• 0 Votes
    7 Posts
    416 Views
    stephenw10S

    If you're asking can you run pfSense as a VM in proxmox then the answer is yes. But there are some caveats! It's a more complex setup to be sure the traffic is all passing through the VM. If you have to reboot proxmox you lose your router/firewall. There are lots of users doing exactly that though.

  • 0 Votes
    1 Posts
    162 Views
    No one has replied
  • PfSense + HyperV

    Virtualization
    3
    0 Votes
    3 Posts
    423 Views
    S

    @JonathanLee Yeah maybe a virtual router. I'll consider that,
    Thanks for the advice.

  • 0 Votes
    6 Posts
    404 Views
    johnpozJ

    @Stp well if you can ping 8.8.8.8 then internet is working.. Your problem is prob dns related.

  • 0 Votes
    4 Posts
    260 Views
    V

    @Enso_
    I was talking about the firewall on the destination machine.

    To investigate the issue, sniff the traffic with packet capture on pfSense on the LAN interface and see if you get both, request and response packets.

  • 0 Votes
    3 Posts
    469 Views
    Y

    @stephenw10 thanks for responding -- yup pfSense update solved this particular issue. Now I'm running into TLS/ cert issues on my dockerized graylog setup, which is probably outside the scope of this forum.

    Would be nice to have a standard way to securely manage logs in Pfsense -- one that does not encourage people to send logs in the clear.

    I know you can just run a local server and have some security with Rules, but would suggest to have a more formal secure integration with Graylog given how popular it seems to be with people here. Also for people that want to monitor more than one network with one Graylog instance

  • Anybody successfully install Pfsense on Sophos XGS126?

    Moved Hardware
    6
    0 Votes
    6 Posts
    740 Views
    stephenw10S

    Ah, OK. Yeah that's not even a known PCI ID. I don't believe there is a driver for it. Certainly not in FreeBSD/pfSense.

    But, perhaps more importantly, there is only one Ethernet device shown. That implies the ports there are connected via a switch and that introduces a lot more issues.

    Similar to this: https://forum.openwrt.org/t/sophos-xgs107-and-no-network-interfaces-unknown-network-controller/168989

    Depending on the switch IC used it might have a serial interface that's accessible. If you're lucky!

  • ACME IP address or domain

    ACME
    4
    0 Votes
    4 Posts
    1k Views
    GertjanG

    @aes4096 said in ACME IP address or domain:

    I can use the DNS method or purchase a Wildcard certificate with subdomain protection, which is more expensive.

    If you can use a DNS Method you can ask a wildcard certificate.
    Letsencrypt will still be free of use.

    If you own( = rent) a domain name, you control the domain. You are the only one being able to create sub domains.
    I can proof that : try creating aes4096.microsoft.com : good luck ^^

  • Does HA Proxy utilize QAT offloading?

    Cache/Proxy
    1
    0 Votes
    1 Posts
    190 Views
    No one has replied
  • 0 Votes
    2 Posts
    293 Views
    G

    @Ratfink Connecting two sites with Wireguard VPN is absolutely doable, and you don't even need fixed IP's for it to work.

    When you say you have 5 fixed IP's from your ISP, I'm kind of assuming you have your office at your house? Meaning they are both connected to the same fibre? Otherwise, if they are at very different locations, is it still the same ISP?
    In terms of getting the IP's on the respective pfsense machines, I assume you know how or have instructions from the ISP to do this. Might be MAC based if DHCP for example...

    Anyway, running pfsense on repurposed HW is very common and can be done "barebone" or virtualized. So you shouldn't have any problems getting to to work on your rack servers, hopefully.

    So step one is of course getting both machines up and running. And since they will be for different sites and connected via VPN you must make sure to use different LAN subnets on them. Like 192.168.1.0/24 on one and 192.168.2.0/24 on the other.

    Once you have them up and running you can follow a guide like one of these to set up wireguard.
    Even though you have fixed IP's it might be a good idea to get two domains, unless you already have that.

    https://www.youtube.com/watch?v=2oe7rTMFmqc
    Youtube Video

  • 0 Votes
    7 Posts
    530 Views
    johnpozJ

    I would concur using it as explicit proxy where your devices actual gateway points to pfsense vs the proxy should remove such issues what what your seeing with that 22 traffic you listed.

    Other option with putting such devices that are really internal to your network on their own transit network can eliminate asymmetrical flow issues.

  • Portforward configuration for pfSense

    OpenVPN
    2
    0 Votes
    2 Posts
    294 Views
    V

    @kstlan02
    First off, it's not wise to use public IP ranges in the local network, even for docker.

    Then I'm wondering, why don't you run the OpenVPN server on pfSense.

    Do I have to do the port forwarding from the WAN to the LAN or do I have to do it from the WAN to the Docker container that is running OpenVPN?

    "LAN address" is the wrong destination here for sure. This is an IP assigned to pfSense itself. Hence forwarding to it, is not that, what you want.

    The question is then, how can pfSense reach the container?
    I'd expect, that the container gets its traffic forwarded inside the VM. But don't know, how you did configure it.

    So you have to forward the OpenVPN traffic either to the VM address or to the container IP. In the latter case, you would need to add a static route for it on pfSense of course.

  • 0 Votes
    4 Posts
    1k Views
    D

    @danwize @viragomann
    I've got it working now. I changed to just use one front end and added my acl for cloud back. I removed my attempts to set the header and changed my could back end to point to 10.10.0.2:443 after I had changed it to 10.10.0.2:10223 for testing. After I did that, and after saving and applying the changes several times, cloud.mydomain.com was still resolving to 10223. I even tested in igognito windows and restarted the ha proxy service from the pfsense ui and it kept resolving to 10223.

