• DSL and IPoE

    4
    0 Votes
    4 Posts
    5k Views
    D
    The Zhone router has way too many options for a hobbiest home user. Count your blessings  ;) Many ISP's limit the control of attached modem/routers to the point they're barely usable unless you want "Their Standard Configurations". Glad you got it working.
  • I cann ssh in but i cant ssh out ?

    2
    0 Votes
    2 Posts
    528 Views
    D
    disregard this my destination wasnt set right now its working flawlesssly  sorry if i took up anyones time thanks
  • [SOLVED] no internet on LAN2 and LAN3

    4
    0 Votes
    4 Posts
    4k Views
    X
    that happened to me before too.. enabled DHCP, boom internet working.  Glad you got it resolved.
  • Can not set Speed and Duplex for LAN - 2.3.1-RELEASE-p5 (i386)

    5
    0 Votes
    5 Posts
    1k Views
    C
    Yeah that'd probably be one of the chipsets that won't disable autonegotiation. Verify your switch ports are all set to autonegotiate, and that your cables are CAT-5e or better and aren't bad.
  • Setup Roadmap / Security Best Practices

    2
    0 Votes
    2 Posts
    6k Views
    R
    I have spent quite some time lurking around here pretty well doing the same. While there is no magic bullet, the goal for me has been to have high security with low maintenance. I have quite a complex home network (to help emulate a corporate network for testing but also for security) and I am always looking to find ways to help secure it better. I have found this thread to be a pretty good starting point with some good security info; https://forum.pfsense.org/index.php?topic=78062.0 There is also some pretty good info in the wiki such as this one for forcing your (or something like OpenDNS) DNS servers; https://doc.pfsense.org/index.php/Redirecting_all_DNS_Requests_to_pfSense Hope some of this helps and I hope some people smarter than us chime in too! pfSense is a great platform that is improving all the time.
  • Dupliate ARP Table Entries - Is this a bug

    7
    0 Votes
    7 Posts
    1k Views
    johnpozJ
    Learn something new every day, thanks cmb..
  • Crashes….

    6
    0 Votes
    6 Posts
    945 Views
    L
    I posted there, and Adrian Chadd wants kgdb, but he thinks(!) it's fixed in head…. I cc'd you (Chris) on my reply.
  • Block information

    9
    0 Votes
    9 Posts
    1k Views
    GertjanG
    @firefox: so how this details Were blocked ? They are part of the HTTP GET browser call (Yep, it's your browser who tells the web server who / what / where / …. so using a less noisy browser will help here) Squid probably dives into the IP packets and removes them on the fly ...
  • Problem with Synology NAS external Access router setup

    3
    0 Votes
    3 Posts
    8k Views
    nsi-fusionN
    I had a quick look at my Synology. This option related to the router seem to be some sort of the tool that would help you to reconfigure your home router by adding relevant firewall rules. It is only supported by some routers as per Synology Knowledge Base: https://www.synology.com/en-global/knowledgebase/DSM/help/DSM/AdminCenter/connection_routerconf It require additional setup and UPnP is involved. So this option may not be something you need to use…
  • VLAN Questions

    33
    0 Votes
    33 Posts
    22k Views
    J
    @johnpoz: if you have questions post up your rules and we can go over them. Thank you so much John, Our first Pfsense Firewall Hardware is up and running.
  • Nat rules

    2
    0 Votes
    2 Posts
    770 Views
    johnpozJ
    "Destination > any  >" Well that is wrong..  Dest would be your wan address. so you read the troubleshooting doc..  And did you follow it or just read it.  First thing to do is make sure the traffic is actually getting to pfsense wan.  Pfsense can not forward something it does not ever see. How are you testing this?  You need to make sure your coming from outside pfsense..  Your not trying to hit your pfsense wan IP from inside pfsense are you - that would be nat reflection and can be problematic and should really just be avoided.  There is never really a valid scenario that it makes sense. this really is clickity clickity..  Create your foward and your done.  If something is not working you either did it wrong or the traffic is not even getting to pfsense.  You also need to check your firewall on the box listening on 443.  maybe pfsense sends it through and that firewall blocks it?  You sure the box is even listening on 443?  Can you access it from a host on your lan directly? The troubleshooting guide covers pretty much every scenario that could be a problem. Its possible your isp blocks 443 and or you have a nat in front of pfsense that you did not forward 443 to your pfsense wan IP, etc. etc..
  • PfSense responding to 192.168.1.1 after LAN & WAN changed

