Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login
    1. Home
    2. Popular
    Introducing Netgate Nexus: Multi-Instance Management at Your Fingertips.
    Log in to post
    • All Time
    • Day
    • Week
    • Month
    • All Topics
    • New Topics
    • Watched Topics
    • Unreplied Topics

    • All categories
    • winzloW

      pfSense > Frontier modem connection question

      Watching Ignoring Scheduled Pinned Locked Moved General pfSense Questions routing frontier wan lan
      3
      0 Votes
      3 Posts
      17 Views
      winzloW
      @tinfoilmatt - I have the “Frontier Gateway” but pulled it as soon as the technician left many years ago. I cloned the MAC address of the WAN port on the Gateway and plugged that into my WAN interface on pfSense. The usual way I think this is done. What I was trying to explain (badly, sorry) is that I want 1 cable coming out of the ONT into the pfSense router, which has lots of spare ports. I’d like to plug the Frontier Gateway into one of those ports so that It is isolated from the rest of my network, but accessible to Frotner. Any ideas?
    • A

      Enter TV MAC address on CP login in page?

      Watching Ignoring Scheduled Pinned Locked Moved Captive Portal
      20
      0 Votes
      20 Posts
      531 Views
      A
      @johnpoz Sorry didn't exsplain myself im not using ppsk at the moment I trying to get it to work, then i can turn captive portal off. I was wondering if anyone has setup ppsk with tunnel-passcode as the login in freeradius and openwrt APs?
    • anallamaA

      Foreign source IPs from LAN from mobile device

      Watching Ignoring Scheduled Pinned Locked Moved Firewalling
      21
      1
      0 Votes
      21 Posts
      436 Views
      tinfoilmattT
      Shouldn't it send the request to or through the 75 address That's exactly what it's trying to do—and exactly the traffic that pfSense is blocking on its LAN interface, which is what pfSense should be doing since presumably you haven't explicitly allowed this traffic to egress pfSense's LAN interface. These 10.16.14.157/10.254.4.79- and 25.211.140.233/25.215.186.12-sourced packets should not be egressing the device's Wi-Fi interface (unless they're encapsulated in an already-established tunnel outbound 'through' pfSense).
    • P

      pfSense Plus 26.03 Release Now Available!

      Watching Ignoring Scheduled Pinned Locked Moved Messages from the pfSense Team
      111
      8 Votes
      111 Posts
      9k Views
      J
      UPDATE — Root cause identified and confirmed Posting this because I find it frustrating when threads like this go cold without a resolution. Full findings below. Summary Unbound was not the root cause—it was the victim. A USB-connected UPS (CyberPower SL700U) was repeatedly cycling connect/disconnect events, leaking kernel DMA bounce buffers at approximately 10 MB/hour. After ~10 days of uptime, the accumulated wired memory (~2,900 MB) left only ~187 MB free, forcing the OOM killer to target Unbound as the largest unprivileged process. Because this leaked memory remained trapped in kernel space, restarting Unbound without rebooting failed every time. Resolution & Next Steps The immediate fix was to disconnect the UPS and reboot the system to fully clear the wired memory. My apologies for the red herring and for unintentionally misrepresenting this as a 26.03 issue. Moving forward, I will be filing a bug against the FreeBSD USB HID driver regarding how it handles DMA management during frequent connect/disconnect cycles. Diagnostic path No log entries from Unbound even at verbosity level 3. This is characteristic of SIGKILL from the kernel rather than an internal crash — a process cannot log its own OOM kill. Confirmed OOM kill found in rotated system log: May 12 12:41:52 pfSense-small kernel: pid 57593 (unbound), jid 0, uid 59, was killed: failed to reclaim memory Memory state before crash (system had been up 10 days, 17 hours): Mem: 14M Active, 21M Inact, 198M Laundry, 2900M Wired, 187M Free 2,900 MB of wired memory on a 3.3 GB system is abnormal. Wired memory cannot be paged out and is only released by a kernel restart. vmstat -m identified the source: bounce 154820 634142720 154820 busdma 154822 9908992 154822 ~605 MB of DMA bounce buffers with a matching busdma descriptor count — both growing. At ~10 MB/hour accumulation rate, projecting back over 10.75 days of uptime yields ~2,917 MB, which matches the observed 2,900 MB of wired memory almost exactly. dmesg confirmed the USB cycling: ugen1.2: <CPS SL Series> at usbus1 ugen1.2: <CPS SL Series> at usbus1 (disconnected) This pair repeated continuously. Each connect/disconnect cycle allocated kernel DMA bounce buffers that were never freed. Minute-by-minute monitoring confirmed the growth rate and halt: Pre-disconnect (bounce buffer samples from cron monitor): 07:02 606 MB 07:13 608 MB (+2 MB/11 min = ~9.8 MB/hr) 07:35 612 MB 07:57 616 MB 08:19 619 MB 08:41 623 MB 08:52 624 MB ← USB cable disconnected 09:03 624 MB 09:14 624 MB 09:25 624 MB 09:36 624 MB ← still flat, 44 minutes later Growth stopped immediately and completely upon disconnecting the USB cable. Control comparison — Florida system I have an identical Netgate 2100 running pfSense Plus 26.03 at a separate location (Florida) with a different UPS model and no USB cycling in dmesg. After 57+ hours of uptime: Bounce buffers: 4,228 items / 16.5 MB — stable, not growing Wired memory: 545 MB flat Free memory: ~2,400–2,570 MB, stable throughout Unbound RSS: plateaued at ~81.7 MB The contrast with California (155,000+ bounce buffers / 607 MB growing at ~10 MB/hr) is unambiguous. Why restarting Unbound without rebooting didn't work The OOM killer reclaims the killed process's user-space heap (~80–90 MB), but the bounce buffers live in kernel space — owned by the DMA subsystem, entirely independent of any user-space process. After the kill, free memory increased only marginally (~80 MB recovered against ~2,900 MB still wired). Restarting Unbound immediately placed it back into the same near-exhausted memory environment and it was killed again almost instantly. A full reboot was the only path to clearing the wired kernel memory. Is this a 26.03 regression? Almost certainly not. The CyberPower UPS was connected while still running 25.07.1. The upgrade to 26.03 required a reboot, which happened to clear the accumulated bounce buffers and reset the counter. Had the system stayed on 25.07.1 long enough with the UPS connected, the same outcome would have occurred. The bug is in FreeBSD's USB HID DMA cleanup path — bounce buffers are not freed when a USB device disconnects — not in pfSense application code. Resolution Immediate: Disconnect the USB cable from the offending UPS. Bounce buffer accumulation stops instantly. Clear existing wired memory: Reboot. The 624 MB already accumulated cannot be released any other way. Underlying bug: FreeBSD USB subsystem does not free DMA bounce buffers on device disconnect when a device cycles repeatedly. This is worth filing upstream with FreeBSD if not already known. Hope this saves someone else the diagnostic journey. Happy to share monitoring scripts or raw log data if useful.
    • A

