• Aliases disappearing

    4
    0 Votes
    4 Posts
    761 Views
    A
    Does your son have access to your Pfsense box? Dumb question I know :D
  • Readable Configuration Report for Non-Default Settings?

    4
    0 Votes
    4 Posts
    688 Views
    DerelictD
    For things like firewall rules, NAT, and Aliases /tmp/rules.debug is probably the most concise representation immediately available.
  • NTP: Dashboard Time on. Widget and Server time off

    9
    0 Votes
    9 Posts
    1k Views
    johnpozJ
    Just for being thorough , there was some issue couple years back where widget was showing client. Here is one of the threads where it came up https://forum.netgate.com/topic/109365/ntp-is-wrong-by-almost-3-minutes/28
  • User Management Active Directory

    2
    0 Votes
    2 Posts
    526 Views
    stephenw10S
    You can create a user group in pfSense that has only that page assigned to it. If auth against AD returns users are members of that group (group name matches exactly) they will inherit the permissions from the group. https://www.netgate.com/docs/pfsense/usermanager/user-authentication-servers.html Steve
  • Restoring config from beta releases

    10
    0 Votes
    10 Posts
    1k Views
    stephenw10S
    Hmm, that's the first time I've ever seen that. If that's a common problem we need to fix it. How exactly were you getting the config file from the APU? Steve
  • huawei e8372 pfsense 2.4.3

    2
    0 Votes
    2 Posts
    268 Views
    stephenw10S
    Which parts of that other thread did you follow exactly? Please retail what you have done. Steve
  • Multi-tenant Managed Firewall

    3
    0 Votes
    3 Posts
    974 Views
    A
    @derelict said in Multi-tenant Managed Firewall: The permissions system in pfSense is likely not going to work for that. There is nothing resembling a multi-instance pfSense. Thanks for answer. Best regards, Alexandre
  • Monitoring multiple PFSense devices

    2
    0 Votes
    2 Posts
    626 Views
    bepoB
    Hello @siil-it, you can monitor the general pfSense state with SNMP within your classic monitoring. For the snort alert you have to configure a syslog server and handle the messages from snort on your syslog server. Kind regards
  • Login incorrect (Failed retrieving values required to evaluate condition)

    5
    0 Votes
    5 Posts
    5k Views
    B
    [image: 1531304306751-ca.png] [image: 1531304311927-ca2-resized.png] [image: 1531304316711-ca3-resized.png] [image: 1531304321798-ca4-resized.png] [image: 1531304332920-interfaces-resized.png] [image: 1531304338315-ldap-resized.png] [image: 1531304345014-ldap2-resized.png] [image: 1531304351224-nasclient-resized.png] [image: 1531304355158-settings-resized.png] [image: 1531304361954-settings2-resized.png] [image: 1531304366689-settings3-resized.png]
  • Assigning Privilidges to AD Groups via RADIUS

    2
    0 Votes
    2 Posts
    310 Views
    U
    I have assigned this privileges. Seems ok for me. If there are other recommendation, let me know [image: 1531252316765-pfsense-operator-assigned-privilidges-resized.jpg]
  • Recommendations for a lot of simultaneous connections

    3
    0 Votes
    3 Posts
    666 Views
    S
    I don't know much about DD-WRT but we have run into instances with lower end routers not handling lots of connections. I think some just have a fixed size state table. The first was a LONG time ago when we starting having our clients' PCs connect in to our management service. We switched to m0n0wall (and then later to pfSense) on an old/spare PC and it cleared right up. A couple years ago we ran into it again at a client with a mid range (for D-Link) D-Link router who had about 5 PCs and 10 phones...the router would just stop passing traffic and you couldn't connect to its web interface. We've since just given up on D-Link type hardware for more than about 5-10 PCs/devices. Currently our traffic goes through an SG-3100 for our building an then an old cast off PC we use that runs Suricata. My point is the hardware is likely not limiting your connections and you should NOT need shiny new hardware for pfSense...most likely some sort of limitation in DD-WRT. The only limitation for pfSense moving forward is that v2.5 will require AES-NI CPU support...so about 2012 or later CPUs if I recall correctly.
  • arpresolve: can't allocate llinfo for [wanip] on igb1

