@periko , love your idea. That would be possible in the near future, no one needs a powerful pc and an it support/person anymore all will be done with VM and AI.
I just found the answer in the blog pages.
"The new log size will not take effect until a log is cleared or reinitialized. This may be done individually from each log tab or it can be done for all logs using the [Trash-button] Reset Log Files button on this page. See Adjusting the Size of Log Files for more."
@KpuCko said in How I can assign same vlan to multiple interfaces:
My thoughts are I expect to be able to do switching and routing with one device
You can - just get a box that has switch ports in it, that does routing.. SG3100 has switch ports, the new sg2100 has switch ports. The 5100 for example does not..
My sg4860 does not.. I didn't want switch ports on it, because switching should be done on your "switch" ;) Not your router..
Keep in mind that with routers with switches, the uplink into the routing is going to be limited.. Look at the above block diagrams for example.. Notice the 1gbps and 2.5gbps uplinks from the switches..
The proper tool for the job.. Do you go buy the hammer at the store, when you need to hammer in a nail? Or do you pound on nails with your screwdriver?
Switches are not expensive these days... You could pick up a 8 port gig smart switch for like $40.. Or get a 16.. Or 24 if what you are after are switch ports. I would always suggest if you think you need a 5 port switch, get an 8 or 16.. That way when your needing another port - you don't start eyeing your router interfaces thinking you can use them as switch port ;)
@kiokoman Thank you for the reply. I will try and use a log parser before sending them to papertrail then (until we have a native way to do it). I think it may be worth my time to setup a cron job to ftp the pfblocker-ng logs rather than the system logs. I need to look at those logs to see if they containt the DNS name.
I forgot to include both of these servers are esxi's. Multiple vms that sit on each network.
I used LAN as a generic term. LAN in this case is a segregated VM network for devices that need access to the lan but are not accessible by the internet.
As for 10gig need, I really only need 10gig for the dmz on server1, which could free up one port on the firewall for server 2 dmz, except I currently have another hardware device that sits in the dmz.
@bmeeks said in Division by zero in /usr/local/www/widgets/widgets/system_information.widget.php on line 373:
running the pfSense-2.5 Snapshot release
Ahhh.
I was mislead (mis read).
"2.5" messages are ment to be posted here [Home > pfSense Software > Development](Home pfSense Software Development) - that's where the bleeding edge battle is taken place.
This is the general pfSense section, 2.4.5-p1.
Anyway .... living on this edge means : updating ..... and wait if something fails. And re update.
@mogarchy said in LDAP auth via SSH:
@jimp Thanks for the info, do you have the power/ability to make it happen? If so what's your price? (not a joke)
Otherwise, can I use any external authentication server like RADIUS or am I stuck with local authentication for SSH sessions?
RADIUS shell authentication is implemented in 2.5:
https://redmine.pfsense.org/issues/10545
@bingo600 I'm not advocating that as the only method, just a small table lookup for existing MAC addresses with a failover to the current way of working if not in the table. A clone would therefore work as before since none of the MAC addresses would exist.
@snigy
No it is not normal=ARC: 6461M Total, 5004K MFU, 6430M MRU, 4128K Anon, 15M Header, 7302K Other
6231M Compressed, 8693M Uncompressed
Swap: 2048M Total, 20M Used, 2028M Free-I don't even use swap.
Probably a pkg. running wild or misconfigured.
There are legitimate reasons for bridges such as bridging two interfaces to create a transparent proxy. That is a legitimate purpose (and it works just fine).
You are attempting the equivalent of driving a screw with a carrot. Your switch is a perfectly good screwdriver and it's right over there.
Hi,
What are your LAN firewall rules ? Is the rule you showed the LAN interface ?
WAN firewall rules ?
Floating rules ?
DHCP on LAN works - you got an IP ? /mask ? / DNS ? / Gateway ?
Why are you hiding lines in your log file ? Are some LAN devices working well = having normal 'Internet' access ?
Default settings will work.
Did you try the classic solution : save the config. Switch to default. Everything will be fine. Now rebuild your settings 'by hand' and you know now what step not to repeat.
Also :
Where did you get that version from ?
( to get that one, I have to 'borrow' if from the local ancient science museum )
@user2 said in Netgate NRDM:
Periodically my pfSense installation reaches out to nrdm.netgate.com:443 (208.123.73.93) ... does anybody know why?
It's not nrdm.netgate.com it's ews.netgate.com, and it connects there when loading the content of the "services and support" widget, when updating package metadata, and when checking for an update to copyright notices.
@johnpoz said in Lan errors in with vlan:
" the TPLINK TL-SG108PE itself that emits the bogus packet. Something about the way this device drops the tagged 802.11q packet causes the packet to be transformed in such a way as to be seen by as this rouge/bogus packet."
Of course, TP-Link is well known as an expert on VLANs.
@Raffi_ thanks for that. I've been advised to try disabling the pfblocker snort rules elsewhere som in trying that now. If it doesn't work I'll try this next :)