• Tracing cause of cpu spike - SG1100

    17
    0 Votes
    17 Posts
    682 Views
    M
    @keyser Took the advice and re-installed pfblocker without keeping settings. So far so good. I have no idea what was wrong with the configuration prior. I'll keep monitoring but so far it looks good. Strange one indeed.
  • Internal LANs do not reach published sites with NAT Port Forward in DMZ

    Moved
    3
    0 Votes
    3 Posts
    123 Views
    stephenw10S
    What's different about the subnet/interface that can reach it? When you try to reach it from the working subnet check the states that are created. Compare that with states created when trying from a failing subnet. Check the firewall logs. Connection refused instantly implies something is responding that it's blocked. The default pfSense block rule doesn't do that. So it may be incorrectly routed or denied at the target device. Your block 1918 destinations would block this connection since NAT happens before firewall rules. The NAT reflection rules should translate the destination from the CARP/IPAlias VIP to the internal server IP and that would be blocked. Are you trying to connect using an FQDN? Does that resolve to the public VIP? Steve
  • pfSense + ONT Routing LAN IPS WAN Pool

    vlan
    11
    0 Votes
    11 Posts
    1k Views
    stephenw10S
    It might have a DMZ pass-through option that simply forwards traffic to pfSense. But that may not be useful if you want to use the public IPs separately.
  • Crash Report

    22
    0 Votes
    22 Posts
    873 Views
    stephenw10S
    Hmm, odd. Hard to imagine that it doesn't like running cooler!
  • Pfsense 2.6.0 CE - No internet access

    14
    0 Votes
    14 Posts
    767 Views
    GertjanG
    @meowmere said in Pfsense 2.6.0 CE - No internet access: could it be from the ISP router configurations that I have to change? You tell us (the details) and we'll tell you ^^
  • Cannot download the USB serial insall image anymore?

    5
    0 Votes
    5 Posts
    210 Views
    GertjanG
    @scilek I've edited my post, I was posting the wrong link. CE link is now there.
  • Squid Proxy

    4
    0 Votes
    4 Posts
    460 Views
    JonathanLeeJ
    @wendel_gt did you enable clam av it updates at night try to disable it you might not have the memory for it
  • OpenVPN + Captive Portal 2FA

    7
    0 Votes
    7 Posts
    392 Views
    GertjanG
    @VioletDragon Same thing. On pfSense, or elsewhere, that all good. remember : processes communicate with 127.0.0.1 = local, to some locally running process, or for example to 192.168.1.10, some device on pfSense LAN, with the same process on that device.
  • Multiple NIC's in PFSense create weird WAN issue

    5
    0 Votes
    5 Posts
    194 Views
    M
    @SteveITS Yes indeed, i found something of this and i edited the .vmx file like i found online. ethernet3.allowGuestConnectionControl = "FALSE" ethernet3.virtualDev = "vmxnet3" ethernet3.networkName = "Wireguard" ethernet3.addressType = "vpx" ethernet3.generatedAddress = "00:50:56:af:20:15" ethernet3.uptCompatibility = "TRUE" ethernet3.present = "TRUE" nvram = "Nieuwefirewall.nvram" vc.uuid = "50 2f 1b 11 f4 3d 4f cb-d2 42 74 21 30 1d 6b 79" ethernet0.pciSlotNumber = "160" ethernet1.pciSlotNumber = "192" ethernet2.pciSlotNumber = "224" ethernet3.pciSlotNumber = "256" scsi0:0.redo = "" virtualHW.productCompatibility = "hosted" floppy0.present = "FALSE" I added the new one here and added the ethernet 3 now everything boots and i get the new adapter and WAN, but.. ofcours there is a but.. 1: If i now go on my lan to the https;//192.168.6.1 site i get nothing, is not loading 2: i NEED to set the ethernet0.pciSlotNumber = "160" on the VMX0 or it does not work BUT i also see that scsi0.pciSlotNumber = "160" is also on 160, if this a problem?
  • Will future versions of CE be online installer only?

    16
    0 Votes
    16 Posts
    5k Views
    V
    @stephenw10 I guess this cements the death of PFSense CE for me now. I guess it's off to OPNSense for whatever I build next. To bad as I would have gladly paid for basic support - but they got rid of that program too years ago.
  • problem openvpn site to site SSL/TLS

    9
    0 Votes
    9 Posts
    303 Views
    M
    @viragomann yes yes, everything is in SSL/TLS and works perfectly in ogni server with the configuration /24 and cmq also activated in CSO
  • UPNP not detected across 2 private LAN interfaces

    6
    0 Votes
    6 Posts
    222 Views
    GertjanG
    @kirenpillay said in UPNP not detected across 2 private LAN interfaces: more specific terms "upnp" is pretty generic (common) indeed - half the planet seems to have a play box thus huge network problems. But "avahi" is very, enormously unique. Throw this one in any search engines out there and you'll know what it is, does, why it exists. True, what is does is rocket science for the most common mortals, but you're not one them, these days are over. You've installed pfSense ^^
  • Not able to whitelist a particular IP

