• Bridge - cannot reassign the bridge as LAN

    6
    0 Votes
    6 Posts
    233 Views
    stephenw10S

    I expect that work. Let us know what you find.

  • Pfsense on Vmware ESXI and microsoft teams

    7
    0 Votes
    7 Posts
    348 Views
    O

    What can explain why MS Teams don’t work well on that network? It is the ISP? Or it a miss configuration in pfsense on VMware?

    The actual ISP uses a hybrid fibre/coax network, the speedtest was good on wifi and connected with an ethernet cable. Google meet work well, YouTube too, etc. But MS Teams are buggy asf.

    If we use MS Teams on another ISP like Telus who use à fibre network, everything works well on the same computer.

    It is the ISP fault?

  • New pfSense install & can’t access my switch

    11
    0 Votes
    11 Posts
    596 Views
    stephenw10S

    Yup it's very easy to get off track when changing a lot of things at once. I agree with @Jarhead, try to change one thing at a time and verify it did what you were expecting.

    Of course sometimes you have no choice but to make several changes and hope it all lines up! 😉

  • OPENVPN Client View IPSEC site-to-site

    6
    0 Votes
    6 Posts
    317 Views
    B

    @stephenw10 It worked, friend, thank you very much, I had to configure phase2 as the image I sent last

  • Intel cpu microcode

    3
    0 Votes
    3 Posts
    634 Views
    stephenw10S

    pkg install will only look in the configured pfSense repo and those pkgs should already be installed:

    [24.03-RELEASE][admin@apu.stevew.lan]/root: pkg search microcode cpu-microcode-1.0 Meta-package for CPU microcode updates cpu-microcode-amd-20231019 AMD CPU microcode updates cpu-microcode-intel-20231114 Intel CPU microcode updates cpu-microcode-rc-1.0_1 RC script for CPU microcode updates [24.03-RELEASE][admin@apu.stevew.lan]/root: pkg info -x microcode cpu-microcode-1.0 cpu-microcode-amd-20231019 cpu-microcode-intel-20231114 cpu-microcode-rc-1.0_1

    Also if you want to run pkg commands like that you should do so from the CLI instead of having to pipe 'y' to it. That way you can see output and review it before allowing it.
    But if you have to use the gui command prompt pkg has a switch for that: pkg install -y cpu-microcode

    Steve

  • 0 Votes
    4 Posts
    222 Views
    stephenw10S

    Those menu entries are created in the config. I have no idea how you ended up with two but you can remove it from the file if if you need to.

  • Noticing traffic spikes on VLANs with no clients?

    11
    0 Votes
    11 Posts
    516 Views
    T

    @johnpoz Thank you so much! This helped me to understand and pinpoint the actual configuration responsible for the ARP scan.

  • IGMP strangeness

    18
    0 Votes
    18 Posts
    2k Views
    dennypageD

    @dennypage said in IGMP strangeness:

    @stephenw10 said in IGMP strangeness:

    As long as the ruleset is reloaded after enabling it that should work fine. Nothing there should require a reboot.

    Agreed. Only thing I could think of is that something prevented the reload from completing…

    @stephenw10, In the other recent thread, the user indicated that after defining the rule, they needed to perform a state reset before the rule worked. Worth noting. This would also explain the situation with the user who asserted that they had to reboot.

  • 24.03 FRR has flapping BGP neighbors

    20
    0 Votes
    20 Posts
    2k Views
    K

    @michmoor hi mich, can you give more detail on what rules you created to allow bgp across the interfaces?
    thanks
    jim

  • ld-elf.so.1: Shared object "libssl.so.30" not found, required by "pkg"

    4
    1 Votes
    4 Posts
    2k Views
    E

    @bthoven
    It worked for me.
    Using 'certctl rehash' than 'pkg-static -d update'
    Thanks

  • DNS for mulitple VLANS

    8
    0 Votes
    8 Posts
    463 Views
    T

    @johnpoz, hum thats what i thought. I will follow the othere thread and see where I end up.

    I appreciate all the guidance and adviae that you have proevided. I jave a good base to start from now.

  • PHP Fatal error ... status_interfaces.php:137

    6
    0 Votes
    6 Posts
    249 Views
    stephenw10S

    Yes that is the best way.

    For a small edit like this you could likely just edit the config file in place and then reboot.

  • After suricata deinstallation have a low speed

    4
    0 Votes
    4 Posts
    166 Views
    stephenw10S

    It's possible if the uninstall didn't complete. Check Diag > System Activity or the output of ps -auxwwd.

  • 23.09.1 update failed. Now it won't restart. What now?

    12
    0 Votes
    12 Posts
    538 Views
    stephenw10S

    The spare 1100 will need a WAN IP that is in your current LAN subnet. I would just use the default for that which sets the WAN as DHCP. It will pull a lease from your existing dhcp server and should be able to connect out.

  • pfSense hacking

    12
    0 Votes
    12 Posts
    2k Views
    GertjanG

    @Antibiotic said in pfSense hacking:

    Is it default deny?

    A firewall is what it says : hard to pass through. At least, that was the word they came up with in the middle of in the last century. These days, I tend to think my pfSense has a back hole in front of my WAN, 'visible' from the outside.
    With this perspective in mind, why would you block a black hole with 'stop' rules in front it ? Stop signs that say : [first stop rule] no RFC1918 here. And [second rule] unknown flying sorcerers neither.
    Just let them have it 👍
    As it should be obvious that anything imaginable (by humans) will get into the black hole, and from there its not our problem anymore.
    Block rules do use CPU cycles .... why waste cycles on stuff that's going to be annihilated ?
    So : no need to block access to black hole. It's a bit 'useless'.

