The pfSense Store

Recent Posts

Pages: [1] 2 3 4 5 ... 10
1
you should see an option to exit to shell on the installer menu, select it, run the sysctl command, then typing exit on the shell will bring you back to the menu and you can proceed from there.
2
Traffic Shaping / WAN Limit bandwith
« Last post by MoaMoaK on Today at 07:48:41 pm »
Hi, I have a problem that I couldn't find any solutions on the web.

I currently have a multiple WAN / multiple LAN setup that works well with no traffic shapping (only firewall rules that redirect traffic according to ports). The fact is I just got a symetrical 1000 Mbit/s WAN access but I want to use only 60 Mbit/s on this connexion (each up and down) and no more (let's call it WAN1). But the LAN users need auround 100-150 Mbit/s for surfing the web. That's why I also have a few 15-20 Mbit/s WAN access (let's call it WAN2-WAN6) but their quality is worse (higher ping and less stable) than WAN1.

So what I need is to setup a (set of) rule(s) with Traffic Shapping probably that handles all the http/https traffic and redirect it to the WAN1-WAN6 group gateways but under the condition that under no circumstances the WAN1 bandwith gets above 60 Mbit/s.

I have found out how to use the limiter to limit up and down bandwidth of a firewall rule but I don't want it applied on the whole http/https traffic but only a single interface.
So I've looked at Traffic Shapper By Interface but I've only managed to limit the upload bandwidth and not the download one and I can't find how to limit both up and down on an interface.

I'm quite lost right now, so I hope you would come with a solution.

In addition if the WAN1 gateway could be prioritized over the WAN2-WAN6 that would be better but it's not the most important point.

MoaMoaK
3
2.4 Development Snapshots / Re: OpenVPN 2.4 AES-NI speed
« Last post by chrcoluk on Today at 07:41:12 pm »
the settings are now different, I was just reporting what was in use at the time of the test.

For reference I now have it using aes 128-gcm as I consider aes 256 wasting resources, and sha256 for the reason you said, sha when used with gcm is only used for the control channel so the impact of strengthening it wont be noticeable.

I am pretty sure aes hardware offloading is working in my case regardless of the settings tho.
4
Você pode forçar a configuração do proxy nos dispositivos móveis usando WPAD.
Dê uma pesquisada a respeito....
5
OpenVPN / Re: Local hostnames won't resolve over OpenVPN
« Last post by sparkynerd on Today at 06:29:20 pm »
I have 2 VLANs: 192.168.10.0/24 and 172.26.1.0/24. These subnets both resolve local hostnames. When nslookup is run over VPN, it is trying to use 192.168.10.1, but the DNS query times out. 
6
General Questions / Re: Downloadrate extrem slowly..
« Last post by aechoone on Today at 06:03:26 pm »
This Setting i habe only on LAN NIC on my WAN NIC this Option is not visible
7
Installation and Upgrades / Re: pfSense Nano 8GB and 16GB - We need!
« Last post by chpalmer on Today at 05:32:48 pm »
Watchguard?

Id dont believe Watchguard has built a 32bit i386 device in more than 5 years..  they are all EOL and most have been in operation over 10 years by now.

Look for some WG xtm5 series boxes on ebay or even better budget for some new hardware such as at the pfSense store. 

8
2.4 Development Snapshots / Traffic Shaper fails on SG-4860 VLAN
« Last post by oben on Today at 05:08:12 pm »
The traffic shaper fails when a VLAN is included with error:


rc.filter_configure_sync: New alert found: There were error(s) loading the rules: pfctl: igb0_vlan10: driver does not support altq - The line in question reads
  • :
9
Installation and Upgrades / After PPP Test..Gateway...
« Last post by thule1291 on Today at 05:01:05 pm »
After many PPP Tests with a stick that is supporter but doesnt work i got a gateway OPT1GW / 192.186.1.1 that i can't delete.
where i can delete that?

thanks.
10
Cache/Proxy / Re: Squid won't save Changes in General
« Last post by spanguel on Today at 05:00:05 pm »
I appreciate the quick responses :)

@doktornotor: Thanks for the action on github too

For everyone:
First Thread: https://github.com/pfsense/FreeBSD-ports/pull/254
Fixed Thread: https://github.com/pfsense/FreeBSD-ports/pull/261

Its fixed in Version 0.4.34
Pages: [1] 2 3 4 5 ... 10