grep -i mss /tmp/rules.debug
output:
scrub in on $FORINI all max-mss 1456 fragment reassemble
It seems to be correct but if i vist some webpages which require correct MTU it doesn't work, while with other firewalls webpages are shown correctly!!!
WHY?
Hi, i find the solution:
i must change the read-only option:
with:
mount -uw /dev/ufs/pfsense0
it switched off
for switched on i use:
mount -ur /dev/ufs/pfsense0
THX –> to be closed
Thanks Chris for the explanation.
I have already created limiters on the LAN side with 5Mbps up and 5Mbps down limits for all the hosts in the LAN. And have made it a point to create limiters on all the installations just to safeguard the box.
@NKRA:
@marcelloc:
go to firewall -> virtual ips.
then add 'ip alias'
Hi,
Would it be possible to setup the following
10.1.1.1/24 (LAN)
192.168.1.1/24 (LAN)
Both IP block run on on LAN port (no VLAN) with no routing between the two and also DHCP for both IP blocks. BTW, only have one WAN port with one public IP.
Regards
While you can have both subnets on a single interface, you can not have a DHCP for both ranges.
Only one rsnge per interface.
How would the server know out of which pool it would have to assign if 2 were available?
You haven't nearly outgrown the project if you're replacing with a 5510, only time that's remotely feasible is if you're at the point where you need a 5580.
There is nothing on pfSense that can affect VTP in any way.
The admin user in the GUI is also the root user in the shell (as well as the admin user there)
To change the root password, you must change the admin password in the GUI, and root will follow.
The password is synchronized to the OS from the config.xml version at bootup, so any changes you make in the shell alone will not survive a reboot.
Running the MySQL client isn't as dangerous as the server, so it's not too bad there.
That said, you'd have to compile php52-mysql, which can be done using a pfSense builder setup (check the doc wiki), and then copy the files over to the firewall.