• Turn off logging for one interface

    3
    0 Votes
    3 Posts
    938 Views
    N
    Sweet! Thansk for the quick and seemingly absolutely correct reply :)
  • How to adjust time and date without time server.

    3
    0 Votes
    3 Posts
    7k Views
    R
    OK, i entered: date 1306171306 which sets the clock on "june 17 2013 at 13:06" my mistake was: date 201306171306 -> so i entered 2013 for year –> and that didn't work ::)
  • SSH keys

    3
    0 Votes
    3 Posts
    1k Views
    M
    can u elaborate more? What is it for? if a user is signing on with there auth keys. why do i need this? i can delete them? can i regenerate new keys? can i delete the DSA and the other one, and just keep RSA? can i change then to 4096 bits? any where i can read up more on this?
  • Feedback on a large pfsense deployment

    7
    0 Votes
    7 Posts
    5k Views
    D
    @cmb: I'd just run Security Onion rather than Snort on the firewall. I guess he's trying to achieve some sort of IPS-like functionality, where the triggering of a Snort rule not only creates an alert but also dynamically adds the offending IP(s) to the firewall's block-list, similar to what is (at long last ;-) offered by pfSense's Snort-package.
  • PfSense Monitor packet Loss command

    3
    0 Votes
    3 Posts
    3k Views
    M
    i will try them all
  • DNS not working for computers using DHCP

    8
    0 Votes
    8 Posts
    4k Views
    stephenw10S
    For example if I run 'ipconfig /all' on this machine, WinXP home set to get it's details via dhcp from pfSense: C:\Documents and Settings\Steve>ipconfig /all Windows IP Configuration         Host Name . . . . . . . . . . . . : NewTuring         Primary Dns Suffix  . . . . . . . :         Node Type . . . . . . . . . . . . : Mixed         IP Routing Enabled. . . . . . . . : No         WINS Proxy Enabled. . . . . . . . : No         DNS Suffix Search List. . . . . . : fire.box Ethernet adapter Local Area Connection:         Connection-specific DNS Suffix  . : fire.box         Description . . . . . . . . . . . : Realtek RTL8139/810X         Physical Address. . . . . . . . . : 00-30-1B-AB-18-C3         Dhcp Enabled. . . . . . . . . . . : Yes         Autoconfiguration Enabled . . . . : Yes         IP Address. . . . . . . . . . . . : 192.168.2.10         Subnet Mask . . . . . . . . . . . : 255.255.255.0         Default Gateway . . . . . . . . . : 192.168.2.1         DHCP Server . . . . . . . . . . . : 192.168.2.1         DNS Servers . . . . . . . . . . . : 192.168.2.1         Lease Obtained. . . . . . . . . . : 16 June 2013 11:16:05         Lease Expires . . . . . . . . . . : 16 June 2013 13:16:05 I am then able to ping other machines by their hostname: C:\Documents and Settings\Steve>ping NewBabbage Pinging NewBabbage.fire.box [192.168.2.2] with 32 bytes of data: Reply from 192.168.2.2: bytes=32 time<1ms TTL=128 Reply from 192.168.2.2: bytes=32 time<1ms TTL=128 Reply from 192.168.2.2: bytes=32 time<1ms TTL=128 Reply from 192.168.2.2: bytes=32 time<1ms TTL=128 Ping statistics for 192.168.2.2:     Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds:     Minimum = 0ms, Maximum = 0ms, Average = 0ms This works even though 'fire.box' is not a real domain, or at least it's not my domain. Interestingly this works even though I don't have 'Register DHCP leases in DNS forwarder' set in pfSense.  :-\ Steve
  • IP Camera lockup after LACP

    2
    0 Votes
    2 Posts
    1k Views
    D
    Sure sounds like the Teaming on the server and Link Aggregation on the switch is not working together. If you have Intel NICs this article might come in handy: http://www.intel.com/support/network/sb/cs-009747.htm
  • PfSense + Windows Server

    16
    0 Votes
    16 Posts
    8k Views
    W
    @anthix: Both Nic Cards have the IP 10.1.2.1. A quick count of what you have told us about suggests there are at least 5 NICs. Which specific NICs are you talking about? A very good guide is that (unless you know what you are doing and have thought about it carefully) each NIC should have a unique address.But that is not sufficient to give you a working network. It is probably a failure of my imagination but I don't see how @anthix: Both Nic Cards have the IP 10.1.2.1. will accomplish  either @anthix: monitor the traffic or @anthix: keep people out of my server when they're using the lab computers. My suggestion: pfSense LAN IP: 10.0.0.1 with netmask size of 16 (255.255.0.0) pfSense: SER1 IP: 10.1.0.1 with netmask size of 24 (255.255.255.0) Windows server 10.1.0.2 with netmask 255.255.0.0 and default gateway 10.1.0.1. Let pfSense handle DHCP on the LAN. (I don't know if Windows DHCP will allocate IP addresses outside its own subnet.) You might find it informative to read an introduction to IP Routing such as the Wikipedia article on the topic.
  • PFSENSE to PFSENSE connection

