Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Own logo

    Scheduled Pinned Locked Moved webGUI
    11 Posts 7 Posters 3.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Jamerson
      last edited by

      Hi guys,
      i was curious if possible to have own logo on the new 2.3 home page of Pfsense.
      thank you

      1 Reply Last reply Reply Quote 0
      • BBcan177B
        BBcan177 Moderator
        last edited by

        Goto the Dashboard, click the "+" add widget Icon, and add the "Picture widget"… then click the picture wrench Icon to upload the picture...

        "Experience is something you don't get until just after you need it."

        Website: http://pfBlockerNG.com
        Twitter: @BBcan177  #pfBlockerNG
        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

        1 Reply Last reply Reply Quote 0
        • jdillardJ
          jdillard
          last edited by

          you can replace the image(s) with whatever you want for personal use. If you plan on redistributing check the license.

          1 Reply Last reply Reply Quote 0
          • J
            Jamerson
            last edited by

            @BBcan177:

            Goto the Dashboard, click the "+" add widget Icon, and add the "Picture widget"… then click the picture wrench Icon to upload the picture...

            thank you for your answer.
            I meant with the first picture on the 2.3 before you log in.
            see attached.
            does you steps apply to this ?
            thank you

            Pfsense.jpg
            Pfsense.jpg_thumb

            1 Reply Last reply Reply Quote 0
            • M
              Milkwyrm
              last edited by

              I do this. go to /usr/local/www and find the logo-black.png file. then modify it as needed. I have done this as I want to be able to identify the correct firewall between the few we run. all in house and I dont modify anything else. As a side note it would be nice if in the menu, where you change themes there was an entry option to put in an identifier name string or the like so I didnt have to do this.

              WFAPF.JPG
              WFAPF.JPG_thumb

              1 Reply Last reply Reply Quote 0
              • J
                Jamerson
                last edited by

                Thank you mike for your answer.
                this exactly the while idea behind. to identify which firewall I am working on.
                its working fine now. much appreciate it

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  I look at the address bar. That's easier than making sure I have the right image on the right firewall that has to be uploaded outside of config.xml.

                  Even better is StartSSL or LetsEncrypt certificates and real host names with port 80 disabled.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • J
                    Jamerson
                    last edited by

                    @Derelict:

                    I look at the address bar. That's easier than making sure I have the right image on the right firewall that has to be uploaded outside of config.xml.

                    Even better is StartSSL or LetsEncrypt certificates and real host names with port 80 disabled.

                    Thank you for your answer
                    any suggestions how to do so using Startssl ? would this ssl affect the already configured vpn ssl ?

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      "to identify which firewall I am working on."

                      So you don't know what firewall is what based upon name, fqdn, IP?

                      Couldn't you just use names like pf-sitename.domain.tld or pfsense.sitename.domain.tld, pfsense.sitedomain.tld, pfsense.othersitedomain.tld, etc.. or if just using IP would they be different IP?

                      While sure having logo that reflects the site is fine, sure why not, etc.  But that should just go inline with how you actually access pfsense.

                      As to putting a cert that matches up with name, etc.  Are you accessing pfsense via public side with a public registered domain name.  Then sure you can use startssl or the new letsencrypt certs or any public CA that issues certs, etc.

                      If your accessing them with rfc1918 IP address, or your own non public domain name.  You can just use your own self signed certs, be it issued from pfsense CA.  You can use just 1 as common CA, so you only have to trust the one CA for all your certs.  Or any other locally hosted CA that you trust to issue the certs, etc. Shoot even if accessed via public side and publidomain name you can still just use a selfsigned.  Normally the only people access pfsense web gui should be admin types and should be able to trust your internal CA that signed the certs in use.  Public signed certs are good for https that is accessed by the masses where you have no control over what CA's they trust..  If that is the case then sure startssl or letsencrypt are cheap/free ways to get that done.

                      I would suggest you use a combination, where you use unique fqdn to access each instance of pfsense where in the fqdn is a way to distinguish which one your on.  I would think they are all different IPs as well, but maybe not depending on your sites, etc..  Yes a cert that has the cn of the unique fqdn and IP for good measure as a SAN, along with sure different logos for each one..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • J
                        Jamerson
                        last edited by

                        @johnpoz:

                        "to identify which firewall I am working on."

                        So you don't know what firewall is what based upon name, fqdn, IP?

                        Couldn't you just use names like pf-sitename.domain.tld or pfsense.sitename.domain.tld, pfsense.sitedomain.tld, pfsense.othersitedomain.tld, etc.. or if just using IP would they be different IP?

                        While sure having logo that reflects the site is fine, sure why not, etc.  But that should just go inline with how you actually access pfsense.

                        As to putting a cert that matches up with name, etc.  Are you accessing pfsense via public side with a public registered domain name.  Then sure you can use startssl or the new letsencrypt certs or any public CA that issues certs, etc.

                        If your accessing them with rfc1918 IP address, or your own non public domain name.  You can just use your own self signed certs, be it issued from pfsense CA.  You can use just 1 as common CA, so you only have to trust the one CA for all your certs.  Or any other locally hosted CA that you trust to issue the certs, etc. Shoot even if accessed via public side and publidomain name you can still just use a selfsigned.  Normally the only people access pfsense web gui should be admin types and should be able to trust your internal CA that signed the certs in use.  Public signed certs are good for https that is accessed by the masses where you have no control over what CA's they trust..  If that is the case then sure startssl or letsencrypt are cheap/free ways to get that done.

                        I would suggest you use a combination, where you use unique fqdn to access each instance of pfsense where in the fqdn is a way to distinguish which one your on.  I would think they are all different IPs as well, but maybe not depending on your sites, etc..  Yes a cert that has the cn of the unique fqdn and IP for good measure as a SAN, along with sure different logos for each one..

                        Thank you John,
                        well explained big thank you

                        1 Reply Last reply Reply Quote 0
                        • T
                          TheWaterbug
                          last edited by

                          @johnpoz:

                          "to identify which firewall I am working on."

                          So you don't know what firewall is what based upon name, fqdn, IP?

                          Couldn't you just use names like pf-sitename.domain.tld or pfsense.sitename.domain.tld, pfsense.sitedomain.tld, pfsense.othersitedomain.tld, etc.. or if just using IP would they be different IP?

                          I like to apply different themes to the 3 pfsense boxes that I administer. Have you ever tried to compare 3 sets of ipsec settings across 3 different firewalls? It can get very confusing, and having a strong visual reference helps keep my head on straight.

                          Sure, the address in the URL bar is a logical equivalent, but a different theme and image is more reliable when dealing with humans.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.