• PPTP Problem

    Moved
    2
    0 Votes
    2 Posts
    224 Views
    H

    https://www.netgate.com/docs/pfsense/vpn/what-are-the-limitations-of-pptp-in-pfsense.html?highlight=pptp

    it's time to move to a different vpn setup

  • Bandwidth limit settings do not work with Squidproxy enabled.

    1
    0 Votes
    1 Posts
    151 Views
    No one has replied
  • login on ttyu0 at night time??

    5
    0 Votes
    5 Posts
    877 Views
    jimpJ

    ttyu0 is the serial console.

    Do you have your serial console connected anywhere? Maybe if you are connected with a USB serial adapter, when you shutdown the desktop or other PC it's plugged into, it sends a serial break which may make the menu redisplay which would cause that message.

  • Internet Disconnecting after Changing WAN Assignment

    4
    0 Votes
    4 Posts
    467 Views
    GertjanG

    Use another browser, for example a fresh installed Opera ..... and check ^^

  • This topic is deleted!

    2
    0 Votes
    2 Posts
    208 Views
  • Show current time in webconfigurator

    3
    0 Votes
    3 Posts
    413 Views
    H

    Sorry - my fault. I looked for it and could not find it and saw other thread saying, there was none (apparently outdated). Thanks

  • Firewall issue and OpenVPN

    3
    0 Votes
    3 Posts
    479 Views
    johnpozJ

    Lan rules have NOTHING to do with unsolicited traffic TO the server.. Since the server is not creating the connection.

    Rules are evaluated as the traffic enters an interface from the network the interface is connected too, towards pfsense.

    If your vpn can talk to everything on this lan network, except this server I would look to as already mentioned firewall on this server.

  • Where are the additional TCP Timeouts? (TIME_WAIT)

    9
    0 Votes
    9 Posts
    2k Views
    DerelictD

    Those FreeBSD tunables (such as net.inet.tcp.msl) are for connections to the firewall itself (like to a web server) and have nothing to do with state timeouts in pf and connections through the firewall.

    The pf timeouts are in System > Advanced, Firewall & NAT.

  • Xen, pfSence, no web connections.

    7
    0 Votes
    7 Posts
    899 Views
    DerelictD

    Right. you have to upgrade CE to 2.4.3-p1. I don't think this info has been refreshed on the new forum yet. There are other threads on it.

    Here are the basics for what you need to do for the PV NICs:

    Install it, shut it down. Add the NICs you want, then in XenServer:

    Get the VM's uuid
    # xe vm-list name-label="pfSense B" | grep "^uuid" | awk '{print $NF}'

    43fdd0da-73ca-22c0-97f6-0ac47ae82360

    Get the UUIDs for the NICs
    # xe vif-list vm-uuid="43fdd0da-73ca-22c0-97f6-0ac47ae82360" | grep "^uuid" | awk '{print $NF}'

    6c9cb724-705a-0449-2176-505dd332431d a4c4ec8f-de68-eab3-69c7-d5b6c8be7b53 25e0d1b6-6d9a-6480-4612-e5aca876a922 71919d5a-000c-b9b3-31ed-21fa1674ba4e 1bf1eaf3-50fe-4a12-c3fa-1341766cee08 7b50e7fd-d6ec-598d-8dd6-6068d5f2765b

    Turn off the checksum checking in the NICs. Run this for all of them:
    # xe vif-param-set uuid=6c9cb724-705a-0449-2176-505dd332431d other-config:ethtool-tx="off"

    Boot the VM and the traffic in should flow through fine on the PV NICs.

    The other major caveat is the HV NICs (reX) support altq shaping. The PV NICs (xnX) don't.

  • ssh noob question

    13
    0 Votes
    13 Posts
    1k Views
    S

    Thank you, its done. As you know it pretty much imported everything so had to make the port change and that was it. I’m able to remote in going over a VPN service here locally but pretty sure it should work from an outside network. Thank you again, your help was greatly appreciated!!!!!

    update: tested from outside network and working perfectly

  • pfSense lost network card

    3
    0 Votes
    3 Posts
    1k Views
    H

    no clue why it isnt showing up, but be careful for the order mess you'll get into when adding vmx4
    https://forum.netgate.com/topic/132933/vmx-nic-ordering-for-pfsense-on-vsphere-5-5

  • <Solved> Configuration after reboot

    9
    0 Votes
    9 Posts
    3k Views
    R

    Managed to make this work for some reason i used <shellcmd> instead of <earlyshellcmd>

  • Static maping

    2
    0 Votes
    2 Posts
    877 Views
    J

    Assume for the moment that the error message is actually correct. Check all the existing DHCP Lease information to see if that IP address, MAC, or hostname was already assigned. DHCP can hold inactive lease information for a while.