      Upgraded from 2.7.2 to 2.8.1 and now won't boot

      Watching Ignoring Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
      11
      1
      0 Votes
      11 Posts
      194 Views
      stephenw10S
      No worries. Often the easiest solution!
    • P

      Issue in pfsense plus + suricata.

      Watching Ignoring Scheduled Pinned Locked Moved IDS/IPS
      2
      0 Votes
      2 Posts
      52 Views
      SteveITSS
      @pvanderlaat https://forum.netgate.com/post/1242504
    • F

      This is how i used limiters to fairly share bandwidth among all devices on LAN

      Watching Ignoring Scheduled Pinned Locked Moved Traffic Shaping
      17
      0 Votes
      17 Posts
      537 Views
      T
      @strannik Thanks for the update. I definitely don't see anything wrong with how you have the limiters and queues configured, and Tail Drop is definitely what you want for the queue management algorithm on both the limiter and the child queue. I'll see whether I can do some more of my own testing to determine whether I seem to get per-host fairness, as I'm configured very much the same. Although I'm also only running it on a small home network. The curious thing is that even without the LAN-side application of the limiters and the masks on the child queues, I would expect things to be generally fair. That is to say, if you only apply limiters on the WAN interface, it should enforce per-flow fairness, based on my understanding. So if host A and host B both run a speed test that makes a connection to a single remote host, they would each be initiating one flow, and FQ_CODEL would split the available bandwidth between them fairly (assuming no other network activity). I think the host-based fairness would come into play more if one host is establishing far more flows than another; say, host A is torrenting with connections to who knows how many remote hosts and host B is just trying to download something from a single remote host. I realize none of that really helps to answer why you're seeing the behavior that you are, more just to express my confusion, and give others reading this thread a chance to point out anything I may have egregiously wrong there. If I think of any other suggestions, I'll update, but unfortunately I'm not sure what else to suggest at the moment. I trust that both the hosts you're using for your testing are wired, since wireless would throw all kinds of wrenches into attempting to assess bandwidth sharing fairness. I suppose if you have a 3rd host it may be interesting to add it to the mix as well. For example, is it always one host that receives an unfair share, or does the unequal distribution seem to move from host to host seemingly at random?
    • M

      How to update to the latest Tailscale version?

      Watching Ignoring Scheduled Pinned Locked Moved Tailscale
      244
      1 Votes
      244 Posts
      140k Views
      CarlMRossC
      said in How to update to the latest Tailscale version?: Updated to version 1.96.4_1, no issues, no errors. Updated to version 1.96.4_2 service tailscaled stop fetch https://pkg.freebsd.org/FreeBSD:16:amd64/latest/All/tailscale-1.96.4_2.pkg || exit 1 && pkg-static add -f tailscale-1.96.4_2.pkg && rm -f tailscale-1.96.4_2.pkg && service tailscaled start After upgrading pfSense+ to 26.03, I added advertised routes in the Tailscale web GUI, and there have been no issues with Tailscale updates or pfSense reboots since then.
    • G

      BTNet Dual Wan with virtual gateway

      Watching Ignoring Scheduled Pinned Locked Moved Routing and Multi WAN
      2
      0 Votes
      2 Posts
      36 Views
      P
      @Gazza77 said in BTNet Dual Wan with virtual gateway: 70.x.x.195/28 You cannot use the same GW on both WAN's You need to ask BT if they can split the /28 into two /29 or /30 subnets for you.
    • J

      lighthttpd listening on wanv6 interface preventing haproxy from starting.

      Watching Ignoring Scheduled Pinned Locked Moved pfBlockerNG
      1
      0 Votes
      1 Posts
      19 Views
      No one has replied
    • A

      Rogue DHCP Server

      Watching Ignoring Scheduled Pinned Locked Moved General pfSense Questions
      32
      0 Votes
      32 Posts
      488 Views
      P
      Is it just me, but I'm still curious what the rogue Server device actually was ??
    • M

      Recurring kernel panics (page fault in bpf_mtap) on pfSense Plus 26.03 with Suricata + VLAN interfaces

      Watching Ignoring Scheduled Pinned Locked Moved Traffic Monitoring
      1
      0 Votes
      1 Posts
      35 Views
      No one has replied