Re: [pfSense Support] To integrate AD users to specific rule groups

2011-07-30 Thread Vaughn L. Reid III
On 7/30/2011 9:17 AM, Isamar Maia wrote:

 Ok. Great. Thanks for the tip, dude.

 Anyone knows an workaround for the item 2 ?

 Thanks,

 Isamar

 2011年7月30日10:10 Chris Clark ch...@belthasar.com
 mailto:ch...@belthasar.com:

 Isamar,

 The captive portal in m0n0wall/pfSense isn’t capable of direct
 LDAP queries, unless something has changed recently. However, it
 is capable of RADIUS authentication. Since you have an Active
 Directory environment, it’s a trivial matter to setup IAS (2003)
 or NPS (2008) to handle RADIUS requests on one of your domain
 controllers.

 I’m not aware of a method to accomplish item two.

 Chris

 *From:*Isamar Maia [mailto:isa...@gmail.com
 mailto:isa...@gmail.com]
 *Sent:* Saturday, July 30, 2011 7:15 AM
 *To:* support@pfsense.com mailto:support@pfsense.com
 *Subject:* [pfSense Support] To integrate AD users to specific
 rule groups



 Hi Folks,

 Is there any way with PfSense to integrate AD authenticated users
 with rules groups.

 I mean, we wish to:

 1) Integrate the Captive portal functionality to authenticate
 users to the Windows AD server
 2) Attach specific users to specific firewall and squid filtering
 rules. Like: HR departament users
 can access only HR related sites,etc.

 Is that currently possible ?


 -- 
 Isamar Maia
 Cel. VIVO SSA: (55) 71-9146-8575
 Cel. TIM SSA: (55) 71-9185-5264
 Fixo: (55) 71-4062-8688
 日本: +81-(0)3-4550-1212
 Skype ID: isamar.maia




 -- 
 Isamar Maia
 Cel. VIVO SSA: (55) 71-9146-8575
 Cel. TIM SSA: (55) 71-9185-5264
 Fixo: (55) 71-4062-8688
 日本: +81-(0)3-4550-1212
 Skype ID: isamar.maia

The Squid Package for PFSense looks like it will authenticate to a local
database, Radius, LDAP, or NT Domain. There are also some ACL
capabilities in the SquidGuard package. I'm not aware of any way to
configure firewall rules on PFSense that communicate with an
authentication back-end.


Re: [pfSense Support] L7 queue seems not to work

2011-05-06 Thread Vaughn L. Reid III



On 5/4/2011 11:37 AM, Vaughn L. Reid III wrote:



On 5/4/2011 11:18 AM, Ermal Luçi wrote:

On Wed, May 4, 2011 at 4:47 PM, Vaughn L. Reid III
vaughn_reid_...@elitemail.org  wrote:


On 4/29/2011 4:49 PM, bsd wrote:

Le 29 avr. 2011 à 19:08, bsd a écrit :


Le 29 avr. 2011 à 09:37, bsd a écrit :


Hi,

I have created a simple L7 container where I have put SIP and 
SkypeOut

traffic.

Then created a Queue called VoIP where this traffic is supposed 
to end

(HFSC with 10% reserved).

Then two floating rule to put all traffic (TCP and UDP) in and 
selected

the VoIP L7 container I have created.


No traffic seems to go in that queue ??

Any hints ?
Is L7 traffic shapping Out of order for the time beeing ?


Thanks.

May I had that my WLAN and LAN are bridged …
If this has any impact on the L7 Queuing.

… and that my other queue (non L7) are also working very correctly.


Thx.

And the system tunables have been set correctly…

net.link.bridge.pfil_member Set to 0 to disable filtering on the
incoming and outgoing member interfaces.   0
net.link.bridge.pfil_bridge Set to 1 to enable filtering on the 
bridge

interface1


No one has any feedback on L7 that and v.2.0.RC1 ?

Here is some feedback on my experience with the L7 filter:

With this morning's snapshot (05/04/2011 approximately 06:00 EST was 
the

time I initiated a snapshot update), I have experienced the L7 filter
significantly slowing web traffic on a system containing Squid and
Squidguard once there were more than a couple of users sending traffic
through the firewall.  Disabling the firewall rule passing traffic 
to the L7
filter eliminated the bottleneck.   Hardware is a a Core 2 Duo 
Processor, 4
Gigs memory, Supermicro Server Board, Intel Server NIC's.  Also, no 
other
traffic shaping other than a single L7 filter rule to block 
peer-to-peer

traffic was enabled.


I would recommend putting a firewall rule to send traffic to layer 7
on the outging side when squid is in place
or either just filter the tcp 80/443 through squid and the other
through layer7 with rules on the lan side.




That's a good idea.  Squid is running on the pfsense box, however, so 
I'm not sure I can create explicit rules for either option.  Maybe 
send ports 80 and 443 to 127.0.0.1?




On an alix system with a 2.0 RC1 update from last night (Wednesday 
5/5/2011) and no squid or squidguard installed, the L7 filter set to 
block several peer-to-peer protocols completely bogged down Internet 
access, effectively disabling web, mail, and other traffic.  Disabling 
the LAN rule that activated the L7 filter on that interface instantly 
re-enabled the normal passage of traffic.




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] L7 queue seems not to work

2011-05-04 Thread Vaughn L. Reid III



On 4/29/2011 4:49 PM, bsd wrote:

Le 29 avr. 2011 à 19:08, bsd a écrit :


Le 29 avr. 2011 à 09:37, bsd a écrit :


Hi,

I have created a simple L7 container where I have put SIP and SkypeOut traffic.

Then created a Queue called VoIP where this traffic is supposed to end (HFSC 
with 10% reserved).

Then two floating rule to put all traffic (TCP and UDP) in and selected the 
VoIP L7 container I have created.


No traffic seems to go in that queue ??

Any hints ?
Is L7 traffic shapping Out of order for the time beeing ?


Thanks.

May I had that my WLAN and LAN are bridged …
If this has any impact on the L7 Queuing.

… and that my other queue (non L7) are also working very correctly.


Thx.

And the system tunables have been set correctly…

net.link.bridge.pfil_member Set to 0 to disable filtering on the incoming 
and outgoing member interfaces.   0   
net.link.bridge.pfil_bridge Set to 1 to enable filtering on the bridge 
interface1


No one has any feedback on L7 that and v.2.0.RC1 ?


Here is some feedback on my experience with the L7 filter:

With this morning's snapshot (05/04/2011 approximately 06:00 EST was the 
time I initiated a snapshot update), I have experienced the L7 filter 
significantly slowing web traffic on a system containing Squid and 
Squidguard once there were more than a couple of users sending traffic 
through the firewall.  Disabling the firewall rule passing traffic to 
the L7 filter eliminated the bottleneck.   Hardware is a a Core 2 Duo 
Processor, 4 Gigs memory, Supermicro Server Board, Intel Server NIC's.  
Also, no other traffic shaping other than a single L7 filter rule to 
block peer-to-peer traffic was enabled.


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] L7 queue seems not to work

2011-05-04 Thread Vaughn L. Reid III



On 5/4/2011 11:18 AM, Ermal Luçi wrote:

On Wed, May 4, 2011 at 4:47 PM, Vaughn L. Reid III
vaughn_reid_...@elitemail.org  wrote:


On 4/29/2011 4:49 PM, bsd wrote:

Le 29 avr. 2011 à 19:08, bsd a écrit :


Le 29 avr. 2011 à 09:37, bsd a écrit :


Hi,

I have created a simple L7 container where I have put SIP and SkypeOut
traffic.

Then created a Queue called VoIP where this traffic is supposed to end
(HFSC with 10% reserved).

Then two floating rule to put all traffic (TCP and UDP) in and selected
the VoIP L7 container I have created.


No traffic seems to go in that queue ??

Any hints ?
Is L7 traffic shapping Out of order for the time beeing ?


Thanks.

May I had that my WLAN and LAN are bridged …
If this has any impact on the L7 Queuing.

… and that my other queue (non L7) are also working very correctly.


Thx.

And the system tunables have been set correctly…

net.link.bridge.pfil_member Set to 0 to disable filtering on the
incoming and outgoing member interfaces.   0
net.link.bridge.pfil_bridge Set to 1 to enable filtering on the bridge
interface1


No one has any feedback on L7 that and v.2.0.RC1 ?

Here is some feedback on my experience with the L7 filter:

With this morning's snapshot (05/04/2011 approximately 06:00 EST was the
time I initiated a snapshot update), I have experienced the L7 filter
significantly slowing web traffic on a system containing Squid and
Squidguard once there were more than a couple of users sending traffic
through the firewall.  Disabling the firewall rule passing traffic to the L7
filter eliminated the bottleneck.   Hardware is a a Core 2 Duo Processor, 4
Gigs memory, Supermicro Server Board, Intel Server NIC's.  Also, no other
traffic shaping other than a single L7 filter rule to block peer-to-peer
traffic was enabled.


I would recommend putting a firewall rule to send traffic to layer 7
on the outging side when squid is in place
or either just filter the tcp 80/443 through squid and the other
through layer7 with rules on the lan side.




That's a good idea.  Squid is running on the pfsense box, however, so 
I'm not sure I can create explicit rules for either option.  Maybe send 
ports 80 and 443 to 127.0.0.1?


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-03-11 Thread Vaughn L. Reid III



On 2/10/2011 7:58 PM, Vaughn L. Reid III wrote:



On 2/10/2011 7:30 PM, Moshe Katz wrote:
Is your ISP Verizon?  We have had many ARP issues with Verizon FIOS. 
 For our pfSense box to get all of our IPs, we have to manually set 
each of the IPs as the WAN IP (one by one), then set up the Virtual 
IP settings after we do that.


Moshe

--
Moshe Katz
-- mo...@ymkatz.net mailto:mo...@ymkatz.net
-- +1(301)867-3732



On Thu, Feb 10, 2011 at 7:19 PM, Vaughn L. Reid III 
vaughn_reid_...@elitemail.org 
mailto:vaughn_reid_...@elitemail.org wrote:




On 2/10/2011 12:57 PM, Evgeny Yurchenko wrote:

On 11-02-10 11:07 AM, Vaughn L. Reid III wrote:



On 2/10/2011 10:42 AM, Vaughn L. Reid III wrote:



On 2/10/2011 9:32 AM, Vaughn L. Reid III wrote:

On 2/10/2011 2:43 AM, Seth Mos wrote:

Op 10-2-2011 4:18, Vaughn L. Reid III schreef:




1. All the Master and backup status
notifications in the web interface
on both PFSense boxes show the correct status
2. I'll do a packet capture tomorrow and
see if the carp-heartbeat shows up

I was unaware that any Carp related
traffic passed between any of the
interfaces except the one designated as
the synchronization interface. I
need to double-check the multi-cast
configuration on the switch tomorrow
also ( I think I have multi-cast enabled
on the switch, but need to
confirm that).


Yes, some switch support multicast filtering,
I know from experience with HP switches that
it works with the setting on. So I know they
have it implemented correctly. This way not
all switch ports get the carp traffic unless
they participate in the multicast group. This
cuts down on broadcast a lot.

I recommend the HP switches, they have never
given me any grief as long as I've worked
with them. I even have a carp cluster
spanning 2 building across the street over a
fiber connection. It just works.

If you need a managed switch on a budget I
can confirm that the HP Procurve 1810-8G
works well. It's web managed, supports vlans
and basic traffic counters. It is also fanless.

The smallest I have in use on a carp cluster
is a Procurcve 2650 in combination with a
2900-48G. The biggest I have is a 8212zl. Do
note that the software in the 1810 differs a
lot from the other managed switches.

Regards,

Seth


-
To unsubscribe, e-mail:
support-unsubscr...@pfsense.com
mailto:support-unsubscr...@pfsense.com
For additional commands, e-mail:
support-h...@pfsense.com
mailto:support-h...@pfsense.com

Commercial support available -
https://portal.pfsense.org



I've run a packet capture and here are the results:

1.  Capture shows a bunch of VRRP announcements
from the primary firewall to destination
224.0.0.18.  The destination confirms this is a
multicast address I  believe.  According to
Wikipedia, VRRP and CARP share the same protocol
number.  So, I believe that these are CARP
announcements.

2.  All the VRRP requests had a vrrp.prio value
of 0 with a description of Priority: 0 (Current
Master has stopped participating in VRRP)

3.  Over a 114 second capture, there were no VRRP
announcements from the secondary firewall.

4.  There were lots of ARP broadcast requests
from the secondary firewall asking for who has
the IP of the default gateway.  There were 0 ARP
requests from the primary firewall during the
capture period

Re: [pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-02-10 Thread Vaughn L. Reid III

On 2/10/2011 2:43 AM, Seth Mos wrote:

Op 10-2-2011 4:18, Vaughn L. Reid III schreef:






1. All the Master and backup status notifications in the web interface
on both PFSense boxes show the correct status
2. I'll do a packet capture tomorrow and see if the carp-heartbeat 
shows up


I was unaware that any Carp related traffic passed between any of the
interfaces except the one designated as the synchronization interface. I
need to double-check the multi-cast configuration on the switch tomorrow
also ( I think I have multi-cast enabled on the switch, but need to
confirm that).


Yes, some switch support multicast filtering, I know from experience 
with HP switches that it works with the setting on. So I know they 
have it implemented correctly. This way not all switch ports get the 
carp traffic unless they participate in the multicast group. This cuts 
down on broadcast a lot.


I recommend the HP switches, they have never given me any grief as 
long as I've worked with them. I even have a carp cluster spanning 2 
building across the street over a fiber connection. It just works.


If you need a managed switch on a budget I can confirm that the HP 
Procurve 1810-8G works well. It's web managed, supports vlans and 
basic traffic counters. It is also fanless.


The smallest I have in use on a carp cluster is a Procurcve 2650 in 
combination with a 2900-48G. The biggest I have is a 8212zl. Do note 
that the software in the 1810 differs a lot from the other managed 
switches.


Regards,

Seth

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



I've run a packet capture and here are the results:

1.  Capture shows a bunch of VRRP announcements from the primary 
firewall to destination 224.0.0.18.  The destination confirms this is a 
multicast address I  believe.  According to Wikipedia, VRRP and CARP 
share the same protocol number.  So, I believe that these are CARP 
announcements.


2.  All the VRRP requests had a vrrp.prio value of 0 with a description 
of Priority: 0 (Current Master has stopped participating in VRRP)


3.  Over a 114 second capture, there were no VRRP announcements from the 
secondary firewall.


4.  There were lots of ARP broadcast requests from the secondary 
firewall asking for who has the IP of the default gateway.  There were 0 
ARP requests from the primary firewall during the capture period.


5.  There were lots of ICMP pings from both the primary and secondary 
Pfsense firewalls to the default gateway on this WAN interface.  I 
assume this is from the Load Balance Fail-Over configuration I have 
enabled for the cluster on this interface.


I confirmed that the Master firewall shows itself as Master for all 
interfaces.  I confirmed that the Secondary firewall shows itself as 
Backup for all interfaces.




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-02-10 Thread Vaughn L. Reid III



On 2/10/2011 9:32 AM, Vaughn L. Reid III wrote:

On 2/10/2011 2:43 AM, Seth Mos wrote:

Op 10-2-2011 4:18, Vaughn L. Reid III schreef:






1. All the Master and backup status notifications in the web interface
on both PFSense boxes show the correct status
2. I'll do a packet capture tomorrow and see if the carp-heartbeat 
shows up


I was unaware that any Carp related traffic passed between any of the
interfaces except the one designated as the synchronization 
interface. I
need to double-check the multi-cast configuration on the switch 
tomorrow

also ( I think I have multi-cast enabled on the switch, but need to
confirm that).


Yes, some switch support multicast filtering, I know from experience 
with HP switches that it works with the setting on. So I know they 
have it implemented correctly. This way not all switch ports get the 
carp traffic unless they participate in the multicast group. This 
cuts down on broadcast a lot.


I recommend the HP switches, they have never given me any grief as 
long as I've worked with them. I even have a carp cluster spanning 2 
building across the street over a fiber connection. It just works.


If you need a managed switch on a budget I can confirm that the HP 
Procurve 1810-8G works well. It's web managed, supports vlans and 
basic traffic counters. It is also fanless.


The smallest I have in use on a carp cluster is a Procurcve 2650 in 
combination with a 2900-48G. The biggest I have is a 8212zl. Do note 
that the software in the 1810 differs a lot from the other managed 
switches.


Regards,

Seth

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



I've run a packet capture and here are the results:

1.  Capture shows a bunch of VRRP announcements from the primary 
firewall to destination 224.0.0.18.  The destination confirms this is 
a multicast address I  believe.  According to Wikipedia, VRRP and CARP 
share the same protocol number.  So, I believe that these are CARP 
announcements.


2.  All the VRRP requests had a vrrp.prio value of 0 with a 
description of Priority: 0 (Current Master has stopped participating 
in VRRP)


3.  Over a 114 second capture, there were no VRRP announcements from 
the secondary firewall.


4.  There were lots of ARP broadcast requests from the secondary 
firewall asking for who has the IP of the default gateway.  There were 
0 ARP requests from the primary firewall during the capture period.