    Also check Diagnostics->ARP Table, to see if that IP address is already listed to a different MAC address. It's possible that the address was used in a local static assignment already, not involving DHCP. You should do this shortly after trying to assign the static mapping as ARP entries will expire from the cache. Note: if DHCP relaying is involved you'll need to check this on a box attached to the subnet in question, using "arp -a" (works on *nix and Windows).

    Originally I thought that it could have been you were trying to make permanent the IP address it got dynamically from the DHCP Pool, but that yields a very specific error message to that effect. At least in version 2.4.3.

  • Question re: security and physical access

    10
    0 Votes
    10 Posts
    1k Views
    J

    @johnpoz said in Question re: security and physical access:

    So changing your username and redoing certs is fine from actual security stance..

    Completely agree these are good steps. Prudent and low cost risk mitigation. Appropriate for OP's home network.

    But do you honestly think that either the postal company or netgate or employee of said companies compromised your stuff?

    Not the OP's case, but if you deal with "high value" data, that risk has to be considered. However in that case you'd not have returned any non-volatile storage to any vendor to begin with. You eat the costs of those parts when they fail, because it's less expensive than risking your data.

    But all the tradeoffs in risks and security could fill a book, several actually. If interested, recommend looking at an outline for Security+, CISSP, or similar certification, just to see the topics.

    Or go find the scripts and videos of the DNSSEC root key signing key "ceremonies". They not only need to be secure, but completely transparent, got to be twice as stressful. Can't see them shipping those laptops out for repair.

  • This topic is deleted!

    1
    0 Votes
    1 Posts
    145 Views
    No one has replied
  • Not sure what to do, looking for some help and guidance

    14
    0 Votes
    14 Posts
    1k Views
    bepoB

    Thank you all for answering me. You´re completely right. I forgot there is a any any rule per default. What i meant was if there is NO rule anything is blocked. Sorry for misunderstanding.

  • This topic is deleted!

    1
    0 Votes
    1 Posts
    49 Views
    No one has replied
  • [solved]Restore 2.3.5 backup on 2.4.3 install

    2
    0 Votes
    2 Posts
    962 Views
    _neok_

    @_neok Yes, old backup works.
    ;)

  • Problem pinpointing network issues

    2
    0 Votes
    2 Posts
    1k Views
    senseivitaS

    Solved it, it wasn't the network. It was pfSense itself. I tried another box and everything got back to normal. I guess some code was misbehaving within pfSense itself.

    I was this close *makingfingersabouttotouchhandgesture* to dust off my license for Mikrotik's CHR to see if with its complicated management at least it got some insights to match. Glad I didn't, I needed to sleep already! :)

  • Simplest way to LOG all URL that users browse to

    11
    0 Votes
    11 Posts
    8k Views
    M

    @cmdias said in Simplest way to LOG all URL that users browse to:

    I was actually just downloading untangle last night ... can you give me more information about the "bridge mode" between PF and Untangle ?

    Back in the days i was using SONIC WALL + WEBSENSE and it as super simple to setup..... miss those days! lol

    Take a look at step 3 here -> https://www.untangle.com/untangle-ng-firewall/resources/how-to-deploy/

    Here's some info on a bridge mode deployment:

    In Bridge mode, NG Firewall is set between your existing firewall and main switch. When in Bridge mode NG Firewall is transparent, meaning you won’t need to change the default gateway of the computers on your network or the routes on your firewall – just put NG Firewall between your firewall and main switch and… that’s it! You’ll need to give NG Firewall’s External interface an IP in the subnet of the firewall, set the Internal interface to bridge and bridge it to External.

    To get a better idea of what you'll have access to, check out their live demo here -> http://demo.untangle.com

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.