    I finally got it routing to 443 after editing the front end settings for cloud to use a different backend, saved those changes, and then changed it back to my cloud.mydomain.com backed and saved again. Possibly my problem from the beginning was the fact that the settings didn't take initially.

  • pfSense Exam & Certification

    Documentation
    2
    0 Votes
    2 Posts
    694 Views
    GertjanG

    @optimusprime

    pfSense as a software resolution, or boxed into devices like this are not to be compared with solutions from (example) Cisco solutions. Or Microsoft for that matter.
    If you look for 'certificates' or 'exams' then you probably won't find what you're looking for.

    @optimusprime said in pfSense Exam & Certification:

    At official netgate site

    Look at their other official site.
    And while you have Youtube open, tens of thousands of pretty good video's are available from other channels that tell you everything you need to know, and more, as the subject is just huge.

    edit : btw : I'm saying all this as this is what I think. I'm didn't 'look'. Maybe it actual exist, but not in my physical neighborhood, and I'm not planning a trip to the US so I can learn the official way how to analyze a NAT rule 😊

  • Problems with retrieve packages.

    General pfSense Questions
    6
    0 Votes
    6 Posts
    662 Views
    stephenw10S

    It's seeing the 2.5 version. You should normally see that as an available upgrade on the dashboard. If that has been disabled you would need to visit System > Updates.

    But from such an old version you should consider installing 2.7.2 clean and restoring your config.

  • 1 Votes
    10 Posts
    2k Views
    A

    @miracuru
    As was mentioned by @viragomann the "Default deny rule IPv(4|6)" logs are normal. Actually they show that pfSense is doing its basic job, which is (by default) blocking all incoming connections to WAN.

    You could implement a firewall rule on the WAN interface which does the same thing, but doesn't log the blocks. Enable that rule when you don't want pfSense to record all the WAN blocks in the logs. If you want to start logging the WAN blocks, just disable your rule and the defaults will kick in again.

    Also, it may be possible to directly connect the enpf4s0 and enpf7s0 interfaces to pfSense via PCI-Passthrough. This will depend on hardware compatibility, but could be worth looking into; just food for thought.

  • 0 Votes
    5 Posts
    789 Views
    N

    Ok, have a look into the DOCSIS Telemetry.

    I was hell if my ISP rollout the OFDMA to the upstream some years ago. And your problem looks similar.
    Idle was nice, but if you use the bandwidth, the error rat grows and grows and with it the retransmission and the latency explode.
    It takes month and 2-3 construction sites to get a nice stable connection back.
    Have a look into it fist.

  • 0 Votes
    1 Posts
    601 Views
    No one has replied
  • PFSENSE 2.7.2-RELEASE (amd64) PROXY Squid

    Moved Portuguese
    2
    0 Votes
    2 Posts
    799 Views
    T

    @dieggocampos Bom dia, descobriu a solução? Eu tenho tido milhões de problemas com skype por exemplo. Estou desconfiado que é a versão do pfsense e estou testando no momento na versão 2.7.0. Até tentei dar uma olhada no e2guardian mas parece que nao faz mais parte da comunidade do PFsense.

  • 0 Votes
    5 Posts
    4k Views
    N

    @viragomann said in pfSense on Proxmox via vmbr0 - got LAN access, but no WAN/internet access - why?:

    @newsboost
    You cannot use a passed-through NIC on Proxmox itself. The only available NIC you can use is enp1s0f3.

    That makes completely sense to me and probably explains the error message, thanks! But I'm really confused now, because it seem to work, i.e. it provides VLAN 100 internet access and yet it seems that the interface is still being passed through, because enp1s0f0 = igb0 = WAN and enp1s0f1 = LAN (vlan trunk) = igb1... Are you sure this should not work, because it seem to work? And why does it work, is it kind of "undefined behaviour" perhaps? Great comment, thanks!

    That's not a prlausible reason to have two subnets on Proxmox.

    The explanation was not good enough... So, VLAN 1 (subnet 192.168.1.0/24) is my management VLAN and the VMs I create in Proxmox should preferably not have access to the management VLAN so I thought the safest and quickest solution would be to use another subnet for all my experimental VMs... That way, they don't have access to the more important devices/machines/printers/servers on VLAN 1... I think this is a better explanation, hopefully...

    Just connect the bridge vmbr0 to a physical NIC port and assign a static (!) IP to the bridge in Proxmox. This should be a trusted subnet of course.

    You're right - and I did just that and it also works:

    209a52c4-6261-487e-9fff-3645ceca5665-image.png

    From a logical perspective, this makes much more sense because as you wrote above and after I've been thinking about it, I think it's weird that I can bridge a NIC that has been passed through to proxmox and still get the behaviour that I wanted - but after my improved understanding and after reading your comment, now I wouldn't expect this to work any longer, but it still does... Very weird, it can bridge the NIC when passed through, apparently without internet/network problems!

    So to access Proxmox in case of emergency, you have only to assign a static IP within the same subnet to a computer and connect it to the appropriate network port. Then you can access Proxmox independently from the state of pfSense.

    It makes completely sense what you're writing and probably the solution could be that I should have two VMBR-interfaces:

    One for emergencies, if pfSense does not respond or boot up correctly so I can plugin a network cable and ssh directly into Proxmox and One on subnet 100, such that I can isolate all the VMs from the management VLAN and do experiments without any fear...

    Is it really that bad if I put vmbr0 in the VLAN 100-subnet so the proxmox interfaces can be access on two different subnets? Because I've been testing and it seems to work completely fine on two different subnets - although perhaps I would like to later block VLAN 100 from accessing the Proxmox-interface and I can do that by adding a firewall-rule using the pfSense-interface, isn't that right?

    Appreciate your comments a lot, thanks!