• Not your average "internet speed" problem...

    33
    0 Votes
    33 Posts
    3k Views
    GertjanG

    @panja said in Not your average "internet speed" problem...:

    options do I have...

    One : you deal with what you have, and you made it work for you !!

    To rephrase what I said above : it might work, as is was sold to you with the idea that it would work.
    I've been using Realteks half my live and wasn't really bothered with them. I did have several NICs in advance, as they just don't 'live' very long.
    These days, I always disable build in NIC's, and add quad Intel branded NIC in systems.

    When I buy material, I always check what the used hardware is. The price, shape and colour details comes next.

  • Scripted method to install/update certificate

    3
    0 Votes
    3 Posts
    488 Views
    D

    @stephenw10 you're right. I've checked this plugin deeper and it seems it supports additional DNS plugins which works perfect!
    Thanks.

  • cannot access pfsense 2.6.0 web interface

    13
    0 Votes
    13 Posts
    2k Views
    VioletDragonV

    @gertjan Only thing in the error.log under /var/log/nginx is from 2020,

    2020/07/31 12:48:14 [crit] 4493#100471: *102827 SSL_write() failed (13: Permission denied) while processing HTTP/2 connection, client: 192.168.1.9, server: 0.0.0.0:4430 2020/08/26 15:32:03 [crit] 8968#100454: *25803 SSL_write() failed (13: Permission denied) while processing HTTP/2 connection, client: 192.168.1.9, server: 0.0.0.0:10443 2020/09/08 04:19:59 [error] 4127#100429: *20842 upstream timed out (60: Operation timed out) while reading response header from upstream, client: 192.168.1.9, server: , request: "POST /acme/acme_certificates.php HTTP/2.0", upstream: "fastcgi://unix:/var/run/php-fpm.socket", host: "violetdragon.ddns.net:10443", referrer: "https://violetdragon.ddns.net:10443/acme/acme_certificates.php"
  • Help connecting a second pfsense router From switch to WAN

    10
    0 Votes
    10 Posts
    911 Views
    D

    @stephenw10 Oh for sure haha ,, Ill be doing a ton of stuff as i learn more . Love it
    Thanks again!

  • Alias by mac address?

    8
    0 Votes
    8 Posts
    6k Views
    stephenw10S

    Just block everything coming via the same router. 😉

  • e6000sw tick kproc

    4
    0 Votes
    4 Posts
    671 Views
    stephenw10S

    Yes, ~5% is typical usage:

    [22.01-RELEASE][admin@7100.stevew.lan]/root: top -aSH last pid: 66887; load averages: 0.16, 0.16, 0.08 up 0+00:03:03 12:54:54 579 threads: 5 running, 547 sleeping, 27 waiting CPU: 0.0% user, 0.0% nice, 1.8% system, 0.0% interrupt, 98.2% idle Mem: 99M Active, 62M Inact, 398M Wired, 7302M Free ARC: 175M Total, 30M MFU, 142M MRU, 32K Anon, 597K Header, 2248K Other 48M Compressed, 125M Uncompressed, 2.61:1 Ratio Swap: 1024M Total, 1024M Free PID USERNAME PRI NICE SIZE RES STATE C TIME WCPU COMMAND 11 root 155 ki31 0B 64K CPU0 0 2:53 99.77% [idle{idle: cpu0}] 11 root 155 ki31 0B 64K CPU2 2 2:54 99.73% [idle{idle: cpu2}] 11 root 155 ki31 0B 64K CPU3 3 3:00 98.26% [idle{idle: cpu3}] 11 root 155 ki31 0B 64K RUN 1 3:04 93.52% [idle{idle: cpu1}] 8 root -16 - 0B 16K e6000s 1 0:11 6.37% [e6000sw tick kproc] 65687 root 20 0 14M 4668K CPU1 1 0:00 0.16% top -aSH

    The process polls the switch IC for the port status once a second. It does so using the MDIO bus via ix2 but that process is slow in the ix driver so it ends up using significant CPU time.
    The same process in the 2100 or 3100 is faster via the mvneta driver so it appears to use less CPU time there.

    Steve

  • This topic is deleted!

