Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login
    1. Home
    2. Tags
    3. update
    Log in to post
    • All categories
    • R

      Update Problem pfSense 2.7.2

      Watching Ignoring Scheduled Pinned Locked Moved General pfSense Questions update help error
      10
      0 Votes
      10 Posts
      577 Views
      stephenw10S

      I would guess it's because you are policy routing traffic from LAN clients to a specific gateway. So that works even when the firewall has no default route.

    • C

      [Crash Report] - Crash after update from 2.6.0 to 2.7.0

      Watching Ignoring Scheduled Pinned Locked Moved General pfSense Questions crash 2.7.0 systempatches update
      3
      0 Votes
      3 Posts
      540 Views
      C

      @stephenw10 said in [Crash Report] - Crash after update from 2.6.0 to 2.7.0:

      Which is fixed in 2.7.2.

      Cool - thank you. As I just wrote in my edit I managed to upgrade it to 2.7.2, so it probably won't happen again.

    • N

      Error updating repositories on Netgate 2100

      Watching Ignoring Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software update repository netgate-sg-2100
      8
      0 Votes
      8 Posts
      1k Views
      S

      @rhammondwtg It sounds like they're working on adding a check to look for routers with the small partition (referenced in your link) and stopping the upgrade. That will let everyone else upgrade safely. But in the meantime it's off, so those of us with early-release models aren't left with a non-functioning router. So, manual (re)install, or wait.

    • M

      Unable to upgrade SG-1100 appliance to 23.01 - Kernel panic

      Watching Ignoring Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software update 23.01 sg-1100
      11
      0 Votes
      11 Posts
      3k Views
      jimpJ

      @william-mandell said in Unable to upgrade SG-1100 appliance to 23.01 - Kernel panic:

      @jimp

      No Jim , sorry, but no. Not an older version of pfsense plus at all.

      I was on the Newest version of pfSense Plus+ that was the release #, 'freshly' and (*natively) installed before > and updated to 23.01 obviously after 23.01 came out, but before I saw that it was being 'blocked' because of some problems going on.

      Those statements are contradictory. Either you installed 23.01 directly or you were on 22.05 and upgraded to 23.01.

      That said, I checked around and apparently it's a known issue that the 1100 and 2100 recovery installers are using an older ZFS version in the disk images.

      While you could run zpool upgrade -a and let it upgrade that, if it didn't properly update the loader when you updated to 23.01 then it may not boot properly after. If you did reimage it with 23.01 and not an upgrade, then it's safe to run.

      How and why would I want to boot it to the older version(s) ZFS boot environment , its has ZFS now. The 'old' environment always said it has an 'error' and shouldnt even running, but TAC said y'all had a special version, so it's fine.

      If you upgraded from 22.05 to 23.01 and had a problem on 23.01, you could use the boot environment to boot back into 22.05 without reinstalling.

      Can I ask again, how EXACTLY do I run a program that uses your special Chip' on board to verify and authenticate that my system is running authentic pfSense+ software. Does it need to be 'on'? Not sure if it's the same chip but whichever one displays whether it is on or not has always been off. Thought that chip was for VPN? Anyway, the trademarked pc sense chip to verify and authenticate - the software running.

      The device that handles the authenticity part is used by the device when accessing the package repositories for packages and updates (all automatic). That is the "thoth" security chip.

      VPN acceleration on 1100/2100 is handled by a different function, the SafeXcel cryptographic accelerator, which is unrelated.

    • TAC57T

      System Information | Version Status

      Watching Ignoring Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software bug update
      5
      0 Votes
      5 Posts
      1k Views
      TAC57T

      @jimp I ran 'pfSens-upgrade' from the Shell and the world is now safe!

      Other than something in item #1, none of the other issues should have been a problem on my system. Here is what I have installed.
      b15b044b-06b8-4008-8a2a-22786ca6a1e2-image.png

    • K

      Snort Not Updating

      Watching Ignoring Scheduled Pinned Locked Moved IDS/IPS snort update rules private
      2
      0 Votes
      2 Posts
      617 Views
      bmeeksB

      Your post is not entirely clear. Perhaps it is a language translation issue ???

      Are you saying that now your pfSense box is behind some kind of double-NAT? You must eventually have a public IP in order to route traffic (not an RFC 1918 address). However, if your pfSense box now communicates with some upstream host that in turn provides a NAT to some type of public routable IP, then your Snort rules update should still work.

      I assume other Internet traffic through the pfSense box works?? Or do you really mean to say you have isolated this pfSense box from the Internet? If that is the case, then there is no method for an offline update in the Snort package. It requires Internet access to update its rules.

    • T

      after update 2.4.4 pfsense couldn't find out branch

      Watching Ignoring Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software install pfsens update
      9
      0 Votes
      9 Posts
      2k Views
      S

      @steveits everything was connected. WAN, LAN, etc...

      All IP addresses were properly assigned.

      Had to manually install packages such as apcupsd, pfblocker, etc...

      The funny thing is that I did not need to configure them once installed. I guess the config backup had written their configurations in a location that did not get overwritten by the package installs.

    • S

      Netgate SG-3100 Stuck on version

      Watching Ignoring Scheduled Pinned Locked Moved Official Netgate® Hardware netgate-sg-1100 update upgrade issue openvpn config
      3
      0 Votes
      3 Posts
      709 Views
      S

      @gertjan Thanks!

      Issue resolved by contacting support for the new version.

    • C

      Unable to check for updates, Package Manager not working

      Watching Ignoring Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software package manager system update
      12
      0 Votes
      12 Posts
      10k Views
      A

      @faust said in Unable to check for updates, Package Manager not working:

      So, I may have found a solution.

      Files in /usr/local/share/pfSense/pkg/repos where all empty, so I have just recovered those files from another exact same pfSense version (and model).

      And everything seems OK now.

      this was the fix for me as well. good thing we had a similar netgate 3100 elsewhere!

    • pfSenseTestP

      Package Manager Not Updating [Solved]

      Watching Ignoring Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software package manager update solved
      16
      0 Votes
      16 Posts
      12k Views
      stephenw10S

      Cool, thanks for confirming. 👍

    • W

      Packages disappear overnight after system restore

      Watching Ignoring Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software installation restore repository packages update
      7
      0 Votes
      7 Posts
      2k Views
      W

      Hi jimp,
      some good news here.

      Your statement that "pkg can't reach the pfsense servers" pointed me to the right direction; I haven't understood it fully, but I found a way at least to unlock the pkg issue.

      In my case, it was due to a double stack IPv4/IPv6 issue: to solve it, I had to temporaly disable the network interface linked to the GIF port; removing IPv6 name resolution plus removing the IPv6 default gateway and firewall rules to route IPv6 traffic didn't suffice.

      I don't like to be so inaccurate in test results, but as IPv6 connectivity was actually working, defining this problem will require some more tests and I meant to find a quick workaround for everybody experiencing this kind of issue.

      Let me know if this rings a bell.