5.  There were lots of ICMP pings from both the primary and secondary 
Pfsense firewalls to the default gateway on this WAN interface.  I 
assume this is from the Load Balance Fail-Over configuration I have 
enabled for the cluster on this interface.


I confirmed that the Master firewall shows itself as Master for all 
interfaces.  I confirmed that the Secondary firewall shows itself as 
Backup for all interfaces.




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



I performed a second capture of 3 minutes on malfunctioning WAN and 
noted identical results for the VRRP/CARP packets.  On the second 
capture, however, I did see ARP requests from both firewalls asking for 
the MAC of the IP of the Default Gateway -- this was different from my 
item number 4 in the previous post.


I also performed a 3 minute packet capture from one of the known working 
WAN connections on the cluster.  The VRRP packets on that connection 
showed an origination address of the Real IP on primary/Master 
firewall and a multi-cast destination, just like the results from the 
problem WAN connection.  I also noted that the vrrp.prio value and 
description was the same on the working WAN as on the not-working WAN.


Both the working WAN connection packet capture and the non-Working WAN 
packet captures show IGMP packets noting the entering and leaving of 
multi-cast groups.




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-02-10 Thread Vaughn L. Reid III



On 2/10/2011 10:42 AM, Vaughn L. Reid III wrote:



On 2/10/2011 9:32 AM, Vaughn L. Reid III wrote:

On 2/10/2011 2:43 AM, Seth Mos wrote:

Op 10-2-2011 4:18, Vaughn L. Reid III schreef:






1. All the Master and backup status notifications in the web interface
on both PFSense boxes show the correct status
2. I'll do a packet capture tomorrow and see if the carp-heartbeat 
shows up


I was unaware that any Carp related traffic passed between any of the
interfaces except the one designated as the synchronization 
interface. I
need to double-check the multi-cast configuration on the switch 
tomorrow

also ( I think I have multi-cast enabled on the switch, but need to
confirm that).


Yes, some switch support multicast filtering, I know from experience 
with HP switches that it works with the setting on. So I know they 
have it implemented correctly. This way not all switch ports get the 
carp traffic unless they participate in the multicast group. This 
cuts down on broadcast a lot.


I recommend the HP switches, they have never given me any grief as 
long as I've worked with them. I even have a carp cluster spanning 2 
building across the street over a fiber connection. It just works.


If you need a managed switch on a budget I can confirm that the HP 
Procurve 1810-8G works well. It's web managed, supports vlans and 
basic traffic counters. It is also fanless.


The smallest I have in use on a carp cluster is a Procurcve 2650 in 
combination with a 2900-48G. The biggest I have is a 8212zl. Do note 
that the software in the 1810 differs a lot from the other managed 
switches.


Regards,

Seth

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



I've run a packet capture and here are the results:

1.  Capture shows a bunch of VRRP announcements from the primary 
firewall to destination 224.0.0.18.  The destination confirms this is 
a multicast address I  believe.  According to Wikipedia, VRRP and 
CARP share the same protocol number.  So, I believe that these are 
CARP announcements.


2.  All the VRRP requests had a vrrp.prio value of 0 with a 
description of Priority: 0 (Current Master has stopped participating 
in VRRP)


3.  Over a 114 second capture, there were no VRRP announcements from 
the secondary firewall.


4.  There were lots of ARP broadcast requests from the secondary 
firewall asking for who has the IP of the default gateway.  There 
were 0 ARP requests from the primary firewall during the capture period.


5.  There were lots of ICMP pings from both the primary and secondary 
Pfsense firewalls to the default gateway on this WAN interface.  I 
assume this is from the Load Balance Fail-Over configuration I have 
enabled for the cluster on this interface.


I confirmed that the Master firewall shows itself as Master for all 
interfaces.  I confirmed that the Secondary firewall shows itself as 
Backup for all interfaces.




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



I performed a second capture of 3 minutes on malfunctioning WAN and 
noted identical results for the VRRP/CARP packets.  On the second 
capture, however, I did see ARP requests from both firewalls asking 
for the MAC of the IP of the Default Gateway -- this was different 
from my item number 4 in the previous post.


I also performed a 3 minute packet capture from one of the known 
working WAN connections on the cluster.  The VRRP packets on that 
connection showed an origination address of the Real IP on 
primary/Master firewall and a multi-cast destination, just like the 
results from the problem WAN connection.  I also noted that the 
vrrp.prio value and description was the same on the working WAN as on 
the not-working WAN.


Both the working WAN connection packet capture and the non-Working WAN 
packet captures show IGMP packets noting the entering and leaving of 
multi-cast groups.




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



One more thing.  If I unplug the connection that leads to the ISP's 
black box  from the switch and leave everything else in place, pings 
from the secondary/backup firewall to the CARP start working as expected.


I'm not sure I understand this behavior.  With 2 IP addresses on the 
same subnet that can communicate with each other on the same VLAN of a 
switch, it seems to me that it shouldn't matter what else I plug into 
that switch (as long as it has a different IP and as long as it is not 
doing some

Re: [pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-02-10 Thread Vaughn L. Reid III



On 2/10/2011 12:57 PM, Evgeny Yurchenko wrote:

On 11-02-10 11:07 AM, Vaughn L. Reid III wrote:



On 2/10/2011 10:42 AM, Vaughn L. Reid III wrote:



On 2/10/2011 9:32 AM, Vaughn L. Reid III wrote:

On 2/10/2011 2:43 AM, Seth Mos wrote:

Op 10-2-2011 4:18, Vaughn L. Reid III schreef:





1. All the Master and backup status notifications in the web 
interface

on both PFSense boxes show the correct status
2. I'll do a packet capture tomorrow and see if the 
carp-heartbeat shows up


I was unaware that any Carp related traffic passed between any of 
the
interfaces except the one designated as the synchronization 
interface. I
need to double-check the multi-cast configuration on the switch 
tomorrow

also ( I think I have multi-cast enabled on the switch, but need to
confirm that).


Yes, some switch support multicast filtering, I know from 
experience with HP switches that it works with the setting on. So 
I know they have it implemented correctly. This way not all switch 
ports get the carp traffic unless they participate in the 
multicast group. This cuts down on broadcast a lot.


I recommend the HP switches, they have never given me any grief as 
long as I've worked with them. I even have a carp cluster spanning 
2 building across the street over a fiber connection. It just works.


If you need a managed switch on a budget I can confirm that the HP 
Procurve 1810-8G works well. It's web managed, supports vlans and 
basic traffic counters. It is also fanless.


The smallest I have in use on a carp cluster is a Procurcve 2650 
in combination with a 2900-48G. The biggest I have is a 8212zl. Do 
note that the software in the 1810 differs a lot from the other 
managed switches.


Regards,

Seth

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



I've run a packet capture and here are the results:

1.  Capture shows a bunch of VRRP announcements from the primary 
firewall to destination 224.0.0.18.  The destination confirms this 
is a multicast address I  believe.  According to Wikipedia, VRRP 
and CARP share the same protocol number.  So, I believe that these 
are CARP announcements.


2.  All the VRRP requests had a vrrp.prio value of 0 with a 
description of Priority: 0 (Current Master has stopped 
participating in VRRP)


3.  Over a 114 second capture, there were no VRRP announcements 
from the secondary firewall.


4.  There were lots of ARP broadcast requests from the secondary 
firewall asking for who has the IP of the default gateway.  There 
were 0 ARP requests from the primary firewall during the capture 
period.


5.  There were lots of ICMP pings from both the primary and 
secondary Pfsense firewalls to the default gateway on this WAN 
interface.  I assume this is from the Load Balance Fail-Over 
configuration I have enabled for the cluster on this interface.


I confirmed that the Master firewall shows itself as Master for all 
interfaces.  I confirmed that the Secondary firewall shows itself 
as Backup for all interfaces.




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



I performed a second capture of 3 minutes on malfunctioning WAN and 
noted identical results for the VRRP/CARP packets.  On the second 
capture, however, I did see ARP requests from both firewalls asking 
for the MAC of the IP of the Default Gateway -- this was different 
from my item number 4 in the previous post.


I also performed a 3 minute packet capture from one of the known 
working WAN connections on the cluster.  The VRRP packets on that 
connection showed an origination address of the Real IP on 
primary/Master firewall and a multi-cast destination, just like the 
results from the problem WAN connection.  I also noted that the 
vrrp.prio value and description was the same on the working WAN as 
on the not-working WAN.


Both the working WAN connection packet capture and the non-Working 
WAN packet captures show IGMP packets noting the entering and 
leaving of multi-cast groups.




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



One more thing.  If I unplug the connection that leads to the ISP's 
black box  from the switch and leave everything else in place, pings 
from the secondary/backup firewall to the CARP start working as 
expected.


I'm not sure I understand this behavior.  With 2 IP addresses on the 
same subnet that can communicate with each other on the same VLAN of 
a switch, it seems to me that it shouldn't matter what

Re: [pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-02-10 Thread Vaughn L. Reid III



On 2/10/2011 7:30 PM, Moshe Katz wrote:
Is your ISP Verizon?  We have had many ARP issues with Verizon FIOS. 
 For our pfSense box to get all of our IPs, we have to manually set 
each of the IPs as the WAN IP (one by one), then set up the Virtual IP 
settings after we do that.


Moshe

--
Moshe Katz
-- mo...@ymkatz.net mailto:mo...@ymkatz.net
-- +1(301)867-3732



On Thu, Feb 10, 2011 at 7:19 PM, Vaughn L. Reid III 
vaughn_reid_...@elitemail.org mailto:vaughn_reid_...@elitemail.org 
wrote:




On 2/10/2011 12:57 PM, Evgeny Yurchenko wrote:

On 11-02-10 11:07 AM, Vaughn L. Reid III wrote:



On 2/10/2011 10:42 AM, Vaughn L. Reid III wrote:



On 2/10/2011 9:32 AM, Vaughn L. Reid III wrote:

On 2/10/2011 2:43 AM, Seth Mos wrote:

Op 10-2-2011 4:18, Vaughn L. Reid III schreef:




1. All the Master and backup status
notifications in the web interface
on both PFSense boxes show the correct status
2. I'll do a packet capture tomorrow and
see if the carp-heartbeat shows up

I was unaware that any Carp related
traffic passed between any of the
interfaces except the one designated as
the synchronization interface. I
need to double-check the multi-cast
configuration on the switch tomorrow
also ( I think I have multi-cast enabled
on the switch, but need to
confirm that).


Yes, some switch support multicast filtering,
I know from experience with HP switches that
it works with the setting on. So I know they
have it implemented correctly. This way not
all switch ports get the carp traffic unless
they participate in the multicast group. This
cuts down on broadcast a lot.

I recommend the HP switches, they have never
given me any grief as long as I've worked with
them. I even have a carp cluster spanning 2
building across the street over a fiber
connection. It just works.

If you need a managed switch on a budget I can
confirm that the HP Procurve 1810-8G works
well. It's web managed, supports vlans and
basic traffic counters. It is also fanless.

The smallest I have in use on a carp cluster
is a Procurcve 2650 in combination with a
2900-48G. The biggest I have is a 8212zl. Do
note that the software in the 1810 differs a
lot from the other managed switches.

Regards,

Seth


-
To unsubscribe, e-mail:
support-unsubscr...@pfsense.com
mailto:support-unsubscr...@pfsense.com
For additional commands, e-mail:
support-h...@pfsense.com
mailto:support-h...@pfsense.com

Commercial support available -
https://portal.pfsense.org



I've run a packet capture and here are the results:

1.  Capture shows a bunch of VRRP announcements
from the primary firewall to destination
224.0.0.18.  The destination confirms this is a
multicast address I  believe.  According to
Wikipedia, VRRP and CARP share the same protocol
number.  So, I believe that these are CARP
announcements.

2.  All the VRRP requests had a vrrp.prio value of
0 with a description of Priority: 0 (Current
Master has stopped participating in VRRP)

3.  Over a 114 second capture, there were no VRRP
announcements from the secondary firewall.

4.  There were lots of ARP broadcast requests from
the secondary firewall asking for who has the IP
of the default gateway.  There were 0 ARP requests
from the primary firewall during the capture period.

5.  There were lots of ICMP pings from both

[pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-02-09 Thread Vaughn L. Reid III
I've got a PfSense version 1.2.3 cluster at a Public Library customer 
connected to 6 WAN links.


The first 5 are connected as VLANS through a TP-Link SL3428 switch then 
to an ISP provided Router (4 ATT ADSL links each with a Netopia ADSL 
router and a Fiber Link with a Cisco 2800 series router).   These 5 WAN 
links are all configured identically (except for IP, etc.) and have 
worked beautifully for 2 or 3 years).  The first 5 WAN's all go out the 
same Intel server interface.  The 6th connection goes out a second Intel 
server interface (There are 6 physical Intel server gigabit interfaces 
on the machines all together -- 4 onboard plus 1 dual port PCI-X card).


Illustration:

WAN Connections 1 through 5
Pfsense Cluster --- VLAN Trunk --- TP-Link Managed Switch --- Switch 
Ports out to each Provider on a different VLAN's (port to provider in 
access mode not tagged) --- Provider's Router -- Internet  
Everything Works!!!


WAN Connection 6
Pfsense cluster -- VLAN Trunk -- D-Link Managed Switch -- Switch Port 
out to the Provider (port to provider in access mode not tagged)   
Provider's On-Site Black Box/Fiber Converter (can't get any details 
about what's in it) -- Nothing!!!


The Library has recently decided to replace the ADSL links with a 
fiber-to-your door Internet connection.  For redundancy, I've set this 
up to run through a D-Link DGS 3200-10 managed switch.  I this 
connection configured identically to the other 5 working connections 
except ISP specific things like netmask and IP address.  I cannot, for 
the life of me, get this 6th connection to work correctly.


I've been doing some troubleshooting for bit now and have noticed some 
items that might be helpful on this 6th WAN connection.


Address Learning enabled on the Switch (default setting):
1.  If I leave MAC address learning on on the D-Link switch, the Carp 
Master can ping its real IP address, can ping its CARP IP address, and 
can ping the fail-over PfSense
2.  The fail-over Pfsense server can ping its own real IP, can ping the 
Carp Master's real IP, but cannot ping the CARP IP.
3.  When I first boot the switch, I can usually ping the CARP IP from 
the fail-over box 1 time before pings start timing out.
4.  From a remote location, I am able to ping the real IP of both boxes, 
but I cannot ping the CARP IP.

5.  Both boxes can ping the ISP's default gateway.

Address Learning disabled on the Switch:
1.  Both PFSense boxes can ping each other, and both can ping the CARP IP.
2.  Neither can ping the ISP's IP address.
3.  From a remote location, I am unable to ping any of the boxes on the 
6th ISP interface.


I've tried this connection through the same switch without VLAN's 
enabled for this connection and still have no connectivity through this 
provider.  If I plug in a laptop directly to the switch and use any of 
the 3 IP's in question, I have a good Internet connection.


On the D-Link Switch, Spanning Tree is disabled.  The ports containing 
the PFSense box links are tagged VLAN trunks with no untagged ports 
allowed.  The port leading to the ISP is an untagged VLAN that is only a 
member of 1 VLAN.  I know I could set this up without fussing with the 
VLANS, but I wanted to be consistent between the 2 switches.


I believe this is a switch related issue and not a PFSense related issue 
directly.  I am hesitant to run this connection through the other 
managed switch because I'm looking for redundancy.  If anyone has any 
suggestions about where my problem may be, I'd really appreciate the help.


Thanks!

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-02-09 Thread Vaughn L. Reid III

According to page 15 of the reference manual address learning is:

Enable or disable MAC address learning for the selected ports. When 
Enabled, destination and
source MAC addresses are automatically listed in the forwarding table. 
When address learning
is Disabled, MAC addresses must be manually entered into the forwarding 
table. This is
sometimes done for reasons of security or efficiency. See the section on 
Forwarding/Filtering
for information on entering MAC addresses into the forwarding table. The 
default setting is

Enabled.



One other thing.  I need to note that I have dedicated a CARP interface 
on each Pfsense box connected to each over via a cross-over cable.




On 2/9/2011 2:35 PM, e...@tm-k.com wrote:

[snip]

Address Learning enabled on the Switch (default setting):

[snip]
Can you briefly explain what 'address learning' is according to D-Link?


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-02-09 Thread Vaughn L. Reid III
My understanding of forwarding also was that address learning is a 
normal part of switch operation.  But, I find it odd that turning that 
off lets the fail-over box ping the CARP IP on the primary box, with 
address learning on, I am unable to do that.


A clarification about the Carp setup -- Each PfSense server has a 
dedicated interface connected to each other via a crossover cable.  This 
is the interface that is configured to send and receive pfsync and its 
related traffic in the carp setup page.  The firewall rules for this 
dedicated interface on each server are to allow all traffic on the 
interface.


