• Require to access internal webserver with virtual IP

    1
    0 Votes
    1 Posts
    88 Views
    No one has replied
  • Floating Rules Question

    1
    0 Votes
    1 Posts
    202 Views
    No one has replied
  • Routing outgoing trafic

    3
    0 Votes
    3 Posts
    298 Views
    K
    Thank you, @viragomann It works.
  • packets lost in WLAN and LAN connection

    2
    0 Votes
    2 Posts
    142 Views
    F
    Hi guys, I don´t know why but I´ve overlooked following article from the official documentation: https://docs.netgate.com/pfsense/en/latest/hardware/troubleshooting-lost-traffic-or-disappearing-packets.html Currently it seems, that checking the checkbox is solved my issue. I´m happy now, but i will continue monitoring the topic Best regards Frosch1482
  • Set Up Firewall Rules on a Backup WAN Interface

    9
    0 Votes
    9 Posts
    721 Views
    G
    @user_three Thanks, I think this Noplan was suggesting. I'll give it a look
  • Delete Firewall rule CLI

    1
    0 Votes
    1 Posts
    168 Views
    No one has replied
  • Guest LAN can't access internet after VPN change

    1
    0 Votes
    1 Posts
    89 Views
    No one has replied
  • 0 Votes
    1 Posts
    166 Views
    No one has replied
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    6 Views
    No one has replied
  • Optimize pfsense to receive incoming 300 connection

    1
    0 Votes
    1 Posts
    114 Views
    No one has replied
  • Filter logs showing traffic that doesn't make sense

    4
    0 Votes
    4 Posts
    259 Views
    dnxD
    II worked it out. I had to add a Floating rule of Pass - src 'this firewall' - dst Internet Host IP - Quick - No Log. That seems to make sense given NAT. I understand things being matched as IN now also, all interface rules are IN. Although I'm still a little confused as to how I can have that floating rule only match if the traffic originated from the one specific LAN port (or if that's even useful) - and it seems it's default to log on the default rule, which means you kinda get double logs if it already matches on interface specific rules.
  • Rule not applied on LAN

    7
    0 Votes
    7 Posts
    485 Views
    S
    Yes On the openvpn I will On other machine (33), it will be a mess !
  • Nessus scan intermittently blocked

    2
    0 Votes
    2 Posts
    370 Views
    dnxD
    What are your Nessus discovery settings? When you say only some are able to go through, what are the symptoms you see of this? Do you know for certain that the internet host is online, and not blocking your requests? Have you checked the firewall logs during the time a scan is run? If not, it'd be a good idea. I run a Nessus scan out to an internet host daily and haven't had any problems (except for the passes being logged even though I have rule entries to not log... which is why I'm here)
  • How to see logs for specific firewall rule?

    8
    0 Votes
    8 Posts
    916 Views
    GertjanG
    Ok, thanks. That should explain the difference. I'm using the latest pfSense RC version 2.4.5.r.20200318.1500 which will probably be (very close to) two dot four dot five. edit : btw : rock solid - for my usage.
  • Firewall blocks traffic coming from Linux NAT

    1
    0 Votes
    1 Posts
    131 Views
    No one has replied
  • SG-3100 OPT1 Firewall configuration - basic help appreciated!

    4
    0 Votes
    4 Posts
    614 Views
    GertjanG
    Ok, great. @paul_endeavour said in SG-3100 OPT1 Firewall configuration - basic help appreciated!: under Firewall / NAT / Port Forward Keep in mind that, when you need to access IPv4 devices that are on a LAN, you need to create NAT rules. The pfSense GUI, the SSH and VPN do not need a NAT rule. These 3 services are listening on any interface already, which includes WAN - VPN listens on the interface you choosed. The (hidden) default WAN firewall rule protects them from being accessed from the outside. So, see my image above : a simple firewall will do to let, for example, http traffic into pfSense to port 80 and your GUI is exposed on that interface. A very bad idea of course, but that's another story.
  • Blocking outoging connections: LAN and/or IPSec?

    1
    0 Votes
    1 Posts
    78 Views
    No one has replied
  • PFSense blocks VPN Connection to company

    21
    0 Votes
    21 Posts
    4k Views
    B
    That was my understanding too but it did not work. Ironically it work with other DNS servers as the one of my PFSense.
  • having troubles with port forward

    2
    0 Votes
    2 Posts
    163 Views
    C
    unless the stealth mode and closed is normal for port forward then maybe its server issues with the company I streaming to.. I just figure its my end since I cant get it to OPEN and is there a port tester site that works with pfsense to see if the port 8000 is open and is working well reason I come here as the company figures maybe router isn't really open as I been trouble shooting
  • Please check my rules on OPT port

    2
    0 Votes
    2 Posts
    194 Views
    johnpozJ
    Your rules just say opt can not go to anything lan net, everything else would be allowed. What would be in opt that would try and go to something in your lan? dhcp would tell client in opt to use pfsense opt IP for dns.. Your rules shows some minor hits on the rule, 26KB worth..
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.