Categories

  • 375 Topics
    1k Posts
    fractal_boyF
    @gigabitguru What TNSR version do you run? This bugs were fixed on TNSR 23.11. Here is the details: https://docs.netgate.com/tnsr/en/latest/releases/release-notes-23.11.html#vrrp
  • 122k Topics
    779k Posts
    A
    Thank you for the suggestions. Yes I am the only one with access to pfsense. The family are on a separate VLAN, and are non-technical. The LAN and all VLANS cannot connect to the internet, but I can connect via IPsec to the LAN and all VLANs. pfsense rebooted a couple of times, and also the modem. Xfinity had reported some kind of misconfiguration, but stated that it had been fixed.
  • 20k Topics
    130k Posts
    N
    @Schannes said in PfSense UI Not Updating frr.conf: I had the same problem. I was able to solve the problem, with clearing the "SAVED frr.conf" field under Services --> FRR --> Global Settings --> Raw Config. After clearing the field, it was possible again, to use the GUI to configure frr. I really want to stress that this is the ONLY feasible way to get frr config and web gui to work again. And while we are at it I would like to request an addition to the frr ospf menu's [image: 1774758674881-714f8830-f68c-4cd7-bfdd-aed167173a54-image.png] What is needed is to produce the line in bold interface tun_wg0 ip ospf network point-to-multipoint non-broadcast ip ospf area 0 This is supported by frr (tested in 25.11.1 and 26.03rc) and is required for ospf over wireguard tunnels on a single spoke , for hub and spoke setups. You also need to specify the neighbor by ip. The reason is that ospf wants multicast, (and works if you add 224.0.0.0/4) on the hub, BUT it will only work for the last spoke, since this is how wireguard operates. The setting above solves it, but since it is not on the menu, you need to change it by hand , which then gets the configuration out of sync, and one have to do chores described above to get it to synce, and THEN change the line to ip ospf network point-to-multipoint non-broadcast Hell breaks loose.!! ps. I would opt for bgp instead of ospf for wireguard tunnels, but this will be another thread!
  • 43k Topics
    267k Posts
    micneuM
    @d4rkw4rden hast du mal einen grafischen netzwerkplan für dein setup (kann helfen beim verständnis) Warum brauchst du die Fritzbox vor der sense? Was ist das für ein Internet zugang (GLASFASER, *DSL)? Ich hatte Früher bevor ich GLASFASER hatte VDSL und hatte direkt ein Draytek Modem angeschloßen. Hier mein Aktuelles Setup ┌──────────────────────────┐ ┌──────────────────────────┐ │ WAN / Internet (PPPoE) │ │ WAN2 / Internet (ETH) │ │ Willy.tel │ │ 300/100Mbit/s 5G Telekom │ │ 1000/250Mbit/s Glasfaser │ │ gl-inet Mudi 7 │ │ (DualStack) │ │GEPLANT/warte auf Hardware│ │ │ │ │ └──────────────────────┬───┘ └──────┬───────────────────┘ ─ ─ ─ ─ ─ ─ ─ ─WAN─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ WAN ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ │ │ ┌────────────────┐ ┌────────────────┐ ╔═════════════╩════════════╩════════ pfSense+ ═══╗ │ TrueNAS SCALE │ │ Switch │ ║ Netgate 6100║ Stand: ─ ─ ┐ │ ORICO CF56 Pro ├───┤ USW-Flex-XG ├────╣ Netzwerk Block: 172.30.0.0/19║ │ │ │ │ │ ║ LAN Block: 172.30.0.0/20║ 17.03.2026 │ └────────────────┘ └───┬─┬──┬───────┘ ║ VPN Block: 172.30.16.0/20║ │ ┌────────────────┐ │ │ │ ║ LAN: 172.30.3.0/24║ ─ ─ ─ ─ ─ ─ ┘ │ UBNT │ │ │ │ ║ Gäste (W)LAN (VLAN2): 172.30.2.0/24║ │UniFI AP AC Pro ├───────┘ │ │ ║ IoT WLAN (VLAN4): 172.30.4.0/24║ │ │ │ │ ║ DynDNS über deSEC.io mit eigener Domain║ └────────────────┘ │ │ ║ VPN's:║ ┌────────────────┐ │ │ ║ 1 x S2S WireGuard FB 7490 (172.30.20.0/24)║ │ Proxmox │ │ │ ║ 1 x S2S WireGuard FB 6591 (172.30.19.0/24)║ │ Intel NUC ├─────────┘ │ ║ 1 x pfSense S2S (Netgate 6100) IPSec║ │BNUC11TNHV50L00 │ │ ║ 1 x OpenVPN Road Warrior DCO (172.30.16.0/24)║ └────────────────┘ │ ║ 1 x WireGuard RA Hetzner (172.30.17.0/24)║ │ ║ 1 x WireGuard Road Warrior (172.30.18.0/24)║ │ ╚════════════════════════════════════════════════╝ ┌────────────────┐ ┌────────┴───────────┐ ┌────────────────────┐ ┌──────────────────┐ │ Fritzbox 7490 │ │ Switch │ │ Switch │ │ UBNT │ │ IPClient ├───┤ USW Pro Max 16 PoE ├─┤ USW Pro XG 8 PoE ├─┤ UniFi AP-Flex-HD │ │ (Nur VoIP) │ │ │ │ │ │ │ └────────────────┘ └────┬───────────────┘ └──┬─────────────────┘ └──────────────────┘ ┌────────────────┐ │ │ ┌───────────┐ │ UBNT │ │ │ │ │ │UniFI AP AC Pro ├────────┘ └────┤ Clients │ │ │ │ │ └────────────────┘ └───────────┘
  • Information about hardware available from Netgate

