• Notification e-mail for WAN down, shows green in web

    3
    0 Votes
    3 Posts
    472 Views
    C

    Thanks for the reply, the issue re-appeared today.

    Here is the log of the WAN in question:

    Nov 27 14:35:08 dpinger: OPT4_WAN_DHCP_DHCP 8.8.8.8: Clear latency 497157us stddev 968654us loss 0%
    Nov 27 14:34:14 dpinger: OPT4_WAN_DHCP_DHCP 8.8.8.8: Alarm latency 517317us stddev 803024us loss 0%

    The mail messages stated that:
    _MONITOR: OPT4_WAN_DHCP_DHCP is down, omitting from routing group MainOut
    8.8.8.8|10.11.1.2|OPT4_WAN_DHCP_DHCP|517.759ms|802.821ms|0.0%|down

    MONITOR: OPT4_WAN_DHCP_DHCP is available now, adding to routing group MainOut
    8.8.8.8|10.11.1.2|OPT4_WAN_DHCP_DHCP|499.966ms|814.632ms|0.0%|delay_

    I guess the WAN was ommited due to high latency, which occurs when a line is really busy.

    Maybe change the latency thresholds (200/500)?

    Best regards

    Kostas

  • Trying to get VLANs working with TP-Link TL-SG1016DE switch

    6
    0 Votes
    6 Posts
    2k Views
    JKnottJ

    Now that I understand, at least I think, that a tagged port is expecting tagged packets, instead of tagging them.

    No, a tagged port is an access port that accepts untagged frames and then tags them.  A trunk port accepts all frames, tagged or not.

  • Inside out - egress filtering

    3
    0 Votes
    3 Posts
    552 Views
    QinnQ

    @NogBadTheBad:

    Put your IOT equipment on its own subnet and do the following on the IOT interface:-

    1st rule allow IOT net to this firewall DHCP, NTP, etc …
    2nd rule block IOT net to LAN net
    3rd rule allow IOT net to any

    Thanks for your advise, but here that was already the case, all IOT devices are in a different subnet and are rejected when trying to access any other subnet. Only a few selected subnets can reach this IOT subnet through a NAT rule.

  • Difficulties Getting Pfsense on GCP

    3
    0 Votes
    3 Posts
    2k Views
    G

    Hi all,
    here are all the steps I´ve done to complete the PFSense installation on a GCP instance:

    References (Credits):

    Route Card: https://groups.google.com/forum/#!topic/gce-discussion/tPYonu9dwbc

    nlienard: https://gist.github.com/nlienard/0ca5aa8397af6e90d70f

    Desra Blog: http://desrablog.blogspot.co.uk/2017/11/using-t1n1wall-on-google-compute-engine.html

    Google Cloud Documentation

    The pfsense downloads contain a disk image inside, the instructions say that you extract it, rename it (to the convention gce expects) and compress it again.  you can do this in your cloud console or a linux system:
    wget https://nyifiles.pfsense.org/mirror/downloads/pfSense-CE-memstick-serial-2.4.2-RELEASE-amd64.img.gz
    gunzip pfSense-CE-memstick-serial-2.4.2-RELEASE-amd64.img.gz
    mv pfSense-CE-memstick-serial-2.4.2-RELEASE-amd64.img disk.raw
    tar -Sczf pfSense-CE-memstick-serial-2.4.2-RELEASE-amd64.img.tar.gz disk.raw

    Create an image based on the file you uploaded to the bucket:

    Activate the serial console on the project:
    sudo ./google-cloud-sdk/bin/gcloud compute project-info add-metada –metadata=serial-port-enable

    Create an instance and add a second disk to it:

    Use the serial console to perform the install:
    sudo ./google-cloud-sdk/bin/gcloud compute connect-to-serial-port [INSTANCE_NAME] – zone [ZONE]

    Install the PFSense on the second disk:

    Create a snapshot from this disk you created:
    Create an instance from this disk:
    Use the serial to perform the setup:
    sudo ./google-cloud-sdk/bin/gcloud compute connect-to-serial-port [INSTANCE_NAME] – zone [ZONE]

    Using the shell, disable HTTP REFERER:
    "pfSsh.php playback disablereferercheck"

    from that point on, you can access the GUI with the external IP address provided on the instance.

    Hope it helps someone.

    Gustavo

  • [solved] Script to disable rules based on keyword

    5
    0 Votes
    5 Posts
    1k Views
    J

    @PiBa:

    There are a few issues i think :)
    The code you have 'creates' a run2 file, but im not sure how you execute that.. Seemed to be missing the Not enough includes, the $value does not modify the original use &$value to keep the reference to the original array value that needs to be modified.

    I would probably create a php file /root/script.sh that can be directly executed when given execute permissions chmod +x /root/script.sh
    Below code 'works for me' :) .

