• 23.09 Local NTP server "unrechable" (worked with 23.05.1)

    20
    0 Votes
    20 Posts
    2k Views
    C
    @johnpoz Thanks for your ongoing support! Not saying it's something wrong generally in 23.09 but at least something specific :-) Either in combination with my NTP server or something went wrong during the upgrade. Went back to 23.05.01 and everything is OK again [image: 1700388875485-bildschirmfoto-2023-11-19-um-11.01.37.png] [image: 1700388884603-bildschirmfoto-2023-11-19-um-11.01.52.png] After being back to 23.09 same as before... The flag "u" and "s" appears randomly or changes after some time, currently it is set to "u": [image: 1700389038112-bildschirmfoto-2023-11-19-um-11.16.09.png]
  • 1 Votes
    9 Posts
    1k Views
    Z
    I just ran into a headache/nightmare trying to downgrade. I was utilizing the AT&T bypass (WAN Connectivity with 802.1X Authentication Bridging and VLAN 0 PCP Tagging). I also had a hard time using a backup to restore from... For whatever reason if I redid the basic configuration at least back to the LAN being my previous IP address AND THEN did the restore it worked. But I then had to troubleshoot why I didn't have WAN access which was due to the MAC spoofing needing to be undone... Very inconvenient from the Plus license changes...
  • Lab and production firewalls sharing same Netgate Device IDs - dangerous?

    2
    0 Votes
    2 Posts
    220 Views
    G
    @Gcon FYI I sorted this out with Netgate support. cheers.
  • 6100er crash dump config import from NUC

    2
    0 Votes
    2 Posts
    245 Views
    stephenw10S
    Looks like this: https://redmine.pfsense.org/issues/14431 You have a number of interfaces that could apply to but I'd guess it's pppoe0. Do you have IPv6 enabled on that? On any other dynamic interface types? Steve
  • Analyzer for pfSense logs

    1
    0 Votes
    1 Posts
    150 Views
    No one has replied
  • easyrule stopped working after upgrading from 23.05 to 23.09

    Moved
    9
    0 Votes
    9 Posts
    861 Views
    D
    @stephenw10 A clean reinstall fixed the easyrule issues. All working fine now.
  • pfsense+ latest update Netgate 4100max

    11
    0 Votes
    11 Posts
    1k Views
    S
    @JuneKlein the serial port is listed in device manager but may not be com3. There is a reset procedure for this model: https://docs.netgate.com/pfsense/en/latest/solutions/netgate-4100/factory-reset.html
  • PFsense cannot ping on a new connection?

    11
    0 Votes
    11 Posts
    990 Views
    E
    @stephenw10 Bless you! Have a lovely day.
  • Auto Configuration Backup times are off

    8
    0 Votes
    8 Posts
    815 Views
    stephenw10S
    Yup, rechecking I think I see the issue. The server timestamps changed when it was moved to new infrastructure so this is no longer true: https://github.com/pfsense/pfsense/blob/master/src/usr/local/www/services_acb.php#L71 Setting that to UTC shows the correct times for me. Asked our admins how they want to handle it. I imagine correcting the server timezone will fix this but we shall see. Steve https://redmine.pfsense.org/issues/15005
  • HA Proxy using HTTP with backend - Not configured for this

    2
    0 Votes
    2 Posts
    164 Views
    M
    FIXED. All i did was remove backend and frontend configuration and re-added it. Working fine. pcaps now show TLS communication with backend. Definitely a bug. Trying to reproduce so i can open a redmine but so far i cant.
  • 0 Votes
    16 Posts
    1k Views
    Yet_learningPFSenseY
    @Gertjan My screen looks a little different, but I set it up this way and completed successfully. The 1dot~ address is the one I was trying to get from here. It seems it was actually a different one... https://blog.cloudflare.com/ja-jp/enable-private-dns-with-1-1-1-1-on-android-9-pie-ja-jp/ ! alt text
  • Service Watchdog and Kea DHCP Server (kea-dhcp4)

    5
    0 Votes
    5 Posts
    677 Views
    QinnQ
    @stephenw10 said in Service Watchdog and Kea DHCP Server (kea-dhcp4): I understand. I'm just pointing out that, in general, you should not need to use the the service watchdog except when debugging some issue. So I was wondering if you had enabled it because Kea (or ISC dhcpd) was stopping unexpectedly. @stephenw10 No, I enabled Service Watchdog, because very occasionally (I am a beta tester for pfBlockerNG develop) a service stops and as a courtesy to users, it will bring it up again and send me mail, so I can check out the cause.
  • 0 Votes
    4 Posts
    458 Views
    stephenw10S
    Yup also see your other identical question: https://forum.netgate.com/post/1136501 You must use block rules for local subnet and any for the destination in pass rules. Or you can use 'not local' as a destination but it's generally better to avoid that. Steve
  • How to tag interface SFP+ ix0 on an XG-7100

    24
    0 Votes
    24 Posts
    5k Views
    stephenw10S
    What do you see from: ifconfig -vvm ix0 on each side? Assuming you're using ix0 that is.
  • Feeling like a NOOB

    Moved
    7
    0 Votes
    7 Posts
    672 Views
    S
    @JonathanLee I have too. I had a client once tell me about a programming change request, “I want to be all powerful, but a prompt of, ‘Are you sure, knucklehead?’ would be great.”
  • How to get around Pfsense ZFS crashing on sudden power loss (electricity)

    5
    0 Votes
    5 Posts
    834 Views
    S
    @SteveITS Perfect. I'll try that. Thanks very much!
  • pfSense using old DNS Server in DHCP6 Server Options

    2
    0 Votes
    2 Posts
    186 Views
    V
    My mistake. I had changed out my network and now realize that the greyed out option is the current DNS server.
  • 0 Votes
    14 Posts
    2k Views
    C
    @stephenw10 Hi Stephen. I give you a reply on this tomorrow (when the error happened again ;-)) Regards, Christian
  • Multiple LANs sharing single WAN interface

    2
    0 Votes
    2 Posts
    319 Views
    S
    @the-loquitur WAN Net is not the Internet, it is WAN’s subnet, often a /24. If you are trying to block LAN1 from accessing 2, you need to add block rules, like: Reject from LAN1 net to LAN2 net Allow from LAN1 net to any
  • 0 Votes
    4 Posts
    471 Views
    stephenw10S
    Hmm, that's about as safe as it could be then. Your description of the failure sounds like it might have somehow pulled in a pkg from 23.09 before the upgrade resulting in a mismatch at some point. I'm not sure how that could have happened but clearly if it wasn't online it couldn't have happened.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.