• Cant get config.xml off dead system

    3
    0 Votes
    3 Posts
    684 Views
    SLIMaxPowerS
    mount /dev/ada1 /mnt        >  Operation not permitted mount /dev/ada1s1a /mnt    > Device busy mount /dev/ada1s1 /mnt      > Operation not permitted mount /dev/ada1s1b /mnt    > Invalid arguement
  • Debugging router freezes

    2
    0 Votes
    2 Posts
    533 Views
    JailerJ
    You could back up your config and try a fresh install but honestly this sounds like a hardware issue.
  • Pfsense loosing connectivity

    1
    0 Votes
    1 Posts
    418 Views
    No one has replied
  • InstaBlocking when enabling rules.

    3
    0 Votes
    3 Posts
    632 Views
    stephenw10S
    If you apply the schedules in the inverse way, set scheduled rules to allow traffic, the states created by that schedule should be dropped when it ends. You can prevent that by setting "Do not kill connections when schedule expires" in    System > Advanced > Miscellaneous. Steve
  • 0 Votes
    5 Posts
    761 Views
    J
    Thank you Very Much KOM your a big help its working now… i just reset.
  • How to block kernel arpresolve: flood?

    1
    0 Votes
    1 Posts
    343 Views
    No one has replied
  • Unable to access webgui pfsense 2.3.3 on VMware workstation 12 Pro

    2
    0 Votes
    2 Posts
    707 Views
    I
    to add on, from the pfsense i can ping successfully the client ip 10.0.0.6, and from the client pc to pfsense LAN ip 10.0.0.1. i also have enable the option [14] secure shell option in pfsense.
  • Dual head - Two consoles?

    4
    0 Votes
    4 Posts
    709 Views
    K
    Not possible with the console driver FreeBSD has, neither with the old sc(4) driver or the newer vt(4) driver. You would need X for dual head set up and pfSense doesn't include anything X related.
  • Pfsense for Azure Login

    4
    0 Votes
    4 Posts
    1k Views
    ivorI
    Glad I could assist.
  • 0 Votes
    1 Posts
    278 Views
    No one has replied
  • VLAN ISUUES!!!

    2
    0 Votes
    2 Posts
    721 Views
    johnpozJ
    so untag it on the switch, ie set it to the native vlan if its a trunk port.  Your typical access port would not be tagged anyway.  If your looking for cisco command help.. You better of RTFM or check the cisco forums.. FE8 on some other switch?  On the mikrotik itself? draw up your connectivity and where you want tagged or untagged.  Just set the port to access and set its pvid and that would normally be untagged traffic.
  • CheckPoint UTM-1 570 and Gigabit Internet

    4
    0 Votes
    4 Posts
    3k Views
    w0wW
    UTM-1 570 Intel Celeron M 1.5 GHz 1 GB RAM 160 GB ATA HDD Firewall Throughput: 2.5 Gbps VPN Throughput: 300 Mbps IPS Troughput: 1.7 Gbps But according to your screenshot it looks more like UTM-1 270 specs UTM-1 270 Intel Celeron M 600 MHz 1 GB DDR2 RAM 400 MHz 160 GB ATA HDD Firewall Throughput: 1.5 Gbps VPN Throughput: 120 Mbps IPS Troughput: 1.0 Gbps Even if its written in specs that it can do 'Throughput: 1.5 Gbps" I am not sure what does it mean without test specification. The CPU is very low end for gigabit anyway.
  • PfSense 2.3.3 - no outbound ICMP past WAN but everything else working

    5
    0 Votes
    5 Posts
    934 Views
    J
    Alright - problem resolved.  My ISP uses the cable infrastructure of another local ISP.  The local ISP had some issue going on that was preventing ICMP for some users.  They must have made some changes to fix things up - just had to reset my modem after and all is well.    It's being discussed over at DSLReports as well.
  • Firewall Rule Ids on GUI. (SOLVED)

    3
    0 Votes
    3 Posts
    2k Views
    M
    @jimp: Status > System Logs, Settings tab. Enable the extra column or row to show the rule description in the log. That only affects what you see on the Firewall log tab in the GUI. Hi jimp, a little better now, at least it's on logs Thanks!
  • Funny peaks in new WAN traffic graph

    Locked
    2
    0 Votes
    2 Posts
    413 Views
    jimpJ
    There is already a thread for this issue, check it over and try the suggestions there: https://forum.pfsense.org/index.php?topic=126010.msg697005#msg697005
  • Picture widget

    4
    0 Votes
    4 Posts
    857 Views
    luckman212L
    A reboot is not necessary.
  • MRTG for Virtaul IP

    1
    0 Votes
    1 Posts
    340 Views
    No one has replied
  • Yang Model for PfSense Firewall

    6
    0 Votes
    6 Posts
    2k Views
    J
    @vijaymaddukuri: Thanks for the update. Could you please guide me where can I find reference Yang models for Pfsense 3.0 Where it makes sense, we follow the IETF standard models.
  • 0 Votes
    7 Posts
    836 Views
    M
    Thanks guys for your answers. My point here is, i have 33 users in that office I want to distribute the three connections to them. It doesnt matter if the network is down,as long as the connection among them is distributed to these three network. Rather than providing individual pfsense per 10 users, why not use one ordinary desktop having three NIC to manage them? How about virtualbox? having windows 2012 as host and virtualize pfsense in three NICS, is this possible? Please be patient with me and sorry for taking your time. Best regards,
  • Block by geography

    4
    0 Votes
    4 Posts
    1k Views
    J
    @johnpoz: There are many places to grab lists of ip blocks based upon geo location.  maxmind comes to mind, there is pfblocker package that does the heavy lifting for this sort of thing. What ports do you have open/forwarded now that your worried about hackers from say china or russia?  There really seems to be a basic disconnect. Out of the box there are ZERO inbound ports allowed to pfsense or your network from the internet/wan.  Only stuff you request would be allowed.  So are you saying you don't want your devices going to places hosted in china.. Or do you have say http forwarded to some webserver behind pfsense, and you only want IPs from the US to access it? So out of the box ALL geo locations are blocked to pfsense - there is no reason to do a specific block unless you don't want these specific locations to access stuff you have opened up, while allowing other to access them. I'm not sure why I never received notification about replies to my post, so I'm just now seeing these. Pouring over more documentation and internet searches I believe you are right that there's probably not much need for me to do this since all inbound ports are blocked by default. I thought maybe it would be a good safety measure to block regions known to be hostile. But after some additional thought I realized it was probably pointless anyway. Any hacker worth his salt isn't going to originate anything from their home country anyway. Thanks for the input everyone.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.