• 0 Votes
    8 Posts
    949 Views
    stephenw10S
    Yeah this likely is the same thing: https://redmine.pfsense.org/issues/14531
  • New build: migrating from Sonicwall

    Moved
    11
    0 Votes
    11 Posts
    981 Views
    stephenw10S
    That would need to be done at the AP. Nothing beyond that sees the SSID.
  • 2.7 crashing daily

    6
    0 Votes
    6 Posts
    635 Views
    T
    Snort is already in legacy mode. I just force updated the rules. Let's see..
  • pfSense 23.01 TAC Subscription expired

    48
    0 Votes
    48 Posts
    9k Views
    stephenw10S
    Send me your NDI in chat and I'll check it.
  • Will WireGuard be built back into the pfSense operating system.

    6
    0 Votes
    6 Posts
    671 Views
    stephenw10S
    To be clear the pkg is installed by default on a clean Plus install since 23.05. In the same way as the ipsec-profile-wizard and aws-wizard packages are. If you upgraded from CE then the same installed package list would be carried across which may or may not include wireguard.
  • Mirror VPN Traffic to External Interface

    6
    0 Votes
    6 Posts
    665 Views
    stephenw10S
    Yeah you could certainly ask in the WG sub. Someone has probably tried that.
  • 0 Votes
    4 Posts
    858 Views
    stephenw10S
    @felipefonsecabh said in Access service in device connected via IPSEC trought public IP: I have change local network to Any to carry traffic from any external IP? Yes, if you are using policy based IPSec and need to keep using that. The policy has to match that traffic and the source IP could be any IP. But if you do that it will match traffic at the other end for 'any' destination. All traffic from site1 will go over the IPSec tunnel. Which you probably don't want. A route based VPN tunnel of some sort would give you more options.
  • [Feature] Unbound Dns request.

    29
    0 Votes
    29 Posts
    2k Views
    M
    @Gertjan yep. Couldn’t watch YouTube any other way.
  • Weird LAN/OPT1 blocks and default deny every second

    4
    0 Votes
    4 Posts
    399 Views
    johnpozJ
    @throttlenerd well your not sniffing on the correct interface? If your seeing it in the logs that its blocked, then packet capture would capture it. [image: 1693054517446-capture.jpg] You sure the traffic is still being seen when your doing the capture - ie are you still logging those denies?
  • 2.5Gbps NICs only getting 1.5Gbps

    26
    0 Votes
    26 Posts
    3k Views
    S
    @Stewart The new BIOS fixed the issue so now all 5 ports run at 2.5Gbe. It also sets much higher default PL1, PL2, and PL4 settings. The temps still stay in normal parameters but isn't the most efficient. I've run 17 different combinations of PL1 and PL2 with the default PL4 of 33W to find the best speed and then started adjusting PL4 to fine tune. Maybe not the best way of doing it but that was my process. Overall I found the best combination of speed and power for iperf over OpenVPN is: PL1=9 PL2=10 PL4=30 Dropping PL1 to 8 impacts performance about 60Mbps but doesn't reduce heat or power. Dropping PL2 to 8 also reduces performance but doesn't reduce heat or power. PL4 default is now 33. Lowering it to 30 reduces temps from 69C to 61-62C and lowers speed from 575Mbps to 550Mbps. Lowering it to 29 reduces speed to 490 and keeps temp at 61C so no real change. Temp was determined by running iperf -P4 -t 300 and seeing what the temp was just before the end of the run. Everything seemed to idle the same no matter what the settings were at around 45C. Skin of the unit is always warm to the touch. I have a thermometer that I've set on top that generally reads 33C-34C (around 95F). It also doesn't seem to change much whether it is idle or under heavy load. The unit idles around 11W no matter the settings and, depending on PL settings, only goes up to 15-18W (most all settings showed 15W as the load limit for the iperf tests). For reference it does spike into the mid-20's in Windows. Speed was determined by the average of the last 10 seconds of the 5 minute test. I felt that I had to do this as the tests generally started out very high, in the 1.2Gbps-1.4Gbps range, and then fell over the course of the first minute to settle around the 5 minute average. Sometimes it would hold that for 5-10 seconds, some times for over 40 seconds. No idea unless it's some kind of TAU setting allowing the assigned core to spike for varying amounts of times.
  • Netgate XG-7100-DT No Response Issue

