<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Recently Active Topics]]></title><description><![CDATA[A list of topics that have been active within the past 24 hours]]></description><link>https://forum.netgate.com/recent</link><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 14:13:05 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/recent.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 16 Apr 2026 14:01:33 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[pfs+ lost access to the plus pfs+ update streams.]]></title><description><![CDATA[<p dir="auto">A major IT meltdown on my homelab has left me having to rebuild the entire thing from backups. Fortunately I am religeous about backups so it only took a couple of hours - but the one outstanding issue is that both my pfs+ licenses are failing to be recognised on their respective machines. I can now only access the CE edition. Both virtual machines report the pfs+ activation is recognised.</p>
<p dir="auto">How do I get back onto the pfs+ stream?</p>
<p dir="auto">TIA<img src="/assets/uploads/files/1776348087308-pfsactivationconfirmation.png" alt="pfsActivationConfirmation.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://forum.netgate.com/topic/200537/pfs-lost-access-to-the-plus-pfs-update-streams.</link><guid isPermaLink="true">https://forum.netgate.com/topic/200537/pfs-lost-access-to-the-plus-pfs-update-streams.</guid><dc:creator><![CDATA[pfstyro]]></dc:creator><pubDate>Thu, 16 Apr 2026 14:01:33 GMT</pubDate></item><item><title><![CDATA[Netgate 6100 Crash and reboot]]></title><description><![CDATA[@stephenw10 oh wow really, I couldnt see anything in the logs what should I be looking for/at?
]]></description><link>https://forum.netgate.com/topic/199916/netgate-6100-crash-and-reboot</link><guid isPermaLink="true">https://forum.netgate.com/topic/199916/netgate-6100-crash-and-reboot</guid><dc:creator><![CDATA[hulleyrob]]></dc:creator><pubDate>Thu, 16 Apr 2026 14:01:29 GMT</pubDate></item><item><title><![CDATA[OpenVPN Crash after update]]></title><description><![CDATA[@PJHaan said in OpenVPN Crash after update:

Does anyone have an idea what could be causing this?

We'll have to come over and check your OpenVPN (server) log page ...... ? 
What do you mean with "appears to" ?
And if it crashes ... what were the condition ? Who restarted the OpenVPN server ?
Sorry, with the info you've supplied I can't find a probable reason.
900 connected users ... wow, that impressive. The local computer hobby club, or is these remote workers ?
I do presume Netgate doesn't 'delete' all the forum post mentioning failing OpenVPN servers from here. So the good news is the bad news : "OpenVPN server" is just fine, it's your settings.
So, can you tell us more ?
edit : is this the same OpenVPN server as mentioned here ? Overhere you were running 25.x
]]></description><link>https://forum.netgate.com/topic/200535/openvpn-crash-after-update</link><guid isPermaLink="true">https://forum.netgate.com/topic/200535/openvpn-crash-after-update</guid><dc:creator><![CDATA[Gertjan]]></dc:creator><pubDate>Thu, 16 Apr 2026 14:00:33 GMT</pubDate></item><item><title><![CDATA[Netgate 6100 Upgrade Available LED]]></title><description><![CDATA[@nonick Ich habe keine Antwort auf deine Frage, mich interessiert nur, warum du bei der 25.11.1 bleiben willst.
]]></description><link>https://forum.netgate.com/topic/200525/netgate-6100-upgrade-available-led</link><guid isPermaLink="true">https://forum.netgate.com/topic/200525/netgate-6100-upgrade-available-led</guid><dc:creator><![CDATA[micneu]]></dc:creator><pubDate>Thu, 16 Apr 2026 13:58:48 GMT</pubDate></item><item><title><![CDATA[KEA DHCP continuously rebooting with error message after 24.11 upgrade and switch from ISC]]></title><description><![CDATA[@ulcha If by chance you have an old config which you reinstalled with ZFS, ensure log compression is off since ZFS also does compression.  That was frequently a reason for bzip taking longer than expected.  But yes rotation every minute would also be a problem.

Switched back to ISC DHCP server.

