Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login
    1. Home
    2. Popular
    Log in to post
    • All Time
    • Day
    • Week
    • Month
    • All Topics
    • New Topics
    • Watched Topics
    • Unreplied Topics
    • All categories
    • A

      Firewall rule order is being changed every reboot.

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling
      2
      0 Votes
      2 Posts
      67 Views
      S

      @aaronouthier There was a bug in 24.3/11 where deleting multiple rules would reorder them. There’s a patch.

      But otherwise no it’s not normal at a reboot. Maybe compare config files before and after?

    • P

      new PPPoE kernel - Suricata not working

      Watching Ignoring Scheduled Pinned Locked Moved IDS/IPS
      2
      0 Votes
      2 Posts
      72 Views
      bmeeksB

      I saw where the Netgate kernel developer updated the Suricata package in the pfSense 25.07 development branch to work with the new kernel PPPoE driver. But so far as I know that updated package has not been migrated to 2.8 CE.

      Here is the commit into the DEVEL branch: https://github.com/pfsense/FreeBSD-ports/commit/68a06b3a33c690042b61fb4ccfe96f3138e83b72.

    • T

      Is pkg.pfsense.org down?

      Watching Ignoring Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
      2
      0 Votes
      2 Posts
      146 Views
      T

      The repo seems to be back online today Jul 19th, I was able to complete the fresh install.

    • C

      pfSense Plus 25.03 release question

      Watching Ignoring Scheduled Pinned Locked Moved General pfSense Questions
      23
      1 Votes
      23 Posts
      2k Views
      stephenw10S

      Yup the issue definitely exists. I have no fix for it yet, none of the things I tried made any difference.

    • M

      ZeroSSL - How to revoke/remove existing certificates

      Watching Ignoring Scheduled Pinned Locked Moved ACME
      2
      0 Votes
      2 Posts
      63 Views
      johnpozJ

      @MacUsers

      https://help.zerossl.com/hc/en-us/articles/360060119933-Certificate-Revocation

      edit: oh you prob out of luck

      You can revoke any certificate issued via the ZeroSSL portal. Currently, certificates issued via ACME can not be revoked from inside the portal - please follow the instructions of your ACME client for revoking those certificates.

      the gui in pfsense does not have the ability to revoke - you prob have to move the certs to something you have certbot installed to and revoke that way.

    • J

      What actions are triggered by gateway going down?

      Watching Ignoring Scheduled Pinned Locked Moved Routing and Multi WAN
      2
      0 Votes
      2 Posts
      68 Views
      J

      It would seem the answer to my question is "/etc/rc.gateway_alarm" is run.

      Nothing in there for DHCP leases from what I see. More about restarting VPN sessions and flushing states.

    • C

      pfblockeer 3.2.8 + pfsense 2.8.0: top1m db download fail

      Watching Ignoring Scheduled Pinned Locked Moved pfBlockerNG
      4
      0 Votes
      4 Posts
      419 Views
      sretallaS

      You can download it here now:

      https://raw.githubusercontent.com/ianb/alexa-sites/refs/heads/master/top-1m.csv

    • T

      Blocking of Discord

      Watching Ignoring Scheduled Pinned Locked Moved pfBlockerNG
      5
      0 Votes
      5 Posts
      303 Views
      M

      @The-Party-of-Hell-No excellent. I’m glad some experimentation proved successful.

    • P

      25.07.r.20250709.2036: still issues with limiters

      Watching Ignoring Scheduled Pinned Locked Moved Plus 25.07 Develoment Snapshots
      2
      0 Votes
      2 Posts
      114 Views
      P

      @pst said in 25.07.r.20250709.2036: still issues with limiters:

      I have yet to test limiters in combination with floating firewall rule for buffer boat mitigation, which was an issue in earlier betas.

      Still an issue in the RC. UL/DL limiters on LAN work as long as I haven't configured UL/DL limiters for WAN. Once there are WAN limiters no limits on LAN are adhered to (which I think is a regression from the beta where at least one direction worked as configured). Time to shelve those ideas of using limiters I guess.

    • K

      Limiter source mask now after NAT when using gateway groups - 2.8 change?

      Watching Ignoring Scheduled Pinned Locked Moved Traffic Shaping
      6
      0 Votes
      6 Posts
      223 Views
      K

      @gemg83 I see what you're saying - it could be the jump from 12.3 to 14 on the BSD side.

      It really hampers the use of limiters in multi-WAN setups so it feels like an important bug (I call it a bug as it doesn't behave at all how the UI or documentation suggests, it's more like using them on a floating rule).

    • JonathanLeeJ

      DNSSEC Resolver Test site

      Watching Ignoring Scheduled Pinned Locked Moved DHCP and DNS
      2
      0 Votes
      2 Posts
      105 Views
      GertjanG

      @JonathanLee said in DNSSEC Resolver Test site:

      https://wander.science/projects/dns/dnssec-resolver-test/

      The patato checker.

