• /30 network - This IPv4 address is the network address

    15
    0 Votes
    15 Posts
    1k Views
    Bob.DigB
    @JKnott said in /30 network - This IPv4 address is the network address: Linux & Cisco do. I had no luck with that on Debian but maybe I did something wrong. And I did not try elsewhere so you are most probably right.
  • 0 Votes
    20 Posts
    2k Views
    G
    @NGUSER6947 Yes but things seem to pop up, at least in discussions. I had it crash a few months back and it didn't want to restart due to a lock file lingering, so changed back. But I also have it running on another instance on CE where it's been working fine...
  • 0 Votes
    2 Posts
    338 Views
    No one has replied
  • Flow control System tunables ignored on sg-1537

    4
    0 Votes
    4 Posts
    477 Views
    E
    @keyser Put it in a new file /boot/loader.conf.local That way it will survive pfSense upgrades. I personally install nano to make small file edits via SSH CLI pkg install nano
  • Changing from managed switch to OpenWRT.

    5
    0 Votes
    5 Posts
    750 Views
    A
    Hmm. I was under the impression that WiFi 6 was 802.11ac. Apparently, it's 802.11ax. My bad!
  • Did not work for me

    1
    0 Votes
    1 Posts
    279 Views
    No one has replied
  • Devices on different VLANs do not seem to be able to talk across firewall

    17
    0 Votes
    17 Posts
    2k Views
    D
    I just wanted to follow up after having had some time to test and tinker. @johnpoz : Thanks for your help and patience! Your insight was invaluable. RECAP : Issue My original issue was identified by the supposed failure of pings to traverse through pfSense between two devices on different networks (ex. 192.168.11.xx and 192.168.12.xx). RECAP : Issue No.1 : Windows Firewall Behavior Important issue no.1 didn't have anything to do with pfSense or, for that matter, with the network in general. Windows firewall blocks ICMP Echo requests and this behavior seems to continue even with the firewall turned off in the Control Panel. The weird part with this issue is that both pfSense AND the managed switch could ping both computers. The issue was revealed when the computers could not ping each other (pings timed out). The simplest way to fix this behavior is to add an Allow Rule to Windows Firewall for ICMP behavior. Just... make sure to turn it off before using those test machines elsewhere. RECAP : Issue No.2 : pfSense DHCP Important issue no.2 had to do with weird behavior from the DHCP service on my pfSense machine. I cannot say if this is the result of a bug. I would have to do further testing (which I may follow up on later). This was described by johnpoz as : "if your device... doesn't have a gateway, then you would never be able to talk to it from some other network." Or even simpler : No door (gateway), no exit. This issue was revealed by the ping attempt on one of the computers throwing a "General Failure" error when trying to ping the other computer. Investigation of ipconfig results confirmed the issue (missing network gateway). The proposed solution that fixed the issue was simply to enter a value in the DHCP configuration screen : Other DHCP Options/Gateway. Adding a value here propagated to the two testing machines. The value I used was the IP address of the associated firewall interface (... the default value...). Fin That's it. Pings between the two computers works as expected, even when they are in different networks. The ping works in both directions. Thanks again!
  • Same VLANs on several SFP+ interfaces on pfSense 8300

    4
    0 Votes
    4 Posts
    511 Views
    keyserK
    @MoonLight-0 only if your switches supports stacking and can be stacked to one logical switch where you create an identical lagg of 4 ports (one from each switch). If they do not stack you cannot use LAGG as an interface aggregation method accross switches.
  • 0 Votes
    9 Posts
    919 Views
    georgelzaG
    @Gblenn said in Switching from igc1 -> ic0 as physical interface starts well and then collapses: Use the topology mapping in Unifi Controller as support as well. It might give you some ideas of where things may be messed up.. issue when the wheels come off my Unifi manager is not reachable... Only switch this is internal static assigned is the ProMax... will remove that and do a static assign on the pfSense... was actually thinking the current config, by the switch is told you are 172.16.10.2, irrespective which port is used for uplink... if anything... i would have expected more problems when the Cat6/2.5 GbE and fiber was patch / active into the pfSense... as it would not have known who is the uplink... Will give all of this a try. G
  • Getting DHCP

    2
    0 Votes
    2 Posts
    300 Views
    johnpozJ
    @mlradioguy firewall rules have nothing to do with, once you enable the dhcp server hidden rules are created that will allow dhcp. Are you seeing dhcp discovery/requests on pfsense? What does the dhcp log say, sniff on pfsense different interfaces are you seeing the dhcp? if you set static, can you ping pfsense IP, do you even see arp entry in your clients for pfsense IP..
  • Layer 2 connection issue with Android to PC app

    33
    0 Votes
    33 Posts
    4k Views
    S
    Man that does sound like a pain. It also doesn't sound possible to really do per app tunneling like a dedicated VPN app can do particularly for things like web browsers whereas with something like Sweech that uses a narrow host address range plus a specific port number, it would be a piece of cake. I suppose I'd have to keep the desktop app for the PC, but the phone should be ok with it since it's just one app that needs to be configured.
  • Bridge Setup is IMHO weird! Seems to complex!

