• Why can't i access my pfsense box over OpenVpn

    27
    0 Votes
    27 Posts
    4k Views
    stephenw10S
    Yes, setting the other router to whatever bridge mode it might have available would affect anything using it directly. Really you should look at using pfSense instead of that router and having a separate wireless access point behind it. You may be able to use the ISP router for that purpose: https://docs.netgate.com/pfsense/en/latest/wireless/use-an-existing-wireless-router-with-pfsense.html It depends what sort of connection you have and whether it has a separate modem. Steve
  • Allow a user via ssh to: ifconfig eth0 down

    11
    0 Votes
    11 Posts
    2k Views
    O
    thanks, you are very helpful and sorry for me beeing so untalented
  • WAN interface not getting IP address via PPPoE

    5
    0 Votes
    5 Posts
    1k Views
    T
    Thanks, it is working now.
  • 0 Votes
    4 Posts
    265 Views
    stephenw10S
    It would be via the site A end of the site-to-site tunnel. If you add it as a remote network in the OpenVPN config that will be set for you. Steve
  • 0 Votes
    20 Posts
    3k Views
    T
    @stephenw10 Ok and that was exactly what i observed :) Thanks again!
  • Not show VPN traffic on WAN traffic graph?

    4
    0 Votes
    4 Posts
    331 Views
    T
    Ok. Thank you :)
  • PFSENSE CRASHED

    6
    0 Votes
    6 Posts
    1k Views
    M
    i just reinstalled it and everything is working great now. thank you!
  • Restricting Access to pfsense webgui with MAC address

    7
    0 Votes
    7 Posts
    759 Views
    O
    Thanks everyone it worked....
  • Issue trying to run another dns resolver on a virtual ip

    3
    0 Votes
    3 Posts
    596 Views
    B
    @stephenw10 thank you, that was actually very helpful. Initially I've enabled the DNS Forwarder, but I selected the VIP in interfaces and checked Strict Binding. Now when I rethinked I chose LAN from interfaces with Strict Binding enabled and it works after reboot I can verify using dig that everything works as expected.
  • Dashboard overuse cpu

    3
    0 Votes
    3 Posts
    377 Views
    M
    @stephenw10 said in Dashboard overuse cpu: Hmm, that does seem excessive, unless each of those cores is running at 100MHz or something! What widgets do you have on the dashboard? That looks like it's from the firewall logs widget. Are you logs files set to a huge size? Steve Thank you, finally after cleaning the system logs and those of pfblocker the use of the cpu is back to normal.
  • pfSense Shuts down on its own?

    4
    0 Votes
    4 Posts
    1k Views
    jimpJ
    Most every time I've had a system shut itself down mysteriously it was due to a BIOS overheat event. Might be something that only happens under load, and happens very fast.
  • Realtek NIC question and wireless network segregation

    19
    0 Votes
    19 Posts
    1k Views
    X
    yup, for sure, thanks again for your help!
  • Remotely enamble disable rule

    6
    0 Votes
    6 Posts
    1k Views
    KOMK
    I doubt it. This post is four years old, and that user has not logged in since November 2017.
  • Which software to use for bot detection over Lan

    21
    0 Votes
    21 Posts
    3k Views
    GertjanG
    @OpenWifi said in Which software to use for bot detection over Lan: I believe this means clients on the lan would not be able to send mail!! Again, you admin a firewall. There is no such thing as "Wondering" and "Believing". Things happens because you let them happen. And things that you do not want, you stop. You are the boss. A boss doesn't "trust" or "believe". Maybe this is new to you : Mail clients like Outlook Express, Outlook (Office) or Thunderbird should not use port 25 to send mail. They are set up to use (as stated) above : port 587 or port 465. These two port permit some one to send mails, if they can authenticity themselves first == have an account at that mail server. Like : you can not send mail using mail.gmail.com on port 25 : gmail does not allow this. gmail is not an open relay. You should use 587, no, better : port 465. For historical reasons, ISP's allow that you use their mail servers so you can send your (not your unkown visitors !!) send mail to some one. This is an exception. Do understand that the ISP knows who you are : you are using their "land line" to connect to their services.
  • System crash on gateway alarm?

    Locked
    7
    0 Votes
    7 Posts
    3k Views
    A
    UniFi switch(es) yes, but LACP no. And it's the GUI that becomes unresponsive. I didn't try the console.
  • help with youlube streaming

    23
    0 Votes
    23 Posts
    2k Views
    bmeeksB
    @stephenw10 is correct. It seems the DNSBL feature of pfBlockerNG is intercepting the attempted domain-to-IP lookup made by your phone and instead of sending your phone the real IP of the domain it is redirecting your phone to the internal web page hosted by the DNSBL code. That's what the 10.10.10.1 address is. This is the problem that can result from using tools that use IP blacklists as the basis for their block decisions. Many of these lists are not always 100% accurate, and they sometimes tend to broad-brush when marking IP subnets as malicious. What I mean by that is they can unintentionally blacklist an IP address that is actually OK but just happens to be located within a larger block the blacklist is marking as bad. Of course it is also possible that DNSBL is flagging the IP block because it serves up ads.
  • Custom Dynamic DNS using PUT instead of GET

    8
    0 Votes
    8 Posts
    865 Views
    K
    I've spent some time looking over the code for DDNS, and I see at least three files that would need to be changed in order to add support for PUT to the "Custom" DNS provider. src/usr/local/www/services_dyndns_edit.php src/etc/inc/dyndns.class src/etc/inc/services.inc I'm thinking of adding a new flag 'curl_use_http_put' similar to the existing 'curl_ssl_verifypeer' flag so that the "Custom" provider UI will display a new checkbox to capture the option in "src/usr/local/www/services_dyndns_edit.php". The flag 'curl_use_http_put' would need to be passed to "src/etc/inc/dyndns.class" where the logic to act on the flag would evaluated. One thing I don't yet understand is how the configuration is persisted. Would someone provide an overview of how the DDNS service is initialized and settings persisted?
  • Certificate Authority // Proxy http/https

    7
    0 Votes
    7 Posts
    1k Views
    stephenw10S
    Yes you can see URLs in https (and http) traffic using Splice mode which is also explained in that hangout. https://youtu.be/xm_wEezrWf4?t=935 Steve
  • Certain websites won`t work when VPN is active

    5
    0 Votes
    5 Posts
    1k Views
    F
    Thanks a bunch, that was exactly what i was missing. Now that you mention it, i feel stupid for having overlooked it. I should have checked the routing table first i guess, then it should have been obvious. Again, thank you very much.
  • Snort: MD5 Hash - Rules Updates - Insecure?

    13
    0 Votes
    13 Posts
    5k Views
    bmeeksB
    @lost89577 said in Snort: MD5 Hash - Rules Updates - Insecure?: i know this is a long dead topic, but to validate the concern raised. A man in the middle attack was used against my firewall to supply blank sort rules which validated as latest version in snort. The attacker stopped some time after i side loaded the real rule set. i believe it was my ISP proxy that was compromised and no i don't believe i was the real target but all of the ISP users. If you have to get to the web through your ISP's proxy, then your security is hosed from the get-go. The Snort rules URL is an SSL-secured site, so without the proxy you can be reasonably certain you are getting to the correct site based on the SSL session setup the CURL code stem uses within the Snort GUI. With the proxy, and you trusting the proxy's certificate, then you are wide open to your ISP and then to anything or anyone that compromises your ISP. If your ISP won't let you bypass their proxy, then I would be trying to find me another ISP!
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.