    The perfect WAN firewall list is ... an empty list.

    There always will be some #d#ts that try to poke in a black hole to see if the can manage to do something with it.
    They are just proving that physical laws exist, but they just didn't get that yet.
    Using a firewall is actually a responsible social thing to do : its keep #d#ts busy and from the street, as they might be doing other things out there ^^

    edit : wait : your stop rules can have a useful function !

    This :

    50248455-ad9b-4130-b13f-634626b95d5b-image.png

    is useful so you can see if there are actually #d#ts out there that send you packets that match, thus hit, the rule.

    Your 'Not assigned by IANA' has actually a double score counter : these packets shouldn't even be routed to you by your ISP, so they couldn't never reach you, as "non assigned networks" can't be used / routed on the Internet.
    So maybe your on to something : your ISP is also a #d#t 😊

  • 0 Votes
    2 Posts
    126 Views
    stephenw10S

    It's a compiled patch so it cannot be applied via the patches package. It will be in 24.07. If we have to produce a point release for 24.03 we could probably pull that in but it's unlikely that by itself would warrant it.

    Steve

  • SG-1100 upgrade 23.01-Release to 23.05.1 - which one?

    6
    0 Votes
    6 Posts
    248 Views
    N

    @stephenw10

    30% of 3.7GB.

    I started another thread since things have gone downhill a bit.

  • acb.netgate.com ERROR

    7
    0 Votes
    7 Posts
    356 Views
    A

    @stephenw10 Could be, anyway this error does not appear anymore.

  • swap not listed? [solved]

    41
    1 Votes
    41 Posts
    9k Views
    stephenw10S

    It's common to have the SWAP as double the RAM size. That way you can dump the full ram to it if required. pfSense doesn't do that though.

  • Still no 2FA?

    5
    0 Votes
    5 Posts
    272 Views
    johnpozJ

    @deanfourie said in Still no 2FA?:

    I'm just surprised this is not built in.

    So freerad is click to add to pfsense, how is it not built in? You looking for a click and dropdown menu to setup 2fa?

    I think there is lack of understanding of what constitutes mfa to be honest.. So any sane setup of a device like a firewall should be limited to what network/devices can access it in the first place. So location of auth is a factor. Now maybe this is just your lan.. But what it should be is secured network that only admins can be on. So that is 1 factor.. Now they need username+password = 2fa by the very definition of what 2fa is.. Do you allow access to the firewall via the public internet?

    So mfa auth can be made up multiple(s) of these attributes

    A knowledge factor is something the user knows, such as a password, a PIN etc.. A possession/have factor is something the user has, such as an ID card, a laptop, security token, cellphone, etc A biometric or something you are factor, ie something inherent in the user's physical self. A location factor is usually denoted by the location from which an authentication attempt is being made. A time factor restricts user authentication to a specific time window in which logging on is permitted and restricts access to the system outside of that window.

    Maybe missing something but lets take these 5.. And walk through some scenarios/setups.

    So to auth to pfsense
    Username and password = 1 factor
    Have to be on the secured "admin" network or IP. = another factor.. So unless you allow login to your firewall from the public internet?

    There is 2fa auth right there if you ask me.

    Other factors that should/would be involved in access to this firewall. Could be another something you have, for example your ID to even get in the building to be able to get on the network/room that can even access the firewall. Or maybe even biometric, fingerprint to access the building or IT dept. Or server room or etc..

    Other factors to be considered, to get on this "admin" network its possible you have to do some sort of 802.1x auth to connect this device not just just walk in off the street and plug into some port or connect to some open wifi network. So this could be something you have - work laptop that is pre setup to get on this admin network, also something you know the username+password to even login to the laptop you have.

    So if we walk through a typical possible process of accessing the firewall gui

    ID to get into the building, laptop that is company laptop and allowed to access the network. Username and password to login to this laptop. Username and password to access pfsense gui. So I count 2 things you have (id and work laptop) and 2 things you know. Login to this laptop and login to pfsense = 4fa

    So unless this pfsense is say just sitting in the open or in an unlocked closet in a public building that requires no form of auth to enter your satisfying mfa..

    Some token or sms sent to a different device is just one of the ways to control access. But it is not the get all end all to having 2fa..

    edit:
    So past company I worked at.. These are factors you would have to do to get access to any sort firewall/router/switch on the network.

    You had to thumbprint to get into the office.. To get into the server room or network closets you needed a badge to scan at the door. So even if you were going to console in ie physical access you had to have 2 factors. Your thumbprint and badge.

    But typically thumb to get in. Work laptop to access the network, because 802.1x was enabled - you couldn't just plug any laptop into any network port on some cube. Also even if you passed 802.1x in some cube, ie a company laptop.. To access the admin network you had to use specific cubes ports, and your laptop had to be specific setup to access this network.

    Now I needed to auth to my laptop.. Which required a tiks card not just username+password, if you just found my laptop on the street wouldn't do you any good.

    Now to access the devices from this "admin" network you also needed to auth to the admin network - not just be plugged into the network that can auth. So this required a different username and password. Now once was on this network, you could access network devices. And then you needed username and password to auth this device.

    So how many factors is that? Well over 2 that is for sure ;)

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.