• Interfaces (historical)

    3
    0 Votes
    3 Posts
    1k Views
    Raul RamosR

    Status -> Interfaces.

    Since then the numbers have changed. Should be the all time connected and i think in another times  the current time connected to! I have to go to logs to check the current time connection.

    ![pfsense - historical.png](/public/imported_attachments/1/pfsense - historical.png)
    ![pfsense - historical.png_thumb](/public/imported_attachments/1/pfsense - historical.png_thumb)

  • [2.3.b.20160316.1117] Fresh issues pack

    2
    0 Votes
    2 Posts
    1k Views
    C

    What's in OpenVPN's PID files at the time? That sounds like that OpenVPN bug with its PID files not being written out correctly which I've never been able to replicate.

  • 0 Votes
    2 Posts
    1k Views
    Raul RamosR

    Have you enable ram disks? disable it and try again.

    Ok, this could be a different problem from the unable to check updates.

  • Layer 7

    3
    0 Votes
    3 Posts
    1k Views
    Raul RamosR

    OpenAppID in snort should be integrated with rules. Some Snort API to add to aliases or something like that.

  • PfBlockerNG: scrambled view in settings

    3
    0 Votes
    3 Posts
    987 Views
    P

    yep, you were right.

    I reinstalled the package and now everything is fine.

    Thanks.

  • Latest update GUI issue

    12
    0 Votes
    12 Posts
    2k Views
    B

    Is it just me or has the last several builds been incredibly slow to download and install?

  • OpenVPN clients can`t connect

    7
    0 Votes
    7 Posts
    2k Views
    M

    Hi Jimp, I will check it.

    P.S.
    This system has no other issues :)
    Other 2 have startup issues.

  • HFSC errors, dedicated wizard, defaults.

    6
    0 Votes
    6 Posts
    2k Views
    C

    @Harvy66:

    Comes down to bad hardware/drivers?

    Doesn't necessarily appear to, affects a wide range of things.

  • [SOLVED]VoIP phone not registering with outside PBX

    4
    0 Votes
    4 Posts
    3k Views
    C

    That's the answer for what's needed if you have to rewrite the private IPs within the SIP packets to your public IP. Whether you need that depends on the provider and situation. It's usually not necessary or desirable to use siproxd.

    This case may have been resolved by just using static port for the SIP and/or RTP traffic, though no traffic reaching the PBX at all would indicate an entirely different problem that siproxd wouldn't solve either.

    The usual suspects here if the defaults don't work.
    https://doc.pfsense.org/index.php/VoIP_Configuration

  • Suricata_2.1.9.1_7 – GUI Package Update and Bug Fixes

    11
    0 Votes
    11 Posts
    3k Views
    bmeeksB

    Latest Suricata bug fix is now available for download.  Here is what the pfSense-pkg-suricata 3.0_2 package update addresses.

    Bug Fixes

    Rules auto-managed by SID MGMT tab files are not tagged correctly on the RULES tab.

    IQRisk IP Reputation files not downloading for users with subscription code.

    Icons indicating rule GID:SID added to Supress Lists get duplicated when IPs are the same on ALERTS tab.

    Snort VRT rules checkboxes not auto-disabled when IPS-Policy is selected on CATEGORIES tab.

    PCRE selection of SIDs not working correctly for auto-SID management.

    Known Limitations:
    At the moment, if you try select a Snort VRT IPS Policy and try to view all the rules selected by the policy on the RULES tab, you will crash the PHP process for the Suricata GUI and get a blank browser screen.  This happens because the large IPS Policy rule set for the "Balanced" or "Security" policies exhausts the maximum PHP memory pool allowed by current pfSense settings.  A solution for that is being looked into by the pfSense developers.  In the interim, do not attempt to view an IPS Policy rule set on the RULES tab.  Note that although doing so will crash the PHP process showing you the RULES tab page, it won't impact the firewall operation and will not crash the Suricata binary.  It just crashes the individual process that was attempting to display the rules.

    Bill

  • 50% interrupt

    15
    0 Votes
    15 Posts
    5k Views
    M

    I had all enabled:

    Disable hardware checksum offload
    Disable hardware TCP segmentation offload
    Disable hardware large receive offload

  • Qklnk.co links not resolvable behind pfs 2.3

    2
    0 Votes
    2 Posts
    1k Views
    C

    That domain is broken.
    http://dnscheck.pingdom.com/?domain=qklnk.co

    Failed to find name servers for QKLNK.co (parent of qklnk.co/IN).

    Delegation not found at parent.
    No delegation could be found at the parent, making your zone unreachable from the Internet.

    Not enough nameserver information was found to test the zone qklnk.co, but an IP address lookup succeeded in spite of that.

  • Weird DNS behaviour with dual WAN

    2
    0 Votes
    2 Posts
    825 Views
    C

    That sounds like you're assigning external DNS servers to your clients? Otherwise LAN rules wouldn't impact where DNS traffic goes.

  • VPN -> IPSec UI Glitches

    4
    0 Votes
    4 Posts
    1k Views
    C

    That works correctly on the stable version of Chrome, as well as IE, Firefox, Opera, and Safari. Seems like that's something broken in Chrome beta.

  • Advanced button behaviour

    8
    0 Votes
    8 Posts
    2k Views
    jimpJ

    One more for the pile: interfaces_bridge_edit.php has a checkbox to 'show advanced' that expands the other settings

  • [SOLVED] pfSense 2.3 extra package management

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN client export issue with namecheap ddns

    3
    0 Votes
    3 Posts
    1k Views
    jimpJ

    This is fixed now, update your copy of the OpenVPN Client Export package and try it again.

  • Extra Eyes Needed: Icon Usage Consistency

    18
    0 Votes
    18 Posts
    4k Views
    jimpJ

    Hmm, I see it now. The grep I was using to gather all of the icons missed that one and also fa-sliders. Hopefully that's all of them. Or at least the ones common enough to need references in docs

  • Intel Ethernet I219-V Support in 2.3

    25
    0 Votes
    25 Posts
    8k Views
    D

    It is working perfectly for me!
    Thank you for the awesome work.

  • Email Reports

    22
    0 Votes
    22 Posts
    10k Views
    H

    i've used openNMS in the past. haven't tried it on 2.3

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.