• LAN and VLAN on same interface, how to solve with switch?

    6
    0 Votes
    6 Posts
    7k Views
    R
    Also note that a bunch of not-so-high-end switches (e.g. Dell PowerConnect 2xxx) won't allow you to move the management interface to a VLAN other than 1, and require VLAN 1 to be untagged.
  • 12 second delay on some but not all web connections.

    2
    0 Votes
    2 Posts
    971 Views
    S
    Same boat here, intermittent web page loading on 2.1 single WAN cox cable here. I thought it was dns timing out at first, but doesn't matter if we are using dnsmasq, or direct to pubic dns servers. The clearest way I can describe it from a users perspective, is the browser shows 'connecting' for 10-12 seconds before either loading the page or timing out.  It happens once every 10 loads maybe.  Switching back to another router solves the problem, but I'd prefer to use pfsense. I've tried the df bit option, enabling disabling dnsmasq, enabling wan side ping, turning off checksome offloading, I can't figure it out.  I'm about to try out monowall and see if the same thing happens. Hardware wise I'm on: http://www.newegg.com/Product/Product.aspx?Item=N82E16816101364
  • RRD history lost on reboot on Alix board (nanoBSD)

    1
    0 Votes
    1 Posts
    571 Views
    No one has replied
  • URL filter active on one WAN only with dual-WAN setup

    2
    0 Votes
    2 Posts
    645 Views
    P
    If the special sites are ones that have quite well-defined IP address(es) (i.e. they are not huge pools of rotating IPs like FaceBook…) then Aliases should work. Say you have WAN and SAT links, and you want some special things to fail over to SAT when WAN is down, then make a gateway group, FailoverToSAT, WAN = Tier 1, SAT = Tier 2. Make an Alias SpecialSites with the names of the sites you want to fail over (myspecial.mailserver.com importantsite.com pfsense.org ...) At the top of your LAN rules, put a rule: Pass, IPv4, protocol any, source LANnet, destination SpecialSites, gateway FailoverToSAT.
  • Question regarding static clients and pfSense implementation

    2
    0 Votes
    2 Posts
    664 Views
    B
    Thanks in advance everyone (:
  • Impossible speeds in Status: Queues?

    1
    0 Votes
    1 Posts
    814 Views
    No one has replied
  • Squid + SquidGuard

    1
    0 Votes
    1 Posts
    871 Views
    No one has replied
  • 0 Votes
    1 Posts
    624 Views
    No one has replied
  • 0 Votes
    1 Posts
    905 Views
    No one has replied
  • Strange 15-20 seconds Lag

    4
    0 Votes
    4 Posts
    1k Views
    L
    I've finally found the problem! It happens when I route traffic on the same interface using Firewall rules with the State Type (Advanced Features) set on Keep State. Setting it to None solve any kind of lag. Luca
  • Routing my own subnet

    4
    0 Votes
    4 Posts
    998 Views
    D
    Absolutely. Your isp will issue you two network address blocks. A single ip for your 'wan' and the public block. All traffic to the public block is forwarded to the wan ip. How you deal with it is up to you. You can use the entire subnet on an interface such as lan. You can even split it up. E.g. Your ISP issues you 10.0.0.2/ 30 for wan (with gateway 10.0.0.1) and a block of addresses: 20.0.1.16 to 20.0.1.31. You then assign 10.0.0.2 as static on wan with gateway 10.0.0.1. Now, you can assign the entire block to lan.  So that lan is 20.0.1.17. Your clients can then use 20.0.1.18 to 20.0.1.30 as valid addresses with gateway as 20.0.1.16. Go to outbound Nat, set to manual and do not Nat anything except the pfsense internal loopback address to Wan ip.  You then add the firewall rules to permit/ block traffic as required. Alternatively, you can split the block into 2. You can then attach 20.0.1.16 - 20.0.1.23 as virtual ips to wan. These can be used as Nat addresses for other interfaces. Assuming you have a private LAN as 192.168.1.0/ 24 for internal use. You then assign 20.0.1.25 to say, opt1 interface. Your servers attach to Opt1 and can use 10.0.1.26-10.0.1.30. In this case, you need to make sure that outbound Nat is set to manual mode. You NAT 192.168.1.0/ 24 network to 20.0.1.16 (or any of the other virtual IPs you've assigned to WAN). Do not NAT 20.0.1.24/ 29 at all.  This will ensure that 20.0.1.24/ 29 network (your server network) is routed rather than NAT'ed.
  • How to Block Ultrasurf 1303

    4
    0 Votes
    4 Posts
    2k Views
    P
    Any update of this problem? Thanks Guys!
  • Help with firewall and ICMPv6

    3
    0 Votes
    3 Posts
    979 Views
    K
    Bump.
  • 2.1 i386 fails install / AMD64 ISO damaged

    4
    0 Votes
    4 Posts
    1k Views
    D
    Yeah this morning I gave up on CDs and did the USB image.  Installed perfectly first try.
  • PfSense 2.1 still using OpenSSL 0.9.8y?

    11
    0 Votes
    11 Posts
    3k Views
    N
    @jimp: It'll be a non-issue once we're on FreeBSD 10 and the base is up-to-date. By then will the base still be up to date?  ;)
  • PLEASE HELP - PFsense + Transparent Proxy + HTTPS Direct

    1
    0 Votes
    1 Posts
    739 Views
    No one has replied
  • proxy server

    5
    0 Votes
    5 Posts
    2k Views
    B
    Does SQUID support listening on multiple interfaces as it can be selected but it seems it does not work? Has anyone got this to work or found a workaround?
  • Need Help Bridging Vlans

    13
    0 Votes
    13 Posts
    3k Views
    R
    Hello, As as an update, I expiremented with changing the source for the rule to pass traffic from DMZMGMT to LAN, and instead of DMZMGMT subnet or the single IP of the machine behind the interface, I decided to use LAN subnet, which worked, since the machine behind DMZMGMT had an IP address in the same subnet. So, if for some reason (again, maybe briding WLAN?) one wanted to put some firewall rules in place between two segments of the same subnet, this would work.  I did not leave it this way, however. I set it up to only pass ICMP and DNS from the machine in DMZMGMT to LAN, to reject all (other) traffic from DMZMGMT to LAN subnet.  So in practice, the machine can still reach the internet and download upgrades, etc.  It is also still reachable from the LAN subnet.  But, all other traffic to it should be blocked by default. stephenw10, thanks for the link to the patch.  I actually had read that thread when researching the possible issues with bridging the vlans, but had not seen the logs that showed the link state going up and down and the attempts at re-assigning the IP address, etc.  I will give the patch a try, and hopefully it will help with the stability. Thanks again for all of your help and input!  I really appreciate it.
  • Pfsense ckeck Internet Speed

    4
    0 Votes
    4 Posts
    1k Views
    stephenw10S
    Not by default. Not in a nice way with a clean result figure at least. You could, for example, run a script every 6 hours that downloaded and uploaded a file. That throughput would be recorded in the traffic graphs which are available on the dashboard but I doubt that's what you had in mind. Steve
  • No internet access after reassigning IPs

    10
    0 Votes
    10 Posts
    4k Views
    stephenw10S
    Check in System: Routing: (gateways tab). Make sure you only have one gateway listed there, that it's the WAN gateway and that it's set as default. Adding a gateway to LAN really causes a number of problems. Having a gateway on LAN, although incorrect, shouldn't cause a huge problem in itself. This problem is that it's almost always the most recently added gateway and hence it becomes set as the default. Steve
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.