    3
    0 Votes
    3 Posts
    1k Views
    M
    https://www.google.co.ve/search?client=ubuntu&channel=fs&q=ipsec+to+ipsec+pfsense&ie=utf-8&oe=utf-8&redir_esc=&ei=pVi7UYHxI5DM9gSZ1ID4BA http://doc.pfsense.org/index.php/OpenVPN_Site-to-Site_%28Shared_Key,_2.0%29
  • Remotely registering mobile devices for use on an intranet

    1
    0 Votes
    1 Posts
    723 Views
    No one has replied
  • Insane latency, Roadrunner shows 237GB traffic in 1 hour [>500Mb/s]

    4
    0 Votes
    4 Posts
    2k Views
    M
    Well, i feel a tad sheepish, and assish, but it was my reinstall of windows8 that was causing the problem.  I thought of that, but, 1-couldn't think why that would cause a tracert done by pfsense itself and all the other connected systems to go bad, and 2-could see no indicators of windows being set up differently, or anything that I could see that suggested some kind of 'footprint' of windows getting it's grubby fingers into the mix.  I need to talk to timewarner about the erroneous traffic reporting, but such calls tend to make me want to kill myself, but ya gotta do … Thanks for the suggestions guys, have a good one
  • [BUG] LDAP with AD - Password with non-english character do not work

    3
    0 Votes
    3 Posts
    1k Views
    S
    Thanks!!!!! What I've been searching for!
  • Fresh Install or Continue to use Auto Update

    3
    0 Votes
    3 Posts
    963 Views
    N
    As far as I know auto-update will only update existing files and add new files to the system but it will not remove "old" files if these are not used anymore. Further if you are using pfsense 2.0.x with packages and then 2.1.x with packages then I would suggest to do a fresh installation because the way how packages are handled on pfsense 2.1 is different. It will work if you are using auto-update but then it could be possible that you have old pfsense 2.0.x package files left on the system and then install the packages the pfsense 2.1 way. And if you played much with packages, installed some for testing and uninstalled them again and so on there could be fragments left. So I personally go the way to do a fresh install until I know what I want to use and install. If I am just testing I am using the auto-update fuction.
  • Kernel crash on 2.0.3 when assigning interface to WIFI NIC clone

    5
    0 Votes
    5 Posts
    2k Views
    S
    Thanks for replying. It's not that import for me, so I guess I am going to wait until 2.2 becomes stable, as I don't want to break my rock solid installation
  • New lan, disappear vlan

    7
    0 Votes
    7 Posts
    2k Views
    I
    Thank you, created one.
  • OpenVPN VS IPSec

    8
    0 Votes
    8 Posts
    4k Views
    jimpJ
    IPsec has better third party support. OpenVPN is easier to use, more likely to punch out of random remote networks, and less prone to have problems with renegotiation. You can do L2 or L3 on either one. IPsec can do transport mode and encrypt anything between the WAN IPs, including some other tunneling protocol that does L2 such as GIF. OpenVPN has tun mode for that, which is much easier to deal with and easier to find client support for of course. :-) I prefer OpenVPN anywhere I can use it. Especially now that there are clients for Android and iOS that don't require root/jailbreak.
  • Vlan?

    32
    0 Votes
    32 Posts
    9k Views
    L
    Yes, It seems to work fine and as expected.  I didn't notice the DHCP status page showing multiple entries until I was off-site and looking at them remotely, and so could not check.  I have since gone past the site and checked, and all seems to work just fine. Thanks.
  • Camfrog Server HELP!!!!! camfrog y wont you work

    2
    0 Votes
    2 Posts
    2k Views
    J
    From their site: You can open the following ports to make Camfrog Server work behind a firewall/NAT. Camfrog Server: Please open following ports: TCP 6005 — incoming port for client data connections UDP 5000 – 15000 — incoming ports for multimedia streams Camfrog Client: Opened ports are not needed, but disable the firewall because it can cause conflicts. Also from this site: http://forum.pfsense.org/index.php?topic=17693.0 The issue mentioned in the second post isn't relevant in 2.x if you leave the "Filter rule association" option alone when creating the NAT forward.
  • Failing TCP connections