    4
    0 Votes
    4 Posts
    263 Views
    GertjanG
    @diehard_02 Normally, I don't use IP block lists, as I don't need a tool that forbids me to go somewhere, if I don't want to go there in the first place. But ok - let's install pfB_PRI1_v4 : [image: 1721975609053-ee4fdc0a-9804-4b9c-abf9-62c0f0d171b6-image.png] and activate it so it block outbound connections : [image: 1721975570797-80c4f7c2-b068-4e3d-b0bb-a86e8f85d987-image.png] After a Force reload : [image: 1721975656310-c95b3e02-c7e7-4a0d-a9ba-5c0a53d8cb64-image.png] all is set up : I've now a floating rule that blocks all IPv4 addresses/networks that are in the list : [image: 1721975701767-f1edc018-bb9d-48bf-a73a-1d7f49945496-image.png] Let's look at the list : https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt [image: 1721975755342-0f44c70c-ca51-43e2-ac92-88649fce2947-image.png] and take the very first IP (IP? not the network !) as an example : I take a browser, and go to : [image: 1721975797605-2e5e5021-d9de-41fb-9a5e-d17238d825ac-image.png] and sure enough, after some time : [image: 1721975814536-44562a39-7245-4e82-ace1-76fc5d735744-image.png] The pfBlockerng alert tells me the same thing : [image: 1721976002371-d45d24e7-30ac-41c5-b65b-702bf3f97a87-image.png] and under IP Block stats I see the same thing : my PC, 192.168.1.6, was blocked when it tried to access 1.10.16.1 : [image: 1721975924106-53c6353f-7329-4e81-a73b-a7011738b82b-image.png] Ok, I add this IP to the white list of this feed : Click on the black round +symbol : [image: 1721976285576-f1d49b39-94b8-4b63-b71a-1c40fb03b205-image.png] You are probably asked if a whitelist should be created, and if you want to add a comment, etc. Now I wind up on this page : [image: 1721976384144-afcd7a72-afcf-4291-ad17-1021dc603c44-image.png] and at the bottom I can see that "10.16.10.1" was added. Save this page. When force reloading, I can see that I have the original feed, and the whitelist : [image: 1721976802618-5a12009a-df70-4163-8d6c-3388f47584db-image.png] Sure enough, 10.16.10.1 wasn't a web server, so my browser, still can't connect to it, but this IP isn't blocked anymore. When I visit it again, the IP block counter doesn't rise = the IP wasn't blocked by pfSense. edit : Just to be sure, as this is not a click contest, but we're still managing a firewall the old classic way : [image: 1721979684913-bbb8e55d-8c3e-42e9-b44a-a1534e39b2bb-image.png] Check that the new Whitelist or permit rule is above the block rule. My white list rule hs taken 'hits' : [image: 1721979754393-ca77e322-0a9c-4ab9-b99e-4438cdec4368-image.png] which means that the rule (with just one IP in it) matched outgoing traffic : that was me trying to contact 10.16.10.1 with my browser.
  • 0 Votes
    4 Posts
    410 Views
    johnpozJ
    @bigtfromaz you could maybe limit the outbound nat for only the device you would be coming from lan with. Like your pc... But yeah that works.. If you just add the route as persistent it should survive reboots, upgrades, etc. you shouldn't need a batch to kick off on startup. I would normally allow ping as a way to validate connectivity..
  • Error in pfSense...

    4
    0 Votes
    4 Posts
    193 Views
    W
    @Stassz You didn't answer @Gertjan 's question...what version of pfSense are you running???
  • Unbound not using glue records

    dns unbound bind
    4
    0 Votes
    4 Posts
    507 Views
    R
    I figured it out - I should not put my authoritative server under the domain override section because unbound put it in a forward zone and expects a dns resolver. Instead, I switched to a stub zone under custom configuration, which requires an authoritative dns server and unbound will perform recursive lookup itself.
  • Receiving Notifications of pfSense Updates

    3
    0 Votes
    3 Posts
    351 Views
    wgstarksW
    AFAIK pfsense doesn’t support this natively but there is a script that you can run using the cron package that works great for me. https://forum.netgate.com/topic/137707/auto-update-check-checks-for-updates-to-base-system-packages-and-sends-email-alerts/3
  • 24.03 crashing (again)

    20
    0 Votes
    20 Posts
    1k Views
    M
    For reference: https://redmine.pfsense.org/issues/15618
  • Selectively blocking mDNS/Avahi

    4
    0 Votes
    4 Posts
    730 Views
    dennypageD
    @mkap218 said in Selectively blocking mDNS/Avahi: It seems like I can't use firewall rules to block mDNS from reaching Avahi since there's no way to filter out individual destinations, right? Yes, you can use a firewall rule to block inbound mDNS packets to the firewall, which would prevent Avahi on the firewall from seeing them. That would allow you to say that mDNS for host X on VLAN A is not seen on either VLAN B or C. What you cannot do is to say that host X on VLAN A can be seen by hosts on VLAN B, but not by hosts on VLAN C. By extension, you cannot filter out "_printer._tcp.local" for host X on VLAN A from the advertisements for VLAN B but include it for the advertisements for VLAN C.
  • Cant access pfSense web interface with new IP

    9
    0 Votes
    9 Posts
    622 Views
    HyperionH
    SOLVED It was partly my fault. When importing the .XML file it configures the Interfaces per default of my other main FW Hardware. That HW uses different assignment identification than the Netgate, therefore I have mismatched the Interface IDs. Expl.: Current HW Interface assignment Port1 WAN = PPPoE0 Port2 LAN = igb1 Port3 DMZ = igb0 Port4 ANP = igb2 Netgate Interface assignment Port1 WAN = PPPoE0 Port2 LAN = igc2 Port3 opt1 = igc3 Port4 opt2 = igc0
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.