@dlogan said in No traffic on WAN, gateway status down, errors "arpresolve: can't allocate llinfo for <WAN IP> on igb1:
I have a WAN configured on IGB1 of an SG5100.
How? PPP, DHCP, etc?
Some hints on this in the logs?
That's a firewall rule and the destination is a public IP.
You need a NAT rule too and that changes the destination to the internal target IP for the firewall rule.
https://docs.netgate.com/pfsense/en/latest/nat/port-forwards.html#adding-port-forwards
Steve
@dilligaf said in Pfsense 2.5 stacks at boot with dots:
I also fully understand already that ClamAV isn't going to see encrypted traffic.
What I've should have mention where I wanted to go : ClamAV will see the traffic that all the process read and write to disk.
What if : some key word(s) in this traffic (the config file to be written) doesn't please ClamAV ?
Is there a way, as any (many) anti virus can do : exclude this file from being scanned ?
Does the issue exists with ClaAV running and not with ClamAV stopped ?
@mrjoli021 if you plan on inspecting https traffic using squid that's not possible without doing a MITM unencryption of the traffic and even then your users are going to see warnings in their browsers even if you install your own certificates. This will just alarm your users and flood you with complaints.
If you want to reduce the chances of your users connecting to malicious sites configure DNS to use the Quad9 servers.
@jcasale said in Issue with pfSense and having to restart constantly:
Where should I look as to the cause of the problem? I looked at the systems logs and have not seen anything that stuck out.
Was the Liva PC a wise hardware decision? If not, what hardware would you recommend?
It seems that your backup is also corrupted and often it's caused by power failure. Its time for a clean install and clean configuration. No one can comment on your new hardware when you haven't stated what you bought.
@macusers
First of all, again check your internet-facing IP on the LTE router. If this is not a real public IP, your ISP provides only a private subnet to you and there is nothing you can do. You will not get any traffic from the internet to your router, cause this is controlled by the ISP.
In this case you can only use it for upstream connections.
The only antivirus you might have on pfSense, clamav, only scans traffic that is cached by Squid.
It is probably not doing anything for traffic coming over a VPN. But even if it is it's no substitute for AV on hosts where it can have far more visibility.
Steve
That should work. We're going to need to see some data to find out why it isn't.
Can we see the ifconfig output with the new card and the interfaces assigned?
Steve
The logs are straight from Strongswan so maybe:
https://wiki.strongswan.org/projects/strongswan/wiki/Loggerconfiguration
Though I don't see any specifics there. There are existing log parsers for strongswan though as it's widely used. You might look at those.
Steve