Just...get rid of the extra Kea process...?
]]></description><link>https://forum.netgate.com/topic/195504/kea-dhcp-continuously-rebooting-with-error-message-after-24-11-upgrade-and-switch-from-isc</link><guid isPermaLink="true">https://forum.netgate.com/topic/195504/kea-dhcp-continuously-rebooting-with-error-message-after-24-11-upgrade-and-switch-from-isc</guid><dc:creator><![CDATA[SteveITS]]></dc:creator><pubDate>Thu, 16 Apr 2026 13:56:54 GMT</pubDate></item><item><title><![CDATA[Updates taking over an hour]]></title><description><![CDATA[Hmm, interesting. Yes if you have a partial IPv6 setup that can cause problems if it's still preferred over IPv4 (the default). But that shouldn't have changed since 25.11.1. Unless perhaps your ISP started handing out v6 info in the mean time.
Otherwise I'd check for issues in the route perhaps? Given you're seeing it across several sites I'd look for commonality. All the same ISP for example.
]]></description><link>https://forum.netgate.com/topic/200533/updates-taking-over-an-hour</link><guid isPermaLink="true">https://forum.netgate.com/topic/200533/updates-taking-over-an-hour</guid><dc:creator><![CDATA[stephenw10]]></dc:creator><pubDate>Thu, 16 Apr 2026 13:55:42 GMT</pubDate></item><item><title><![CDATA[Please assist me with settings]]></title><description><![CDATA[If I’m not mistaken, the issue you’re facing is not caused by your configuration but by a limitation in the Asus router firmware.
Even with NAT disabled, firewall disabled, and correct static routes, an Asus router operating in Router Mode does not allow routing from the WAN interface toward the LAN network.
The WAN interface always treats the upstream device (pfSense in your case) as “Internet”, which means it blocks any attempt to reach LAN clients in the 192.168.50.0/24 subnet. This is why you can ping the Asus WAN IP from pfSense, but you cannot reach any clients behind it.
If you need full communication from pfSense to the devices behind the Asus, the only supported solution is to run the Asus in Access Point Mode, so it becomes part of the same LAN (192.168.10.0/24).
For the use case you described (Portainer, Docker, InfluxDB, Grafana), a separate subnet is not required. In AP Mode all services will be directly reachable, and pfSense’s Telegraf can send metrics to InfluxDB without any routing or NAT-related issues.
]]></description><link>https://forum.netgate.com/topic/200511/please-assist-me-with-settings</link><guid isPermaLink="true">https://forum.netgate.com/topic/200511/please-assist-me-with-settings</guid><dc:creator><![CDATA[netpt]]></dc:creator><pubDate>Thu, 16 Apr 2026 13:53:42 GMT</pubDate></item><item><title><![CDATA[Upgrade 25.11.1 -&gt; 26.03 on SG-4200 fails]]></title><description><![CDATA[Hmm, if it fails because if that you should see an 'out of space' alert generated on the dashboard.
But glad that allowed it to continue. 
]]></description><link>https://forum.netgate.com/topic/200534/upgrade-25.11.1-26.03-on-sg-4200-fails</link><guid isPermaLink="true">https://forum.netgate.com/topic/200534/upgrade-25.11.1-26.03-on-sg-4200-fails</guid><dc:creator><![CDATA[stephenw10]]></dc:creator><pubDate>Thu, 16 Apr 2026 13:50:40 GMT</pubDate></item><item><title><![CDATA[Stuck on 26.03 RC]]></title><description><![CDATA[@stephenw10 Ah indeed I overlooked that one.
If you also provide links in the doc to the correct one for plus it would be a lot clearer.
(and helpful :))
]]></description><link>https://forum.netgate.com/topic/200530/stuck-on-26.03-rc</link><guid isPermaLink="true">https://forum.netgate.com/topic/200530/stuck-on-26.03-rc</guid><dc:creator><![CDATA[Lazer13]]></dc:creator><pubDate>Thu, 16 Apr 2026 13:32:29 GMT</pubDate></item><item><title><![CDATA[Suricata Blocks Page]]></title><description><![CDATA[@Petrixx using https://docs.netgate.com/pfsense/en/latest/development/system-patches.html.
Add a patch and paste in the code, then apply. IIRC all the defaults are OK.
]]></description><link>https://forum.netgate.com/topic/200348/suricata-blocks-page</link><guid isPermaLink="true">https://forum.netgate.com/topic/200348/suricata-blocks-page</guid><dc:creator><![CDATA[SteveITS]]></dc:creator><pubDate>Thu, 16 Apr 2026 12:55:09 GMT</pubDate></item><item><title><![CDATA[No DHCP Server for newly added OPT interface]]></title><description><![CDATA[@Udbytossen I knew to look because I have done the same thing...
]]></description><link>https://forum.netgate.com/topic/200536/no-dhcp-server-for-newly-added-opt-interface</link><guid isPermaLink="true">https://forum.netgate.com/topic/200536/no-dhcp-server-for-newly-added-opt-interface</guid><dc:creator><![CDATA[AndyRH]]></dc:creator><pubDate>Thu, 16 Apr 2026 12:52:17 GMT</pubDate></item><item><title><![CDATA[Is this possible with Tailscale?]]></title><description><![CDATA[@keyser good questions! I have Tailscale disabled right now on my 6100 while I wait to see if there will be any news on 16784, so I didn't get to try these yet.
But my initial thought is it would probably be preferred to use Tailscale's native Serve feature to provide ingress to your RDP servers from other tailnet-joined devices. This way you get the benefit of their granular ACLs, logging etc. Any reason not to go that route?
]]></description><link>https://forum.netgate.com/topic/200531/is-this-possible-with-tailscale</link><guid isPermaLink="true">https://forum.netgate.com/topic/200531/is-this-possible-with-tailscale</guid><dc:creator><![CDATA[luckman212]]></dc:creator><pubDate>Thu, 16 Apr 2026 12:51:29 GMT</pubDate></item><item><title><![CDATA[SURICATA Ethertype unknown]]></title><description><![CDATA[@stephenw10 I think they’re responding to me re the new HTTP header alerts. I wasn’t intending to hijack the thread, just say to watch out for them, too.