With a dedicated interface for the Carp related stuff to use, do the 
other interfaces still send and receive multi-cast pfsync traffic?




On 2/9/2011 5:10 PM, David Newman wrote:

On 2/9/11 1:12 PM, Vaughn L. Reid III wrote:

According to page 15 of the reference manual address learning is:

Enable or disable MAC address learning for the selected ports. When
Enabled, destination and
source MAC addresses are automatically listed in the forwarding table.
When address learning
is Disabled, MAC addresses must be manually entered into the forwarding
table. This is
sometimes done for reasons of security or efficiency. See the section on
Forwarding/Filtering
for information on entering MAC addresses into the forwarding table. The
default setting is
Enabled.


This just means the switch dynamically learns the source MAC of each
attached device. 99.999 percent of all switches on the market have
dynamic MAC learning enabled. This isn't the problem.




One other thing.  I need to note that I have dedicated a CARP interface
on each Pfsense box connected to each over via a cross-over cable.

Sorry, I don't completely understand your CARP setup. I too use a
crossover cable between pairs of boxes but that's for pfsync, not CARP.
pfsync migrates table state between pf boxes; CARP is for redundant
sharing of a virtual IP address among multiple pf boxes, and would be of
little use on a network consisting of a crossover cable.

IIRC CARP uses multicast addressing for its keepalive messages. You
might also want to verify that the switch is configured to forward
multicast.

dn









On 2/9/2011 2:35 PM, e...@tm-k.com wrote:

[snip]

Address Learning enabled on the Switch (default setting):

[snip]
Can you briefly explain what 'address learning' is according to D-Link?


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-02-09 Thread Vaughn L. Reid III



On 2/9/2011 9:20 PM, Evgeny Yurchenko wrote:




On 2/9/2011 2:35 PM, e...@tm-k.com wrote:

[snip]

Address Learning enabled on the Switch (default setting):

[snip]
Can you briefly explain what 'address learning' is according to D-Link?


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org




On 11-02-09 04:12 PM, Vaughn L. Reid III wrote:

According to page 15 of the reference manual address learning is:

Enable or disable MAC address learning for the selected ports. When 
Enabled, destination and
source MAC addresses are automatically listed in the forwarding 
table. When address learning
is Disabled, MAC addresses must be manually entered into the 
forwarding table. This is
sometimes done for reasons of security or efficiency. See the section 
on Forwarding/Filtering
for information on entering MAC addresses into the forwarding table. 
The default setting is

Enabled.



One other thing.  I need to note that I have dedicated a CARP 
interface on each Pfsense box connected to each over via a cross-over 
cable.



Please do not top-post.
So Address Learing should be enabled.
1) do you see one box as stand-by, another one as active in 
web-interface?
2) connect laptop instead of ISP's cable and run packet capture you 
should be able to see once a second carp-heartbeat (multicast mac + 
carp IP in destination field).


If one pfSense shows Active, another one shows Stand-by and on the 
laptop you see heartbeat from only one (master) pfSense then you did 
not mess up with carp configuration and vlans on the switch.


Evgeny.



1.  All the Master and backup status notifications in the web interface 
on both PFSense boxes show the correct status

2.  I'll do a packet capture tomorrow and see if the carp-heartbeat shows up

I was unaware that any Carp related traffic passed between any of the 
interfaces except the one designated as the synchronization interface.  
I need to double-check the multi-cast configuration on the switch 
tomorrow also ( I think I have multi-cast enabled on the switch, but 
need to confirm that).


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] CARP IP Not Registering MAC Address or Switch Disregarding CARP MAC Address -- Maybe???

2011-02-09 Thread Vaughn L. Reid III



On 2/9/2011 10:09 PM, Chris Buechler wrote:

On Wed, Feb 9, 2011 at 8:51 PM, Vaughn L. Reid III
vaughn_reid_...@elitemail.org  wrote:

My understanding of forwarding also was that address learning is a normal
part of switch operation.  But, I find it odd that turning that off lets the
fail-over box ping the CARP IP on the primary box, with address learning on,
I am unable to do that.

A clarification about the Carp setup -- Each PfSense server has a dedicated
interface connected to each other via a crossover cable.  This is the
interface that is configured to send and receive pfsync and its related
traffic in the carp setup page.  The firewall rules for this dedicated
interface on each server are to allow all traffic on the interface.

With a dedicated interface for the Carp related stuff to use, do the other
interfaces still send and receive multi-cast pfsync traffic?


No but they send the multicast CARP traffic on all interfaces where a
CARP IP resides.



Thanks for this clarification.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Possible DHCP Server Failover Error?

2009-05-26 Thread Vaughn L. Reid III
I have now had an unexpected dhcp server behavior occur twice on a 
pfsense cluster when a power supply has malfunctioned and caused one 
pfsense device to go offline.  Here are the details.


Hardware Setup:
2 Server grade servers running pfsense 1.2.3RC1 with Intel Nics, dual 
core processors with the smp pfsense kernel, and 4 gigabytes of RAM.  
Multiple WAN links using tagged VLAN's.  Multiple LAN links using tagged 
VLAN's.  CARP enabled.  DHCP Server enabled on both firewalls with 
failover DHCP peer setup enabled.  On each device, the failover peer in 
the DHCP server setup is the real interface IP for the other firewall on 
that particular interface.  For example, on pfsense1 LAN interface, the 
failover DHCP peer is pfsense2 real LAN IP.  On pfsense2 LAN, the 
failover DHCP peer is pfsense1 real LAN IP.  These two machines usually 
operate with 4000 to 7000 total active states from 75 to 130 nodes on 
the LAN side at any given time.


Normal DHCP Messages:
During normal operation with both firewalls functioning, both devices 
show My State -- Normal and Peer State -- Normal in the DHCP Status 
page.



Possible DHCP Error:
When one of the pfsense firewalls goes off-line unexpectedly (e.g. due 
to power failure on one of the devices, etc.), the DHCP server on the 
remaining unit shows unexpected behavior.  First, the status of the 
remaining DHCP server shows My State -- Communications Interrupted and 
Peer State -- Normal.  Second, initially, DHCP leases renew, but seem 
to take much longer than normal to get served to clients.  After a long 
period of having only one active firewall, however, DHCP leases seem to 
stop getting handed-out, or the client's dhcp acquisition process times 
out before the remaining firewall answers the DHCP request.


-Vaughn Reid III



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Re: Intel Atom Install Trouble

2009-03-31 Thread Vaughn L. Reid III
I reset the jetway dual-core atom board's bios to optimized defaults.  
The board rebooted and worked like a charm.


Thanks for everyone's help and advice.

VRIII



On 3/30/2009 6:44 PM, Dave Warren wrote:

In message49d1326b.3050...@elitemail.org  Vaughn L. Reid III
vaughn_reid_...@elitemail.org  was claimed to
have wrote:

   

I have a Intel Atom based board that I'm trying to get pfsense to
install on.  I can boot fine into safe mode but I get a panic message
when I try the default boot config.  I can reproduce this from both the
pfsense ISO and after an actual install onto the hard drive.  I'm trying
to install 1.2.3 (downloaded today).
 


This is a shot in the dark, but try resetting the BIOS to it's defaults
and see if you've got any luck.

I've got an Atom 330 based system (Sorry, I don't have the mobo or
chipset details handy, beyond to say it's a Intel mobo) that panics
during the install based on some combination of BIOS options that I
don't entirely recall.

I have reason to believe there are some ACPI issues but haven't had the
time to track it down, but at this point if I disable ACPI I can't even
boot the system, it locks immediately after the Highpoint driver (I
don't use any Highpoint cards in this machine), and ACPI needs to be
enabled for the system to even boot.

Beyond the initial hardware configuration fun, it has been rock solid.


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org

   


[pfSense Support] Intel Atom Install Trouble

2009-03-30 Thread Vaughn L. Reid III
I have a Intel Atom based board that I'm trying to get pfsense to 
install on.  I can boot fine into safe mode but I get a panic message 
when I try the default boot config.  I can reproduce this from both the 
pfsense ISO and after an actual install onto the hard drive.  I'm trying 
to install 1.2.3 (downloaded today).


I've searched both the forum and the support mailing list archives for 
kernel panic, intel atom, bootloader.conf, and mptable_walk_table but 
didn't receive any helpful results.  A google search of the error 
message listed below shows several links that lead to a C programming 
language file called mptable.c


Here's the message:
panic mptable_walk_table: Unknown MP Config Entry 194

Here are the board's specs and hardware configuration:
Jetway Manufacturer
Intel Atom dual core 1.6 ghz processor
2 gigabytes RAM
Sata Drive
3 realtek 8110 PCI NICs on daughter board
1 realtek 8119 PCI-Express onboard Nic -- disabled in bios
Onboard Audio -- disabled in  bios
ACPI -- disabled in bios
USB 2.0 -- disabled in bios
Floppy Drive -- disabled in bios
SATA Generation 1 -- forced in bios (the hard drive is only 1st 
generation hardware, but just to be sure)


Does anyone have any suggestions that I might find helpful to get this 
system to boot the default pfsense?


Thanks for your assistance.



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Intel Atom Install Trouble

2009-03-30 Thread Vaughn L. Reid III

Thanks for the link to the FreeBSD issue reporting article.

Where do I find the bootloader arguments that are added to a safe mode 
pfsense boot versus a normal boot.  I would like to play around with 
some bootloader options to see what, in particular, needs to be turned 
off to get the boot message.




Chris Buechler wrote:

On Mon, Mar 30, 2009 at 4:58 PM, Vaughn L. Reid III
vaughn_reid_...@elitemail.org wrote:
  

I have a Intel Atom based board that I'm trying to get pfsense to install
on.  I can boot fine into safe mode but I get a panic message when I try the
default boot config.  I can reproduce this from both the pfsense ISO and
after an actual install onto the hard drive.



Sounds like you've tried the usual. You'll probably have to report it
to a FreeBSD list. See:
http://doc.pfsense.org/index.php/Policy_on_FreeBSD_issues

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org

  


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] WAN, VLANS on WAN, and RRD Graph Behavior Graph or Feature?

2009-03-25 Thread Vaughn L. Reid III
I have a pfsense router configured with the following WAN setup.  It's 
running 1.2.2.


Wan Physical Interface Contains:
WAN is mapped to the default untagged interface (I know this isn't a 
completely normal setup with VLAN's also on the interface too, but it's 
a legacy setup I've inherited and am not currently able to change)

WAN2 through WAN5 are mapped to 802.1q VLANS on this same physical interface

With this configuration, I have noticed the following behavior when 
viewing traffic RRD graphs:
The WAN interface in the RRD page shows the sum of all traffic on the 
actual physical interface, including the VLAN traffic.

Each WAN interface VLAN shows only the traffic on that VLAN.

Is this a bug, or is this expected behavior?

Thanks,

Vaughn Reid III

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] WAN, VLANS on WAN, and RRD Graph Behavior Graph or Feature?

2009-03-25 Thread Vaughn L. Reid III
Thanks for the confirmation that I'm experiencing expected behavior.  I 
thought that was the case, but I wanted to be sure.


Vaughn III

Chris Buechler wrote:

On Wed, Mar 25, 2009 at 9:16 AM, Vaughn L. Reid III
vaughn_reid_...@elitemail.org wrote:
  

I have a pfsense router configured with the following WAN setup.  It's
running 1.2.2.

Wan Physical Interface Contains:
WAN is mapped to the default untagged interface (I know this isn't a
completely normal setup with VLAN's also on the interface too, but it's a
legacy setup I've inherited and am not currently able to change)
WAN2 through WAN5 are mapped to 802.1q VLANS on this same physical interface

With this configuration, I have noticed the following behavior when viewing
traffic RRD graphs:
The WAN interface in the RRD page shows the sum of all traffic on the actual
physical interface, including the VLAN traffic.
Each WAN interface VLAN shows only the traffic on that VLAN.

Is this a bug, or is this expected behavior?




Expected, there is no way to differentiate between tagged and untagged
traffic. It's showing you the traffic that's passing over that
interface, which includes the VLANs assigned as other interfaces. You
shouldn't use the parent interface with VLANs (for reasons completely
unrelated to this, and not product/vendor specific). I would plan to
change that, or just live with the understanding that the parent
interface will always have the sum of all VLAN traffic and that your
network is possibly open to VLAN hopping from tagged to parent
interface.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org

  


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Policy Routing and Re-Direct Question

2008-12-03 Thread Vaughn L. Reid III

Hello, I have a policy routing and re-direct question.

Is it possible in PFSense to do something like the following:

A request comes to PFSense on the internal LAN interface on port 80 or 
port 443.  Instead of passing this out WAN to the Internet, can the 
traffic, instead, be re-directed to a different port number of another 
internal machine (e.g. a proxy server or content filter)?


Ascii art example:
LAN Network Workstation port 80 or 443 request -- PFSense LAN interface 
-- internal PFSense rules, etc -- re-direct back out interface to 2nd 
Internal network machine which would then either serve the content or 
fetch it from the Internet


I'm asking this to see if it is feasible to set up a traditional proxy 
server/content filter in a way to avoid having to configure proxy 
settings on each client machine.  I'm also wanting to keep the proxying 
and content filtering off of the gateway routers.  If it would make 
things easier, the 2nd machine could live on a different PFSense interface.


Thanks for your help.

Vaughn Reid III

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] spamd package

2008-05-01 Thread Vaughn L. Reid III
I have been successfully using the spamd package for about 2 weeks at 
one of my client sites, and it is working wonderfully.  It has reduced 
the amount of spam that the site's email server was receiving from about 
15000 per day to about 50 to 75 per day. 


I configured the package as follows:

On the external spam data sources page, I have the following 2 items 
configured:

provider:  spamhaus
type:  blacklist
provider method:  url
url:  zen.spamhaus.org

provider:  uceprotect network
type:  blacklist
provider method:  file
file:  
http://wget-mirrors.uceprotect.net/rbldnsd-all/dnsbl-1.uceprotect.net.gz


On the white list tab, I have the client's local email server's IP 
address listed.


I left the default configuration on the spamd settings tab.

I am having excellent luck with this package running on a pair of 
firewalls using CARP.  I manually replicated my settings on both boxes, 
and it successfully works during failover (although the settings and 
spam database don't replicate -- but that's a given with most of the 
add-on packages).


I believe that you may be experiencing problems because you don't have 
your local email server white listed.


Vaughn Reid III


Michel Servaes wrote:

Hi,


I just tried to install spamd today, but it seems to block all my 
messages.

I've waited 25 minutes, and still no mail arrives.

I also tried to add some blacklist servers from the openbsd/spamd 
page, but it seems not to really work.


It just kept three entries in the greylist, and nothing else passed 
into that list, nor anything went through the mailserver I entered as 
next MTA.


When I telnetted into the SMTP port on my WAN side (from another 
location obviously), the SMTP HELO string came very slowly (but 
changing the value to '0' for the delay didn't make it faster).



Where can I find good info on how to configure it basic... from that 
point I could maybe tweak a little, but a basic guideline would be 
great to start with.



Kind regards,
Michel

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] spamd package

2008-05-01 Thread Vaughn L. Reid III

Gary,

Thanks for the suggestion.  My client is a not-for-profit library.  They 
own the hardware.  I provide consulting services/labor.  So, I believe 
that their usage is appropriate.  I do not sale pre-configured appliances.






Gary Buckmaster wrote:

Vaughn,

You should re-visit the spamhaus terms of service for their Zen 
service.  It is not free for commercial use as you are apparently doing.

Otherwise, thank you for the feedback on the package.
-Gary

Vaughn L. Reid III wrote:
I have been successfully using the spamd package for about 2 weeks at 
one of my client sites, and it is working wonderfully.  It has 
reduced the amount of spam that the site's email server was receiving 
from about 15000 per day to about 50 to 75 per day.

I configured the package as follows:

On the external spam data sources page, I have the following 2 items 
configured:

provider:  spamhaus
type:  blacklist
provider method:  url
url:  zen.spamhaus.org

provider:  uceprotect network
type:  blacklist
provider method:  file
file:  
http://wget-mirrors.uceprotect.net/rbldnsd-all/dnsbl-1.uceprotect.net.gz


On the white list tab, I have the client's local email server's IP 
address listed.


I left the default configuration on the spamd settings tab.

I am having excellent luck with this package running on a pair of 
firewalls using CARP.  I manually replicated my settings on both 
boxes, and it successfully works during failover (although the 
settings and spam database don't replicate -- but that's a given with 
most of the add-on packages).


I believe that you may be experiencing problems because you don't 
have your local email server white listed.


Vaughn Reid III


Michel Servaes wrote:

Hi,


I just tried to install spamd today, but it seems to block all my 
messages.

I've waited 25 minutes, and still no mail arrives.

I also tried to add some blacklist servers from the openbsd/spamd 
page, but it seems not to really work.


It just kept three entries in the greylist, and nothing else passed 
into that list, nor anything went through the mailserver I entered 
as next MTA.


