• Unable to accede to PFSENSE INTERFACE AFTER Taping the IP adresse

    15
    0 Votes
    15 Posts
    3k Views
    stephenw10S

    ^Yes, exactly.
    Many things wrong there. Looks like you accidentally pasted a part of the xml file.

    What were you trying to do there?

    Steve

  • Weird RRD Graph

    8
    0 Votes
    8 Posts
    2k Views
    stephenw10S

    Not necessarily. If Snort is slowly caching everything it looks at and then resets it when it reloads its ruleset that might produce a similar graph. If it's doing that without any traffic flowing through the box that would be more weird.

    Steve

  • Help please: pfSense stops access to internet from LAN

    7
    0 Votes
    7 Posts
    2k Views
    -flo- 0-

    Thank you chemlud,

    next time this problem occurs I can check whether I can get around it this way.

    Telekom-gateway not responding to ping is not such a severe problem. As long as I have a reliably substitute for monitoring this is fine. It would be a problem however if a problem with connectivity is not on my side but in the Telekom network between the default Gateway and other hosts in the internet. Fortunately this seems to be quite reliable …

  • Pfsense 2.1.3 firewall floating not working?

    4
    0 Votes
    4 Posts
    1k Views
    V

    If using floating rule ensure that you select the interfaces an the direction traffic goes.

  • Error lightsquid diagnostic

    1
    0 Votes
    1 Posts
    671 Views
    No one has replied
  • Convert simple WAN/LAN system to WAN/Multi-VLAN-on-LACP

    1
    0 Votes
    1 Posts
    653 Views
    No one has replied
  • SNMP vulnerability in certain cable modems

    1
    0 Votes
    1 Posts
    554 Views
    No one has replied
  • Traffic shaper limiter

    3
    0 Votes
    3 Posts
    983 Views
    C

    Thank you for this

  • Apparent "hang" periodically?

    12
    0 Votes
    12 Posts
    3k Views
    stephenw10S

    Ouch. Never the underestimate massive coincidental failure.  ;)
    Often things start to fail and go unnoticed, only when several things have failed or are failing do real problems show up. Then when you investigate you find what appears to be a string of failures but you look for a siongle point of failure because that seems more likely.
    Of course most of the time it is just a single point of failure.  ::)

    Steve

  • PfSense Captive portal slow

    6
    0 Votes
    6 Posts
    3k Views
    W

    Thanks, I see this was closed a not a bug.  I have another pfSense system to install and I will see if I get this issue as well.

  • [SOLVED] Manual packages failing to install

    3
    0 Votes
    3 Posts
    2k Views
    stephenw10S

    It is just for Nano installs. The are mounted RO by default and should have been since 1.2.3.
    2.1.3 is built on FreeBSD 8.3 so you should be using those.  ;)
    Since 8.3 is still the current  it hasn't been archived yet so you can just add packages by their name directly without having to specify the entire path.

    Steve

  • Website from LAN 2 inaccessible from LAN 1 when proxy in use

    2
    0 Votes
    2 Posts
    739 Views
    jimpJ

    You can set a proxy bypass in the client configuration/options on the individual workstations/browsers.

    Otherwise you'll need to make sure that your local DNS resolves the hostname to be the actual local/internal IP address of the web server.

  • I'm coming back to pfSense, have some questions

    6
    0 Votes
    6 Posts
    1k Views
    R

    Alright, thanks for the info. I will place an order for the APU then.

  • Multie Lan isseu?

    2
    0 Votes
    2 Posts
    685 Views
    V

    What I want to do is stop traffic between the 192.168.2.0 and 10.0.0.0 networks - Ive tried a few fire wall rules and also block private networks - from the interface section but I'm not having much luck

    If you block private networks on these interfaces there will be blocked everything, cause your LANs are private networks.

    Basically pfSense only allow traffic which is proper to a configured firewall rule. However on LAN interface there is a predefined rule that allow traffic from LAN net to anywhere. If you don't want this you have do delete or edit it to fit to your purposes.

    If you just want to isolate your 2 LANs add a rule to each interface to pass traffic, in the destination area check "not", select network in type-dropdown and in the underneath field enter the other LAN network and mask. Delete any other rules.
    This allow access to anywhere, but the other LAN.

  • Unable to check for updates.

    6
    0 Votes
    6 Posts
    3k Views
    R

    same solution works for 2.1.3 :)

  • 0 Votes
    2 Posts
    762 Views
    Z

    The problem has been solved!
    Set in a private ip in squid do not pass on it.
    Bypass proxy for Private Address Space (RFC 1918) destination
    Do not forward traffic to Private Address Space (RFC 1918) destination through the proxy server but directly through the firewall.

  • Mailscanner running wild

    2
    0 Votes
    2 Posts
    880 Views
    M

    Same here. CPU Load 100% …

  • Blocking Internet Explorer

    1
    0 Votes
    1 Posts
    672 Views
    No one has replied
  • Transparent Firewall behind another Firewall

    5
    0 Votes
    5 Posts
    1k Views
    P

    I just did a test with a single laptop and it seems to be working now. You are correct, the WAN does
    not need an address.

    I realize now that I have a separate issue when I consider what I eventually want to accomplish. I
    really want to block Internet Explorer from accessing the internet and I have just learned that a transparent
    squid will break the bridge. I will do another post for my new issue.

    Thanks for the help.

  • PPoE WAN not acquiring IP

    2
    0 Votes
    2 Posts
    2k Views
    B

    I've set up a draytek 130 vdsl same setup .. I found that this exact issue is due to the setup of the draytek.

    ensure you have setup the router correctly… and update the fermware to the latest verison

    a quick setup (ensure you save the config as asked and conferm settings at end as my draytek lost vlan tag each time)

    *** ADSL Connection

    Reset router factory defaults Compete Quick Internet Wizard Disable PPPoE/PPPoA client                    (internet access >> PPPoE/PPPoA) Enable PPPoe Passthrough                      (internet access >> PPPoE/PPPoA)

    *** VDSL connection

    Reset router factory defaults Enable vlan and enter tag                      (internet access >> general setup) Disable PPPoE/PPPoA client                    (internet access >> PPPoE/PPPoA) On MPoA set                                            (internet access >> MPoA / static or dynamic IP)
                          a)  MPoa (rfc1483/2684) >>>  enabled
                          b)  Encapulation >>> 1483 Bridged IP (IPoE)
                          c)  MTU >>> 1492

    If vlan is enabled in step 2 then no vlan settings are needed on the pfsense firewall

    hope this helps :)

    Bodie

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.