    #!/usr/local/bin/php-cgi -f require_once("globals.inc"); require_once("filter.inc"); require_once("util.inc"); require_once("config.inc"); global $config; $config = parse_config(true); foreach ($config[filter][rule] as &$value) { if (strpos(strtolower($value[descr]), 'pfb_dnsbl_allow_access_to_vip') !== false) { $value[disabled] = true; //unset($value[disabled]); print_r($value); } } write_config(gettext("Firewall: Rules - saved/edited a firewall rule.")); $retval |= filter_configure(); print_r($retval);

    Thanks a lot! Works well.

  • Libssl.so.8 not found, unable to update/upgrade

    3
    0 Votes
    3 Posts
    2k Views
    S

    Hi,

    with pkg-static update -f and pkg-static upgrade -f i now was able to upgrade to pfsense 2.4.2

    Thank you!

  • Logging Everything in "Allow All" setup

    1
    0 Votes
    1 Posts
    219 Views
    No one has replied
  • Amazon AWS pfSense instance

    1
    0 Votes
    1 Posts
    315 Views
    No one has replied
  • MOVED: pfSense KVM guest - additional disk / grow disk

    Locked
    1
    0 Votes
    1 Posts
    216 Views
    No one has replied
  • MOVED: Help a newbie with routing

    Locked
    1
    0 Votes
    1 Posts
    173 Views
    No one has replied
  • SuperMicro X11SSi-LN4F + pfSense + Intel ME Bug

    2
    0 Votes
    2 Posts
    605 Views
    ?

    Hello, as I was reading it from 4 websites right now two things must be given that your device will be
    able to attack with a bad result for you. First of them is the firmware version shown by that tool shown
    under the download link above and the second point that must be given is the following, the ME unit
    must be enabled and configured or better so called "provisioned"!

    Your SuperMicro X11SSi-LN4F supports supports the following CPUs;
    (fat marks)

    Intel® Celeron® Intel® Pentium® Intel® 7th/6th Generation Core i3 series Intel® Xeon® Processor E3-1200 v6/v5 series

    Please have a look at the Supermicro website for the following two things;

    BIOS update or latest BIOS version
    Install the lastest BIOS and have a look into the change log or release notes for ME bug fixes and patches IPMI update or the latest BMC/IPMI firmware version
    Install the lastest BIOS and have a look into the change log or release notes for ME bug fixes and patches

    Connect another HDD/SSD to your Mainboard and boot from there an installed Windows 7,8,8.1 or 10
    and download the Intel tool shown under the link below, and run a test please.
    Intel SA-00075 detection and mitigation tool

    You will be getting out something like this here shown in the code block, it is copied over from the bigger Qotom thread
    because there were also some persons testing their equipment over. Then have to watch out for the following entries;

    Version: 10.0.25.1048

    Based on my information it should be updated, because it is under the version number 3000 (<3000).
    The last four numbers are counting to get this information! Let us imnagine the ME version on your
    device will be shown as "11.6.27.3264" the it is counting as 3264 and this is over 3000 and save
    or an updated version that is not able to attack!

    Provisioning Mode: Not Provisioned

    But the other point is, that your device is not provisioned and that means;
    Based on the both ME functions variants named "Active Management Technology" (AMT) and "Intel
    Standard Manageability" (ISM) are attackers able to get over or using the network higher access rights,
    if that remote function is activated and configured (provisioned), yours is not provisioned!!!
    Security holes in many Intel systems since 2010 (german language)

    Risk Assessment Based on the analysis performed by this tool, this system is not vulnerable; the ME SKU is not affected. Explanation: If Vulnerable, contact your OEM for support and remediation of this system. For more information, refer to CVE-2017-5689 in the following link: CVE-2017-5689 or the Intel security advisory Intel-SA-00075 in the following link: INTEL-SA-00075 INTEL-SA-00075 Detection Tool Application Version: 1.0.3.215 Scan date: 2017-11-24 15:09:59 Host Computer Information Name: DESKTOP-L7VJDFJ Manufacturer: To be filled by O.E.M. Model: To be filled by O.E.M. Processor Name: Intel(R) Core(TM) i5-5250U CPU @ 1.60GHz Windows Version: Microsoft Windows 10 Education ME Information Version: 10.0.25.1048 SKU: Consumer Provisioning Mode: Not Provisioned Control Mode: None Is CCM Disabled: True Driver installation found: True EHBC Enabled: False LMS service state: NotPresent microLMS service state: NotPresent Is SPS: False

    The ME unit is able to be completely deactivated or it is working in one of three available called
    "function modes" called "AMTSKU" from the SCS-Tool;

    Intel Full AMT Manageability Intel Standard Manageability Intel Small Business Advantage (SBA)

    If you are finding behind your firewall such devices that are effected too, you may block port at the
    firewall to prevent them to be attacked. (16992, 16993, 16994, 16995, 623 and 664), disable
    the ME function in the BIOS and/or update the BIOS and firmware too if you will be sorted right
    from the vendor, it must or should be showing then a number (the last four) over 3000 (>3000)
    this all will be able to help you out. On Windows based systems where nothing else will be nice
    helping out, you could also try out to deactivate the Local Manageability Service (LMS).

    my pfSense box is based on SuperMicro X11SSi-LN4F which is affected by the Intel ME bug.