      Uncheck :
      77b420f9-5499-4301-8050-7c1f6a6560d3-image.png

      and do the test again.

      So that page, and this one : http://www.dnssec-or-not.com/ test if you've checked the resolver's DNSSEC capability, or not ^^

      That web site is part of my collection of web sites that test several DNS(SEC) related things.
      I 'admin' several web servers ( = domain names), I also use site use this one https://dnsviz.net/d/test-domaine.fr/dnssec/ to check out a domain name DNSSEC capabilities, as I need to be sure it works = me not messing up things when deploying it.
      test-domaine.fr is a domain I rent and use to test things before I apply them on the domains that can't afford down time when I mess up (again).
      Remember : if you set up DNSSEC wrong on your web server, mail server ( actually DNS domain name server ), your domain name will 'vanish' from the Internet.
      DNSSEC was considered rocket science not so long ago and maybe it still is, as using it really implies that you know what DNS is.

      The good thing about pfSense : when you install it, and don't change (add, remove) any pfSense DNS settings, it will use DNSSEC out of the box without the user (admin) even being aware of anything.
      DNSSEC = that's why resolving (yourself, locally) is such a good thing.
      Forwarding means : you have to trust some one else.

      Last time I checked, half of Europe's web site are using DNSSEC, and the US was ... not really using it.
      That changed a lot the last several years : DNSSEC is now somewhat mandatory for all government hosted sites world wide.

    • J

      DNS problem

      Watching Ignoring Scheduled Pinned Locked Moved DHCP and DNS
      4
      0 Votes
      4 Posts
      230 Views
      GertjanG

      @jamesdun

      @jamesdun said in DNS problem:

      if the new machine wasn't picking up the correct DNS server

      Well, launch

      ipconfig /all

      and it tells you what DNS server it uses.
      Normally, a new Windows PC will use DHCP is so it's 'plug and play'.

      @jamesdun said in DNS problem:

      Both machines show the correct DNS server when NSLookup is launched, although the old one also gives it a name and the new one fails to do the reverse lookup

      Looks like the new machine isn't allowed to do DNS requests against pfSense ?

      @jamesdun said in DNS problem:

      and the new one fails to do the reverse lookup

      Humm. The new one's DNS request gets refused ...

    • B

      Hyper-V Failover Clustering

      Watching Ignoring Scheduled Pinned Locked Moved HA/CARP/VIPs
      2
      0 Votes
      2 Posts
      87 Views
      S

      @bimmerdriver You need one IP that can move between the routers. Technically both WANs can be private IPs…Comcast business allows for this even if their modem is bridged, then the shared IP is a public. Maybe that helps.

    • P

      Bug or undocumented? Floating rule on out ditection not properly applying on final interface unless it is also applied to originating interface

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling
      27
      0 Votes
      27 Posts
      755 Views
      P

      Wel, really strange
      I disabled the Allo VPN floating rule and restarted pfsense
      Now, VPN works even with the block rule and without pass rule, as expected
      Really strange that it needed a reboot and the logs I posted above

    • J

      Squid fails to re-install on 2.8

      Watching Ignoring Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
      2
      0 Votes
      2 Posts
      70 Views
      patient0P

      @jc1976 can you check if you hit the same issue as: Squid: "Undefined symbol "_ZTVNSt3__117bad_function_callE" after upgrade to 2.8?

    • TAC57T

      DNSBL (Python mode) errors Found!

      Watching Ignoring Scheduled Pinned Locked Moved pfBlockerNG
      8
      0 Votes
      8 Posts
      1k Views
      reza3swR

      @Gertjan
      Hello,
      Thank you.
      I had exactly the same issue, and your solution helped me fix it.

      Ask ChatGPT

    • K

      Advanced Settings for Client to attach

      Watching Ignoring Scheduled Pinned Locked Moved UPS Tools
      1
      0 Votes
      1 Posts
      9 Views
      No one has replied
    • Bob.DigB

      The if_pppoe backend does not support all advanced features of the MPD implementation

      Watching Ignoring Scheduled Pinned Locked Moved Plus 25.07 Develoment Snapshots
      1
      0 Votes
      1 Posts
      20 Views
      No one has replied
    • C

      External leased /24 class

      Watching Ignoring Scheduled Pinned Locked Moved Routing and Multi WAN
      1
      0 Votes
      1 Posts
      36 Views
      No one has replied
    • S

      Using VTI IPsec to bypass managed office NAT

      Watching Ignoring Scheduled Pinned Locked Moved IPsec
      1
      0 Votes
      1 Posts
      9 Views
      No one has replied