• [WANTED] - if_vte.ko in nanoBSD images

    3
    0 Votes
    3 Posts
    984 Views
    L

    Hi ermal,

    Some feedback: The 2.2-ALPHA runs smoothly on a two-ether eBox just out of the box. I made tests with nanoBSD's 2GB VGA version.

    Until now, I have noticed no issues with this version. Thanks for the info about the RDC 6040 (if_vte.ko) driver.

    I will keep you devs informed.

  • HTTP Portforwarding really slow

    4
    0 Votes
    4 Posts
    1k Views
    M

    Just to let everybody know, reinstalled and upgraded to latest alpha, now it works perfectly!

  • 2.2 HyperV + Gateway outside subnet issue

    2
    0 Votes
    2 Posts
    1k Views
    E

    Should be fixed with next coming snapshot.

  • [solved]diagnostic->dnslookup php warning (see Revision bc0a452f)

    2
    0 Votes
    2 Posts
    656 Views
    jimpJ

    Looks like that happens if you have no aliases defined. I just pushed a fix, new snapshots later should be OK.

  • Upgraded to Aug release & OpenVPN authentication Issue

    3
    0 Votes
    3 Posts
    1k Views
    M

    That's great thanks. At least it wasn't a noob mistake from me for a change ;-)

    I'll try again over the weekend…

  • Status->openvpn page not working correctly

    1
    0 Votes
    1 Posts
    593 Views
    No one has replied
  • REQUEST: Support multiple IPSec mobile client profiles

    4
    0 Votes
    4 Posts
    2k Views
    jimpJ

    For most, OpenVPN is much less of a pain than IPsec when it comes to mobile access. It's a lot more flexible and more likely to work from remote locations.

  • Disable source port rewriting - Auto created rule LAN to WAN missing?

    3
    0 Votes
    3 Posts
    2k Views
    J

    @vindenesen:

    Probably a copy&paste error. It's the bottom rule you want.

    Thanks!
    Hopefully developers will see this post and fix it.

    Edit: Reported at https://redmine.pfsense.org/projects/pfsense/issues

  • Alias->URL Table (IPS)

    3
    0 Votes
    3 Posts
    4k Views
    W

    After looking around further creating an Alias of URLS in a URL_table(IPs) then creating Floating rules based on these aliases the rules do not populate the pf tables after saving them, you can see this by the command "pfctl -s labels".

    After executing the command "pfctl -t -T replace -f /PATH/TO/

    " manually the tables then load and function as expected per "pfctl -s labels".

    Also with these rules in place it takes 13 minutes for pfSense to boot at the first instance of "loading firewall" with 99.8 to 100% idle per Top during this idle time.

    From what I see the alias tables do not get populated and the floating rules based on these aliases do not function without manual intervention using the pfctl command. I am resorting to set up a cron job to reload the tables manually.

    Guys, am I missing something here?

  • Valn Issue

    1
    0 Votes
    1 Posts
    924 Views
    No one has replied
  • Build scripts timestamp issue

    2
    0 Votes
    2 Posts
    953 Views
    C

    This seems to be fixed now, thanks!

  • IKE: Invalid Life Duration

    3
    0 Votes
    3 Posts
    3k Views
    K

    Thanks mgsmith - I've just tried setting rekey=yes and restarting ipsec using "ipsec restart" on the command line and I can verify that the correct lifetime is used and IKE is successfully established. Hurrah!

    From the PA-200's logs;

    2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:384:get_ph1approvalx(): Compared: DB:Peer 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:385:get_ph1approvalx(): (lifetime = 28800:28800) 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:387:get_ph1approvalx(): (lifebyte = 0:0) 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:389:get_ph1approvalx(): enctype = AES:3DES 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:394:get_ph1approvalx(): (encklen = 128:0) 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:396:get_ph1approvalx(): hashtype = SHA1:SHA1 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:401:get_ph1approvalx(): authmethod = PSK:PSK 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:406:get_ph1approvalx(): dh_group = DH2:DH2 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:384:get_ph1approvalx(): Compared: DB:Peer 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:385:get_ph1approvalx(): (lifetime = 28800:28800) 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:387:get_ph1approvalx(): (lifebyte = 0:0) 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:389:get_ph1approvalx(): enctype = 3DES:3DES 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:394:get_ph1approvalx(): (encklen = 0:0) 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:396:get_ph1approvalx(): hashtype = SHA1:SHA1 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:401:get_ph1approvalx(): authmethod = PSK:PSK 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:406:get_ph1approvalx(): dh_group = DH2:DH2 2014-08-07 15:03:23 [DEBUG]: ipsec_doi.c:283:get_ph1approval(): an acceptable proposal found. admin@firewall> show vpn ike-sa gateway FirewallVM phase-1 SAs GwID/client IP  Peer-Address          Gateway Name          Role Mode Algorithm          Established    Expiration      V  ST Xt Phase2 --------------- ------------          ------------          ---- ---- ---------          -----------    ----------      -  -- -- ------               1 pf.sense.ip.address:4500    FirewallVM            Resp Main PSK/DH2/3DES/SHA1 Aug.07 15:03:23 Aug.07 23:03:23 v1 12  2      0
  • Package Open-VM-Tools installation error

    7
    0 Votes
    7 Posts
    2k Views
    J

    Exactly what I was missing then, worked like a charm.  Thanks!

  • Gold menu addition breaks system menu

    6
    0 Votes
    6 Posts
    2k Views
    A

    @mais_um:

    Hi

    Delete your browser cache.

    Thanks.  I only just had time to test it again and it fixed itself over time.  Probably because of cache expiration or something.

  • HP BL460C Blade Server LAN interface is not coming up.

    3
    0 Votes
    3 Posts
    944 Views
    D

    Yes I assigned it when I did the installer. I'll do it again on Monday to see what if anything happens.

  • Dansguardian don't show on menu of pfsense 2.2

    1
    0 Votes
    1 Posts
    712 Views
    No one has replied
  • APU1C & pfSense with LAN, Wifi and 3G-4G

    18
    0 Votes
    18 Posts
    12k Views
    O

    very good info…havent have a hand on ip fire yet but i need to see this working..thanks a lot

  • Unable to route any non-ICMP traffic from OPT1 -> LAN or WANs

    6
    0 Votes
    6 Posts
    2k Views
    P

    I was able to solve my issue:

    The D-Link DUB-E100 Ethernet USB adapters I've used seems to be not fully supported in the C1 hardware version. The fact that I did use two of those adapters and both of them work properly with an PPPoE DSL modem mislead me to search in the firewalls configuration.

    So with the current 2.2-ALPHA ICMP, PPPoE and assumable other layer 3 traffic works with the DUB-E100 C1 adapter but any layer 4 traffic like TCP, UDP is lost somewhere. I'm now using a Delock 61969 USB Ethernet adapter for my OPT1 network which works like a charm..

  • 0 Votes
    7 Posts
    5k Views
    gregbG

    Note #4 of this bug seems to cover this:
      https://redmine.pfsense.org/issues/3747#note-4

  • Squid externally, how to

    3
    0 Votes
    3 Posts
    1k Views
    W

    Duh… Thanks Jiimp for hitting me in the head... Working.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.