When I telnetted into the SMTP port on my WAN side (from another 
location obviously), the SMTP HELO string came very slowly (but 
changing the value to '0' for the delay didn't make it faster).



Where can I find good info on how to configure it basic... from that 
point I could maybe tweak a little, but a basic guideline would be 
great to start with.



Kind regards,
Michel

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Ping

2008-02-28 Thread Vaughn L. Reid III

Try creating a firewall rule on the Wan interface to allow ICMP packets.

Vaughn

Anil Garg wrote:

My ISP has created a CLAN for me with the following public address:

xxx.xxx.xxx.64/27
Gateway for my pfsense is xxx.xxx.xxx.65

I have configured the pfsense to static IP of xxx.xxx.xxx.66/27 and 
given an gateway of xxx.xxx.xxx65


Everything works fine and I can VPN into xxx.xxx.xxx.66

But my router does not respond to the ping.

Any suggestions?

Thanks
Anil



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Carp Slave Internet Access Problem/Question

2007-11-26 Thread Vaughn L. Reid III
I have two pfSense boxes running a recent version of 1.2 RC3.  Fail-over 
seems to work correctly when the master unit dies, and the master unit 
takes back over when it comes back online, so I figure most of my 
settings must be mostly correct (I followed the visual tutorial listed 
on the pfsense.com site).


I do, however, seem to have one problem with the slave carp unit.  When 
it is not the master unit, it does not have internet access.  From the 
diagnostic ping page on the web configurator of the carp slave, I cannot 
ping a remote site and the list of addon packages for the unit do not 
show up.  Also, Snort rules will not update.  From the WAN side, I am 
able to ping the real IP of the carp slave, but cannot connect to it 
remotely (unless it is working as the master carp unit).


I believe that my problem may be a NAT issue.  I have advanced outbound 
NAT enabled and have the master unit configured to sync NAT with the 
slave.  I have found, however, that if I create a manual rule on the 
slave unit that tells it to perform NAT for all traffic and to use the 
real WAN IP address that all Internet access for the carp slave is 
restored.  As soon as I remove this rule and rely on the synced advanced 
outbound NAT rule that is replicated from the master unit, however, 
internet access to the slave unit dies.


I am able to access the master unit from both the Carp Wan IP and from 
its real Wan IP, and everything seems to work correctly with it.  Both 
machines have identical hardware.


The advanced outbound NAT rule that is synced between the two units is 
as follows:

Interface -- WAN
Source -- any
Source Port -- *
Destination  -- *
Destination Port -- *
NAT Address -- The Carp IP Address
NAT Port -- *
Static Port -- No

I have searched the mailing list and the forum and the updated carp 
documentation on the pfsense documentation site, but I have not yet 
found an explanation for this problem.


I appreciate any help that may be available. 


Thanks,

Vaughn Reid III
Indiana, USA

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] dhcp failover--missing parameter in web interface?

2007-07-11 Thread Vaughn L. Reid III
Also, with all of the money that you can save on technician costs and 
hardware by implementing something like pfsense, you might be able to 
afford an additional layer of transparent firewalling or some other 
security hardware/software or redundancy that you might otherwise be 
unable to afford.


-Vaughn Reid III

LJ Rand wrote:

Please note that this may not just be a matter of preference to have the second 
pfsense box designated as secondary dhcp server.  I am also hoping it will 
resolve the issue I reported earlier of running out of free IPs from the 
dynamic range even before the stash is exhausted.  I have completely abandoned 
using dynamic dhcp in my setup because of this outstanding issue--did not get 
resolved even after dhcpd package was updated to the latest version.  Thanks.

LJ
- Original Message 
From: Scott Ullrich [EMAIL PROTECTED]
To: support@pfsense.com
Sent: Monday, July 9, 2007 5:30:42 PM
Subject: Re: [pfSense Support] dhcp failover--missing parameter in web 
interface?

On 7/9/07, LJ Rand [EMAIL PROTECTED] wrote:
  

I am running 1.2-beta-1 snapshot 05-11-2007 on 2 pfsense firewalls carp'ed 
together.

I configured dhcp server in failover mode for both firewalls, following 
instructions.

I do not see on the web interface how to set the second firewall as secondary 
dhcp, so when I check the resultant /var/dhcpd/etc/dhcpd.conf file, both 
firewalls consider themselves as primary.

My preference is for all clients to take their dhcp address  configuration 
from the first firewall, and only contact the second firewall when the first one is 
down.

I could manually edit above dhcpd.conf file, but I don't want to keep doing 
that everytime I reload the configuration.

Would someone please look into this issue?  Thanks.



Woops, I misread this originally.  Please ignore me.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]






   

Yahoo! oneSearch: Finally, mobile search 
that gives answers, not web links. 
http://mobile.yahoo.com/mobileweb/onesearch?refer=1ONXIC


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

  


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] I hit reply to the wrong post..... oops

2007-07-11 Thread Vaughn L. Reid III

Oops!!!  I didn't realize I had jumped topics.  :(

Vaughn Reid III

Vaughn L. Reid III wrote:
Also, with all of the money that you can save on technician costs and 
hardware by implementing something like pfsense, you might be able to 
afford an additional layer of transparent firewalling or some other 
security hardware/software or redundancy that you might otherwise be 
unable to afford.


-Vaughn Reid III

LJ Rand wrote:
Please note that this may not just be a matter of preference to have 
the second pfsense box designated as secondary dhcp server.  I am 
also hoping it will resolve the issue I reported earlier of running 
out of free IPs from the dynamic range even before the stash is 
exhausted.  I have completely abandoned using dynamic dhcp in my 
setup because of this outstanding issue--did not get resolved even 
after dhcpd package was updated to the latest version.  Thanks.


LJ
- Original Message 
From: Scott Ullrich [EMAIL PROTECTED]
To: support@pfsense.com
Sent: Monday, July 9, 2007 5:30:42 PM
Subject: Re: [pfSense Support] dhcp failover--missing parameter in 
web interface?


On 7/9/07, LJ Rand [EMAIL PROTECTED] wrote:
 
I am running 1.2-beta-1 snapshot 05-11-2007 on 2 pfsense firewalls 
carp'ed together.


I configured dhcp server in failover mode for both firewalls, 
following instructions.


I do not see on the web interface how to set the second firewall as 
secondary dhcp, so when I check the resultant 
/var/dhcpd/etc/dhcpd.conf file, both firewalls consider themselves 
as primary.


My preference is for all clients to take their dhcp address  
configuration from the first firewall, and only contact the second 
firewall when the first one is down.


I could manually edit above dhcpd.conf file, but I don't want to 
keep doing that everytime I reload the configuration.


Would someone please look into this issue?  Thanks.



Woops, I misread this originally.  Please ignore me.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]






   
 

Yahoo! oneSearch: Finally, mobile search that gives answers, not web 
links. http://mobile.yahoo.com/mobileweb/onesearch?refer=1ONXIC


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

  


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] VPN tunnel connects properly, but it frequently drops

2007-07-02 Thread Vaughn L. Reid III
I have a pfsense box with the June 30th snapshot, and have it connected 
to two Linksys RV016's, two Linksys RV082's, and two Hotbrick 800/2.  
The pfsense box has two adsl connections with static IP's for WAN 
connectivity, and the remote sites also have adsl connections.  Both 
brands of units are running the most recent firmware posted on their 
vendor's web site as of June 29, 2007.


I was consistently, having trouble with the VPN tunnels dropping after 
prolonged periods of inactivity.  The remote endpoints had to actively 
look for items on the LAN behind the pfsense box to get the connection 
to re-establish.  Sometimes, for example, if the WAN disconnected for 
some reason, the VPN's tunnels would not get re-built without rebooting 
the Linksys or Hotbrick router.


Anyway, I contacted Hotbrick's tech support, and asked them for advice 
since they sell a couple other products that look to be customized and 
branded versions of pfsense.  They sent me a link to one of their help 
documents here:  http://www.hotbrick.com/support_detail.asp?tipo=4


Basically, the documents suggest the following settings for VPN's 
between Hotbrick products:


IPSEC Phase 1:
Negotiation:  Main
Encryption:  3DES
Hash:  SHA1
DH Key:  2  (1024 Bit)
Lifetime:  28800
Authentication:  Pre-Shared Key

IPSEC Phase 2:
Protocol:  ESP
Encryption:  Make Sure 3DES only is checked
Hash:  SHA1
Perfect Forward Secrecy:  2 (1024 Bit)
Lifetime:  28800

So, I have tried these settings on my remote endpoint Hotbrick's and 
Linksys's  and have experienced much more stable VPN connections.  I 
have also noticed that the VPN connection doesn't have to be 
re-established by the remote endpoint after long periods of inactivity, 
and I have noticed that the tunnels seem to rebuild correctly after a 
WAN link goes down and then comes back up.  Also, on the Linksys devices 
I have dead peer detection turned off, but have keep-alive turned on.  
On the pfsense box, I have the IP address listed to ping as an IP on the 
remote subnet that is not assigned to any host.  I found that on the 
Hotbrick and the Linksys units that long term pinging of the remote LAN 
gateway (i.e. pinging the LAN IP of the linksys or hotbrick unit) caused 
the device to actively start blocking the connection from the pfsense box.


-Vaughn Reid III

David Strout wrote:

I have had the same experience w/ the RV016 and
pfSense.  What is the exact version on the linksys
side (have you upgraded the firmware to the
current?), and what build of 1.0.1 pfSense are you
running?  I'd move the the current 1.2-BETA SNAP
and upgrade your Linksys to the current 2.0.17.

I personally have had very little luck in
conecting linksys to anything but linksys for VPN
connectivity.  I have gotten it to work in the lab
and maintain it's stability but under a high load
situation it becomes very unstable and drops quite
often.


  

Hi,

 


 I have PFSense 1.0.1 version configured with


open VPN on one site and Dual
  

wan router (Linksys RV016) configured on the


other site.  VPN connection
  

works fine.  However, even though both the


routers are configured to be on a
  

Keep Alive status in reference to the VPN


connectivity, still the VPN
  

connection drops consistently.  Please let me


know for any further details
  

you want from me to resolve this issue.  Any


help from your side would
  

really be appreciated.

 


Thanks   Regards,

 


Vidit Gupta





-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

  


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] VPN tunnel connects properly, but it frequently drops

2007-07-02 Thread Vaughn L. Reid III
That is true.  I believe, however, that their 6000 and 4000 series are, 
perhaps, pfsense based.


Vaughn III

Pedro Paulo Oliveira Jr wrote:

Hotbrick VPN800/2 is not based on pfsense.

-Original Message-
From: Vaughn L. Reid III [mailto:[EMAIL PROTECTED] 
Sent: segunda-feira, 2 de julho de 2007 08:55

To: support@pfsense.com
Subject: Re: [pfSense Support] VPN tunnel connects properly, but it
frequently drops

I have a pfsense box with the June 30th snapshot, and have it connected 
to two Linksys RV016's, two Linksys RV082's, and two Hotbrick 800/2.  
The pfsense box has two adsl connections with static IP's for WAN 
connectivity, and the remote sites also have adsl connections.  Both 
brands of units are running the most recent firmware posted on their 
vendor's web site as of June 29, 2007.


I was consistently, having trouble with the VPN tunnels dropping after 
prolonged periods of inactivity.  The remote endpoints had to actively 
look for items on the LAN behind the pfsense box to get the connection 
to re-establish.  Sometimes, for example, if the WAN disconnected for 
some reason, the VPN's tunnels would not get re-built without rebooting 
the Linksys or Hotbrick router.


Anyway, I contacted Hotbrick's tech support, and asked them for advice 
since they sell a couple other products that look to be customized and 
branded versions of pfsense.  They sent me a link to one of their help 
documents here:  http://www.hotbrick.com/support_detail.asp?tipo=4


Basically, the documents suggest the following settings for VPN's 
between Hotbrick products:


IPSEC Phase 1:
Negotiation:  Main
Encryption:  3DES
Hash:  SHA1
DH Key:  2  (1024 Bit)
Lifetime:  28800
Authentication:  Pre-Shared Key

IPSEC Phase 2:
Protocol:  ESP
Encryption:  Make Sure 3DES only is checked
Hash:  SHA1
Perfect Forward Secrecy:  2 (1024 Bit)
Lifetime:  28800

So, I have tried these settings on my remote endpoint Hotbrick's and 
Linksys's  and have experienced much more stable VPN connections.  I 
have also noticed that the VPN connection doesn't have to be 
re-established by the remote endpoint after long periods of inactivity, 
and I have noticed that the tunnels seem to rebuild correctly after a 
WAN link goes down and then comes back up.  Also, on the Linksys devices 
I have dead peer detection turned off, but have keep-alive turned on.  
On the pfsense box, I have the IP address listed to ping as an IP on the 
remote subnet that is not assigned to any host.  I found that on the 
Hotbrick and the Linksys units that long term pinging of the remote LAN 
gateway (i.e. pinging the LAN IP of the linksys or hotbrick unit) caused 
the device to actively start blocking the connection from the pfsense box.


-Vaughn Reid III

David Strout wrote:
  

I have had the same experience w/ the RV016 and
pfSense.  What is the exact version on the linksys
side (have you upgraded the firmware to the
current?), and what build of 1.0.1 pfSense are you
running?  I'd move the the current 1.2-BETA SNAP
and upgrade your Linksys to the current 2.0.17.

I personally have had very little luck in
conecting linksys to anything but linksys for VPN
connectivity.  I have gotten it to work in the lab
and maintain it's stability but under a high load
situation it becomes very unstable and drops quite
often.


  


Hi,

 


 I have PFSense 1.0.1 version configured with

  

open VPN on one site and Dual
  


wan router (Linksys RV016) configured on the

  

other site.  VPN connection
  


works fine.  However, even though both the

  

routers are configured to be on a
  


Keep Alive status in reference to the VPN

  

connectivity, still the VPN
  


connection drops consistently.  Please let me

  

know for any further details
  


you want from me to resolve this issue.  Any

  

help from your side would
  


really be appreciated.

 


Thanks   Regards,

 


Vidit Gupta

  


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

  



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

  


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Questions about Full Version versus Embedded

2007-05-01 Thread Vaughn L. Reid III
I have a few questions about Pfsense full versus Pfsense embedded.

1.  What, specifically, are the differences between the full and
embedded versions?  Are there features available in one that is not
available in the other?  Do they both support the same hardware?

2.  Do both the embedded and full version write their log files to
memory?  

3.  Is it suitable to use the full version on a disk on module or micro
drive if I have a big enough solid state storage device?

4.  How do I update the embedded version?  Do I just download and
install the files listed under update?

5.  What are the advantages and disadvantages of the full and embedded
versions?

I appreciate any answers or links that you may be willing to provide. 
I'm asking because I'm wondering if it is feasible or even a good idea
to replace the small ide hard drives on some of my customers pfsense
boxes with 1 or 2 gig disk on module solid state media. 

Thanks,

Vaugh Reid III





-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] Questions about Full Version versus Embedded

2007-05-01 Thread Vaughn L. Reid III
If I understand you correctly then the embedded version does not support
the addition of packages and does not write to disk during runtime
operations.  The full version, on the other hand, supports the addition
of packages and definitely writes to disk during runtime operation.  Are
these the major differences between the two versions?  

--Vaughn


On Tue, 1 May 2007 14:41:50 -0400, Sean Cavanaugh
[EMAIL PROTECTED] said:
 the embedded version is designed for a system that's running off of
 Compact flash such as the WRAP and Soekris platforms so it does not write
 anything to storage during runtime other than config changes. logs and
 whatnot are (supposedly) written to a RAM temp location. think of it more
 like the firmware that's running on a linksys router.
  
 the full version is designed for full servers with storage that's not
 limited by how many writes it can do (flash, HDD, etc) and as such will
 record logs to storage as well as support adding packages to extend the
 functionality of the firewall. this would be more of a full software
 firewall running on something like a 2U server from Dell or something.
  
 -Sean Cavanaugh
 
 
 
  From: [EMAIL PROTECTED] To: support@pfsense.com Date: Tue, 1 May 2007 
  14:34:00 -0400 Subject: [pfSense Support] Questions about Full Version 
  versus Embedded  I have a few questions about Pfsense full versus Pfsense 
  embedded.  1. What, specifically, are the differences between the full 
  and embedded versions? Are there features available in one that is not 
  available in the other? Do they both support the same hardware?  2. Do 
  both the embedded and full version write their log files to memory?   3. 
  Is it suitable to use the full version on a disk on module or micro drive 
  if I have a big enough solid state storage device?  4. How do I update 
  the embedded version? Do I just download and install the files listed 
  under update?  5. What are the advantages and disadvantages of the full 
  and embedded versions?  I appreciate any answers or links that you may 
  be willing to provide.  I'm asking because I'm wondering if it is feasible 
  or even a good idea to replace the small ide hard drives on some of my 
  customers pfsense boxes with 1 or 2 gig disk on module solid state media. 
Thanks,  Vaugh Reid III  
  - To 
  unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: 
  [EMAIL PROTECTED] 
 _
 Explore the seven wonders of the world
 http://search.msn.com/results.aspx?q=7+wonders+worldmkt=en-USform=QBRE



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Wireless 3g Cellular PC Card Modem Support on Pfsense

2007-05-01 Thread Vaughn L. Reid III
My local Fire Dept has asked me about the feasibility of building them a
dual Wan Pfsense box using two Internet Access provided by two accounts
to Verizon's wireless cellular broadband service.

