Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Clock Issue

    Scheduled Pinned Locked Moved Hardware
    31 Posts 5 Posters 2.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jp141 @elvisimprsntr
      last edited by

      @elvisimprsntr Well see thats what I thought, this is the general setting, I didnt have anything in the DNS servers until earlier, I added 127.0.0.1, im using the local resolver, possibly it needs something in there even if its just 127.0.0.1

      02193e8e-556f-41ea-8574-7ce99198bf70-image.png

      E 1 Reply Last reply Reply Quote 0
      • E
        elvisimprsntr @jp141
        last edited by

        @jp141

        You will want to add a valid external DNS server to the System -> General settings.

        Otherwise it will not be able to resolve DNS names

        Screenshot 2025-03-13 at 10.27.30 AM.png

        J fireodoF 2 Replies Last reply Reply Quote 0
        • J
          jp141
          last edited by jp141

          Without the wan selected I get this:

          6815a612-5677-466f-b2f3-14227b020b7b-image.png

          With the WAN selected I get this:

          50a18493-8bf1-4449-83ed-23dda6c9294e-image.png

          So that must need to be selected, as long as I don't have a firewall rule allowing NTP on the WAN interface it shouldn't be accessible from the outside world right?

          E 1 Reply Last reply Reply Quote 1
          • J
            jp141 @elvisimprsntr
            last edited by

            @elvisimprsntr Im using the DNS Resolver Service, never had an issue with the firewall installing packages or updates so it can resolve ok with just that and this command was working fine ntpdate -q 0.pfsense.pool.ntp.org

            1 Reply Last reply Reply Quote 1
            • fireodoF
              fireodo @elvisimprsntr
              last edited by

              @elvisimprsntr said in Clock Issue:

              You will want to add a valid external DNS server to the System -> General settings.

              Only if you want to forward to this DNS Servers. Pfsense can resolve out from the box ...

              Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
              SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
              pfsense 2.8.0 CE
              Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

              1 Reply Last reply Reply Quote 0
              • E
                elvisimprsntr @jp141
                last edited by elvisimprsntr

                @jp141

                You have likely made too many changes from the defaults that are conflicting with each other.

                If you are relatively new to pfSense, you should use the defaults unless you are a spefiic reason to change them. Then only change them one at a time.

                J 1 Reply Last reply Reply Quote 0
                • J
                  jp141 @elvisimprsntr
                  last edited by

                  @elvisimprsntr Not new been using it for 15-20 years 😆

                  E 1 Reply Last reply Reply Quote 0
                  • E
                    elvisimprsntr @jp141
                    last edited by

                    @jp141

                    Suggest changing the following setting

                    Screenshot 2025-03-13 at 10.37.43 AM.png

                    J 1 Reply Last reply Reply Quote 1
                    • J
                      jp141 @elvisimprsntr
                      last edited by

                      @elvisimprsntr Yeah I will set that and a google DNS server just incase there is ever an issue with the resolver.

                      E 1 Reply Last reply Reply Quote 0
                      • E
                        elvisimprsntr @jp141
                        last edited by

                        @jp141

                        You need to be able to forward DNS requests to a public DNS server, otherwise public domain names will not resolve, which is exactly what you were seeing with the NTP pools.

                        J 1 Reply Last reply Reply Quote 0
                        • J
                          jp141 @elvisimprsntr
                          last edited by

                          @elvisimprsntr Im using the Resolver service so those entries shouldn't be needed as that talks to the root DNS servers but its probably good to have that setting set as a backup

                          E 1 Reply Last reply Reply Quote 0
                          • J
                            jp141
                            last edited by

                            I have just checked the documentation and it looks like the wan does need to be selected, its just not very intuitive from the interface as its called NTP server and you would expect you are selecting the interfaces you want the server to listen and respond on, not call out on:

                            5c783124-6d27-4428-873c-a70cc3f705ae-image.png

                            1 Reply Last reply Reply Quote 2
                            • E
                              elvisimprsntr @jp141
                              last edited by elvisimprsntr

                              @jp141

                              I use DNS Resolver as well. I enable transparent mode so all DHCP clients use my local DNS first, but you have to configure a public DNS server under System -> General

                              Screenshot 2025-03-13 at 10.51.45 AM.png

                              Then add a FW rule to redirect all public DNS and NTP queries to my local server,

                              Screenshot 2025-03-13 at 10.57.09 AM.png

                              J 1 Reply Last reply Reply Quote 0
                              • J
                                jp141 @elvisimprsntr
                                last edited by jp141

                                @elvisimprsntr I dont use forwarding mode, ideally you want that off as for more privacy and security you want it going to the root servers not your ISP, google etc

                                3d544608-1ae6-45a5-85b5-0f2cf28bedf7-image.png

                                E 1 Reply Last reply Reply Quote 1
                                • E
                                  elvisimprsntr @jp141
                                  last edited by elvisimprsntr

                                  @jp141

                                  I use Q9 encrypted (port 853) DNS. They seem to do a good job.

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Yup ntp will bind to those interface addresses for outbound queries. That usually still works because most configurations have outbound NAT rules for those subnets and default routes via the WAN. But if you don't have one of those things it will fail.

                                    1 Reply Last reply Reply Quote 1
                                    • U
                                      Uglybrian
                                      last edited by

                                      I believe you have come to the wrong conclusion about having to have WAN selected for the NTP server configuration interfaces. It’s true for how you have your PFS set up. Possibly because of interfaces you have selected in the DNS resolver network settings. This is just a guess on my part.
                                      For comparison, I use resolver.
                                      DNS server settings are empty, resolver behavior is set to use local DNS, ignore remote DNS servers.
                                      Resolver is set up in a transparent zone with DNSSEC support enabled.
                                      Resolver is set to listen to all network interfaces and is listening on all outgoing network interfaces. This is a stock out of the box setting.
                                      The NTP server is enabled and set to listen on all interfaces except WAN.
                                      The only difference is I have set up time server pools that are closest to me rather than use the PFSense pools.

                                      1 Reply Last reply Reply Quote 1
                                      • stephenw10S
                                        stephenw10 Netgate Administrator
                                        last edited by

                                        Check the states. You will see the outgoing ntp queries are sourced from an internal IP and NAT'd.

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.