    3k Topics
    21k Posts
    publictoiletbowlP
    hi i have same issue but when i upgraded to 25 the problem gone and now the sfp+ show correctly. this is what before upgrading. ix0: flags=1008843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST,LOWER_UP> metric 0 mtu 1500 description: OPT1 options=4e138bb<RXCSUM,TXCSUM,VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,WOL_UCAST,WOL_MCAST,WOL_MAGIC,VLAN_HWFILTER,RXCSUM_IPV6,TXCSUM_IPV6,HWSTATS,MEXTPG> capabilities=4f53fbb<RXCSUM,TXCSUM,VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,TSO4,TSO6,LRO,WOL_UCAST,WOL_MCAST,WOL_MAGIC,VLAN_HWFILTER,VLAN_HWTSO,NETMAP,RXCSUM_IPV6,TXCSUM_IPV6,HWSTATS,MEXTPG> ether 00:00:00:00:00:00 inet6 fe80::208:a2ff:fe12:d8c7%ix0 prefixlen 64 scopeid 0x1 media: Ethernet autoselect (10Gbase-Twinax <full-duplex,rxpause,txpause>) status: active supported media: media autoselect media 10Gbase-Twinax nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL> drivername: ix0 plugged: SFP/SFP+/SFP28 1X Copper Passive (Copper pigtail) vendor: Mellanox PN: MCP2104-X02AB SN: MT1407VS00954 DATE: 2014-02-14 SFF8472 DUMP (0xA0 0..127 range): 03 04 21 01 00 00 04 00 04 80 d5 00 67 00 00 00 00 00 03 00 4d 65 6c 6c 61 6e 6f 78 20 20 20 20 20 20 20 20 00 00 02 c9 4d 43 50 32 31 30 34 2d 58 30 32 41 42 20 20 20 41 31 20 20 01 00 00 1f 00 00 00 00 4d 54 31 34 30 37 56 53 30 30 39 35 34 20 20 20 31 34 30 32 31 34 20 20 00 00 00 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  • Information about hardware available from Netgate

    44 Topics
    211 Posts
    AriKellyA
    It looks like unified web management could be coming soon. It would be great if it means easier control and management of all web services in one place. Let's see if any companies announce more details about it!
  • Feel free to talk about anything and everything here

    4k Topics
    19k Posts
    BBcan177B
    There are alias deny for blocking and using that option the events will show in the Deny Stats. Alias Native doesn't use any deduplication. Alias Permit/Match should be selected if they are destined for a permit or match rule.
Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.

Looks like your connection to Netgate Forum was lost, please wait while we try to reconnect.