• 0 Votes
    4 Posts
    404 Views
    dotdashD
    What you are trying to do is not how vswitches work. You might be able to map each nic to a separate switch and have a virtual nic on the firewall for each one, but that's kind of crazy.
  • 0 Votes
    2 Posts
    203 Views
    jimpJ
    NAT does not affect where the rules go. Rules for traffic originating from your LAN go on the LAN tab. Rules for traffic originating from the remote site over IPsec go on the IPsec tab.
  • Heavy traffic on OpenVPN client kills primary connection

    5
    0 Votes
    5 Posts
    817 Views
    J
    @stephenw10 said in Heavy traffic on OpenVPN client kills primary connection: I could imagine maybe the main WAN gateway could get marked down due to latency and the VPN gateway gets set as default. If that is happening make sure the main WAN is set specifically as the default v4 gateway rather than 'automatic' in System > Routing > Gateways Thanks Steve. I think that was exactly the issue. After making that change a few weeks ago, WAN hasn't gone down!
  • Fresh Pfsense installation ,No logs to display issue

    3
    0 Votes
    3 Posts
    409 Views
    T
    Thanks works , i did reset "Reset log files under log settings and started to work Thanks again
  • Problems pointing traffic through GRE tunnel

    1
    0 Votes
    1 Posts
    140 Views
    No one has replied
  • CVE-2019-14899

    Locked security vulnerability
    3
    0 Votes
    3 Posts
    612 Views
    T
    Sorry there is another thread on this: https://forum.netgate.com/topic/148713/cve-2019-14899
  • How to find spambot? Got network abuse report from my ISP

    85
    0 Votes
    85 Posts
    11k Views
    stephenw10S
    Yes, you should be able to. I would read through it though. Better to be sure. Steve
  • Block TCP:PA

    2
    0 Votes
    2 Posts
    368 Views
    stephenw10S
    It's probably this: https://docs.netgate.com/pfsense/en/latest/firewall/troubleshooting-blocked-log-entries-for-legitimate-connection-packets.html It could be this: https://docs.netgate.com/pfsense/en/latest/firewall/troubleshooting-blocked-log-entries-due-to-asymmetric-routing.html Steve
  • Can't browse default LAN

    9
    0 Votes
    9 Posts
    832 Views
    P
    @marvosa Thanks for the follow-up. Not sure what changed, or if I'm just impatient... Before I posted that last comment I had enabled dhcp for VLAN 300 and everything worked. Then I disabled dhcp and reconnected the external dhcp server and it didn't work. So I posted the comment and went upstairs and ate lunch. Came back downstairs to continue troubleshooting and everything is working using the external dhcp server. Thanks again for your help.
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    12 Views
    No one has replied
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    11 Views
    No one has replied
  • Enable LAN interface from Shell

    4
    0 Votes
    4 Posts
    8k Views
    zoqaskZ
    @stephenw10 yep. Spot on I just hadn't replied yet. Reassigned the IP on the bge0 interface and it automatically enabled the interface again. Many thanks for the help from all on this thread. I did work it out myself but knowing others would have got it as well makes a difference. Thanks.
  • Monitoring Graphs Question

    3
    0 Votes
    3 Posts
    466 Views
    stephenw10S
    Ok so you can see what those values are in the RRD update script /var/db/rrd/updaterrd.sh, specifically: pfctl_si_out="` /sbin/pfctl -si > /tmp/pfctl_si_out `" pfctl_ss_out="` /sbin/pfctl -ss > /tmp/pfctl_ss_out`" pfrate="` cat /tmp/pfctl_si_out | egrep "inserts|removals" | awk '{ pfrate = $3 + pfrate } {print pfrate}'|tail -1 `" pfstates="` cat /tmp/pfctl_ss_out | egrep -v "<\-.*?<\-|\->.*?\->" | wc -l|sed 's/ //g'`" pfnat="` cat /tmp/pfctl_ss_out | egrep '<\-.*?<\-|\->.*?\->' | wc -l|sed 's/ //g' `" srcip="` cat /tmp/pfctl_ss_out | egrep -v '<\-.*?<\-|\->.*?\->' | grep '\->' | awk '{print $3}' | awk -F: '{print $1}' | sort -u|wc -l|sed 's/ //g' `" dstip="` cat /tmp/pfctl_ss_out | egrep -v '<\-.*?<\-|\->.*?\->' | grep '<\-' | awk '{print $3}' | awk -F: '{print $1}' | sort -u|wc -l|sed 's/ //g' `" So that looks like the number of unique source IPs on outgoing states. If you only have a single WAN and you're NATing out of it that's probably going to be 1. And the number of unique destination IPs on incoming states. A lot higher since that includes all the external IPs on states opened on LAN by clients. Looking at the output there though it looks like there may be room for improvement. It doesn't handle IPv6 addresses and counts blank lines. Steve
  • multi domain for lan

    8
    0 Votes
    8 Posts
    843 Views
    stephenw10S
    The only way I can see this behaviour happening is if you're trying to connect to those hosts using only the host name and not the fqdn. Like: ping preauth. If that's true then yeah it will only resolve hosts in the same domain as the client in general. Steve
  • LAN, use opt as lan interface

    lan side interfaces bridge vlan
    16
    1 Votes
    16 Posts
    4k Views
    johnpozJ
    Dick? Really? Calling you out on calling yourself a ccie when clearly everyone knows that is not even close to true is not being a dick... That is just calling someone out on their BS! So what was the problem, only tcp for the rule? Wrong source? Maybe you had policy route on the rule? But that wouldn't of stopped ping to pfsense IP? Only ping to other lan.. That is another common mistake.
  • cron log

    1
    1 Votes
    1 Posts
    888 Views
    No one has replied
  • Can't access Web Sites behind nginx reverse proxy.

    7
    0 Votes
    7 Posts
    1k Views
    stephenw10S
    Because the NAT IP is set to 192.168.1.4, the proxy. The destination IP defined what traffic that port forward will match on coming into the WAN. Unless you have more than one public IP on the WAN it can only be the WAN IP. Steve
  • NAT forwarded ports

    5
    0 Votes
    5 Posts
    550 Views
    P
    @stephenw10 Nothing was hard coded but I confirmed the issue with tcpdump. The areas where this impacted me seemed to be only in NAT functions
  • Port Forwarding Problems

    2
    0 Votes
    2 Posts
    398 Views
    stephenw10S
    What port test are you using? 192.168.1.146 should report success on port 8443. You won't be able to test the forward from pfSense itself. But if you try some external test such as canyouseeme and then check the state table for :25565 you should see the NAT'd state with traffic both ways. Steve
  • 0 Votes
    13 Posts
    2k Views
    chpalmerC
    Did you reboot the modem?
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.