    3
    0 Votes
    3 Posts
    950 Views
    beremonavabiB
    Thanks. Hopefully, that will keep NTP running, too. EDIT: Never mind this paragraph. I found the log entry about states being killed. OP: As far as I can tell, pfSense killed the states on the former IP address when it noticed the first change to the wanip. But, I don't see it killing them when the wanip changed to a valid one. It's possible I'm missing it in the logs, but shouldn't it have done so?
  • Port aggregation

    5
    0 Votes
    5 Posts
    744 Views
    johnpozJ
    @tbbz8x8 said in Port aggregation: I have absolutely no use for more vlans as I only have one device that uses Ethernet @jknott said in Port aggregation: Unless it's over 1 Gb, aggregation won't accomplish much Even if over 1 gig, wouldn't matter lagg is not going to allow 1 device to use more than 1 physical path.. From the OP statements - other than a failover for failed port.. I don't see any use to setting up a lag.. And what switch is he using? Most likely since he doesn't have any vlans, just the 1 lan connection more than likely doesn't even have as smart switch capable of lagg, etc.
  • No internet Connection. LAN side.

    11
    0 Votes
    11 Posts
    1k Views
    stephenw10S
    I would suspect some hardware off loading not playing nicely. Things can get weird when you are testing from the host itself as traffic does not actually enter/leave the NIC. It not subject to the same path as traffic from external clients. Steve
  • NTP server remain in Soliciting pool server

    ntp
    36
    0 Votes
    36 Posts
    13k Views
    J
    attached two trace, one of my ntp local server and one of pfsense box with the same server configured. 1_1531170243257_pfsense.pcap 0_1531170243256_local.pcap
  • warning unresponsive script

    4
    0 Votes
    4 Posts
    769 Views
    R
    @stephenw10 yes it was lastpass causing the issue. thank you.
  • How to display the Traffic Graph feature on another website.

    montoring
    1
    0 Votes
    1 Posts
    560 Views
    No one has replied
  • Disable Auto-added VPN rules???

    6
    0 Votes
    6 Posts
    3k Views
    DerelictD
    No. If you needed to NAT on IPsec you would use the NAT in IPsec Phase 2 not Outbound NAT. Once the Phase 1 (IKE) tunnel is up you can forget all about the WAN interface. In your case, if you wanted to only pass traffic between those hosts you would probably want to make these Phase 2 Networks: Local Network Remote network Host 192.168.2.61 Host 192.168.81.3 Host 192.168.2.61 Host 192.168.81.4 Host 192.168.2.61 Host 192.168.81.5 You can further enforce inbound connections with proper rules on the IPsec tab.
  • Tmobile cellspot - OPT1 interface

    8
    0 Votes
    8 Posts
    945 Views
    DerelictD
    Seems like a personal choice.
  • PfSense reload pfctl rules

    8
    0 Votes
    8 Posts
    5k Views
    stephenw10S
    When I run that command I see this in the system logs (reversed): Jul 8 12:30:23 php-cgi rc.update_urltables: /etc/rc.update_urltables: pfB_Spamhaus does not need updating. Jul 8 12:30:23 php-cgi rc.update_urltables: /etc/rc.update_urltables: pfB_NAmerica_v4 does not need updating. Jul 8 12:30:23 php-cgi rc.update_urltables: /etc/rc.update_urltables: Starting URL table alias updates Jul 8 12:30:00 php-cgi rc.update_urltables: /etc/rc.update_urltables: Starting up. Those are url aliases added by pfBlocker that point to lists of IPs. Do you not see that logged for your custom alias? Steve
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.