Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Now Available: pfSense® CE 2.8.1-RELEASE

    Scheduled Pinned Locked Moved Messages from the pfSense Team
    25 Posts 14 Posters 4.2k Views 19 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N Offline
      nimrod @Machine22
      last edited by

      This post is deleted!
      1 Reply Last reply Reply Quote 0
      • W Offline
        Wylbur
        last edited by

        Has anyone updated from CE 2.7.2 to 2.8.1?

        I'm asking because the upgrade to 2.8.0 for me failed and recovery required re-installing 2.7.1 (ISO), and then upgrade to 2.7.2 (which I've been running for a while now).

        Since I have two systems, I can upgrade the one and keep the other as a backup.... I just dislike going back through manually putting in the various IP pools and static addresses for my network.

        Regards,
        Wylbur

        P GertjanG 2 Replies Last reply Reply Quote 0
        • P Offline
          Patch @Wylbur
          last edited by

          @Wylbur worked fine form me
          I suspect the easiest is to

          • backup your pfsense configuration
          • Connect your backup pfsense routers want to your main units lan (so you can crash the backup unit and your internet continues to function
          • Download pfsense iso v2.70 v2.71 v2.72 from https://atxfiles.netgate.com/mirror/downloads/
          • download the free pfsense installer (internet connection during install required) from https://shop.netgate.com/products/netgate-installer
          • Try installing various versions of pfsense to confirm which are compatable with your hardware
          • restore your configuration to your preferred working pfsense version
          P 1 Reply Last reply Reply Quote 0
          • P Offline
            Patch @Patch
            last edited by

            @Wylbur worked fine form me
            I suspect the easiest for you is to

            • backup your pfsense configuration
            • Connect your backup pfsense router WAN to your main units LAN (so you can crash the backup unit and your internet continues to function)
            • Download pfsense iso v2.70 v2.71 v2.72 from https://atxfiles.netgate.com/mirror/downloads/
            • download the free pfsense installer (internet connection during install required) from https://shop.netgate.com/products/netgate-installer
            • Try installing various versions of pfsense to confirm which are compatible with your hardware
              restore your configuration to your preferred working pfsense version

            (re-entered as editing prior posts is not working atm)

            W 1 Reply Last reply Reply Quote 0
            • W Offline
              Wylbur @Patch
              last edited by

              @Patch Thanx. I'll find time to set up to do this. I just wanted to not be a guinea pig for this update. Last time it took me a few hours to re-install and configure both fire wal/gateway servers.

              1 Reply Last reply Reply Quote 0
              • GertjanG Offline
                Gertjan @Wylbur
                last edited by

                @Wylbur said in Now Available: pfSense® CE 2.8.1-RELEASE:

                . I just dislike going back through manually putting in the various IP pools and static addresses for my network.

                That's why you have to put all chances on your side.
                As already said above : make use of the very single reason why pfSense exists (in the first place) : this is not the presence of a GUI t set things up, it's the fact that you can 'backup' or 'save' one single config file, and later on, on the same system ( ! ) you can install from an USB drive, do minimal initialisation, probably mostly accepting the default) and as soon as the GUI comes up : import the config, and 'done'.
                If your connection is slow, or you have (had) many pfSense packages installed, just be patient. All packages will get installed 'fresh', and their settings will get applied before they are started.
                Be ware that race conditions can exist, like you use the OpenVPN (client or server) and to opted for FreeRadius authentification, but the pfSense FreeRadius package wasn't installed yet ...
                So, when hing have settled out, the dust is cleared, just reboot pfSense (GUI or console command) onces more.

                My update/upgrade check list :
                First : if you made any special changes to your system, document them all. Use for example the pfSense Notes packages, as this info will get stored in the config file, so it will be in your backup.
                Before you update/upgrade, go to the console or GUI, and restart the system.
                It would be perfect if you could use the console access (not SSH) and log this reboot process.
                Scan that log for any potentiel issue. This will be the perfect moment you'll your disk is full - or in bas shape (disk always die)
                Let your system running for a while, and test any functionality that you depend on.
                Then use the same console access (or SSH) to do the upgrade. If possible, have this logged to disk on your device. If an issue shows up, you have a trace. If you have trace, you can copy past here exactly what happens, so we see the exact issue, so fast answer are possible.

                Me writing all this took probably more time as you doing all this.
                Getting experiences in learning all this isn't lost time. The day a re install really counts, and it has to be done fast (as always), you know the drill.
                This was previously known as 'learning'.

                Using a plan and prepare well with reverse the Murphy's law : all your good preparation will be for nothing as everybody goes smooth.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                1 Reply Last reply Reply Quote 1
                • V Offline
                  Viktor.V
                  last edited by

                  IGMP:
                  It seems the IGMP block logging issue is still up.
                  Even if it set any-any pass rule, and every logging is turned off.
                  Is it possible to fix this in a later version?

                  OpenVPN:
                  What is the highest supported version of the OpenVPN Community Edition (V2) client for 2.8.1 CE from these links below?
                  Last time I tested it did not work above 2.5.9.

                  https://community.openvpn.net/ReleaseHistory

                  https://build.openvpn.net/downloads/releases/

                  S 1 Reply Last reply Reply Quote 0
                  • S Offline
                    SteveITS Galactic Empire @Viktor.V
                    last edited by

                    @Viktor.V re IGMP, I have excellent news for you :)
                    https://redmine.pfsense.org/issues/16068

                    Also if you just need to ignore them you can do that without allowing it.

                    Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to reboot, or more depending on packages, CPU, and/or disk speed.
                    Upvote 👍 helpful posts!

                    V 1 Reply Last reply Reply Quote 0
                    • V Offline
                      Viktor.V @SteveITS
                      last edited by

                      @SteveITS

                      Thank you!
                      Yes, I figured out how to "pass" the IGMP without logging blocked.
                      Adding a destination rule with "multicast4" and "Allow IP options" checked.

                      😊
                      This is a widespread issue, and having to manually add rules to stop IGMP packets from being logged is a workaround but not a solution.

                      If I am understanding well, these will be the new rule sets for IGMP in the future version 2.9.0?

                      Feature #16110: Automatically check Allow IP options when IGMP is selected Resolved
                      Feature #16215: Allow floating rules using the "match" action to match based on IP Options

                      But I am using Interface and Group rules instead of Floating rules with IGMP, because an IGMP Floating rule can create other type of packets in the same rule, if you do not create TCP and/or UPD Floating rules as well, which is not the most convinient to see in one specific rule.

                      V 1 Reply Last reply Reply Quote 0
                      • V Offline
                        Viktor.V @Viktor.V
                        last edited by

                        Floating IGMP rules should work like this:
                        Set direction to "in"

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.