    1
    0 Votes
    1 Posts
    12 Views
    No one has replied
  • Unable to save smtp password if tested first

    2
    0 Votes
    2 Posts
    360 Views
    stephenw10S

    Mmm, this is not regression, it's always behaved like that, as noted here:
    https://forum.netgate.com/post/111569

    As is says there: 'The last SAVED values will be used, not necessarily the values entered here.'

    After you test the values shown are not those you just tested with so saving afterwards can replace them with bad values. I agree though it could be clearer.

    Steve

  • Reconfigure of pfSense upstream appliance

    4
    0 Votes
    4 Posts
    578 Views
    stephenw10S

    That looks like you have a VPN from pfSense to the AWS VPC?
    AWS use APIPA addresses for the VPN tunnel subnet to route across so that may be expected.

    If you can make connections from AWS to the local DB server then it probably has a route back in order to reply. Unless the outbound NAT you added was on the internal pfSense interface. In that case the traffic from AWS appears to be local so it can reply but it can never open connections the other way.
    If you need to do that then you need to fix the routing issue rather than masking it with OBN.

    Almost certainly the DB server has a bad or missing default route.

    Steve

  • 2.6.0 clean install & config restore fails <SOLVED>

    Moved
    6
    1 Votes
    6 Posts
    954 Views
    E

    @jimp not just to @manicmoose , it happened to me today when reinstalling a 2.6 box in order to get the new ZFS layout.

    Steps to reproduce:

    a 2.6 box (VM on ESXi) with older ZFS layout, upgraded since 2.4 series install 2.6 over it, choose to recover the old config
    (note there are no keys in /etc/ssh after the installer finishes) after first and subsequent boots, the sshd keys are not regenerating, and clicking "Start" on the SSH service yields nothing. Only starting from CLI reveals the issue (missing keys).

    Regen via CLI (almost instant)

    cd /etc/ssh ssh-keygen -N '' -t rsa -f ssh_host_rsa_key ssh-keygen -N '' -t ed25519 -f ssh_host_ed25519_key

    adapted from here fixes it.

  • Block all site except exchange online mail

    4
    0 Votes
    4 Posts
    518 Views
    stephenw10S

    See: https://docs.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide#exchange-online

    You can just use the json list directly in pfBlocker-ng to get a list of IPs for office365, including Exchange, and it will be auto updated. It doesn't include IPv6 yet.

    Screenshot from 2022-04-13 13-43-37.png

    Steve

  • 2009 MacMini - occasional crashes after logging in

    2
    0 Votes
    2 Posts
    274 Views
    stephenw10S

    @pfnuevo said in 2009 MacMini - occasional crashes after logging in:

    I suspect the 70Mbps throughput is enough to max the 2 core CPU?

    Very unlikely, 70Mbps is nothing for anything remotely recent. What CPU is in that?

    USB Ethernet devices are notoriously unreliable in FreeBSD/pfSense. It should never disconnect like that.
    I would use VLANs on the nfe NIC instead if you can. As long as your WAN connection is <1G you likely won't see any speed reduction and it will be waaaaay more reliable. 😉

    Steve

  • ZenArmor(Sensei) on PFSENSE?

    1
    0 Votes
    1 Posts
    498 Views
    No one has replied
  • pfsense, web server and VLAN's

    42
    0 Votes
    42 Posts
    11k Views
    stephenw10S

    No worries, glad you're up and running. 👍

  • warning pseudo-random number generator used for ipsec processing

    11
    0 Votes
    11 Posts
    4k Views
    stephenw10S

    I what still working? The ancient 32bit install from 2013?

    Or is this just spam.... 😉

    Edit: Yup.

    Steve

  • Syslog giving error syslogd - sendto: Can't assign requested address

    8
    0 Votes
    8 Posts
    1k Views
    stephenw10S

    So something is preventing traffic from localhost on that install specifically.

    Does it give that same error even after boot?

    Steve

  • I can send emails from my mail server but not receive from Hotmail.

    8
    0 Votes
    8 Posts
    1k Views
    TheCableGuy96T

    @stephenw10

    Thanks Stephen, I'll be okay from here... really appreciate the help!

  • New to Pfsense

    27
    0 Votes
    27 Posts
    3k Views
    JonathanLeeJ

    @jonathanlee

    https://getlabsdone.com/how-to-setup-pfsense-pppoe-wan/

    Great example of bridging the modem

  • stress-ng install

    5
    0 Votes
    5 Posts
    2k Views
    T

    @stephenw10 That served the purpose.