    15
    0 Votes
    15 Posts
    1k Views
    P
    @stephenw10 Hi Steve, Thanks again! I quickly got the firmware from support! I was able to reinstall it to the appliance and am back up and running! Thanks, Patrick
  • 0 Votes
    21 Posts
    1k Views
    M
    With the patch, they should always be placed on the bottom when copying/moving to another interface.
  • Boot environment - Selections

    2
    0 Votes
    2 Posts
    302 Views
    stephenw10S
    See: https://docs.netgate.com/pfsense/en/latest/backup/zfsbe/status.html Yes the patch should have been applied against whatever BE you booted from. Which I assume was 'default'.
  • Pfsense 2.6 and 2.7 crash on Zotac Mini PC

    16
    0 Votes
    16 Posts
    1k Views
    stephenw10S
    Any of those. I would start with ping to a local IP, then to some remote IP.
  • Single core on multiple threads requests

    5
    0 Votes
    5 Posts
    444 Views
    stephenw10S
    system vs interrupt load. 3 cores there are pegged though. The loading from pf itself appears as interrupt load. Check the NICs are using more than one queue. Try testing between different NICs rather than VLANs on the same NIC, which share the same queues.
  • pfSense Certificate Manager's Revocation list (CRL) is unavailable

    18
    0 Votes
    18 Posts
    2k Views
    johnpozJ
    @bigtfromaz said in pfSense Certificate Manager's Revocation list (CRL) is unavailable: Why not just expose it in the configuration dialog? Well they prob want you to use certs from their CA, etc. But yeah I hear yeah.. But then - this would of never been brought up, and I wouldn't of learned something new ;) Part of the reason I have stuck around here for so long and love helping people. Is helping someone figure out something almost always leads to people on both sides of the problem learning something.. And it brings up a possible feature request to expose being able to add a crl distribution uri in the gui, which would be win everyone using pfsense cert manager for more than just openvpn ;) or the webgui of pfsense. I use it for all my local certs.. I have not run into needing to publish the crl, but I can see how it would be a bonus addition to the cert manager. Even if not hosting the crl off pfsense, but just being able to easy add the uri for the distribution point.
  • Combo squid + OVPN routing question

    5
    0 Votes
    5 Posts
    521 Views
    O
    ah it was a dumb mistake. I took that NAT out, and then realized on my client it was set for socks not https and now im in business, thanks!!
  • Newb question for CityFibre PPPOE on pfsense (in UK)

    2
    0 Votes
    2 Posts
    745 Views
    stephenw10S
    Yes, you would create a VLAN 911 on the WAN NIC and then create the PPPoE connection on that VLAN. Should work fine. Steve
  • Blank Web Configurator after upgrade from 22.9 to 23.05.01

    13
    0 Votes
    13 Posts
    1k Views
    stephenw10S
    Hmm, that all look good. I can see that NDI chekcing in and it's being validated. After running that pkg-static update still fails? Try pkg-static -d update to see more error output.
  • DNS - Unable to reverse lookup internet address

    14
    0 Votes
    14 Posts
    792 Views
    johnpozJ
    @michmoor I believe that is for clients IPs.. I don't currently have squid or squid reports or anything installed, guess I could to take a look. But anything you google for squid PTR all comes up talking about the client IP. from back in the day, when I ran proxies for living ;) we almost always blocked direct IP access, and only specific ones were whitelisted. Not sure why a proxy would want to look up PTRs when you normally block direct IP access, etc. ;) But for clients, you could use client names in rules that allow, deny etc. So since client IPs might change you might want to do ptr on client IPs to know if its specific client based on its name.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.