My overall point was to “yes and” the topic because normally one does not need to watch for excessive blocking with a Suricata upgrade. I would guess something in detection changed and/or new rules are triggering often.
To answer your question it’s a lot of connections to (and also from as I recall) the web servers. Like 10x normal blocking, without actually counting.
]]></description><link>https://forum.netgate.com/topic/200340/suricata-ethertype-unknown</link><guid isPermaLink="true">https://forum.netgate.com/topic/200340/suricata-ethertype-unknown</guid><dc:creator><![CDATA[SteveITS]]></dc:creator><pubDate>Thu, 16 Apr 2026 12:14:34 GMT</pubDate></item><item><title><![CDATA[X-ray VPN implementation in future releases of pfSense+]]></title><description><![CDATA[@Сергей-3
In your case, the gateway IP should be 10.100.94.53, just like the TUN IP. To restore the TUN IP, restart the Xray instance.
By the way, that's what I was saying, I had to tinker with hev-socks5-tunnel, but tune2socks worked right away.
Still working on fixes...
]]></description><link>https://forum.netgate.com/topic/197376/x-ray-vpn-implementation-in-future-releases-of-pfsense</link><guid isPermaLink="true">https://forum.netgate.com/topic/197376/x-ray-vpn-implementation-in-future-releases-of-pfsense</guid><dc:creator><![CDATA[kingpin]]></dc:creator><pubDate>Thu, 16 Apr 2026 08:39:56 GMT</pubDate></item><item><title><![CDATA[Netgate 8200 - Thermals]]></title><description><![CDATA[@tsmialek This is 3 years late but I just need to say. The reason for the temps, besides the obvious, ambient temp is probably too high and the fan cannot compensate. But the material the heat sink is made of matters. Aluminum has a thermal conductivity of 237 W/m.k while copper has a thermal conductivity of 401 W/m.k. It is why heat sinks typically are made of copper. The downside is copper is more expensive. So the point is if the heat sink at the base of the unit was made of copper it would pull heat away more efficiently, though there is the risk that if the fan can’t cool the heat sink fast enough then all the components besides the cpu would be at risk of damage. Not a mechanical engineer here but …just a small note. The noise in the 8200 is like a low wining noise that is just annoying. Can’t believe Netgate thought this was acceptable. In a data center or closest it would be ok but for small business or home use, yeah…not ideal. At this point swapping out the fan is an appealing thought. But if it gets damaged in the process then it’s an expensive venture. If i damage it I would buy a 6100 instead.
]]></description><link>https://forum.netgate.com/topic/177035/netgate-8200-thermals</link><guid isPermaLink="true">https://forum.netgate.com/topic/177035/netgate-8200-thermals</guid><dc:creator><![CDATA[zaphanathpaneah]]></dc:creator><pubDate>Wed, 15 Apr 2026 22:35:15 GMT</pubDate></item><item><title><![CDATA[Пакет Xray-core для pfSense CE (VLESS + Reality, selective routing)]]></title><description><![CDATA[<p dir="auto">Всем привет.</p>
<p dir="auto">Хочу поделиться своим аддоном для pfSense CE:<br />
<a href="https://github.com/pdazcom/pfSense-pkg-xray" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/pdazcom/pfSense-pkg-xray</a></p>
<p dir="auto">Это пакет для интеграции <strong>Xray-core</strong> в <strong>pfSense CE</strong> с нормальным GUI в веб-интерфейсе.<br />
Основная задача — удобно поднимать <strong>VLESS + Reality</strong> и использовать <strong>selective routing</strong> через стандартные механизмы pfSense: <strong>Aliases / Firewall Rules / Gateway</strong>.</p>
<p dir="auto">Что уже есть:</p>
<ul>
<li>GUI для настройки подключений и инстансов<br />
поддержка <strong>VLESS + Reality</strong></li>
<li><strong>multi-instance</strong></li>
<li>группы подключений</li>
<li>подписки с автообновлением</li>
<li>ротация соединений с выбором рабочего узла</li>
<li>диагностика, URL test, логирование</li>
<li>watchdog и автоподнятие</li>
</ul>
<p dir="auto">По сути, трафик маршрутизируется штатными средствами pfSense через policy-based routing, без необходимости городить сложную routing-логику внутри самого xray-core.</p>
<p dir="auto">Проект вырос из идеи порта <strong>os-xray</strong> из OPNsense в pfSense, но с адаптацией под pfSense CE.</p>
<p dir="auto">Если кому интересно — буду рад фидбеку, тестам и замечаниям:<br />
<a href="https://github.com/pdazcom/pfSense-pkg-xray" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/pdazcom/pfSense-pkg-xray</a></p>
]]></description><link>https://forum.netgate.com/topic/200532/пакет-xray-core-для-pfsense-ce-vless-reality-selective-routing</link><guid isPermaLink="true">https://forum.netgate.com/topic/200532/пакет-xray-core-для-pfsense-ce-vless-reality-selective-routing</guid><dc:creator><![CDATA[kingpin]]></dc:creator><pubDate>Wed, 15 Apr 2026 22:31:32 GMT</pubDate></item><item><title><![CDATA[Guide to filtering web content (http and https) with pfsense 2.3]]></title><description><![CDATA[@aGeekhere I really think it would be great if you could find the time to publish a full guide that can followed towards the stated goals. Such a setup is very difficult to create and would take A LOT of trial and error and error.
Here’s crossing my fingers for a guide 
]]></description><link>https://forum.netgate.com/topic/100342/guide-to-filtering-web-content-http-and-https-with-pfsense-2-3</link><guid isPermaLink="true">https://forum.netgate.com/topic/100342/guide-to-filtering-web-content-http-and-https-with-pfsense-2-3</guid><dc:creator><![CDATA[keyser]]></dc:creator><pubDate>Wed, 15 Apr 2026 18:31:01 GMT</pubDate></item><item><title><![CDATA[pfSense Plus 26.03 Release Now Available!]]></title><description><![CDATA[I said in pfSense Plus 26.03 Release Now Available!:

Suricata: https://forum.netgate.com/post/1240644 (prevents Blocks page crash)

IMO, those running Suricata should also look for:
https://forum.netgate.com/post/1241305
]]></description><link>https://forum.netgate.com/topic/200448/pfsense-plus-26.03-release-now-available</link><guid isPermaLink="true">https://forum.netgate.com/topic/200448/pfsense-plus-26.03-release-now-available</guid><dc:creator><![CDATA[SteveITS]]></dc:creator><pubDate>Wed, 15 Apr 2026 14:29:00 GMT</pubDate></item><item><title><![CDATA[NOT working with OVH end point since 2025]]></title><description><![CDATA[@zimnysbrain
The bad news : Setting up acme.sh with the correct settings is close to rocket science.
And the good news : the pfSense acme.sh packages is used daily by the thousands. If it didn't work, people wouldn't have their certificates, and then things will go bad very fast.
Have a look for yourself here : you saw some one mentioning something ?
I have many domain names with OVH (EU), so I decided to ask for a certificate for a domain name "test.test-domaine.fr" - I do own =&gt; rent "test-domaine.fr" from OVH.
First, after reading the official OVH acme.sh notice : https://github.com/acmesh-official/acme.sh/wiki/How-to-use-OVH-domain-api#3-authentication-the-api-key I quickly created/found the 3 things needed :
[image: 1776250268164-950c3548-42b5-4aa9-a322-2a13abf08bb9-image.png]
[image: 1776250346724-6996b61c-7fcd-478b-848a-f44eafd48253-image.png]
and I hit 'Issue'.
[image: 1776250318306-aeacae9b-f89c-4139-af4b-a9303d73b201-image.png]
As I'm a bit more stupid then avarrage today, I totall forgot that, although I rent the domain name 'test-domaine.fr' from them, I removed all the extras, like : they don't do my DNS, I do my own DNS.
Which means I have to talk:negocaite to my own domain name server, not OVH ...
So the isseuing failed with a "invalid domain" which I should read as : "domain ok - but can't do DNS zone modification for you". So it couldn't add the TXT challenge, etc
But : no authorization issues.
Btw : the DNS-OVH API script, the official source file here was last modified 6 month ago.
The pfSense version was synced like yesterday - PfSense acme.sh package version 1.2.
I presume you use the same version.
Do you mind telling what your issue is, give details ?
With all the juicy details, andf you can find them here /tmp/acme/test-domaine.fr/acme_issuecert.log (where test-domaine.fr has to be changed with your domaine name)
@zimnysbrain said in NOT working with OVH end point since 2025:

is also the answer NOT updated OVH api which changed from the beginning of 2026

I copied this file, the original dns_ovh.sh on my pfSense, in the /root/ folder.
Then :
[26.03-RELEASE][root@pfSense.bhf.tld]/root: ll dns_ovh.sh
-rw-r--r--  1 root wheel 8324 Apr 15 13:15 dns_ovh.sh
[26.03-RELEASE][root@pfSense.bhf.tld]/root: ll /usr/local/pkg/acme/dnsapi/dns_ovh.sh
-r-xr-xr-x  1 root wheel 8324 Apr 13 15:48 /usr/local/pkg/acme/dnsapi/dns_ovh.sh*
[26.03-RELEASE][root@pfSense.bhf.tld]/root: diff dns_ovh.sh /usr/local/pkg/acme/dnsapi/dns_ovh.sh
[26.03-RELEASE][root@pfSense.bhf.tld]/root:

conclusion : the pfSense acme.sh package contains the latest - identical 'official' "dns_ovh.sh" file.
Also :
In the past, when things were 'manual', I could use the instructions and get a certificate 'by hand' == using command line.
acme.sh is a command line tool after all.
Goto /usr/local/pkg/acme/ and start from there.
That should work, and I have an indirect proof : if it didn't you would have found others here talking about it.
]]></description><link>https://forum.netgate.com/topic/200526/not-working-with-ovh-end-point-since-2025</link><guid isPermaLink="true">https://forum.netgate.com/topic/200526/not-working-with-ovh-end-point-since-2025</guid><dc:creator><![CDATA[Gertjan]]></dc:creator><pubDate>Wed, 15 Apr 2026 11:24:32 GMT</pubDate></item><item><title><![CDATA[6100-upgrade to 26.03 and can no longer log in via GUI or SSH]]></title><description><![CDATA[Yeah seeing the login page but nothing after that usually implies a PHP issue. I'd guess it either stopped entirely or all the PHP processes were tied up.
Check the system logs when it happened.
]]></description><link>https://forum.netgate.com/topic/200524/6100-upgrade-to-26.03-and-can-no-longer-log-in-via-gui-or-ssh</link><guid isPermaLink="true">https://forum.netgate.com/topic/200524/6100-upgrade-to-26.03-and-can-no-longer-log-in-via-gui-or-ssh</guid><dc:creator><![CDATA[stephenw10]]></dc:creator><pubDate>Wed, 15 Apr 2026 10:05:45 GMT</pubDate></item></channel></rss>