• Monitoring Graphs Question

    3
    0 Votes
    3 Posts
    468 Views
    stephenw10S
    Ok so you can see what those values are in the RRD update script /var/db/rrd/updaterrd.sh, specifically: pfctl_si_out="` /sbin/pfctl -si > /tmp/pfctl_si_out `" pfctl_ss_out="` /sbin/pfctl -ss > /tmp/pfctl_ss_out`" pfrate="` cat /tmp/pfctl_si_out | egrep "inserts|removals" | awk '{ pfrate = $3 + pfrate } {print pfrate}'|tail -1 `" pfstates="` cat /tmp/pfctl_ss_out | egrep -v "<\-.*?<\-|\->.*?\->" | wc -l|sed 's/ //g'`" pfnat="` cat /tmp/pfctl_ss_out | egrep '<\-.*?<\-|\->.*?\->' | wc -l|sed 's/ //g' `" srcip="` cat /tmp/pfctl_ss_out | egrep -v '<\-.*?<\-|\->.*?\->' | grep '\->' | awk '{print $3}' | awk -F: '{print $1}' | sort -u|wc -l|sed 's/ //g' `" dstip="` cat /tmp/pfctl_ss_out | egrep -v '<\-.*?<\-|\->.*?\->' | grep '<\-' | awk '{print $3}' | awk -F: '{print $1}' | sort -u|wc -l|sed 's/ //g' `" So that looks like the number of unique source IPs on outgoing states. If you only have a single WAN and you're NATing out of it that's probably going to be 1. And the number of unique destination IPs on incoming states. A lot higher since that includes all the external IPs on states opened on LAN by clients. Looking at the output there though it looks like there may be room for improvement. It doesn't handle IPv6 addresses and counts blank lines. Steve
  • multi domain for lan

    8
    0 Votes
    8 Posts
    847 Views
    stephenw10S
    The only way I can see this behaviour happening is if you're trying to connect to those hosts using only the host name and not the fqdn. Like: ping preauth. If that's true then yeah it will only resolve hosts in the same domain as the client in general. Steve
  • LAN, use opt as lan interface

    lan side interfaces bridge vlan
    16
    1 Votes
    16 Posts
    4k Views
    johnpozJ
    Dick? Really? Calling you out on calling yourself a ccie when clearly everyone knows that is not even close to true is not being a dick... That is just calling someone out on their BS! So what was the problem, only tcp for the rule? Wrong source? Maybe you had policy route on the rule? But that wouldn't of stopped ping to pfsense IP? Only ping to other lan.. That is another common mistake.
  • cron log

    1
    1 Votes
    1 Posts
    888 Views
    No one has replied
  • Can't access Web Sites behind nginx reverse proxy.

    7
    0 Votes
    7 Posts
    1k Views
    stephenw10S
    Because the NAT IP is set to 192.168.1.4, the proxy. The destination IP defined what traffic that port forward will match on coming into the WAN. Unless you have more than one public IP on the WAN it can only be the WAN IP. Steve
  • NAT forwarded ports

    5
    0 Votes
    5 Posts
    550 Views
    P
    @stephenw10 Nothing was hard coded but I confirmed the issue with tcpdump. The areas where this impacted me seemed to be only in NAT functions
  • Port Forwarding Problems

    2
    0 Votes
    2 Posts
    399 Views
    stephenw10S
    What port test are you using? 192.168.1.146 should report success on port 8443. You won't be able to test the forward from pfSense itself. But if you try some external test such as canyouseeme and then check the state table for :25565 you should see the NAT'd state with traffic both ways. Steve
  • 0 Votes
    13 Posts
    2k Views
    chpalmerC
    Did you reboot the modem?
  • 0 Votes
    2 Posts
    478 Views
    GertjanG
    This https://forum.netgate.com/topic/104475/resetting-mac-address-to-nic-real-address ?
  • Implement pfSense To Protect Distributed Virtual Private Servers

    11
    0 Votes
    11 Posts
    1k Views
    stephenw10S
    I've never used Vultr so I have no way to know if this fits you usage.... https://www.vultr.com/docs/configuring-private-network I note that: "Private networks are only available on Vultr compute and dedicated compute instances." Steve
  • Migrationg from OPNsense to pfSense

    Moved
    7
    0 Votes
    7 Posts
    2k Views
    T
    We set the LTE as bridge mode but not too happy with it. Looking at getting the MikroTik LHG 4G/LTE to replace it
  • DNS Forwards or Zones? Or how do I setup a backup + forward.

    3
    0 Votes
    3 Posts
    327 Views
    johnpozJ
    So in this scenario both your DCs are down? Because AD can for sure share their dns info. If both your DCs are down - you have bigger problems then a copy of your dns records running on pfsense ;) But sure running bind on pfsense would allow for zone xfers from your AD dns..
  • High WAN Usage

    3
    0 Votes
    3 Posts
    314 Views
    manjotscM
    @freska99 I'll keep an eye for next time it happens, I am pretty sure it is going happen again, because It had happend to me, couple time. Thanks.
  • Active Directory/LDAP and WebGUI

    9
    0 Votes
    9 Posts
    11k Views
    J
    @dreamslacker Bingo, that was the piece I forgot, thanks!
  • PFSense 2.4.4 User Authentication Using Zentyal 6.1

    1
    0 Votes
    1 Posts
    335 Views
    No one has replied
  • Proxy, Whitelist

    1
    0 Votes
    1 Posts
    266 Views
    No one has replied
  • apcupsd- Back UPS 650VA

    15
    0 Votes
    15 Posts
    2k Views
    M
    @jimp LOL! I have been thinking this very thing and will probably do it. If I do, I’ll report back.
  • LDAP authentication works in Diag:Auth but not for login

    1
    0 Votes
    1 Posts
    105 Views
    No one has replied
  • how to block bad guys who is sharing internet by laptop

    Moved
    18
    0 Votes
    18 Posts
    2k Views
    JKnottJ
    @marvosa said in how to block bad guys who is sharing internet by laptop: We even have a few clinics that are sharing a single T1... A real T1? These days, those are generally emulated over Ethernet. I first did that over 10 years ago. They have also been run over SHDSL for many years. I was working with that stuff back in the early '90s. I suppose there are still some parts of the world that rely on 2 cans and a string.
  • Pfsense 2.5.0 pppoe Limit on Radius

    Moved
    6
    0 Votes
    6 Posts
    739 Views
    stephenw10S
    Possible solution here: https://forum.netgate.com/topic/141034/rate-limit-on-radius-reply-attributes-for-pppoe-connections-not-working/3 Pretty hacky though.... Steve
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.