    Thanks
    Ted

  • Email Reports formatting

    4
    0 Votes
    4 Posts
    611 Views
    NogBadTheBadN

    @michmoor have a play with the following:-

    awk, sed and echo

    I run the following at midnight to get yesterdays entries from the snort logs:-

    grep ^`date -v-1d +"%D"` /var/log/snort/snort_pppoe*/alert | awk -F, '{a[$5]++;} END {for(i in a) print a[i]" "i}' | sed 's/"//g' | sort -r ; echo grep ^`date -v-1d +"%D"` /var/log/snort/snort_pppoe*/alert ; echo

    So I get a summary like this:-

    Command output: Snort WAN Alerts (grep ^`date -v-1d +"%D"` /var/log/snort/snort_pppoe*/alert | awk -F, '{a[$5]++;} END {for(i in a) print a[i]" "i}' | sed 's/"//g' | sort -r ; echo) 3 ET TOR Known Tor Relay/Router (Not Exit) Node TCP Traffic group 108 3 ET TOR Known Tor Exit Node TCP Traffic group 107 3 (spp_sip) Content length mismatch 1 ET DOS Possible NTP DDoS Inbound Frequent Un-Authed MON_LIST Requests IMPL 0x03 Command output: Snort WAN Alerts Details (grep ^`date -v-1d +"%D"` /var/log/snort/snort_pppoe*/alert ; echo) 04/10/22-07:46:07.832658 ,1,2522107,4759,"ET TOR Known Tor Relay/Router (Not Exit) Node TCP Traffic group 108",TCP,45.61.188.191,60048,xx.xx.xx.xx,1080,54321,Misc Attack,2,alert,Allow 04/10/22-07:46:07.832658 ,1,2520106,4759,"ET TOR Known Tor Exit Node TCP Traffic group 107",TCP,45.61.188.191,60048,xx.xx.xx.xx,1080,54321,Misc Attack,2,alert,Allow 04/10/22-16:23:11.254875 ,140,18,2,"(spp_sip) Content length mismatch",UDP,192.241.212.220,55707,xx.xx.xx.xx,5060,54321,Potentially Bad Traffic,2,alert,Allow 04/10/22-18:08:00.070426 ,1,2522107,4759,"ET TOR Known Tor Relay/Router (Not Exit) Node TCP Traffic group 108",TCP,45.61.188.191,47241,xx.xx.xx.xx,1080,54321,Misc Attack,2,alert,Allow 04/10/22-18:08:00.070426 ,1,2520106,4759,"ET TOR Known Tor Exit Node TCP Traffic group 107",TCP,45.61.188.191,47241,xx.xx.xx.xx,1080,54321,Misc Attack,2,alert,Allow 04/10/22-20:42:03.730836 ,140,18,2,"(spp_sip) Content length mismatch",UDP,128.199.3.204,58177,xx.xx.xx.xx,5060,40209,Potentially Bad Traffic,2,alert,Allow 04/10/22-21:11:10.595437 ,140,18,2,"(spp_sip) Content length mismatch",UDP,165.232.128.219,58181,xx.xx.xx.xx,5060,47623,Potentially Bad Traffic,2,alert,Allow 04/10/22-22:53:32.283173 ,1,2522107,4759,"ET TOR Known Tor Relay/Router (Not Exit) Node TCP Traffic group 108",TCP,45.61.188.191,50650,xx.xx.xx.xx,1080,54321,Misc Attack,2,alert,Allow 04/10/22-22:53:32.283173 ,1,2520106,4759,"ET TOR Known Tor Exit Node TCP Traffic group 107",TCP,45.61.188.191,50650,xx.xx.xx.xx,1080,54321,Misc Attack,2,alert,Allow 04/10/22-23:34:44.609324 ,1,2017919,2,"ET DOS Possible NTP DDoS Inbound Frequent Un-Authed MON_LIST Requests IMPL 0x03",UDP,14.1.112.177,38376,xx.xx.xx.xx,123,54321,Attempted Denial of Service,2,alert,Allow

    NB the snort logs date format differs.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.