• Exeption to "Block RFC 1918 networks" rule…

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    C
    Thanks, i'll do it that way
  • Cannot connect to remote Cisco VPN from behind pfsense firewall

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    C
    Nevermind – found out that it was actually a problem using a virtualized client machine.  A physical device worked OK.
  • High delay in ping to wan NIC

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    J
    yepp on the trafic shaping section its told many times that imcp (ping) is set to a low priorty when you shape you can chanche that if you like butt ping is only for testing its not just for real world trafic so that is the resen for the low priorty
  • FTP

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    ?
    Incidentally, at this point, if you're running 1.0.1, you really should be on at least 1.2-Beta-2, especially if you're having problems.
  • Trouble getting VPN connection to work across pfsense

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    A
    We are still having issues with this.  We reinstalled pfsense but the problem continues.  Basically VPN over UDP is erratic.  It works some of the time but other times does not.  It will work fine for a few days then it will stop working for a day.  One client machine may be working while another isn't.  It seems random. Is anyone else having a similar problem?  We have not yet upgraded to 1.2-Beta2 (still running beta1), but we might try to see if it fixes any of our issues. James
  • Sshlockout

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    M
    Hi, I htink it will work the same way as BFD for APF, something like it. Matts
  • "default block all just to be sure"

    Locked
    5
    0 Votes
    5 Posts
    4k Views
    S
    Hi well both are exist, in the NAT there is : WAN….TCP/UDP.... 113 (IDENT)....10.0.0.1 ext any....113 (IDENT) and in firewall rules there is: TCP/UDP.............10.0.0.1....113(IDENT)....*...
  • New 1.2 beta 2 and IPSEC changes

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    valnarV
    OK, that's what I needed.  Thanks. -Robert
  • Filtering OpenVPN Interfaces

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    C
    No, but it should make 1.3.
  • Need some quick shell ipfw help

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    C
    It's pf, not ipfw. You have to make your rule changes via the webGUI, otherwise they'll be overwritten. If your existing ruleset does not allow you into the webGUI, you can make temporary rule changes at the command line. Your running ruleset is /tmp/rules.debug. Info on changing it can be found here: http://www.openbsd.org/faq/pf/ Don't do anything other than add a rule to permit access to the webGUI, then go into the webGUI and setup the same rule there, as well as whatever else you want. Editing the ruleset manually is unsupported and may cause problems, I strongly suggest having someone on the LAN side let you into the webGUI rather than doing this. You could use tunneling with SSH to get into the webGUI, that's probably a better and easier solution.
  • Multiple Outside Interfaces

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Firewall in transparent bridge mode "turns arround" - very strange issue

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    W
    After a lot more testing I come to the conclusion that simply my old observations must have been wrong (maybe I shoudn't do setups at late night) ;) . Summarizing this meas: the confusion started with the fact that the bridged LAN IP can be accessed from the outside network (ping and webinterface and ssh). All other observation where just due to other effects, e.g. the pptp stuff still works. Hence, what remains from here is just, that it's probably a bug that the internal ip can be accessed from outside in bridge mode. Furthermore, this cannot be deactivated by deactivating the anti-lockout rule. This is discussed here: http://forum.pfsense.org/index.php/topic,5441.msg32479.html#msg32479 . Sorry for the long post and the confusion.
  • Anyway to limit concurrent connections by IP or MAC?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    S
    Look in firewall rules -> LAN, edit the default firewall rule and click the advanced button.
  • SMTP Question on Dual Lan setup

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jahonixJ
    @dcbour: Wan - Cogeco - blocks SMTP except to their own server. Hopefully you mean from their Server. On WAN you can only block/reject packets that enter on this interface… Chris
  • Vlans, and out bound loadbalance

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Help setting up standard rules for mail server/web server/vpn

    Locked
    6
    0 Votes
    6 Posts
    3k Views
    dotdashD
    @Kim: Thanks for that. So in the NAT window, I would just do the following: (where 10.7.31.20 is our Exchange/Web Server) - see attachment? - Then the same for HTTP and HTTPS? Yes. Once you have the first one done, you can use the handy + create a new rule based on the first one, and just change the ports. @Kim: Do I also need to create a Firewall rule to Block * from the WAN? (and order the rules so this is the last rule?) - or does pfSense block everything else by default? Defaults to blocked. @Kim: What are the VIPs? You would define Virtual Ips if you had additional static IP addresses assigned to you by your provider.
  • Firewall Performance - Suitable for >100Mbit?

    Locked
    12
    0 Votes
    12 Posts
    5k Views
    J
    @Cry: @tulsaconnect: We plan to use Dell hardware, and unfortunately the newer Dell's are using Broadcom NICs, which aren't as well supported under FreeBSD as Intel NICs.  I wonder how the onboard NICs are connected internally – e.g. at something better than PCI-X or PCIe bus speeds... ? From discussions with somebody I know you'll find you get better throughput with add-in Intel GBit cards even on boxes with onboard Intel GBit.  He wasn't sure why, but even when the add-in cards had the same chips as the onboard cards he still saw better performance (beyond 100 Mbs, don't remember the exact values) with the add-in cards. From what I was told from an Intel engineer was that, the OnBoard NIC's use shared resources relying heavily on the CPU whereas an Add In NIC, usually has it's own timer chips, etc.
  • Redirecting

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • 0 Votes
    1 Posts
    2k Views
    No one has replied
  • Random network outages "Drops"

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.