    4
    0 Votes
    4 Posts
    4k Views
    johnpozJ
    well quick test to make sure its pfsense or not, unplug pfsense lan from your network ;)  Does it still get answered?  If your showing an answer from that mac, then it would be in your clients arp table if on the same layer 2. But pfsense might be sending it out its wan, and something upstream could be answering.  If that is the case then yeah you would show mac of pfsense lan as the answering mac.. That would be my guess to what is happening. perfect example of this is me pinging my cable modem management IP ping 192.168.100.1 Pinging 192.168.100.1 with 32 bytes of data: Reply from 192.168.100.1: bytes=32 time=26ms TTL=63 Reply from 192.168.100.1: bytes=32 time=1ms TTL=63 Reply from 192.168.100.1: bytes=32 time<1ms TTL=63 Reply from 192.168.100.1: bytes=32 time=1ms TTL=63 my pfsense wan is public..  But I can still access my cable modem via that rfc1918 address since pfsense wan is directly connected to it.  If something on your wan answering - sniff on pfsense wan and find the mac that is answering.  It might be showing your gateway on your that network, but then you would know its something else upstream.
  • 0 Votes
    6 Posts
    4k Views
    C
    Generally, yeah, it's best to not loop traffic through the firewall where it's not strictly necessary to do so.
  • Command prompt

    6
    0 Votes
    6 Posts
    940 Views
    C
    You will break things if you do as kpa advises. Don't.
  • 0 Votes
    3 Posts
    717 Views
    K
    Oh, I can't believe I overlooked that.  There are A LOT of virtual IP's on the system.  Thank you for the quick response!
  • Installing packages and speed tweaks

    4
    0 Votes
    4 Posts
    2k Views
    dotdashD
    No idea what you are doing with metasploit, so I can't comment there. Reflection is only needed if you are trying to hit the public IP of a box on your local network. e.g.- you have a web server on the lan that local clients hit via a public IP. Port forwards are not that hard. A typical forward for a web server would go something like- IF WAN Proto TCP Dest WAN address Dest port HTTP Redirect target IP 192.168.1.100 Redirect target port HTTP Description HTTP to web server Note that pfSense usually listens on TCP 443 (and maybe 22), so If you only have one IP, you'll need to change the webgui port to forward HTTPS to your WAN.
  • [Solved] Strange behavior on Syslog. Needs restart for remote logging.

    2
    0 Votes
    2 Posts
    1k Views
    T
    After two days I just found out that I should select LAN on Remote Logging Options / Source Address, to bind the correct interface. Now is working as expected. Thanks.
  • Need help to access web gui

    3
    0 Votes
    3 Posts
    1k Views
    A
    I tried to access it from another computer but web page is not opening. Pfsense is showing "192.168.1.1/24" but that is my router password, pfsense's system password is 192.168.1.2 and both of them not opening pf webui on other computer connected on same network, seems like i have done some mistake in configuration :) which ip address is needed to assign to pfsense lan interface (em0)?
  • 1:1 NAT and traceroutes since 2.3.1_1

    7
    0 Votes
    7 Posts
    2k Views
    ?
    Thanks for the clarification cmb. Noticed that when doing a ICMP traceroute it currently looks like this with 1:1 NAT and a ICMP-req permit any ingress rule: root@mybox:~$ traceroute -P ICMP www.mycorp.com traceroute to www.mycorp.com (178.29.55.4), 64 hops max, 72 byte packets 1  192.168.0.1 (192.168.0.1)  4.286 ms  0.853 ms  0.793 ms 2  * * * 3  * * * .... 12  isp-gw.isp.com (178.29.55.1) 37.324 ms 36.232 ms 37.232 ms 13  web.mycorp.com (178.29.55.101)  38.349 ms  37.285 ms  37.907 ms  <--- this would probably be the pfSense box at 178.29.55.100 14  web.mycorp.com (178.29.55.101)  37.661 ms  37.410 ms  36.496 ms So yes, it really seems that Freebsd 10.3 changed something.
  • Need help on port 443 ! please

    10
    0 Votes
    10 Posts
    1k Views
    D
    ok man thanks for all of your help i really mean that you have got me further that anyone else on the other forums i really appreciate you i will read that link and hopefuly i get it thank you cheers
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.