• Problem with virus making it through the firewall

    3
    0 Votes
    3 Posts
    867 Views
    johnpozJ
    Lets not forget that there is no scanner on the planet that detects all bad files. I have to wonder how your "server" would get infected to be honest - other than some worm running on your network.  Why would you be browsing or executing anything other than trusted exe on a "server" in the first place?
  • Pool of Firewalls

    2
    0 Votes
    2 Posts
    714 Views
    jimpJ
    It's not possible currently, CARP does not support an active-active configuration at this time for load sharing.
  • Router Information

    5
    0 Votes
    5 Posts
    1k Views
    stephenw10S
    The anti-lockout rule is there to make it more difficult to lock yourself out especially if you're not very familiar with the firewall. You can still tighten up the LAN rules though. You can still lock yourself out.  ;) Steve
  • How to get the "#" away from my pfsense

    5
    0 Votes
    5 Posts
    1k Views
    A
    thanks bro, its has been solved :)
  • Worried about corruption

    7
    0 Votes
    7 Posts
    2k Views
    C
    nanobsd is the way to go
  • SMTP Notifications not working when using SMTPS

    4
    0 Votes
    4 Posts
    1k Views
    J
    Thanks, I submitted a bug report for this issue.
  • WAN PPPOE - Serious timeout

    2
    0 Votes
    2 Posts
    1k Views
    B
    Check to see if the mtu is 1492.
  • How to monitor traffic

    5
    0 Votes
    5 Posts
    1k Views
    P
    Yes.  The Suricata package will decode and log all HTTP traffic.  You can see the source/destination address and the exact URL that is being requested.  Everything is timestamped.  However, it is a 'raw' log and will require some manipulating to pull it into a more readable format. Another alternative is Netflow.  Export the data to a Netflow collector and you can see the conversations, but not the actual URL's being requested. Another less informative alternative is to use OpenDNS.  You can generate reports on what domains are being requested, but not from which machine and the report is only on a full-day basis. EDIT:  The squid solution posted above would be a very good way to accomplish what you want.
  • Blocking some HTTPS Site and Finding IPs

    1
    0 Votes
    1 Posts
    593 Views
    No one has replied
  • Error in communication between interfaces

    4
    0 Votes
    4 Posts
    1k Views
    T
    Are you able to ping from a SEC device to a DMZ device? What about from the DMZ interface to the SEC network (within pfSense in Diagnostics -> Ping)?
  • QinQ pls advise

    1
    0 Votes
    1 Posts
    749 Views
    No one has replied
  • System log, too many logs from ntop

    6
    0 Votes
    6 Posts
    3k Views
    K
    @jimp: Sounds like either ntop is running multiple times, or you have a clock issue causing ntop to believe the clock is stepping backward or not ticking properly. Time zone set  Europe/Athens from console-terminal  is ok. Must to configure and ntop time ? seperetely ?
  • Mount /cf/conf NFS

    3
    0 Votes
    3 Posts
    1k Views
    A
    I assume you want to do this to backup your configs. All you need to do is setup an FTP server on the backup target and use this script: #!/bin/bash HOST=IP  #This is the FTP servers host or IP address. USER=USER            #This is the FTP user that has access to the server. PASS=PASS        #This is the password for the FTP user. dstamp=date +%Y-%m-%0e cd /cf/conf Call 1. Uses the ftp command with the -inv switches.  -i turns off interactive prompting. -n Restrains FTP from attempting the aut o-login feature. -v enables verbose and progress. ftp -inv $HOST << EOF Call 2. Here the login credentials are supplied by calling the variables. user $USER $PASS Call 3. Here you will change to the directory where you want to put or get cd /cf/conf/ Call4.  Here you will tell FTP to put or get the file. put config.xml chmod 777 config.xml rename config.xml config$dstamp.xml or #get test.txt bye EOF i have this on a daily cronjob and it works very well.
  • Question

    2
    0 Votes
    2 Posts
    636 Views
    V
    It seems you have connected your pfSense to an existing network. pfSense sets the LAN IP to 192.168.1.1 by default. For existing networks this would not fit. At first you may to configure the LAN interface on the shell and assign an unique IP in your network. Then you get access to the web interface.
  • Home Network Help

    10
    0 Votes
    10 Posts
    2k Views
    johnpozJ
    Bridge what connections? What do you think you need to bridge?
  • Kernel Crash

    1
    0 Votes
    1 Posts
    641 Views
    No one has replied
  • High interrupt load when VGA cable (un)plugged

    21
    0 Votes
    21 Posts
    6k Views
    D
    @Harvy66: I'm just going to wait for 2.2 stable, then try it out again. Might take quite some time. Meanwhile, snaps seem to be back.
  • Any way to hide disabled rules?

    1
    0 Votes
    1 Posts
    435 Views
    No one has replied
  • PfSense and logging to RAM

    2
    0 Votes
    2 Posts
    855 Views
    P
    There is a new advanced option in 2.1 that will allow the creation of a RAM disk to store logs on. It is documented somewhere, just search for it.
  • IPs added to sshlockout even with SSH not exposed to WAN

    1
    0 Votes
    1 Posts
    562 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.