• 2.0 rc1 NAT reflection problem

    Locked
    9
    0 Votes
    9 Posts
    4k Views
    V

    i just applyed your fix by hand and now it is working well. thanks!

  • Occasional PPTP problem and Multi WAN failover problem

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    E

    For 1. Can you show some system logs?
    Normally if you have choosen a gateway in a rule it will behave that way.

  • Many packets with DF set have bad cksums on enc0

    Locked
    1
    0 Votes
    1 Posts
    992 Views
    No one has replied
  • Interface options? Solved!

    Locked
    1
    0 Votes
    1 Posts
    984 Views
    No one has replied
  • Should I update?

    Locked
    6
    0 Votes
    6 Posts
    2k Views
    V

    I was addicted to updating as much as possible..until today. Yesterdays image seems to have screwed my ath0 WLAN. The interface stays down, when enabled. Guess i'm going back to an older version.

    -edit
    seems like i found the problem.

    -"Common wireless configuration - Settings apply to all wireless networks on ath0."
    –"Standard": set to 802.11ng causes the interface to go down after a few seconds. Strange.  ::)

  • Reboot only works from console/SSH and not from reboot PHP page

    Locked
    5
    0 Votes
    5 Posts
    4k Views
    P

    Same issue here, so I created a bugreport : http://redmine.pfsense.org/issues/1564

    Running version : 30 May / nanoBSD / No plugin

  • Menu not showing

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    T

    yeah that worked with mozilla

    thanks man

  • MOVED: Snort not able to find all interfaces.

    Locked
    1
    0 Votes
    1 Posts
    923 Views
    No one has replied
  • Isn't anyone else having this problem??? (Solved)

    Locked
    7
    0 Votes
    7 Posts
    3k Views
    R

    @cmb:

    State killing is overzealous when a WAN is down it appears. Under System>Advanced, Misc, check the box under Gateway Monitoring to not kill states. Does that make it stop?

    Thanks for this advice. It sounds like I was having the same (or similar) issue that kronso mentioned (two gateways in a 'balanced' gateway group), where connections were being dropped even if they were going through the WAN that stayed up.

    Now running "2.0-RC2 (amd64) built on Fri May 27 14:15:10 EDT 2011", but the issue was happening even with that version, right up until that setting was changed.

    Maybe a note mentioning something about this setting could be placed on the Gateway Groups page?

  • Ifa_add_loopback_route: insertion failed

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    E

    Put the related system log here.
    Put a tcpdump trace of traffic related to carp.
    a sysctl -a | grep carp output
    and ifconfig output including your config.xml if possible.

  • [suggestion] multiple monitor ip

    Locked
    7
    0 Votes
    7 Posts
    3k Views
    E

    The only thing to speed up a feature to be implemented is to ask support.pfsense.com.
    Surely this means having to pay for it.

    In the free development cycle it will come when someone has it in the agenda.

  • Multiwan questions

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    E

    If they share the same gateway no its not possible yet.
    There are many people interested on this and they are putting money on this through support.pfsense.com.
    So you can contribute through there to make this happen.

    One thing is clear it will not be for 2.0!

  • Problem with 2nd vlan on lagg dot1q vlan interface

    Locked
    6
    0 Votes
    6 Posts
    4k Views
    V

    Well, that was a interesting ride, changed opt1 back to the lagg_vlan160 and it all worked.

    I did, however learn heaps so its not a waste of time, aye :)

  • Need driver for hardware watchdog

    Locked
    64
    0 Votes
    64 Posts
    41k Views
    M

    Nice temperatures indeed. Mine is at about 48 degrees Celsius though it being totally passive cooled without a single fan.

  • Firewall rule order

    Locked
    6
    0 Votes
    6 Posts
    5k Views
    J

    @_igor_:

    that depends on whether you have quick selected, if not, then last match wins.

    so does it mean that with quick option there is no "order", but when quick is not used, the order is from bottom to top?

    When quick is used the rule evaluation from top to bottom stops there…that is also the default behavior for all rules (LAN/WLAN/OPT). Only w/floating rules they are also matched from TOP to BOTTOM and the LAST matching rule is used if you haven't set the quick on a rule before that one.

  • Problem with System: Static Routes

    Locked
    22
    0 Votes
    22 Posts
    6k Views
    johnpozJ

    If your going continue to run with that network setup then it seems to me your running a router on a stick.. Ie you have devices connecting via interface X, just for the router to send traffic back out interface X to got next hop but without the vlans.

    If you back to your bridged setup, then I would say you just need the correct route on your pfsense box, before you had it set to lan as interface.  But 172.25.55.253 is not on lan its on opt1.

    So your route should of been

    172.16.254.0/24 172.25.55.253 via opt1 or possible your br0.  I don't have a lot of exp with bridges to be honest, have not used them since late 90's ;)  Other than a wireless ones to change from wireless to wired, etc.

    But when you create a bridge would you not just have 1 ip address for the br0??  Again I don't work with bridges much.  Never seen the need on router ;)  With a router you would route not bridge - and if you were going bridge you wouldn't need to route over the bridge.

  • FTP problem ob 2.0RC2

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Make: not found

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    K

    I really dont know much about BSD, thank you :)

  • 0 Votes
    13 Posts
    5k Views
    P

    @jimp:

    new snap is building now that has those commits in it, so it should be OK once it uploads later this evening.

    Awesome, thanks!
    This issue creeped up on me Monday's daily build.  Decided to come post about it today. Been trying new dailies all week waiting for a fix. Each time after a rule change, manually editing out the empty or erred rules in /tmp/rules.debug
    and reloading the rules from the shell.

    pfctl -f /tmp/rules.debug
  • Hardware TCP segmentation offload & hardware large receive offload

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    stephenw10S

    The hardware offloading is disabled by default because some NICs/drivers do not support it correctly leading to problems. You should be OK with Intel NICs though.

    Steve

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.