• How does one build 2.8.0 kernel with a patch applied to it?

    Development
    2
    1 Votes
    2 Posts
    658 Views
    nazar-pcN
    @kprovost you've been kind enough to review, test and merge the PR. Maybe you could help me do a similar kind of build as you did?
  • Deutsche Glasfaser - WAN IPs

    Deutsch
    1
    0 Votes
    1 Posts
    246 Views
    No one has replied
  • PFBlockerNG Python-Mode - Source-IP in Reports

    pfBlockerNG
    21
    0 Votes
    21 Posts
    1k Views
    S
    @mOrbo O.k. i see. Under such circumstances i would also stay on the internal DNS. Well just give it a try with @BBcan177 said in PFBlockerNG Python-Mode - Source-IP in Reports: For Python mode, when you use an internal dns server, you can either null block or check the option "DNSBL Event Logging", which will provide a workaround for this issue. So as far i remember, it did not work with Python mode and DNSBL Null block (logging). But i surely did not test it with checking "DNSBL Event Logging" and DNSBL Webserver / VIP.
  • HE tunnel broker and DoH and DoT

    IPv6 dot doh dns he.net ipv4+ipv6
    1
    0 Votes
    1 Posts
    754 Views
    No one has replied
  • Use My Own CA for pfSense Web GUI

    webGUI
    3
    0 Votes
    3 Posts
    833 Views
    johnpozJ
    @nasheayahu where is this CA from? You can for sure create your own CA, and sign certs for any domain and use those certs anywhere. And as long as you add this CA to your browser, or other device to trust certs its signed then you can create a cert for any host.domain.tld, even can put in rfc1918 IP addresses as SAN, so your browser can access via name or even IP and trust the cert. I am pretty sure have gone over how to do that many times over the years - here is an old post where I went over it https://forum.netgate.com/post/831783 I use certs signed by my local CA for lots of things, printer web gui, switches web gui, nas gui, yes my pfsense web gui, etc. etc.
  • Firewall blocks explicitly allowed traffic

    Firewalling
    6
    0 Votes
    6 Posts
    2k Views
    johnpozJ
    @RKiFkRyCevGvpLeXMove said in Firewall blocks explicitly allowed traffic: pfSense has added IPv6 versions of the aliased IPv4 IPs, even though IPv6 is disabled in pfSense. having pfsense not talk ipv6 doesn't stop dns from resolving a fqdn to a IPv6 address (AAAA). If you create an alias that says resolve dns.whatever.tld and it has A and AAAA (ipv6) records then that is what it will resolve. Resolving something to IPv6 doesn't mean you can talk to it on IPv6 if rules do not allow it.
  • Resolvido em partes

    Portuguese
    1
    0 Votes
    1 Posts
    298 Views
    No one has replied
  • 3 Votes
    3 Posts
    2k Views
    W
    I have to agree with you! My upgrade went smooth and nothing needed to be restarted, upgraded or anything else! I did upgrade a 4200, but at least it went smoothly. I will run another backup since it is upgraded.
  • 0 Votes
    1 Posts
    528 Views
    No one has replied
  • Chelsio T4 VF is not recognized as NIC

    Virtualization
    9
    0 Votes
    9 Posts
    2k Views
    nazar-pcN
    My patch https://github.com/pfsense/FreeBSD-src/pull/57 fixing above redmine ticket (by enabling corresponding driver in kernel config) was merged last month and will be a part of 2.9.0, whenever that comes out.
  • 0 Votes
    23 Posts
    513 Views
    B
    @syhm Thanks, although I did try that and unfortunately no dice.
  • [Tutorial] How to Secure and Implement Internal IPv6 NAT66/NPt

    NAT
    2
    1 Votes
    2 Posts
    2k Views
    M
    -------- Action: Block Interface: WAN Address Family: IPv6 Protocol: Any Source: Network f000::/4 Destination: Any Description: Block internal IPv6 (f000::/4) from leaving via WAN -------- Just letting people know i made a little mistake here while writing the tutorial it's actually: -------- Action: Block Interface: WAN Address Family: IPv6 Protocol: Any Source: Any Destination: Network f000::/4 Description: Block internal IPv6 (f000::/4) from leaving via WAN --------
  • 0 Votes
    20 Posts
    4k Views
    S
    The same thing hit me when upgrading to 25.07.1 this morning. I moved libc++.so.1 to /root and squid started normally. When I was experiencing the issue it looked like this in my system log: /rc.filter_configure_sync: [squid] Installed but not started. Not installing 'nat' rules. /rc.filter_configure_sync: [squid] Installed but not started. Not installing 'pfearly' rules. /rc.filter_configure_sync: [squid] Installed but not started. Not installing 'filter' rules. sshd[12272]: error: connect_to [interface_to_listen_on] port 3128: failed. Squid_Alarm[34120]: Squid has exited. Reconfiguring filter. Squid_Alarm[35230]: Attempting restart... The sshd error is from my ssh connection where I tunnel my websurfing to my home router. Since squid wasn't listening on the specified port sshd could not make the connection. All well now.
  • 5 Votes
    4 Posts
    1k Views
    Bob.DigB
    said in Now Available: pfSense Plus 25.07.1-RELEASE: Coincidence? Yes, indeed.
  • Upgrading pfSense 21.05 to 23.01

    General pfSense Questions upgrade
    11
    0 Votes
    11 Posts
    4k Views
    stephenw10S
    ZFS is also a lot more resilient to filesystem issues than UFS. So if you see frequent power outages it's a much better choice. But, yes, it does write more to the drive. Though the default values in 25.07 reduce that significantly. You can mitigate it almost entirely by running RAM disks too.
  • 0 Votes
    13 Posts
    5k Views
    stephenw10S
    Yup so check the routing and arp table on a client when it's unable to browse.