    How do you find this out? Did you perform this test already?

    Is this a security problem from WAN side?

    The picture (from Intel) below is showing the "way" inside bypassing your overlying OS
    and it will be passing through without to be stopped then as I am informed. (Picture below)

    Sources:
    Intel patches remote hijacking vulnerability that lurked in chips for 7 years
    Remote access bug in Intel AMT worse than we thought, says researcher
    Sicherheitslücke in vielen Intel-Systemen seit 2010
    Tipps zur Intel-ME-Sicherheitslücke SA-00075

    ![ME bug picture around the OS.jpg](/public/imported_attachments/1/ME bug picture around the OS.jpg)
    ![ME bug picture around the OS.jpg_thumb](/public/imported_attachments/1/ME bug picture around the OS.jpg_thumb)

  • Fatal trap 12: page fault while in kernel mode

    2
    0 Votes
    2 Posts
    400 Views
    GertjanG

    Hi,

    99 % sure its a hardware failure, FreeBSD freaks out during its idle loop and knowing that this loop is by far the most executed code on every device, I consider it without bugs  ;)
    The only thing you can do : check out the RAM and storage of your device.

    edit : if possible - and if present, change the power block and use an UPS.

  • Problem loading backup in different hardware

    6
    0 Votes
    6 Posts
    522 Views
    B

    After investigating the error it wasn't the interfaces. I load the full backup without modifying the .xml and I reassign the corresponding interfaces without success so I create the interfaces one by one (not a big deal). Well, when I connect via serial appears a message DXE on startup:

    Available status code
    DXE status code available
    ESes:; 1

    Once the message appears, it does not load anything else in the shell but I can connect via web. If a connect again via serial the shell doesn't show any information.

  • Cant access webgui of pfsense in vbox

    1
    0 Votes
    1 Posts
    246 Views
    No one has replied
  • Arp fails?

    3
    0 Votes
    3 Posts
    455 Views
    K

    i reloaded the switch and router, rebooted all the servers and the app tables populated appropriately. thanks!

  • Remote syslog not working

    3
    0 Votes
    3 Posts
    1k Views
    H

    I just wanted to say thank you to the OP. I was having problems with remote syslog along the same lines. I spent about 3 hours troubleshooting, and your solution eventually resolved my problem. I haven't set up the alias/rules you suggested yet, since setting the IP of the syslog server, rather than the hostname, worked perfectly and is good enough for me. Thank you for posting your solution!

  • Network planing

    3
    0 Votes
    3 Posts
    482 Views
    ?
    what should i do to connect my pfsense to my switch ? (just from modem to WAN and from LAN to my switch)

    Internet –- Modem --- WAN Port pfSense --- LAN port pfSense --- LAN Switch --- WLAN APs and/or other equipment
    such PCs or whatever.

    should i give my PCs in VLAN: LAN static ip dresses or will dhcp do that for me ?

    About how many device we will talk here? Up to 20 devices I would give all of them static IP addresses
    and let only for the WLAN and/or VPN service run the dhcp server then.

    should i allow wlan to access in lan if i want that people can print through my access point ?

    You will be able to st up a VLAN onl for the printer and let them then connect to only that VLAN too and
    not to the other VLANs with your private stuff inside. Work with radius and certificates for the private wifi
    and st up the captive portal with voucher system for all your guests.

    how can i set up my firewall to do the routing and not the modem ?

    A pure modem is not able to do a routing job. Only a router will be able to do so. You could
    try out to bridge that router into the so called bridged mode and let the pfSense then routing
    tha entire WAN and LAN (VLAN) part. (Would be my way do realize it) only if you own a Layer3
    switch in your network, then that switch will be better for the entire internal LAN and VLAN routing
    it is mostly able to route it with wire speed and this too over all VLANs.

  • Cannot upload

    9
    0 Votes
    9 Posts
    1k Views
    S

    @JKnott:

    Does your ADSL modem include a router?  If so, have you placed it in bridge mode, to bypass that router?

    thanks for answer, but router have disabled this option, any other option?

    Captura.PNG
    Captura.PNG_thumb

  • Internal network in public network

    6
    0 Votes
    6 Posts
    521 Views
    A

    OK, great! Sounds like it might work! Thanks.

  • Solved: Unable to access wireless device on VLAN from wired LAN

    2
    0 Votes
    2 Posts
    274 Views
    C

    Solved:

    Well, now I feel silly.  The printer still had 192.168.1.1 for a gateway rather than 192.168.10.1.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.