• Square LED flashing green

    2
    0 Votes
    2 Posts
    685 Views
    stephenw10S
    Is that consistent across a full power cycle? The LEDs should only ever normally show flashing green during an upgrade. So with pfSense booted. Do that still show the normal power up sequence? Initially no LEDs should be lit. Then after a few seconds the green-circle LED flashes blue.
  • 0 Votes
    26 Posts
    1k Views
    C
    @stephenw10 Yeah, that was kind of my thinking too. I'll stick with it for now despite the (seemingly) high error rate (0.1% if it could be believed). Do let me know if anyone has any ideas for trying to hone in on the cause of these 'errors'.
  • Regaining Access to pfSense?

    5
    0 Votes
    5 Posts
    836 Views
    M
    @stephenw10 That's a handy command, good to know
  • 0 Votes
    3 Posts
    732 Views
    stephenw10S
    Yup, use python mode.
  • 0 Votes
    8 Posts
    994 Views
    stephenw10S
    Hmm, that doesn't look good. I assume you have tried a full power cycle? But on the 4200 you can fit in NVMe SSD to install to: https://docs.netgate.com/pfsense/en/latest/solutions/netgate-4200/m-2-nvme-installation.html
  • IGMP for IPTV

    7
    0 Votes
    7 Posts
    551 Views
    stephenw10S
    I can't be if you're not using IGMP proxy in 23.01 as you said. Is that not actually the case?
  • Home Network Accessed

    11
    0 Votes
    11 Posts
    1k Views
    VioletDragonV
    @TAC57 Plex themselves had a data breech awhile ago, there Plex code had some bad malware in, infostealer. Workstations and Public Facing services should be in VLANs regardless. Look at netstat but bare in mind that it will most likely be noisy, Monitor Wireshare and pfSense together to look at logs, I would recommend wiping the system completely and starting from scratch. Change all passwords, move Public Facing services into there own VLAN with strict firewall rules, TrueNAS should be in a Storage VLAN, Workstations in their own VLAN. Having a flat network with public facing services is the worst thing you can do. Implement a IDS/IPS something like Snort or Suricata, pfblockerng with Geolocation blocking which are the things I would suggest implementing as well. Check have i been pwned also.
  • pfSense OpenVPN cannot reach the entire LAN subnet

    4
    0 Votes
    4 Posts
    439 Views
    stephenw10S
    Oh yes if some hosts are not using pfSense as their gateway that would be an asymmetric route. That traffic could (should) be blocked by the Fortigate since it would only ever see replies. For TCP traffic at least.
  • syslogd service crashes every couple of days after upgrade to 25.07

    1
    0 Votes
    1 Posts
    207 Views
    No one has replied
  • pfSense+ 24.11 to 25.07 Unresponsive webui

    Moved
    2
    0 Votes
    2 Posts
    363 Views
    stephenw10S
    Do you see any errors logged? What does Diag > System Activity show? Or at the CLI: ps -auxwwd ?
  • pfblocker report issue

    3
    0 Votes
    3 Posts
    113 Views
    publictoiletbowlP
    @keyser hi sir please ignore my post i figure it out now to make it work i added in dns resolver/custom option. i get this instruction from someone who posted hehe https://forum.netgate.com/topic/129365/bypassing-dnsbl-for-specific-ips thank yo man server: access-control-view: 120.10.0.0/21 bypass access-control-view: 192.168.40.0/21 bypass access-control-view: 120.50.0.0/21 bypass access-control-view: 192.168.80.0/24 dnsbl access-control-view: 192.168.100.0/24 dnsbl access-control-view: 192.168.101.0/24 dnsbl access-control-view: 192.168.200.0/24 dnsbl access-control-view: 172.100.0.0/24 dnsbl view: name: "bypass" view-first: yes view: name: "dnsbl" view-first: yes
  • DDNS issue after upgrading to 2.8.0

    4
    0 Votes
    4 Posts
    422 Views
    stephenw10S
    New behaviour for dyndns in 2.8 is that it will not attempt to check a WAN that has a gateway that's offline. So some configs that were previously working even though there was some issue there will now show the issue such as this.
  • forum.pfsense.com

    2
    0 Votes
    2 Posts
    396 Views
    stephenw10S
    Hmm, pfsense.com was never a way to access the forum. I imagine it's hitting a generic forward there. The forum was previously at forum.pfsense.org and that still forwards correctly.
  • Ran into this same issue with pfsense+ 25.07

    2
    0 Votes
    2 Posts
    398 Views
    stephenw10S
    Yes I have seen that on the igc driver. It really only supports auto-select. For some reason when the driver sets anything it can cause link issues. Also worth noting is that if you have set autoselect and then go back to default it may not reset that since 'default' sets nothing. You may need to reboot to get the NIC and driver back to the actual default state.
  • Can't block webconfigurator on the wan.

    11
    0 Votes
    11 Posts
    533 Views
    stephenw10S
    If it was something upstream the port wouldn't change when you change the pfSense gui port. It pretty much has to be a floating rule or interface group passing that traffic. If you look at the states at the CLI using: pfctl -vss you can see the rule that opened the state. Then check the rules with pfctl -vsr to see what that rule is.
  • Enable new ip_pppoe module over remote/PPPoE connection is "dangerous"

    7
    0 Votes
    7 Posts
    547 Views
    D
    @stephenw10 no worries, scheduled reboot was our backup and as you say works well. We've not come across any other issues so far with our use cases.
  • LDAP Authentication with Active Directory Windows Server 2025, bind fails

    8
    0 Votes
    8 Posts
    23k Views
    G
    My operating system is Windows Server 2022. I noticed that the default group policies of my domain controller are somewhat different from yours. Currently, I'm also having issues with failing LDAP connections via ports 389 and 636, but I can connect successfully using GSS-API SASL. I almost gave up, but after seeing your post, I've regained hope. Since various systems currently only support connections via port 389 or 636, I still hope to prioritize using port 389.[image: 1755148365158-398c0123-f27e-4b3d-83ad-74357589cf66-image.png] [image: 1755148525693-f6940a51-b579-4528-bc8f-5aa493be8564-image.png]
  • pfSense Plus 25.03 release question

    29
    1 Votes
    29 Posts
    3k Views
    stephenw10S
    Yes it's still available for amd64 and arm64. It no longer builds for arm32.
  • pfSense and Squid going forward?

    12
    0 Votes
    12 Posts
    1k Views
    JonathanLeeJ
    @aGeekhere I want to play with it more in a secure environment. To compile it on a m1 in a VM it took hours
  • 0 Votes
    2 Posts
    258 Views
    stephenw10S
    @Cornel said in Reboot removes kern.ipc.nmbclusters lline from /boot/loader.conf.local on SG-3100: kern.ipc.nmbclusters="32768" That value is specifically cleared on ARM devices in /etc/inc/pfsense-utils.inc. You could comment that out there if you really want to set it but the default value there should be good. Seeing it at 65% is not that unusual.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.