Does Pfsense provide support for any cellular modems?  Do any of the
pfsense resellers, support organizations provide a ready-made product
that might match this description?

Thanks,

Vaughn Reid III



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Wireless 3g Cellular PC Card Modem Support on Pfsense

2007-05-01 Thread Vaughn L. Reid III
Thanks for the info.  I was just wondering at this point.  I had a fire
dept ask me about the feasibility because of interest on their part
about using a multi-wan firewall deployed with their command vehicle to
establish a mobile and somewhat fast Internet gateway that could easily
be deployed on the scene of a large fire, or other emergency.  My
immediate thought was a multi-wan cellular broadband powered embedded
fanless firewall with wireless card and hi-gain antenna for a quick fix
network in a box that could provide an emergency worker hotspot with
internet and VPN capabilities back to the home network and resources. At
this point, satellite is not an option for them, but they have a couple
mobile cellular accounts.

A couple questions, how large of a bounty would be required, and are
there any other products out there that can currently use multiple
cellular broadband modems as wan connections?  (I'm aware of the dlink
3g routers and one from Linksys).  Hmmm. I suppose that I could get
a couple dlinks and place them in bridge mode to a pfsense box.  Just
thinking out loud at this point.


--Vaughn 


On Tue, 01 May 2007 16:47:41 -0400, Chris Buechler [EMAIL PROTECTED]
said:
 Vaughn L. Reid III wrote:
  My local Fire Dept has asked me about the feasibility of building them a
  dual Wan Pfsense box using two Internet Access provided by two accounts
  to Verizon's wireless cellular broadband service.
 
  Does Pfsense provide support for any cellular modems?  Do any of the
  pfsense resellers, support organizations provide a ready-made product
  that might match this description?

 
 No and no. If you have some external device that can turn the cell 
 connection into an Ethernet connection, that'll work. No cell services 
 are supported at this time.
 
 I have a Verizon EVDO PC card for my laptop, but with a 15 Mb cable 
 modem and 3.5 Mb DSL line at home, I have no interest in making it work 
 with pfsense other than curiosity, which means it'll be a long time 
 before I have time to mess with it. If you'd like, start a bounty and 
 you may be able to adjust my priorities. :)
 
 
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Wireless 3g Cellular PC Card Modem Support on Pfsense

2007-05-01 Thread Vaughn L. Reid III

Cool, thanks for the links.  I'll check out the Soekris list too.

Vaughn :-)

RB wrote:

A couple of potential options - we just chased a similar rabbit over
on the Soekris list, and I got a lot of good links out of it:

http://www.digi.com/products/cellulargateways/digiconnectwanfamily.jsp
http://www.digi.com/products/cellulargateways/connectportwanvpn.jsp

http://www.novatelwireless.com/products/ovation/mcu2000.html
http://www.sierrawireless.com/product/mp875gps.aspx

Some of them do everything you want; others may need an embedded
pfSense device involved, others may need 'modem' support.


RB

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] help pptp plz

2007-04-17 Thread Vaughn L. Reid III
I have PPTP successfully working on my pfsense box.  Here's how I got 
stuff working.


1.  My lan IP is 192.168.10.1/24, and my Lan net is 192.168.10.0/24
2.  On the VPN PPTP  page, I selected the radio button that corresponds 
to Enable PPTP Server

3.  My PPTP server address is:  192.168.150.25
4.  My Remote Address Range is:  192.168.150.48/28 -- The /28 was 
already entered.  You can change this netmask, but you need to do it 
manually through config files -- Check out the forum for more info.

5.  I also have the Require 128-bit Encryption option selected.
6.  After selecting these settings, I clicked save.

Next, on the Users tab of the VPN PPTP page I created usernames and 
passwords for the various accounts that I wanted to allow access to the 
pfsense's PPTP server.


I did not add any special routes or other items to to the pfsense box's 
configuration.  It just worked like magic. I have successfully connected 
to the network using pptp by using the VPN wizard on both Windows 2000 
and Windows XP Pro road warriors.  I am running the PPTP server on the 
snapshot built:

*1.0.1-SNAPSHOT-03-27-2007 *
built on Sun Apr 8 18:57:04 EDT 2007

When I first started using pfsense, however, I did notice that I had 
trouble with getting PPTP to work on the 1.0.1 default release.  As soon 
as I updated to a snapshot release, however, my problems in this area 
went away.


Vaughn Reid III


Arthur Mitchell wrote:

how do i add an static routes?
- Original Message - From: Holger Bauer 
[EMAIL PROTECTED]

To: support@pfsense.com
Sent: Tuesday, April 17, 2007 8:13 AM
Subject: RE: [pfSense Support] help pptp plz


You do not need to forward anything. When your users connect they will
become part of your local network. However as you have chosen different
networks for the PPTP Clients and LAN (unless I  have some
misinterpretation here) you have to make sure your PPTP Clients use the
remote subnets gateway as default gateway or you need to add static
routes at the client (Windows XP and Mac OS X default to this setting
btw). Also make sure you have firewallrules at firewallrules, pptp that
allow the desired traffic.

Holger



From: Arthur Mitchell [mailto:[EMAIL PROTECTED] Sent: Tuesday, April 
17, 2007 7:12 AM

To: support@pfsense.com
Subject: [pfSense Support] help pptp plz


Hi i have a problem with pfsense. I have configured the pptp server and
it's working fine. on the pptp server side the add is 192.168.16.1 that
is the server's add ofer pptp.
I want to portfoward that add (192.168.16.1) to a lan add on my network
(192.168.1.5) that is my fileserver add that others must have acsess to.
plz help me im in the dark about this.


Arthur Mitchell


Virus checked by G DATA AntiVirusKit
Version: AVK 17.4036 from 17.04.2007
Virus news: www.antiviruslab.com




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] help pptp plz

2007-04-17 Thread Vaughn L. Reid III
Sorry for the confusion, I should have been slightly more explicit in my
previous reply.

I was trying to explain that, on my pfsense box, I have allow everything
from everywhere to everywhere on my PPTP interface in the firewall
rules.  On my machine, I know that I have this type of setup because a *
symbol appears in each of the fields:  
Proto   Source  PortDestination PortGateway
Schedule

Vaughn

On Tue, 17 Apr 2007 16:54:00 +0200, Rainer Duffner
[EMAIL PROTECTED] said:
 Arthur Mitchell wrote:
  what is asterisks?
 
 
 http://en.wikipedia.org/wiki/Asterisk
 
 ;-)
 
 
 
 cheers,
 Rainer
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] help pptp plz

2007-04-17 Thread Vaughn L. Reid III
I forgot one step in the process.  Go to firewall rules and make sure 
that there are asterisks all the way across for the pptp VPN interface 
(unless you want to do some filtering).


Vaughn

Arthur Mitchell wrote:
still got a problem it doesnt become a part of my local network when i 
want to acc a machine on my network it isnt there and the ip is rejected


- Original Message - From: Vaughn L. Reid III 
[EMAIL PROTECTED]

To: support@pfsense.com
Sent: Tuesday, April 17, 2007 12:28 PM
Subject: Re: [pfSense Support] help pptp plz


I have PPTP successfully working on my pfsense box.  Here's how I got 
stuff working.


1.  My lan IP is 192.168.10.1/24, and my Lan net is 192.168.10.0/24
2.  On the VPN PPTP  page, I selected the radio button that 
corresponds to Enable PPTP Server

3.  My PPTP server address is:  192.168.150.25
4.  My Remote Address Range is:  192.168.150.48/28 -- The /28 was 
already entered.  You can change this netmask, but you need to do it 
manually through config files -- Check out the forum for more info.

5.  I also have the Require 128-bit Encryption option selected.
6.  After selecting these settings, I clicked save.

Next, on the Users tab of the VPN PPTP page I created usernames and 
passwords for the various accounts that I wanted to allow access to 
the pfsense's PPTP server.


I did not add any special routes or other items to to the pfsense 
box's configuration.  It just worked like magic. I have successfully 
connected to the network using pptp by using the VPN wizard on both 
Windows 2000 and Windows XP Pro road warriors.  I am running the PPTP 
server on the snapshot built:

*1.0.1-SNAPSHOT-03-27-2007 *
built on Sun Apr 8 18:57:04 EDT 2007

When I first started using pfsense, however, I did notice that I had 
trouble with getting PPTP to work on the 1.0.1 default release.  As 
soon as I updated to a snapshot release, however, my problems in this 
area went away.


Vaughn Reid III


Arthur Mitchell wrote:

how do i add an static routes?
- Original Message - From: Holger Bauer 
[EMAIL PROTECTED]

To: support@pfsense.com
Sent: Tuesday, April 17, 2007 8:13 AM
Subject: RE: [pfSense Support] help pptp plz


You do not need to forward anything. When your users connect they will
become part of your local network. However as you have chosen different
networks for the PPTP Clients and LAN (unless I  have some
misinterpretation here) you have to make sure your PPTP Clients use the
remote subnets gateway as default gateway or you need to add static
routes at the client (Windows XP and Mac OS X default to this setting
btw). Also make sure you have firewallrules at firewallrules, pptp 
that

allow the desired traffic.

Holger



From: Arthur Mitchell [mailto:[EMAIL PROTECTED] Sent: Tuesday, 
April 17, 2007 7:12 AM

To: support@pfsense.com
Subject: [pfSense Support] help pptp plz


Hi i have a problem with pfsense. I have configured the pptp server and
it's working fine. on the pptp server side the add is 192.168.16.1 that
is the server's add ofer pptp.
I want to portfoward that add (192.168.16.1) to a lan add on my network
(192.168.1.5) that is my fileserver add that others must have acsess 
to.

plz help me im in the dark about this.


Arthur Mitchell


Virus checked by G DATA AntiVirusKit
Version: AVK 17.4036 from 17.04.2007
Virus news: www.antiviruslab.com




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-04-06 Thread Vaughn L. Reid III
I just wanted to report an update of how my IPSEC over OPTx is working.  
It's been a few days, now since I set up the manual rules on the OPTx 
interface that I wanted to use for IPSEC.  Since I set up the rules 
listed in my previous post, my IPSEC VPN's over the OPTx interface are 
working well and seem very stable.


Vaughn

Vaughn L. Reid III wrote:

Just to be thorough, I added two more rules to the firewall's OPT
interface to make sure all the IPSEC stuff gets through.  I'm fuzzy on
if the last two are needed, but just to be safe, I added them.

Here are all the rule that I've added:
Rules in the format listed below:
Format:  Protocol Source Port Destination Port
Gateway Schedule

1.  UDP * * Interface IP Address 500 * Blank
2.  ESP * * Interface IP Address * * Blank
3.  AH * * Interface IP Address * * Blank
4.  GRE * * Interface IP Address * * Blank

Vaughn




On Mon, 02 Apr 2007 20:43:38 -0400, Vaughn L. Reid III
[EMAIL PROTECTED] said:
  

Interesting,

This version of the firmware doesn't even list the VPN tunnel that is
configured for the OPT interface in the vpn section of /tmp/rules.debug.
 The tunnel definition is listed in the GUI, and it's working with the
manual rules because I'm in the process of accessing remote resources
now.

In /tmp/rules.debug, however, it's like the vpn out the opt interface
just doesn't exist.  I checked the firewall rules section of
/tmp/rules.debug, and the manual rules that I added are there.

Also, the firmware version that I was using when I started this thread
last week showed the VPN tunnel definition in /tmp/rules.debug, but it
showed the wrong interface.

Vaughn


On Mon, 2 Apr 2007 20:32:47 -0400, Scott Ullrich [EMAIL PROTECTED]
said:


On 4/2/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:
  

Here are the rules for the interface in question that seem to make the
IPSEC tunnel work:


[snip]

Look in /tmp/rules.debug and search for IPSEC.

Do you see rules permitting traffic to the interface?

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

  


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]






-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

  


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-04-06 Thread Vaughn L. Reid III
No.  The only things that I added/changed were the firewall rules.  
Actually, I don't have manually entered static routes configured for any 
of my IPSEC connections, and they all work.  When I pull up the routing 
table, I have noticed that the pfsense box appears to automatically add 
the routes.


Vaughn

[EMAIL PROTECTED] wrote:

Do you have static routes set up as well?

  

I just wanted to report an update of how my IPSEC over OPTx is working.
It's been a few days, now since I set up the manual rules on the OPTx
interface that I wanted to use for IPSEC.  Since I set up the rules
listed in my previous post, my IPSEC VPN's over the OPTx interface are
working well and seem very stable.

Vaughn

Vaughn L. Reid III wrote:


Just to be thorough, I added two more rules to the firewall's OPT
interface to make sure all the IPSEC stuff gets through.  I'm fuzzy on
if the last two are needed, but just to be safe, I added them.

Here are all the rule that I've added:
Rules in the format listed below:
Format:  Protocol Source Port Destination Port
Gateway Schedule
1.  UDP * * Interface IP Address 500 * Blank
2.  ESP * * Interface IP Address * * Blank
3.  AH * * Interface IP Address * * Blank
4.  GRE * * Interface IP Address * * Blank

Vaughn
  



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

  


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-04-06 Thread Vaughn L. Reid III
I should also add, in case it matters that all of the remote end-points 
are either Linksys RV082's, Linksys RV016's, Hotbrick 800/2's, or 
Netgear FVS338's.


All of the remote end-points are configured with static IP's and any ISP 
supplied routers are configured solely as bridge devices.  If PPPoE is 
being used, I have the remote Linksys, Netgear, or Hotbrick performing 
the PPPoE.  These remote end points operate over a combination of Cable, 
ADSL, and wireless Internet access from their various ISP's.  I have 
learned that, if the ISP's supplied router/firewall is doing any sort of 
NAT or port forwarding, it just kills IPSEC VPN stability.  This seems 
especially true for the Linksys and Netgear devices that I've run across. 


Vaughn

Vaughn L. Reid III wrote:
No.  The only things that I added/changed were the firewall rules.  
Actually, I don't have manually entered static routes configured for 
any of my IPSEC connections, and they all work.  When I pull up the 
routing table, I have noticed that the pfsense box appears to 
automatically add the routes.


Vaughn

[EMAIL PROTECTED] wrote:

Do you have static routes set up as well?

 

I just wanted to report an update of how my IPSEC over OPTx is working.
It's been a few days, now since I set up the manual rules on the OPTx
interface that I wanted to use for IPSEC.  Since I set up the rules
listed in my previous post, my IPSEC VPN's over the OPTx interface are
working well and seem very stable.

Vaughn

Vaughn L. Reid III wrote:
   

Just to be thorough, I added two more rules to the firewall's OPT
interface to make sure all the IPSEC stuff gets through.  I'm fuzzy on
if the last two are needed, but just to be safe, I added them.

Here are all the rule that I've added:
Rules in the format listed below:
Format:  Protocol Source Port Destination Port
Gateway Schedule
1.  UDP * * Interface IP Address 500 * Blank
2.  ESP * * Interface IP Address * * Blank
3.  AH * * Interface IP Address * * Blank
4.  GRE * * Interface IP Address * * Blank

Vaughn
  



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

  


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] OK, I think this is simple...

2007-04-05 Thread Vaughn L. Reid III
I have a customer with a setup that sounds very similar to what you are 
describing.  They have 2 WAN type connections.  The first is an SDSL 
line that is used for IPSEC and other general WAN stuff.  The second is 
an ADSL line that they use to feed their proxy server/content filter. 

They don't have any load balancing or failover setup.  They do, however, 
have a single rule in their firewall config that directs all traffic 
from the content filter to use the ADSL connection.


In order to set this up correctly for them, I first read the information 
available here:

http://www.pfsense.com/mirror.php?section=tutorials/policybased_multiwan/policybased_multiwan.pdf

Then, I set up the following rule on the LAN interface protocol page:

Proto -- *
Source -- Lan IP of Proxy/content filter
Destination -- *
Port -- *
Gateway -- The Default Gateway of the ADSL connection -- Note:  This is 
the actual ADSL interface's gateway, not the IP of the ADSL interface 
itself.


All the proxy server's Internet traffic now goes out through the ADSL 
interface.  Even cooler that that, when the remote VPN'd sites request 
stuff from the proxy, the firewall is smart enough to allow the proxy 
server to answer back to the remote sites via the VPN interface (which 
is WAN, not ADSL).  Hope this helps.


Vaughn Reid III

Robert Goley wrote:
Just leave off the steps for creating the pools and skip straight to setting 
your LAN rules.  All you should have to do to send the traffic for the one 
application is define a couple of rules based on either source IP on the LAN, 
Destination IP, or destination ports that application uses.  you will set 
these rules to the gateway of your OPT1 connection.   This rule will need to 
be higher in the list than the default traffic rule.  Leave the default 
traffic rule set to the gateway of your WAN connection. 

