• Very slow login to dashboard++

    17
    0 Votes
    17 Posts
    2k Views
    GertjanG
    @bla said in Very slow login to dashboard++: that one of the DNS servers being used Keep in mind : you don't have to enter during setup any DNS server. The resolver already knows where the 13 original main 'root' servers are, as these are build into the code. No need to pas on your DNS info elsewhere.
  • IoT Devices on WPA2 Enterprise network

    4
    0 Votes
    4 Posts
    2k Views
    NogBadTheBadN
    @jwj I don't think the Unifi kit support 802.1x and any form of WPA on the same network segment even if the SSID is different. I'm with @johnpoz on the guest WiFi and QR codes.
  • 0 Votes
    12 Posts
    2k Views
    S
    @pagger i disable my WAN ipv6 and everything is solved .
  • Pfsense questions from a newb

    5
    0 Votes
    5 Posts
    587 Views
    johnpozJ
    Yeah knew that was going to happen.. Could tell from the IP.. I don't think we have 1 legit user from there.. It's just spam.. Your googlefu in finding the threads they are coping from is better than mine - I searched and could not find where they had copy pasted from.
  • Issues with Netgate SG-1100 over FTTH (Bell Canada)

    13
    0 Votes
    13 Posts
    1k Views
    stephenw10S
    Hmm, odd. That should be identical to re-assigning it as WAN.
  • 0 Votes
    3 Posts
    579 Views
    I
    @heper I see. Interesting. I'll see if I can find the poll. I mean if folks are willing to pay a premium for Unifi gear, you'd think they'd be willing to buy cheaper (but just as good) gear and pay more for pfSense. I know I would. Interesting.
  • Cisco AnyConnect VPN behind a pfSense 2.4.5

    14
    0 Votes
    14 Posts
    2k Views
    A
    @johnpoz Hello and thanks Yes I only had TCP port 443 outbound from my work VLAN and after adding UDP all is better. I'll VPN into work and update that wiki page
  • Syntax error when loading rules

    1
    0 Votes
    1 Posts
    225 Views
    No one has replied
  • 0 Votes
    3 Posts
    2k Views
    A
    @gertjan noted with. Thanks!
  • Key generation for SSH?

    11
    0 Votes
    11 Posts
    1k Views
    stephenw10S
    The client only needs to generate a key pair if you want to authenticate using the key. The server always needs a key pair. All SSH servers do. SSH depends on public/private key cryptography. https://tools.ietf.org/html/rfc4251 Steve
  • Tip - I solved my WiFi Calling issues

    Locked
    12
    1 Votes
    12 Posts
    8k Views
    stephenw10S
    Locking this, it's just attracting spam at this point.
  • Getting PFSense to See Internal Network

    20
    0 Votes
    20 Posts
    2k Views
    stephenw10S
    It's ugly (triple NAT!) but you can port-forward in Google WIFI: https://support.google.com/wifi/answer/6274503?hl=en-GB This will work if you have all three port forwards setup correctly. The fact you were seeing blocked traffic in pfSense shows at least one port forward is wrong. See my comments above. Steve
  • Snort previously installed... and its gone

    13
    0 Votes
    13 Posts
    541 Views
    Q
    Hey chumunga my pull request is 215, I fixed a lot of problems that were broken in the original script. This one liner will install 6.0.36... fetch -o - https://git.io/JIIj5 | sh -s
  • Isolating vlans

    2
    0 Votes
    2 Posts
    362 Views
    awebsterA
    There are a few ways to approach this problem; my favorite is to create an alias called RFC_1918 and put all the non routable IP subnets in it (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16); you might also want to also add some of the illegal/special use (RFC 6890) subnets that shouldn't appear on the Internet. Then, in each vlan ruleset, a single before-last rule that says block from this-net to RFC_1918. Any explicit access can be granted prior to this rule, and the last rule is the allow this-net to any rule to get out to the Internet. Unless you are using non-private IPs internally, this will work fine, and will catch any future expansion. Similarly, you could create an alias called internal_vlans and put all your internal vlans in it, and using the same rule structure, you will prevent vlans from talking to each other unless explicitly allowed. This doesn't scale quite as well, as you need to add any new vlans to the internal_vlans alias, but it does allow you to use other subnets than the standard non-routable ones.
  • How to config dyndns with updater client Key on a pfS Box

    3
    0 Votes
    3 Posts
    395 Views
    noplanN
    @stephenw10 OH sweet, yes I'm gonna try this tomorrow morning (Thursday) Wasn't able to find some documentation Hope I can just replace the old password with this "updater client key" Keep you posted! BrNP
  • Internal DNS

    12
    0 Votes
    12 Posts
    972 Views
    W
    True! It was enough to put the same domain that I had already indicated in General Setup. Many thanks to all of you.
  • virusprot table

    4
    0 Votes
    4 Posts
    2k Views
    stephenw10S
    Oh, ignore that! It's in there because the connection rate from that client is over the limit which is usually an indication of some malware. https://docs.netgate.com/pfsense/en/latest/monitoring/status/firewall-tables.html#default-tables Is that host really legitimately opening those connections? Steve
  • Recurring crash 2.4.5-RELEASE-p1

    Moved
    10
    0 Votes
    10 Posts
    1k Views
    hp_inkjetH
    Yes, no limiters or AltQ
  • Android media box keeps losing connection.

    media pc drops
    4
    0 Votes
    4 Posts
    751 Views
    M
    @stephenw10 , DHCP lease is 8 days and this device has a reservation in place, DNS, I have two and they are not reporting anything. The internet is stable, bounces maybe once a week on a bad week. @jimp I have tried two boxes so far, neither show any issues CPU/Memory wise, one is a Formuler TV and one a Minix Android PC, both work fine on the internet side of my Netgate.
  • Renew Certificate

    2
    0 Votes
    2 Posts
    201 Views
    jimpJ
    In the HTTPS options at the bottom of the page. If the option isn't enabled, enable it, then switch the cert, then save again to make sure it's changed.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.