Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense crashed - stuck on reboot

    Scheduled Pinned Locked Moved General pfSense Questions
    11 Posts 2 Posters 464 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance
      last edited by

      I’ll do my best to respond on my phone but pfsense appears stuck. This is a SG6100

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @michmoor
        last edited by

        I pulled the power to reset it. After coming back online the interface assignments are wrong. WAN was igc3 but now ix3. Seems to be an old config. I went in through the console to list all my backups and to my shock all 30 files are from today and seems to be the system adding interfaces , setting syslog…just random changes
        Performing another reboot through cli and my vlans and even my LAN interface is gone…

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        M 1 Reply Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @michmoor
          last edited by

          @michmoor
          Im back online.
          Super weird. Almost all my interfaces were gone, LAN/Wifi etc. The only ones that were available was my WAN and Wireguard Remote Access.
          I hopped into VPN and was able to hit my pfsense. I go straight into my backup configurations and all 30 backups like it states in the GUI are all from today and from system.

          These are the interfaces that are showing up. Note that LAN is missing, igc2.14 and igc.23 is missing which are the main wlans.

          398c589d-ef7d-4075-a39c-b332a630cba3-image.png
          Boot env
          15dc5c79-f486-4780-bb0c-807c5b15b560-image.png

          The default seems to be broken for some reason but the one being booted is corrupted i feel as its not loading the most recent config.

          I went into BE and cloned the default that is in a warning state ..i think... rebooted. Firewall comes up with the latest configuration.

          1d68fa5c-fb94-4e8c-acd4-19aeb6f1b2b4-image.png

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          M 1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @michmoor
            last edited by

            @stephenw10 i need your help. Why do i get the weird issues with no cause? lol

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Hmm, that is odd. What is shown as the 'Configuration Change' for each of those backup files? It sounds like it may have been stuck in a loop creating configs, at boot possibly?

              Are those missing interfaces available to assign?

              Can you restore a config remotely? Do you have other backups? ACB configured?

              M 1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @stephenw10
                last edited by

                @stephenw10
                My config history is all from today.

                cacb098d-fcbf-4c09-b5a9-447ce4b43a4e-image.png

                My remote VPN network was still assigned so i got in through there. I cloned my default BE. Rebooted the firewall. All my config came back.

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                M 1 Reply Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @michmoor
                  last edited by

                  ACB does have better back ups available thank goodness.

                  9ac9dece-2878-4b69-bcd6-2223b9356e0b-image.png

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yeah ACB excludes those package config writes to prevent it spamming the backups.

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      michmoor LAYER 8 Rebel Alliance @stephenw10
                      last edited by

                      @stephenw10
                      Question for you.
                      Do you recall those pfSense random lock ups i would have. I moved from an IX interface to a IGC ?
                      I would see increase CPU core load with [kernel{if_io_tqq_X} as the top usage item.

                      I saw it today with this incident.

                      Maybe something, Maybe nothing but i noticed i have a limiter applied to certain rules on my WAN interface.
                      e8dcc60e-2c03-4dcb-8ac3-d2644fff0869-image.png

                      I was experimenting to see if i could police ICMP traffic. Never the less, could something like this impact performance? Could this cause issues with the NIC queue where it locks up the whole system?

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        No it shouldn't lock up the system entirely. You might end up blocking all ICMP traffic depending on how the limiter is configured. That could potentially block gateway monitoring etc.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.