Robert 


On Thursday 05 April 2007 18:06, Jaye Mathisen wrote:
  

Yeah, I read that.  But I don't want load balancing or failover.

Logging in via shell shows the routing is set right, in that the
default route is still WAN.

# netstat -rn
Routing tables

Internet:
DestinationGatewayFlagsRefs  Use  Netif Expire
default70.58.179.174  UGS 0  837   sis0

I created an OPT1 interface, set it to DHCP.  Went to firewall rules
and added a rule that sent proto:any, source:*, Port*, dest 4.2.2.2,
port *, Gateway OPT1.

# User-defined rules follow
pass in quick on $lan from 192.168.0.0/24 to any keep state  label
USER_RULE: D efault LAN - any
pass in log quick on $lan  route-to ( sis2 192.168.100.1 ) from any to { 
4.2.2. 2 } keep state  label USER_RULE


But all traffic is now going out the OPT1 interface, instead of just
traffic to 4.2.2.2

Tracing route to pfsense.org [69.64.6.13]
over a maximum of 30 hops:

  11 ms1 ms1 ms  192.168.0.1
  2 *** Request timed out.
  338 ms38 ms39 ms  67.42.192.195
  436 ms36 ms35 ms  67.42.192.125
  535 ms36 ms35 ms  205.171.150.33


What's weirder is that the ISP on OPT1 is allowing the
traffic packets with my WAN interface IP to pass through
it. It doesn't appear to be nat'd to the OPT1 interface
IP either...

On Thu, Apr 05, 2007 at 11:38:27PM +0200, Holger Bauer wrote:


http://doc.pfsense.org/index.php/Multi-Wan/Load-Balancing


Holger

-Original Message-
From: Fuchs, Martin [mailto:[EMAIL PROTECTED]
Sent: Thursday, April 05, 2007 11:13 PM
To: support@pfsense.com
Subject: AW: [pfSense Support] OK, I think this is simple...

I don't have thos config, but i could imagine it works with the gateway
option (select a gateway different than default) Perhaps it might be
necessary to define a pool or else fort hat...

Just try a bit :-)

Regards, Martin

-Urspr?ngliche Nachricht-
Von: Jaye Mathisen [mailto:[EMAIL PROTECTED]
Gesendet: Donnerstag, 5. April 2007 22:53
An: support@pfsense.com
Betreff: [pfSense Support] OK, I think this is simple...
  

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

  


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-04-02 Thread Vaughn L. Reid III
I've just tested the most recent pfsense update available on
http://snapshots.pfsense.com/FreeBSD6/RELENG_1/updates/

Here is the system's firmware information:
1.0.1-SNAPSHOT-03-27-2007
built on Mon Apr 2 19:21:19 EDT 2007

My results indicate that IPSEC over OPTx still does not work without
explicitly opening UDP 500 and ESP on the interface in question to allow
the interface's IP address to accept these two items.

I believe that this may still be an older firmware, but I do not see a
newer firmware available in the update format.  At this time, I am also
not in a position to test an .iso file.  To do that, I will need to wait
for the weekend when firewall usage is low.


Vaughn


On Fri, 30 Mar 2007 12:23:44 -0400, Vaughn L. Reid III
[EMAIL PROTECTED] said:
 I'll check back later this evening or Monday day sometime.
 
 Thanks,
 
 Vaughn
 
 Scott Ullrich wrote:
  This is an old image.  The snapshot server has been down for some
  time...  Try again 2-3 hours from now or on Monday.
 
  Scott
 
 
  On 3/30/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:
  I just tried implementing IPSEC over an OPT interface using the
  pfsense.iso file from March 29, 2007 at 7:19 p.m.
 
  Here are my results.  IPSEC will not work over my OPT2 Interface without
  adding specific firewall rules to the OPT2 interface to allow UDP 500
  and ESP to connect to that interface's IP address.
 
  Once I manually add the rules, the tunnels get created and work
  correctly over the OPT2 interface.  Before I manually added the rules to
  the OPT2 interface, I noticed that there was no SAD listing to the
  tunnel being tested.  Both ends of the tunnel were, however, listed on
  the SPD tab of the IPSEC tunnel diagnostic page.
 
  Once I added the needed firewall rules to the OPT2 interface, the VPN
  tunnel immediately set up and started working.  At that time, the proper
  entries appeared in the SAD on the IPSEC diagnostic page.
 
  Also, I noticed during the loading of the pfsense firewall software
  while it was connecting services, etc. that an error message appeared
  that stated that there was an invalid argument foreach on line 7 of the
  /etc/inc/vslb.inc file.  Don't quote me on the line number, but I'm
  pretty sure it was line 7.  I'm not sure if this is related to my IPSEC
  issue, but I thought I'd comment in case it is relevant.
 
  Thanks,
 
  Vaughn Reid III
 
  Tunge2 wrote:
   If this is working it would be a great step a head :)
  
   -Oorspronkelijk bericht-
   Van: Vaughn L. Reid III [mailto:[EMAIL PROTECTED]
   Verzonden: vrijdag 30 maart 2007 1:08
   Aan: support@pfsense.com
   Onderwerp: Re: [pfSense Support] IPSEC over an OPT interface Problems
  
   Have the IPSEC changes been committed and built yet?  I'm looking 
  at the
   update files, and they all still say March 27 2007.  I'm using this
   repository http://snapshots.pfsense.com/FreeBSD6/RELENG_1/updates/
  
   Should I be looking somewhare else for the update with the IPSEC fix?
  
   Thanks,
  
   Vaughn
  
   On Thu, 29 Mar 2007 15:26:58 -0400, Vaughn L. Reid III
   [EMAIL PROTECTED] said:
  
   Thanks for your hard work.  I appreciate it and I'm sure my customers
   do too.
  
   Vaughn
  
   Vaughn L. Reid III wrote:
  
   The ones ones that say Computer Support are from the test tunnel
   that I created to use OPT2.
  
   The interfaces on this machine are labeled like this:
  
   LAN = em0
   WAN = em1
   ATTDSL = em4 -- This is the OPT interface that I was using for the
   Computer Support VPN test wireless = em2
  
   Vaughn
  
   Scott Ullrich wrote:
  
   Okay, so that I am on the same page as you.  Those $wan rules
   should have read $optX ??
  
   Scott
  
  
   On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] 
  wrote:
  
   Oops!  Sorry for the double post.
  
   Vaughn L. Reid III wrote:
  
   Here is the relevant text of my rules.debug file.  It looks like
   the interface on the connection computer support has the same
   interface as the rest of the tunnels.  This is the test
   connection that should be using OPT3.
  
   # let out anything from the firewall host itself and decrypted
   IPsec traffic pass out quick on $lan proto icmp keep state label
   let out anything from firewall host itself
   pass out quick on $wan proto icmp keep state label let out
   anything from firewall host itself
   pass out quick on em1 all keep state label let out anything
   from firewall host itself
   # pass traffic from firewall - out anchor firewallout
   pass out quick on em1 all keep state label let out anything
   from firewall host itself
   pass out quick on em0 all keep state label let out anything
   from firewall host itself
   pass out quick on em4 all keep state label let out anything
   from firewall host itself
   pass out quick on em2 all keep state label let out anything
   from firewall host itself
   pass out quick on $pptp all keep state label let out anything
   from firewall host itself pptp
   pass out quick

Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-04-02 Thread Vaughn L. Reid III
Here are the rules for the interface in question that seem to make the
IPSEC tunnel work:

Rules in the format listed below:
Format:  Protocol Source Port Destination Port
Gateway Schedule
1.  UDP * * Interface IP Address 500 * Blank
2.  ESP * * Interface IP Address * * Blank

Vaughn 


On Mon, 2 Apr 2007 20:11:10 -0400, Scott Ullrich [EMAIL PROTECTED]
said:
 On 4/2/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:
  I've just tested the most recent pfsense update available on
  http://snapshots.pfsense.com/FreeBSD6/RELENG_1/updates/
 
 Please show the IPSEC rules that are relevant to the interface in
 question as you did prior.
 
 Thanks!
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-04-02 Thread Vaughn L. Reid III
Interesting,

This version of the firmware doesn't even list the VPN tunnel that is
configured for the OPT interface in the vpn section of /tmp/rules.debug.
 The tunnel definition is listed in the GUI, and it's working with the
manual rules because I'm in the process of accessing remote resources
now.

In /tmp/rules.debug, however, it's like the vpn out the opt interface
just doesn't exist.  I checked the firewall rules section of
/tmp/rules.debug, and the manual rules that I added are there.

Also, the firmware version that I was using when I started this thread
last week showed the VPN tunnel definition in /tmp/rules.debug, but it
showed the wrong interface.

Vaughn


On Mon, 2 Apr 2007 20:32:47 -0400, Scott Ullrich [EMAIL PROTECTED]
said:
 On 4/2/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:
  Here are the rules for the interface in question that seem to make the
  IPSEC tunnel work:
 [snip]
 
 Look in /tmp/rules.debug and search for IPSEC.
 
 Do you see rules permitting traffic to the interface?
 
 Scott
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-04-02 Thread Vaughn L. Reid III
Just to be thorough, I added two more rules to the firewall's OPT
interface to make sure all the IPSEC stuff gets through.  I'm fuzzy on
if the last two are needed, but just to be safe, I added them.

Here are all the rule that I've added:
Rules in the format listed below:
Format:  Protocol Source Port Destination Port
Gateway Schedule
1.  UDP * * Interface IP Address 500 * Blank
2.  ESP * * Interface IP Address * * Blank
3.  AH * * Interface IP Address * * Blank
4.  GRE * * Interface IP Address * * Blank

Vaughn




On Mon, 02 Apr 2007 20:43:38 -0400, Vaughn L. Reid III
[EMAIL PROTECTED] said:
 Interesting,
 
 This version of the firmware doesn't even list the VPN tunnel that is
 configured for the OPT interface in the vpn section of /tmp/rules.debug.
  The tunnel definition is listed in the GUI, and it's working with the
 manual rules because I'm in the process of accessing remote resources
 now.
 
 In /tmp/rules.debug, however, it's like the vpn out the opt interface
 just doesn't exist.  I checked the firewall rules section of
 /tmp/rules.debug, and the manual rules that I added are there.
 
 Also, the firmware version that I was using when I started this thread
 last week showed the VPN tunnel definition in /tmp/rules.debug, but it
 showed the wrong interface.
 
 Vaughn
 
 
 On Mon, 2 Apr 2007 20:32:47 -0400, Scott Ullrich [EMAIL PROTECTED]
 said:
  On 4/2/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:
   Here are the rules for the interface in question that seem to make the
   IPSEC tunnel work:
  [snip]
  
  Look in /tmp/rules.debug and search for IPSEC.
  
  Do you see rules permitting traffic to the interface?
  
  Scott
  
  -
  To unsubscribe, e-mail: [EMAIL PROTECTED]
  For additional commands, e-mail: [EMAIL PROTECTED]
  
 
 
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-30 Thread Vaughn L. Reid III
I just tried implementing IPSEC over an OPT interface using the 
pfsense.iso file from March 29, 2007 at 7:19 p.m.


Here are my results.  IPSEC will not work over my OPT2 Interface without 
adding specific firewall rules to the OPT2 interface to allow UDP 500 
and ESP to connect to that interface's IP address.


Once I manually add the rules, the tunnels get created and work 
correctly over the OPT2 interface.  Before I manually added the rules to 
the OPT2 interface, I noticed that there was no SAD listing to the 
tunnel being tested.  Both ends of the tunnel were, however, listed on 
the SPD tab of the IPSEC tunnel diagnostic page.


Once I added the needed firewall rules to the OPT2 interface, the VPN 
tunnel immediately set up and started working.  At that time, the proper 
entries appeared in the SAD on the IPSEC diagnostic page.


Also, I noticed during the loading of the pfsense firewall software 
while it was connecting services, etc. that an error message appeared 
that stated that there was an invalid argument foreach on line 7 of the 
/etc/inc/vslb.inc file.  Don't quote me on the line number, but I'm 
pretty sure it was line 7.  I'm not sure if this is related to my IPSEC 
issue, but I thought I'd comment in case it is relevant.


Thanks,

Vaughn Reid III

Tunge2 wrote:
If this is working it would be a great step a head :) 


-Oorspronkelijk bericht-
Van: Vaughn L. Reid III [mailto:[EMAIL PROTECTED] 
Verzonden: vrijdag 30 maart 2007 1:08

Aan: support@pfsense.com
Onderwerp: Re: [pfSense Support] IPSEC over an OPT interface Problems

Have the IPSEC changes been committed and built yet?  I'm looking at the
update files, and they all still say March 27 2007.  I'm using this
repository http://snapshots.pfsense.com/FreeBSD6/RELENG_1/updates/

Should I be looking somewhare else for the update with the IPSEC fix?

Thanks,

Vaughn 


On Thu, 29 Mar 2007 15:26:58 -0400, Vaughn L. Reid III
[EMAIL PROTECTED] said:
  
Thanks for your hard work.  I appreciate it and I'm sure my customers 
do too.


Vaughn

Vaughn L. Reid III wrote:

The ones ones that say Computer Support are from the test tunnel 
that I created to use OPT2.


The interfaces on this machine are labeled like this:

LAN = em0
WAN = em1
ATTDSL = em4 -- This is the OPT interface that I was using for the 
Computer Support VPN test wireless = em2


Vaughn

Scott Ullrich wrote:
  
Okay, so that I am on the same page as you.  Those $wan rules 
should have read $optX ??


Scott


On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:


Oops!  Sorry for the double post.

Vaughn L. Reid III wrote:
  
Here is the relevant text of my rules.debug file.  It looks like 
the interface on the connection computer support has the same 
interface as the rest of the tunnels.  This is the test 
connection that should be using OPT3.


# let out anything from the firewall host itself and decrypted 
IPsec traffic pass out quick on $lan proto icmp keep state label 
let out anything from firewall host itself
pass out quick on $wan proto icmp keep state label let out 
anything from firewall host itself
pass out quick on em1 all keep state label let out anything 
from firewall host itself

# pass traffic from firewall - out anchor firewallout
pass out quick on em1 all keep state label let out anything 
from firewall host itself
pass out quick on em0 all keep state label let out anything 
from firewall host itself
pass out quick on em4 all keep state label let out anything 
from firewall host itself
pass out quick on em2 all keep state label let out anything 
from firewall host itself
pass out quick on $pptp all keep state label let out anything 
from firewall host itself pptp

pass out quick on $enc0 keep state label IPSEC internal host to


host
  

# let out anything from the firewall host itself and decrypted IPsec
traffic
pass out quick on em4 proto icmp keep state label let out anything
from firewall host itself
pass out quick on em4 all keep state label let out anything from
firewall host itself


# VPN Rules
pass out quick on $wan proto udp from 209.218.218.138 to
65.119.178.137 port = 500 keep state label IPSEC: Fire Station 3 -
outbound isakmp
pass in quick on $wan proto udp from 65.119.178.137 to 


209.218.218.138
  

port = 500 keep state label IPSEC: Fire Station 3 - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to
65.119.178.137 keep state label IPSEC: Fire Station 3 - outbound


esp
  

proto
pass in quick on $wan proto esp from 65.119.178.137 to 


209.218.218.138
  

keep state label IPSEC: Fire Station 3 - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to
65.119.178.129 port = 500 keep state label IPSEC: Street 


Department -
  

outbound isakmp
pass in quick on $wan proto udp from 65.119.178.129 to 


209.218.218.138
  
port = 500 keep state label IPSEC

Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-30 Thread Vaughn L. Reid III

I'll check back later this evening or Monday day sometime.

Thanks,

Vaughn

Scott Ullrich wrote:

This is an old image.  The snapshot server has been down for some
time...  Try again 2-3 hours from now or on Monday.

Scott


On 3/30/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

I just tried implementing IPSEC over an OPT interface using the
pfsense.iso file from March 29, 2007 at 7:19 p.m.

Here are my results.  IPSEC will not work over my OPT2 Interface without
adding specific firewall rules to the OPT2 interface to allow UDP 500
and ESP to connect to that interface's IP address.

Once I manually add the rules, the tunnels get created and work
correctly over the OPT2 interface.  Before I manually added the rules to
the OPT2 interface, I noticed that there was no SAD listing to the
tunnel being tested.  Both ends of the tunnel were, however, listed on
the SPD tab of the IPSEC tunnel diagnostic page.

Once I added the needed firewall rules to the OPT2 interface, the VPN
tunnel immediately set up and started working.  At that time, the proper
entries appeared in the SAD on the IPSEC diagnostic page.

Also, I noticed during the loading of the pfsense firewall software
while it was connecting services, etc. that an error message appeared
that stated that there was an invalid argument foreach on line 7 of the
/etc/inc/vslb.inc file.  Don't quote me on the line number, but I'm
pretty sure it was line 7.  I'm not sure if this is related to my IPSEC
issue, but I thought I'd comment in case it is relevant.