    2
    0 Votes
    2 Posts
    1k Views
    maxxerM
    I'm attaching here a tcpdump of a failing ssh attempt to a remote host. The dump has been captured from within pfsense's VM, lan_host is a client on the lan and remote_host is the ip i'm trying to ssh to. Apparently at 13:54:06.552208 the remote host replies with ACK, but the connection is not established. What could be the problem? tcpdump -nn -v host remote_host tcpdump: listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes 13:54:04.355722 IP (tos 0x0, ttl 64, id 43641, offset 0, flags [DF], proto TCP (6), length 52)     lan_host.51155 > remote_host.30022: Flags [F.], cksum 0x9517 (correct), seq 1051905475, ack 4183675913, win 115, options [nop,nop,TS val 2397103 ecr 1808805240], length 0 13:54:04.865743 IP (tos 0x0, ttl 64, id 48162, offset 0, flags [DF], proto TCP (6), length 60)     lan_host.51231 > remote_host.30022: Flags [s], cksum 0x1d11 (correct), seq 1526999052, win 14600, options [mss 1460,sackOK,TS val 2397230 ecr 0,nop,wscale 7], length 0 13:54:05.863110 IP (tos 0x0, ttl 64, id 48163, offset 0, flags [DF], proto TCP (6), length 60)     lan_host.51231 > remote_host.30022: Flags [s], cksum 0x1c17 (correct), seq 1526999052, win 14600, options [mss 1460,sackOK,TS val 2397480 ecr 0,nop,wscale 7], length 0 13:54:05.992162 IP (tos 0x0, ttl 64, id 43642, offset 0, flags [DF], proto TCP (6), length 52)     lan_host.51155 > remote_host.30022: Flags [F.], cksum 0x937e (correct), seq 0, ack 1, win 115, options [nop,nop,TS val 2397512 ecr 1808805240], length 0 13:54:06.550870 IP (tos 0x0, ttl 53, id 0, offset 0, flags [DF], proto TCP (6), length 60)     remote_host.30022 > lan_host.51231: Flags [S.], cksum 0xa275 (correct), seq 1291086062, ack 1526999053, win 14480, options [mss 1412,sackOK,TS val 1808882048 ecr 2397230,nop,wscale 5], length 0 13:54:06.552208 IP (tos 0x0, ttl 64, id 48164, offset 0, flags [DF], proto TCP (6), length 52)     lan_host.51231 > remote_host.30022: Flags [.], cksum 0x0787 (correct), ack 1, win 115, options [nop,nop,TS val 2397652 ecr 1808882048], length 0 13:54:07.547636 IP (tos 0x0, ttl 53, id 0, offset 0, flags [DF], proto TCP (6), length 60)     remote_host.30022 > lan_host.51231: Flags [S.], cksum 0xa17c (correct), seq 1291086062, ack 1526999053, win 14480, options [mss 1412,sackOK,TS val 1808882297 ecr 2397230,nop,wscale 5], length 0 13:54:07.548634 IP (tos 0x0, ttl 64, id 48165, offset 0, flags [DF], proto TCP (6), length 52)     lan_host.51231 > remote_host.30022: Flags [.], cksum 0x068e (correct), ack 1, win 115, options [nop,nop,TS val 2397901 ecr 1808882048], length 0 13:54:09.263836 IP (tos 0x0, ttl 64, id 43643, offset 0, flags [DF], proto TCP (6), length 52)     lan_host.51155 > remote_host.30022: Flags [F.], cksum 0x904c (correct), seq 0, ack 1, win 115, options [nop,nop,TS val 2398330 ecr 1808805240], length 0 13:54:15.815396 IP (tos 0x0, ttl 64, id 43644, offset 0, flags [DF], proto TCP (6), length 52)     lan_host.51155 > remote_host.30022: Flags [F.], cksum 0x89e6 (correct), seq 0, ack 1, win 115, options [nop,nop,TS val 2399968 ecr 1808805240], length 0 13:54:28.904119 IP (tos 0x0, ttl 64, id 43645, offset 0, flags [DF], proto TCP (6), length 52)     lan_host.51155 > remote_host.30022: Flags [F.], cksum 0x7d1e (correct), seq 0, ack 1, win 115, options [nop,nop,TS val 2403240 ecr 1808805240], length 0 13:54:55.112219 IP (tos 0x0, ttl 64, id 43646, offset 0, flags [DF], proto TCP (6), length 52)     lan_host.51155 > remote_host.30022: Flags [F.], cksum 0x6386 (correct), seq 0, ack 1, win 115, options [nop,nop,TS val 2409792 ecr 1808805240], length 0 13:55:47.465207 IP (tos 0x0, ttl 64, id 43647, offset 0, flags [DF], proto TCP (6), length 52)     lan_host.51155 > remote_host.30022: Flags [F.], cksum 0x3066 (correct), seq 0, ack 1, win 115, options [nop,nop,TS val 2422880 ecr 1808805240], length 0 [/s][/s]
  • L2TP VPN Setup

    6
    0 Votes
    6 Posts
    9k Views
    C
    I just read in the cook book that L2TP is not a secure protical and needs to be used in conjuction with Ipsec. So im going to stick with OpenVPN. Thanks for your response.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.