• Not sure this is normal

    6
    3
    0 Votes
    6 Posts
    93 Views
    johnpozJ
    @Gertjan said in Not sure this is normal: stashed somewhere in an obscure registry key Not sure I would call obscure Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config
  • Port 0 Extra Precautions

    13
    2
    0 Votes
    13 Posts
    139 Views
    JonathanLeeJ
    @johnpoz Does Netgate have a cook book recipe for configuring Squid externally, like the old one for internally? If I had this it would make it easy, I just wonder how to do this as it has to go into squid and back up to the internet etc, makes my brain hurt I only have done it inside pfsense
  • Traffic between OPT1 net and other networks e.g. LAN net

    16
    1
    0 Votes
    16 Posts
    114 Views
    patient0P
    @jogovogo what I forgot: what pfSense version are you using? There was an issue with changing rule orders in certain situations on pfSense+ 23 and 24. https://forum.netgate.com/topic/196601/rules-order-randomly-changes https://redmine.pfsense.org/issues/16076
  • pfSense Slow Inter-Subnet Traffic: 1Gb LAN to 10Gb TrueNAS

    6
    0 Votes
    6 Posts
    456 Views
    J
    I'm facing a similar problem; after authenticating on the captive portal, the user is redirected to another gateway, and after that, the upload speed drops to 0.5. The download works normally, but the upload doesn't.
  • UPLOAD MUITO RUIM PFSENSE 2.7.2

    1
    0 Votes
    1 Posts
    21 Views
    No one has replied
  • 0 Votes
    20 Posts
    3k Views
    JonathanLeeJ
    @johnpoz Thanks for your help with knowledge about openwrt
  • Recommended white list duplicate removal bug work around

    1
    0 Votes
    1 Posts
    36 Views
    No one has replied
  • Confused with firewall rules for OpenVPN

    3
    0 Votes
    3 Posts
    123 Views
    J
    @the-other , Thank you for your answer, and sorry for the late response. I have just finished some experiments with firewall rules. Based on your advice, I moved all rules from the generic OpenVPN tab to the OVPN1 tab, leaving no rules at that tab. Everything works in the same way compared to the previous configuration. I also read that page in the pfSense manual you shared before I raised my post, but I did not fully understand. After reading your example, it became clearer, and after the mentioned experiments with rules, it is fully clear. Hopefully, all my findings are correct: Rules on the OpenVPN tab have priority over the OVPN1 tab (=> In case an incoming packet matches some OpenVPN tab rule, OVPN1 rules are ignored => Rules on the OpenVPN tab are meant to be generic and common for all OpenVPN servers.) If there are no rules on the OpenVPN tab, there is a default message saying "No rules are currently defined for this interface All incoming connections on this interface will be blocked until pass rules are added. Click the button to add a new rule". This confused me. I was convinced that a state without any rule is fully equivalent to a state with a "block all" rule (IPv4+IPv6, any protocol, any IP, any port, etc.). But at least for the OpenVPN tab, this is not true, as I tested that in case there are no rules on the OpenVPN tab, rules from OVPN1 are applied, and everything just works. I just tried to add a "block all" rule on the OpenVPN tab, and remote clients lost connection. So the mentioned message is quite confusing in this case. Because if that message was correct, remote clients would not have had a connection. Thanks, Jan
  • Unresolvable destination alias

    3
    0 Votes
    3 Posts
    47 Views
    W
    OK! Turns out that in: firewall > rules > lan ...there were several old rule sets with alias's that mapped to those files. I deleted them as they were no longer in use then applied the config. Problem solved! Thanks.
  • What is 1000000103 doing on my LAN

    8
    0 Votes
    8 Posts
    189 Views
    johnpozJ
    @Felix-4 I have been in this biz for too long I guess - I don't need to see every little thing.. Some stray SA is meaningless - its noise, or stray udp packets to any single port, etc.. Its just noise.. I have a rule at the end that blocks syn to my address and logs.. I have other rules that log specific senders, that I block from scanning my ports, etc. I log those, etc. But some stray packet hitting my ip is many times just noise that clutters up the log with stuff I don't want to see. If I am troubleshooting something and want/need to see everything its click of button to turn back on default deny logging ;)
  • Aliases error - not updating system tables

    1
    2
    0 Votes
    1 Posts
    32 Views
    No one has replied
  • mDNS :5353 traffic swamping log file...

    9
    2
    0 Votes
    9 Posts
    197 Views
    D
    That's it guys,... Thankyou,.. I now have a log file that has 'useful stuff' in it and will allow me to track the problem I was really trying to solve....
  • Why is the firewall filter sooo slow to access?

    7
    0 Votes
    7 Posts
    170 Views
    P
    My settings, filters, etc. load almost instantly (<1sec) at home. It's running on a rather old HP Intel I5 with 4GB memory.
  • Firewall/NAT issue

    3
    0 Votes
    3 Posts
    85 Views
    D
    @viragomann I figured it out I just had to restart my nas.
  • URL Table - Update Frequency trick

    5
    0 Votes
    5 Posts
    3k Views
    J
    UP, is there any way for this to resume?
  • Rules not blocking inbound

    8
    0 Votes
    8 Posts
    224 Views
    R
    @johnpoz And thank you for pointing out that the outbound blocking rules don't do what I thought they did! :-)
  • pfBlockerNG and Google Earth on Debian Trixie

    3
    0 Votes
    3 Posts
    220 Views
    S
    @Uglybrian, Thank you, I will give that a try. Stuart
  • Default Deny Rules

    15
    3
    0 Votes
    15 Posts
    738 Views
    W
    For other people's future reference. I had to switch to Ruckus Router Code and upgrade to their L3 Premium license to use the Policy-Based Routing feature. Once this feature was enabled, the policy-based routing was very simple. Similar to Cisco policy-based routing. However, it seems, as far as I can tell, due to the state-based nature of the Netgate, the policy-based routes I was trying to set up just did not work. Unfortunately, no one on this forum was able to provide a workaround using the pfsense platform.
  • 0 Votes
    2 Posts
    100 Views
    S
    @tross9 yes. There should be a tooltip if you hover over the X.
  • 0 Votes
    16 Posts
    745 Views
    P
    Thank you all for helping me. In the end I've managed to make it work. As you said, following rule(s) were necessary to access devices on OPT1 and OPT2 respectively. [image: 1760577607694-4278df83-2799-41fa-a032-8ae0b9205d44-image.png] There are some things that I learned along the way: When spoofing MAC address, don't spoof it on the interface you are accessing the web GUI from. Don't spoof WAN MAC address when connected to internet. Do it with WAN port disconnected. Also, clear DHCP leases on your upstream modem/router. When you already have an enabled interface, but then want to spoof MAC address, delete the interface first and then recreate it with spoofed MAC address. Reenabling doesn't work properly. Sometimes the device you're trying to access doesn't allow access from different subnet. This is the case with my OpenWRT router, but home server works flawlessly.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.