Thanks,

Vaughn Reid III

Tunge2 wrote:
 If this is working it would be a great step a head :)

 -Oorspronkelijk bericht-
 Van: Vaughn L. Reid III [mailto:[EMAIL PROTECTED]
 Verzonden: vrijdag 30 maart 2007 1:08
 Aan: support@pfsense.com
 Onderwerp: Re: [pfSense Support] IPSEC over an OPT interface Problems

 Have the IPSEC changes been committed and built yet?  I'm looking 
at the

 update files, and they all still say March 27 2007.  I'm using this
 repository http://snapshots.pfsense.com/FreeBSD6/RELENG_1/updates/

 Should I be looking somewhare else for the update with the IPSEC fix?

 Thanks,

 Vaughn

 On Thu, 29 Mar 2007 15:26:58 -0400, Vaughn L. Reid III
 [EMAIL PROTECTED] said:

 Thanks for your hard work.  I appreciate it and I'm sure my customers
 do too.

 Vaughn

 Vaughn L. Reid III wrote:

 The ones ones that say Computer Support are from the test tunnel
 that I created to use OPT2.

 The interfaces on this machine are labeled like this:

 LAN = em0
 WAN = em1
 ATTDSL = em4 -- This is the OPT interface that I was using for the
 Computer Support VPN test wireless = em2

 Vaughn

 Scott Ullrich wrote:

 Okay, so that I am on the same page as you.  Those $wan rules
 should have read $optX ??

 Scott


 On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] 
wrote:


 Oops!  Sorry for the double post.

 Vaughn L. Reid III wrote:

 Here is the relevant text of my rules.debug file.  It looks like
 the interface on the connection computer support has the same
 interface as the rest of the tunnels.  This is the test
 connection that should be using OPT3.

 # let out anything from the firewall host itself and decrypted
 IPsec traffic pass out quick on $lan proto icmp keep state label
 let out anything from firewall host itself
 pass out quick on $wan proto icmp keep state label let out
 anything from firewall host itself
 pass out quick on em1 all keep state label let out anything
 from firewall host itself
 # pass traffic from firewall - out anchor firewallout
 pass out quick on em1 all keep state label let out anything
 from firewall host itself
 pass out quick on em0 all keep state label let out anything
 from firewall host itself
 pass out quick on em4 all keep state label let out anything
 from firewall host itself
 pass out quick on em2 all keep state label let out anything
 from firewall host itself
 pass out quick on $pptp all keep state label let out anything
 from firewall host itself pptp
 pass out quick on $enc0 keep state label IPSEC internal host to

 host

 # let out anything from the firewall host itself and decrypted 
IPsec

 traffic
 pass out quick on em4 proto icmp keep state label let out 
anything

 from firewall host itself
 pass out quick on em4 all keep state label let out anything from
 firewall host itself


 # VPN Rules
 pass out quick on $wan proto udp from 209.218.218.138 to
 65.119.178.137 port = 500 keep state label IPSEC: Fire 
Station 3 -

 outbound isakmp
 pass in quick on $wan proto udp from 65.119.178.137 to

 209.218.218.138

 port = 500 keep state label IPSEC: Fire Station 3 - inbound 
isakmp

 pass out quick on $wan proto esp from 209.218.218.138 to
 65.119.178.137 keep state label IPSEC: Fire Station 3 - outbound

 esp

 proto
 pass in quick on $wan proto esp from 65.119.178.137 to

 209.218.218.138

 keep state label IPSEC: Fire Station 3 - inbound esp proto
 pass out quick on $wan proto udp from 209.218.218.138 to
 65.119.178.129 port = 500 keep state label

[pfSense Support] Connectivity Issue with second OPT interface

2007-03-29 Thread Vaughn L. Reid III

I am running the 3-27 snapshot of pfsense.

I've been testing out adding a 2nd OPT interface that goes to remote 
sites over a wireless link.  A dedicated access point is doing all the 
wireless stuff, so that is not a responsibility of the pfsense box.   
Here's my problem though.


I can ping remote hosts from the pfsense box and can ping the remote 
hosts from the LAN interface.  Remote hosts show up in my arp table on 
the pfsense box and remote hosts can see the pfsense box in their arp 
tables.  I have a firewall rule configured to all all traffic going into 
and coming out of the interface on the pfsense box (Once I get things 
working, I'll lock this down some). 


Firewall Rule:
Proto * Source * Destination * Port * Gateway *

The firewall log shows that the pfsense box is accepting inbound 
requests, but nothing happens.  The remote hosts can't ping the pfsense 
machine, connect to it in any way, or access resources that lie behind it.


I do not have a NAT rule set for this interface, and I'm using Advanced 
NAT.  I don't want to perform NAT on this interface, just routing.


The IP of the OPT interface on the pfsense box is 172.16.125.1/24 with 
no gateway defined for the interface.  All of the remote hosts are in 
the 172.16.125.0/24 subnet and they have the pfsense box set up as their 
default gateway.  The diagnostic = routes page shows the correct 
interface as for the route to the 172.16.125.0/24 network and also shows 
a route to each host.


Am I missing something that I need to have configured that I don't?  My 
other OPT interface to a dsl connection is working correctly.


Thanks,

Vaughn

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III

I'm using the 3-27 snapshot on the pfsense box.

I've searched both the forum and the mailing list archives, and I can't 
seem to find an updated listing of how to get IPSEC to work over an OPT 
interface as well as over WAN at the Same time.


Here's what I want to do:

I have several remote sites that use one of two companies for their 
Internet access.  Our main office also has Internet access through these 
two ISP's.  I want to configure the tunnels that have Internet access 
through ISP A to use our ISP A connection, which is WAN, and those that 
have ISP B, which is our OPT1, to use ISP B's interface on the pfsense 
box for IPSEC vpn's.


I can get all of the VPN connections to work properly if they all use 
the WAN interface, but this adds about 5 hops and 50 milli-seconds to 
the round trip for those remotes that use ISP B.


Here's what I tried without success:
On the pfsense box, I changed the existing working configurations for 
the desired VPN tunnels to use the OPT interface.  I then saved my 
changed settings and clicked the Apply button.  At the desired remote 
sites, I changed the remote Gateway IP on their (previously working when 
using WAN) existing VPN tunnel configurations to use the OPT interface's 
IP address.  After doing this, I rebooted both the pfsense box and the 
remote router.   Also, the IPSEC interface has the default rule to allow 
all connections and all traffic.


Both the pfsense machine and the remote sites have static IP's for their 
Internet connections.  The remote sites are using linksys RV series 
firewalls.  The dsl router at the main site for the OPT interface is a 
netopia 3500 and it is set to bridge mode so that the OPT interface has 
a real public IP.


Any help will be appreciated.

Thanks,

Vaughn

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Connectivity Issue with second OPT interface

2007-03-29 Thread Vaughn L. Reid III
Thanks for the link.  I've been looking for a definitive how-to for load 
balancing.  It appears to have more information than some of the other 
documentation.


I'm not, however, actually using the OPT2 as a Wan link.  I just want to 
use it to act, basically, like a separate subnet on the network.  All 
the nodes that connect to that interface are on the same subnet as the 
interface itself, they can all see each other in arp, and I can ping out 
from both the pfsense box and the LAN interface and get a reply from the 
other nodes on OPT2.  The problem is that they can't see or ping or 
connect to either the pfsense machine or  to anything on the lan 
interface.  I added a rule to the firewall rules page for this interface 
to allow all traffic into and out of the interface.  And the firewall 
logs show that connection attempts are accepted.  But, none of the 
remote nodes get responses to their traffic.


Vaughn

Scott Ullrich wrote:

We have docs concerning multi-wan. Please ensure that you have double
checked your settings.

http://doc.pfsense.org/index.php/Multi-Wan/Load-Balancing

I run multi-wan at work and it absolutely works.

Scott


On 3/29/07, Robert Goley [EMAIL PROTECTED] wrote:
It seems we are both having the same basic issue.  I am assuming that 
you are
able to connect out via the same OPT2 interface you are trying to 
connect in
thru.  I wish I had more answer for you than I am having this trouble 
too.
No one has responded to my emails.  If I find the source of my 
problem, I

will let you know.

Robert

On Thursday 29 March 2007 07:13, Vaughn L. Reid III wrote:
 I am running the 3-27 snapshot of pfsense.

 I've been testing out adding a 2nd OPT interface that goes to remote
 sites over a wireless link.  A dedicated access point is doing all the
 wireless stuff, so that is not a responsibility of the pfsense box.
 Here's my problem though.

 I can ping remote hosts from the pfsense box and can ping the remote
 hosts from the LAN interface.  Remote hosts show up in my arp table on
 the pfsense box and remote hosts can see the pfsense box in their arp
 tables.  I have a firewall rule configured to all all traffic going 
into

 and coming out of the interface on the pfsense box (Once I get things
 working, I'll lock this down some).

 Firewall Rule:
 Proto * Source * Destination * Port * Gateway *

 The firewall log shows that the pfsense box is accepting inbound
 requests, but nothing happens.  The remote hosts can't ping the 
pfsense
 machine, connect to it in any way, or access resources that lie 
behind it.


 I do not have a NAT rule set for this interface, and I'm using 
Advanced

 NAT.  I don't want to perform NAT on this interface, just routing.

 The IP of the OPT interface on the pfsense box is 172.16.125.1/24 with
 no gateway defined for the interface.  All of the remote hosts are in
 the 172.16.125.0/24 subnet and they have the pfsense box set up as 
their

 default gateway.  The diagnostic = routes page shows the correct
 interface as for the route to the 172.16.125.0/24 network and also 
shows

 a route to each host.

 Am I missing something that I need to have configured that I 
don't?  My

 other OPT interface to a dsl connection is working correctly.

 Thanks,

 Vaughn

 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III
I've set up a test tunnel between my office and my customer site.  The 
VPN tunnel will work correctly when the pfsense interface is the WAN 
interface.  When I change the interface to the OPT interface, It doesn't 
seem to work.  Here are some log entries.


racoon: ERROR: phase1 negotiation failed due to time up. 
8c35cc8f9a4378c0:

Mar 29 13:36:29 racoon: INFO: delete phase 2 handler.
Mar 29 13:36:29 	racoon: ERROR: phase2 negotiation failed due to time up 
waiting for phase1. ESP 70.237.44.110[500]-75.44.169.169[500]

Mar 29 13:35:58 racoon: INFO: begin Aggressive mode.
Mar 29 13:35:58 	racoon: INFO: initiate new phase 1 negotiation: 
75.44.169.169[500]=70.237.44.110[500]
Mar 29 13:35:58 	racoon: INFO: IPsec-SA request for 70.237.44.110 queued 
due to no phase1 found.
Mar 29 13:32:04 	racoon: ERROR: phase1 negotiation failed due to time 
up. 022718bb87e94fd7:

Mar 29 13:31:35 racoon: INFO: delete phase 2 handler.
Mar 29 13:31:35 	racoon: ERROR: phase2 negotiation failed due to time up 
waiting for phase1. ESP 70.237.44.110[500]-75.44.169.169[500]

Mar 29 13:31:04 racoon: INFO: begin Aggressive mode.
Mar 29 13:31:04 	racoon: INFO: initiate new phase 1 negotiation: 
75.44.169.169[500]=70.237.44.110[500]
Mar 29 13:31:04 	racoon: INFO: IPsec-SA request for 70.237.44.110 queued 
due to no phase1 found.




This set of responses just seem to repeat themselves over and over 
again.  If I set the remote node to use the pfsense's WAN ip and change 
the tunnel definition on the pfsense box to use the WAN interface, then 
everything immediately works after hitting the save and apply buttons. 


Thanks,

Vaughn

Scott Ullrich wrote:

On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

I'm using the 3-27 snapshot on the pfsense box.

I've searched both the forum and the mailing list archives, and I can't
seem to find an updated listing of how to get IPSEC to work over an OPT
interface as well as over WAN at the Same time.

Here's what I want to do:

I have several remote sites that use one of two companies for their
Internet access.  Our main office also has Internet access through these
two ISP's.  I want to configure the tunnels that have Internet access
through ISP A to use our ISP A connection, which is WAN, and those that
have ISP B, which is our OPT1, to use ISP B's interface on the pfsense
box for IPSEC vpn's.

I can get all of the VPN connections to work properly if they all use
the WAN interface, but this adds about 5 hops and 50 milli-seconds to
the round trip for those remotes that use ISP B.

Here's what I tried without success:
On the pfsense box, I changed the existing working configurations for
the desired VPN tunnels to use the OPT interface.  I then saved my
changed settings and clicked the Apply button.  At the desired remote
sites, I changed the remote Gateway IP on their (previously working when
using WAN) existing VPN tunnel configurations to use the OPT interface's
IP address.  After doing this, I rebooted both the pfsense box and the
remote router.   Also, the IPSEC interface has the default rule to allow
all connections and all traffic.

Both the pfsense machine and the remote sites have static IP's for their
Internet connections.  The remote sites are using linksys RV series
firewalls.  The dsl router at the main site for the OPT interface is a
netopia 3500 and it is set to bridge mode so that the OPT interface has
a real public IP.


Please post the IPSEC logs from the pfSense box.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III
I changed the My Identifier on the tunnel definition to IP Address and 
then specified  75.44.169.169.  I clicked save and apply.  When I did 
this, the tunnel still did not work.  In addition, all mention of the 
tunnel stopped in the IPSEC logs. 

I have confirmed that I can ping the 75.44.169.169 IP from the remote 
gateway and that it is the OPT2 IP for the pfsense box.  I also 
confirmed that I can ssh into the pfsense machine using the above IP 
address.


Are there any special firewall or NAT rules that I need to set up the 
OPT2 interface to get it to accept an IPSEC tunnel?  I noticed that, for 
WAN at least, that those rules are automatically created and are not 
visible on the rules page.


Vaughn


Scott Ullrich wrote:

On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

I've set up a test tunnel between my office and my customer site.  The
VPN tunnel will work correctly when the pfsense interface is the WAN
interface.  When I change the interface to the OPT interface, It doesn't
seem to work.  Here are some log entries.

racoon: ERROR: phase1 negotiation failed due to time up.
8c35cc8f9a4378c0:
Mar 29 13:36:29 racoon: INFO: delete phase 2 handler.
Mar 29 13:36:29 racoon: ERROR: phase2 negotiation failed due 
to time up

waiting for phase1. ESP 70.237.44.110[500]-75.44.169.169[500]
Mar 29 13:35:58 racoon: INFO: begin Aggressive mode.
Mar 29 13:35:58 racoon: INFO: initiate new phase 1 negotiation:
75.44.169.169[500]=70.237.44.110[500]
Mar 29 13:35:58 racoon: INFO: IPsec-SA request for 
70.237.44.110 queued

due to no phase1 found.
Mar 29 13:32:04 racoon: ERROR: phase1 negotiation failed due 
to time

up. 022718bb87e94fd7:
Mar 29 13:31:35 racoon: INFO: delete phase 2 handler.
Mar 29 13:31:35 racoon: ERROR: phase2 negotiation failed due 
to time up

waiting for phase1. ESP 70.237.44.110[500]-75.44.169.169[500]
Mar 29 13:31:04 racoon: INFO: begin Aggressive mode.
Mar 29 13:31:04 racoon: INFO: initiate new phase 1 negotiation:
75.44.169.169[500]=70.237.44.110[500]
Mar 29 13:31:04 racoon: INFO: IPsec-SA request for 
70.237.44.110 queued

due to no phase1 found.



This set of responses just seem to repeat themselves over and over
again.  If I set the remote node to use the pfsense's WAN ip and change
the tunnel definition on the pfsense box to use the WAN interface, then
everything immediately works after hitting the save and apply buttons.


Please verify that the IP addresses match up in the report below.

You can also change My Identifier to IP Address and manually type
in the OPT interface IP.  Does that fix it?  If so please show the log
files differences.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III
I have only the default allow everything rule on the IPSEC tab.  I 
manually added rules to the firewall to allow UDP 500 to the OPT2 
interface and to allow ESP to the OPT2 interface, and now I'm getting 
different IPSEC log results (I changed the My Identifier back to 
interface address).


Here are the new log entries:

Mar 29 14:20:20 	racoon: ERROR: pfkey DELETE received: ESP 
75.44.169.169[0]-70.237.44.110[0] spi=3627103776(0xd8313620)
Mar 29 14:19:21 	racoon: INFO: IPsec-SA established: ESP/Tunnel 
75.44.169.169[0]-70.237.44.110[0] spi=3097439008(0xb89f2b20)
Mar 29 14:19:21 	racoon: INFO: IPsec-SA established: ESP/Tunnel 
70.237.44.110[0]-75.44.169.169[0] spi=129752861(0x7bbdf1d)
Mar 29 14:19:21 	racoon: INFO: respond new phase 2 negotiation: 
75.44.169.169[500]=70.237.44.110[500]
Mar 29 14:19:21 	racoon: INFO: ISAKMP-SA established 
75.44.169.169[500]-70.237.44.110[500] spi:72fba3fecd3739c6:f7fb0fc1959fdf21
Mar 29 14:19:20 	racoon: NOTIFY: couldn't find the proper pskey, try to 
get one by the peer's address.

