewall started up again, then followed the network until I hit on that machine. One reboot later and a happy network. Why is it always a simple solution that takes hours to find :)
  • Restore of a dump

    1
    0 Votes
    1 Posts
    608 Views
    No one has replied
  • Pfsense, HP Procurve 5412, VMware and VLANs

    3
    0 Votes
    3 Posts
    1k Views
    T
    All inter VLAN traffic will be routed by the Procurve 5412 which is our core switch which is working fine. Any traffic to the internet will be sent to the firewall which is pfsense. If your traffic is simply being sent to pfSense from your core switch (which would mean it's all done at layer 3), you don't need to mess with VLANs at all on pfSense. VLANs are a layer 2 concept, and your switch is dealing with it. Set the default route on your switch to your pfSense address, leave all the VLAN stuff off on your VMWare box and within pfSense, and you should be fine. I am running nearly the same thing (with a Brocade core), and only have to mess with VLANs in pfSense if my switch is not routing them. You will probably, however, want to set up a point-to-point connection between pfSense and your switch (just a /30 will suffice) to prevent pfSense from getting hit with unnecessary broadcast traffic.
  • Unaccounted For Wan Traffic

    2
    0 Votes
    2 Posts
    982 Views
    jimpJ
    If you're using a proxy such as squid, this has been known to happen if you're trying to cache things such as Windows Updates. Squid will sometimes attempt to download a full file or revalidate the cache even if a client stopped the initial request.
  • 0 Votes
    3 Posts
    931 Views
    B
    Have you tried to ping the printer from windows?
  • Cable WAN doesn't work, VDSL does, laptop direct does work

    4
    0 Votes
    4 Posts
    1k Views
    stephenw10S
    No problem, glad my wild guess proved at least somewhat helpful.  ;) I'm unsure about the status of Squid with multiwan. Certainly what I said, that it always uses the default gateway, used to be true but things may have changed since I last tried it. I'm not running Squid here at home which is the only place I have multiwan connectivity. Time to do some research…. Way out of date: https://doc.pfsense.org/index.php/Troubleshoot_Outbound_Load_Balancing_Issues#Squid_doesn.27t_seem_to_be_using_both_connections Steve Edit: This looks fairly comprehensive, haven't tried it myself though: http://www.communig8.com/articles/64-open-source/137-pfsense-multi-wan-how-to-really-make-it-work
  • RRD Graph Oddity

    1
    0 Votes
    1 Posts
    703 Views
    No one has replied
  • High ping and packet loss in local network

    29
    0 Votes
    29 Posts
    17k Views
    B
    @dreamslacker: I dislike the wizard, it never gives an optimal solution (nor should it since every use-case is different). Nevertheless, you can run the wizard but remove all upperlimits in all queues once it's done.  I've found that it increases latencies across the board (usually when it's active on the queue and occasionally at low loads) for some unknown reason. I've settled on manually setting up my own queues and settings damn nearly since day 1 (pfSense 1.2rc2). I will try your advice, thanks ;) Glad you got your issue solved.. I want to do some more testing in my own DC, trying to find these sub .2 ms response times..  So couple of cisco switches yesterday I pinged from one to the other.. Now the IPs were SVI on a vlan, but switches not doing anything and directly connected was seeing .4 ms roughly..  Which is bit of difference from .1 ms ;) I will be keeping an eye out.. I just personally don't recall seeing such low response times even just local lan with directly connected equipment unless you were pinging loopback, local IP, etc. But I will be paying more attention in the future on the hunt ;) Thx :) I advice you to try to ping a zeroshell box! Just out of curiosity :D
  • Pass-through MAC - help!

    1
    0 Votes
    1 Posts
    662 Views
    No one has replied
  • Editing /var/etc/ntpd.conf doesn't work

    3
    0 Votes
    3 Posts
    1k Views
    S
    @ptt: https://forum.pfsense.org/index.php/topic,71396.msg389748.html#msg389748 Thank you. Any links about upgrading a service manually? Thanks again.
  • LAN and VLAN on same interface, how to solve with switch?

    6
    0 Votes
    6 Posts
    7k Views
    R
    Also note that a bunch of not-so-high-end switches (e.g. Dell PowerConnect 2xxx) won't allow you to move the management interface to a VLAN other than 1, and require VLAN 1 to be untagged.
  • 12 second delay on some but not all web connections.

    2
    0 Votes
    2 Posts
    980 Views
    S
    Same boat here, intermittent web page loading on 2.1 single WAN cox cable here. I thought it was dns timing out at first, but doesn't matter if we are using dnsmasq, or direct to pubic dns servers. The clearest way I can describe it from a users perspective, is the browser shows 'connecting' for 10-12 seconds before either loading the page or timing out.  It happens once every 10 loads maybe.  Switching back to another router solves the problem, but I'd prefer to use pfsense. I've tried the df bit option, enabling disabling dnsmasq, enabling wan side ping, turning off checksome offloading, I can't figure it out.  I'm about to try out monowall and see if the same thing happens. Hardware wise I'm on: http://www.newegg.com/Product/Product.aspx?Item=N82E16816101364
  • RRD history lost on reboot on Alix board (nanoBSD)

    1
    0 Votes
    1 Posts
    573 Views
    No one has replied
  • URL filter active on one WAN only with dual-WAN setup

    2
    0 Votes
    2 Posts
    650 Views
    P
    If the special sites are ones that have quite well-defined IP address(es) (i.e. they are not huge pools of rotating IPs like FaceBook…) then Aliases should work. Say you have WAN and SAT links, and you want some special things to fail over to SAT when WAN is down, then make a gateway group, FailoverToSAT, WAN = Tier 1, SAT = Tier 2. Make an Alias SpecialSites with the names of the sites you want to fail over (myspecial.mailserver.com importantsite.com pfsense.org ...) At the top of your LAN rules, put a rule: Pass, IPv4, protocol any, source LANnet, destination SpecialSites, gateway FailoverToSAT.
  • Question regarding static clients and pfSense implementation

    2
    0 Votes
    2 Posts
    674 Views
    B
    Thanks in advance everyone (:
  • Impossible speeds in Status: Queues?

    1
    0 Votes
    1 Posts
    820 Views
    No one has replied
  • Squid + SquidGuard

    1
    0 Votes
    1 Posts
    875 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.