    7
    1
    0 Votes
    7 Posts
    582 Views
    L
    @johnpoz Currently they both carry different vlans via their uplinks to pfsense? Yep that was previous situation. And yep I do have a limmited number of vlan's in a trunk between the two switches. But for the essential management vlan, I did not like that. Note that the bridge I implemented does work as intended! I just do not understand the IMHO crazy way it is implemented !!
  • Help with VLAN configuration

    8
    7
    0 Votes
    8 Posts
    803 Views
    V
    @codechurn Yes, you need an outbound NAT rule for the respective subnet on the VPN interface. To limit access to outside destinations only, best practice is to create an RFC 1918 alias, which includes all private IP ranges and use this one in the filter rule. [image: 1730237797744-86600fa1-0b28-4483-813c-42d9d6d521b9-grafik.png] You can use this as destination with "invert match" checked in the policy routing (pass) rule. Or just insert a block rule above of it. Used in a pass rule, it looks like this: [image: 1730238169509-d1fd0a53-d658-4d4d-b99a-431dc1d40461-grafik.png] Also you should limit access in your first rule to services, which are needed like DNS. If you also want to block access to HAproxy, which is listening on the WAN IP, you need an additional block rule for this.
  • Adding existing LAN to LAGG

    1
    0 Votes
    1 Posts
    193 Views
    No one has replied
  • Stuck while restoring VLANs to new hardware

    1
    1 Votes
    1 Posts
    217 Views
    No one has replied
  • Cannot ping across VLANs on a 2100 when we add WAN2

    2
    0 Votes
    2 Posts
    203 Views
    S
    @desquinn Port 4/WAN2 is a unique subnet? The steps in https://docs.netgate.com/pfsense/en/latest/solutions/netgate-2100/configuring-the-switch-ports.html just isolate the port, it should not affect anything else. Steps 21-22 remove 4 from VLAN group 0 but your text shows it in there. If you configure WAN2 but unplug it what happens? Can you ping from pfSense into each VLAN? Check Diagnostics/Routes.
  • 3x small switch+2x Mesh Wi-Fi recommendation

    3
    0 Votes
    3 Posts
    338 Views
    G
    @cyb3rtr0nian Buying used on ebay might be a good idea, but if you are looking for new, perhaps TPLink could be an option. As @AndyRH mentioned there is Unifi which is a good option, but TPLink have pretty much copied their UI in their Omada series. I have Omada at home and run Unifi at our vacation house and my mom's place and I actually think Omada is a bit more "clean" and simple to navigate. Retransmission might be cables, but it's perhaps more likely that it is due to your wifi network. What mesh system are you using today? Some of them seem to reuse the same wifi channel on all AP's which is completely wrong from a radio standpoint. Phones or other devices will change to the next cell based on radio conditions and don't need to be on the same channel to be able to roam in your home. And you can control their "behaviour" via the settings for the AP's. At what signal strength they should be "pushed off" an AP so they connect to the next etc. But I'd say that is not at all necessary to mess with in a normal home with just a few AP's. Placement and channel selection is important however, and you will be trying to minimize interference. Having all AP's on the same channel creates tons of interference, from the AP's themselves as well as all the devices. There are apps on Android you can use to check signal strength of wifi from you neighbours on each channel (Wifi analyzer and Ubiquitis WiFiman). Wifiman has a nice mapping feature that you can use to create a "heat map" showing the signal strength or expected speed in your own home as well. On 2.4Ghz channels are much wider than the numbers suggest, already at 20 Mhz channel width. So channel 6 also covers channels 4, 5, 7 and 8, meaning that the only non overlapping channels are 1, 6, 11 and 14. And don't use more than 20 Mhz... in theory it should give you higher speeds but you will likely get more interference and lower speeds.
  • Assistance with Multiple DHCP Servers on Netgate 6100

    6
    0 Votes
    6 Posts
    768 Views
    johnpozJ
    @socrateberserk said in Assistance with Multiple DHCP Servers on Netgate 6100: I just changed the rules and it works You corrected your overlapping networks as well as I assume, pfsense will not allow you to put an IP on an interface that overlaps with another interface
  • Do you assign a dedicated interface to manage your Pfsense from the GUI?

    4
    0 Votes
    4 Posts
    778 Views
    johnpozJ
    @cuteliquid11 said in Do you assign a dedicated interface to manage your Pfsense from the GUI?: switch for speed and streamlined logic. Yeah I sure wouldn't call that streamlined, and not sure what your using for pfsense but its more than capable of routing at speed.. Now if you wanted devices to talk at like 2.5ge or 5 or 10ge or something ok.. If pfsense couldn't do those speeds.. How is lack of any firewall rules between segments on your switch vs easy clickly clicky easy firewall rules on pfsense streamlined? You creating firewall rules via ACLs? Not sure what switch your using, but those are not anything close to ease rules can be done on pfsense. If your not firewalling between the segments on your switch, why even segment them? Just put them all on the same vlan, etc. But you still haven't said what your route conflict is?? Lets take a look at your drawing.. But routing to your downsteam router(L3 switch doing routing) wouldn't cause route conflict.. Here is example of how you would setup downstream router [image: 1728597078158-pfsense-layer-3-switch.png]
  • Ethernet rules L2 capable interface

    3
    0 Votes
    3 Posts
    558 Views
    J
    @johnpoz Thank you, that really cleared things up.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.