Mar 29 14:19:20 racoon: INFO: begin Aggressive mode.
Mar 29 14:19:20 	racoon: INFO: respond new phase 1 negotiation: 
75.44.169.169[500]=70.237.44.110[500]
Mar 29 14:17:43 	racoon: ERROR: pfkey DELETE received: ESP 
75.44.169.169[0]-70.237.44.110[0] spi=754453952(0x2cf80dc0)
Mar 29 14:17:43 	racoon: ERROR: pfkey DELETE received: ESP 
75.44.169.169[0]-70.237.44.110[0] spi=2451182496(0x921a13a0)
Mar 29 14:17:03 	racoon: INFO: IPsec-SA established: ESP/Tunnel 
75.44.169.169[0]-70.237.44.110[0] spi=3627103776(0xd8313620)
Mar 29 14:17:03 	racoon: INFO: IPsec-SA established: ESP/Tunnel 
70.237.44.110[0]-75.44.169.169[0] spi=101957205(0x613be55)
Mar 29 14:17:03 	racoon: INFO: respond new phase 2 negotiation: 
75.44.169.169[500]=70.237.44.110[500]
Mar 29 14:17:03 	racoon: INFO: ISAKMP-SA established 
75.44.169.169[500]-70.237.44.110[500] spi:8203621148841b41:6ad562eb830dd2d5
Mar 29 14:17:02 	racoon: NOTIFY: couldn't find the proper pskey, try to 
get one by the peer's address.

Mar 29 14:17:02 racoon: INFO: begin Aggressive mode.
Mar 29 14:17:02 	racoon: INFO: respond new phase 1 negotiation: 
75.44.169.169[500]=70.237.44.110[500]



Vaughn

Scott Ullrich wrote:

On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

I changed the My Identifier on the tunnel definition to IP Address and
then specified  75.44.169.169.  I clicked save and apply.  When I did
this, the tunnel still did not work.  In addition, all mention of the
tunnel stopped in the IPSEC logs.

I have confirmed that I can ping the 75.44.169.169 IP from the remote
gateway and that it is the OPT2 IP for the pfsense box.  I also
confirmed that I can ssh into the pfsense machine using the above IP
address.

Are there any special firewall or NAT rules that I need to set up the
OPT2 interface to get it to accept an IPSEC tunnel?  I noticed that, for
WAN at least, that those rules are automatically created and are not
visible on the rules page.


Nothing else is required except for a pass rule on the IPSEC tab on
recent snapshots.

I am running a tunnel on a opt1 interface and it works fine here.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III
I changed the My Identifier on the tunnel definition to IP Address and 
then specified  75.44.169.169.  I clicked save and apply.  When I did 
this, the tunnel still did not work.  In addition, all mention of the 
tunnel stopped in the IPSEC logs. 

I have confirmed that I can ping the 75.44.169.169 IP from the remote 
gateway and that it is the OPT2 IP for the pfsense box.  I also 
confirmed that I can ssh into the pfsense machine using the above IP 
address.


Are there any special firewall or NAT rules that I need to set up the 
OPT2 interface to get it to accept an IPSEC tunnel?  I noticed that, for 
WAN at least, that those rules are automatically created and are not 
visible on the rules page.


Vaughn


Scott Ullrich wrote:

On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

I've set up a test tunnel between my office and my customer site.  The
VPN tunnel will work correctly when the pfsense interface is the WAN
interface.  When I change the interface to the OPT interface, It doesn't
seem to work.  Here are some log entries.

racoon: ERROR: phase1 negotiation failed due to time up.
8c35cc8f9a4378c0:
Mar 29 13:36:29 racoon: INFO: delete phase 2 handler.
Mar 29 13:36:29 racoon: ERROR: phase2 negotiation failed due 
to time up

waiting for phase1. ESP 70.237.44.110[500]-75.44.169.169[500]
Mar 29 13:35:58 racoon: INFO: begin Aggressive mode.
Mar 29 13:35:58 racoon: INFO: initiate new phase 1 negotiation:
75.44.169.169[500]=70.237.44.110[500]
Mar 29 13:35:58 racoon: INFO: IPsec-SA request for 
70.237.44.110 queued

due to no phase1 found.
Mar 29 13:32:04 racoon: ERROR: phase1 negotiation failed due 
to time

up. 022718bb87e94fd7:
Mar 29 13:31:35 racoon: INFO: delete phase 2 handler.
Mar 29 13:31:35 racoon: ERROR: phase2 negotiation failed due 
to time up

waiting for phase1. ESP 70.237.44.110[500]-75.44.169.169[500]
Mar 29 13:31:04 racoon: INFO: begin Aggressive mode.
Mar 29 13:31:04 racoon: INFO: initiate new phase 1 negotiation:
75.44.169.169[500]=70.237.44.110[500]
Mar 29 13:31:04 racoon: INFO: IPsec-SA request for 
70.237.44.110 queued

due to no phase1 found.



This set of responses just seem to repeat themselves over and over
again.  If I set the remote node to use the pfsense's WAN ip and change
the tunnel definition on the pfsense box to use the WAN interface, then
everything immediately works after hitting the save and apply buttons.


Please verify that the IP addresses match up in the report below.

You can also change My Identifier to IP Address and manually type
in the OPT interface IP.  Does that fix it?  If so please show the log
files differences.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III
After I let the connection set for a couple minutes after manually 
adding the UDP 500 and ESP rules, the tunnel started working.  Yeah!!!


Assuming that I will need to manually add the rules to the OPT2 
interface, are there any additional rules that need to be added for IPSEC?


Also, here are the log entries now that the tunnel is up.
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 192.168.10.1[500] used as isakmp port 
(fd=22)
Mar 29 14:24:41 	racoon: INFO: fe80::2e0:81ff:fe74:bb24%em0[500] used as 
isakmp port (fd=21)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 209.218.218.138[500] used as isakmp port 
(fd=20)
Mar 29 14:24:41 	racoon: INFO: fe80::204:23ff:fede:b8a6%em1[500] used as 
isakmp port (fd=19)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 75.44.169.169[500] used as isakmp port 
(fd=18)
Mar 29 14:24:41 	racoon: INFO: fe80::204:23ff:fede:b88d%em4[500] used as 
isakmp port (fd=17)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument

Mar 29 14:24:41 racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=16)
Mar 29 14:24:41 racoon: INFO: ::1[500] used as isakmp port (fd=15)
Mar 29 14:24:41 racoon: INFO: fe80::1%lo0[500] used as isakmp port 
(fd=14)
Mar 29 14:24:41 	racoon: INFO: fe80::2e0:81ff:fe74:bb24%ng1[500] used as 
isakmp port (fd=13)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 192.168.10.1[500] used as isakmp port 
(fd=22)
Mar 29 14:24:41 	racoon: INFO: fe80::2e0:81ff:fe74:bb24%em0[500] used as 
isakmp port (fd=21)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 209.218.218.138[500] used as isakmp port 
(fd=20)
Mar 29 14:24:41 	racoon: INFO: fe80::204:23ff:fede:b8a6%em1[500] used as 
isakmp port (fd=19)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 75.44.169.169[500] used as isakmp port 
(fd=18)
Mar 29 14:24:41 	racoon: INFO: fe80::204:23ff:fede:b88d%em4[500] used as 
isakmp port (fd=17)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument

Mar 29 14:24:41 racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=16)
Mar 29 14:24:41 racoon: INFO: ::1[500] used as isakmp port (fd=15)
Mar 29 14:24:41 racoon: INFO: fe80::1%lo0[500] used as isakmp port 
(fd=14)
Mar 29 14:24:41 	racoon: INFO: fe80::2e0:81ff:fe74:bb24%ng1[500] used as 
isakmp port (fd=13)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 192.168.10.1[500] used as isakmp port 
(fd=22)
Mar 29 14:24:41 	racoon: INFO: fe80::2e0:81ff:fe74:bb24%em0[500] used as 
isakmp port (fd=21)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 209.218.218.138[500] used as isakmp port 
(fd=20)
Mar 29 14:24:41 	racoon: INFO: fe80::204:23ff:fede:b8a6%em1[500] used as 
isakmp port (fd=19)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 75.44.169.169[500] used as isakmp port 
(fd=18)
Mar 29 14:24:41 	racoon: INFO: fe80::204:23ff:fede:b88d%em4[500] used as 
isakmp port (fd=17)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument

Mar 29 14:24:41 racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=16)
Mar 29 14:24:41 racoon: INFO: ::1[500] used as isakmp port (fd=15)
Mar 29 14:24:41 racoon: INFO: fe80::1%lo0[500] used as isakmp port 
(fd=14)
Mar 29 14:24:41 	racoon: INFO: fe80::2e0:81ff:fe74:bb24%ng1[500] used as 
isakmp port (fd=13)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 192.168.10.1[500] used as isakmp port 
(fd=22)
Mar 29 14:24:41 	racoon: INFO: fe80::2e0:81ff:fe74:bb24%em0[500] used as 
isakmp port (fd=21)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 209.218.218.138[500] used as isakmp port 
(fd=20)
Mar 29 14:24:41 	racoon: INFO: fe80::204:23ff:fede:b8a6%em1[500] used as 
isakmp port (fd=19)
Mar 29 14:24:41 	racoon: WARNING: 
setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): Invalid argument
Mar 29 14:24:41 	racoon: INFO: 75.44.169.169[500] used as isakmp port 
(fd=18)
Mar 29 14:24:41 	racoon: INFO: fe80::204:23ff:fede:b88d%em4[500] used as 
isakmp port (fd=17)




Thanks,

Vaughn Reid III


Vaughn L. Reid III wrote:
I have only the default allow everything rule on the IPSEC tab.  I 
manually added rules to the firewall to allow UDP 500 to the OPT2

Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III
Here is the relevant text of my rules.debug file.  It looks like the 
interface on the connection computer support has the same interface as 
the rest of the tunnels.  This is the test connection that should be 
using OPT3.


# let out anything from the firewall host itself and decrypted IPsec traffic
pass out quick on $lan proto icmp keep state label let out anything 
from firewall host itself
pass out quick on $wan proto icmp keep state label let out anything 
from firewall host itself
pass out quick on em1 all keep state label let out anything from 
firewall host itself

# pass traffic from firewall - out
anchor firewallout
pass out quick on em1 all keep state label let out anything from 
firewall host itself
pass out quick on em0 all keep state label let out anything from 
firewall host itself
pass out quick on em4 all keep state label let out anything from 
firewall host itself
pass out quick on em2 all keep state label let out anything from 
firewall host itself
pass out quick on $pptp all keep state label let out anything from 
firewall host itself pptp

pass out quick on $enc0 keep state label IPSEC internal host to host

# let out anything from the firewall host itself and decrypted IPsec traffic
pass out quick on em4 proto icmp keep state label let out anything from 
firewall host itself
pass out quick on em4 all keep state label let out anything from 
firewall host itself



# VPN Rules
pass out quick on $wan proto udp from 209.218.218.138 to 65.119.178.137 
port = 500 keep state label IPSEC: Fire Station 3 - outbound isakmp
pass in quick on $wan proto udp from 65.119.178.137 to 209.218.218.138 
port = 500 keep state label IPSEC: Fire Station 3 - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 65.119.178.137 
keep state label IPSEC: Fire Station 3 - outbound esp proto
pass in quick on $wan proto esp from 65.119.178.137 to 209.218.218.138 
keep state label IPSEC: Fire Station 3 - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 65.119.178.129 
port = 500 keep state label IPSEC: Street Department - outbound isakmp
pass in quick on $wan proto udp from 65.119.178.129 to 209.218.218.138 
port = 500 keep state label IPSEC: Street Department - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 65.119.178.129 
keep state label IPSEC: Street Department - outbound esp proto
pass in quick on $wan proto esp from 65.119.178.129 to 209.218.218.138 
keep state label IPSEC: Street Department - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 65.119.178.154 
port = 500 keep state label IPSEC: Fire Station 2 - outbound isakmp
pass in quick on $wan proto udp from 65.119.178.154 to 209.218.218.138 
port = 500 keep state label IPSEC: Fire Station 2 - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 65.119.178.154 
keep state label IPSEC: Fire Station 2 - outbound esp proto
pass in quick on $wan proto esp from 65.119.178.154 to 209.218.218.138 
keep state label IPSEC: Fire Station 2 - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 70.227.28.14 
port = 500 keep state label IPSEC: EMS Building - outbound isakmp
pass in quick on $wan proto udp from 70.227.28.14 to 209.218.218.138 
port = 500 keep state label IPSEC: EMS Building - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 70.227.28.14 
keep state label IPSEC: EMS Building - outbound esp proto
pass in quick on $wan proto esp from 70.227.28.14 to 209.218.218.138 
keep state label IPSEC: EMS Building - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 70.237.44.110 
port = 500 keep state label IPSEC: Computer Support - outbound isakmp
pass in quick on $wan proto udp from 70.237.44.110 to 209.218.218.138 
port = 500 keep state label IPSEC: Computer Support - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 70.237.44.110 
keep state label IPSEC: Computer Support - outbound esp proto
pass in quick on $wan proto esp from 70.237.44.110 to 209.218.218.138 
keep state label IPSEC: Computer Support - inbound esp proto


pass in quick on em0 inet proto tcp from any to $loopback port 8021 keep 
state label FTP PROXY: Allow traffic to localhost
pass in quick on em0 inet proto tcp from any to $loopback port 21 keep 
state label FTP PROXY: Allow traffic to localhost
pass in quick on em1 inet proto tcp from port 20 to (em1) port  49000 
user proxy flags S/SA keep state label FTP PROXY: PASV mode data 
connection

# enable ftp-proxy
pass in quick on em4 inet proto tcp from any to $loopback port 8022 keep 
state label FTP PROXY: Allow traffic to localhost
pass in quick on em4 inet proto tcp from any to $loopback port 21 keep 
state label FTP PROXY: Allow traffic to localhost


Vaughn


Scott Ullrich wrote:

On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

I didn't get the request, but I'll be happy check to see if rules are
being added.  Should I remove

Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III
Here is the relevant text of my rules.debug file.  It looks like the 
interface on the connection computer support has the same interface as 
the rest of the tunnels.  This is the test connection that should be 
using OPT3.


# let out anything from the firewall host itself and decrypted IPsec traffic
pass out quick on $lan proto icmp keep state label let out anything 
from firewall host itself
pass out quick on $wan proto icmp keep state label let out anything 
from firewall host itself
pass out quick on em1 all keep state label let out anything from 
firewall host itself

# pass traffic from firewall - out
anchor firewallout
pass out quick on em1 all keep state label let out anything from 
firewall host itself
pass out quick on em0 all keep state label let out anything from 
firewall host itself
pass out quick on em4 all keep state label let out anything from 
firewall host itself
pass out quick on em2 all keep state label let out anything from 
firewall host itself
pass out quick on $pptp all keep state label let out anything from 
firewall host itself pptp

pass out quick on $enc0 keep state label IPSEC internal host to host

# let out anything from the firewall host itself and decrypted IPsec traffic
pass out quick on em4 proto icmp keep state label let out anything from 
firewall host itself
pass out quick on em4 all keep state label let out anything from 
firewall host itself



# VPN Rules
pass out quick on $wan proto udp from 209.218.218.138 to 65.119.178.137 
port = 500 keep state label IPSEC: Fire Station 3 - outbound isakmp
pass in quick on $wan proto udp from 65.119.178.137 to 209.218.218.138 
port = 500 keep state label IPSEC: Fire Station 3 - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 65.119.178.137 
keep state label IPSEC: Fire Station 3 - outbound esp proto
pass in quick on $wan proto esp from 65.119.178.137 to 209.218.218.138 
keep state label IPSEC: Fire Station 3 - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 65.119.178.129 
port = 500 keep state label IPSEC: Street Department - outbound isakmp
pass in quick on $wan proto udp from 65.119.178.129 to 209.218.218.138 
port = 500 keep state label IPSEC: Street Department - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 65.119.178.129 
keep state label IPSEC: Street Department - outbound esp proto
pass in quick on $wan proto esp from 65.119.178.129 to 209.218.218.138 
keep state label IPSEC: Street Department - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 65.119.178.154 
port = 500 keep state label IPSEC: Fire Station 2 - outbound isakmp
pass in quick on $wan proto udp from 65.119.178.154 to 209.218.218.138 
port = 500 keep state label IPSEC: Fire Station 2 - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 65.119.178.154 
keep state label IPSEC: Fire Station 2 - outbound esp proto
pass in quick on $wan proto esp from 65.119.178.154 to 209.218.218.138 
keep state label IPSEC: Fire Station 2 - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 70.227.28.14 
port = 500 keep state label IPSEC: EMS Building - outbound isakmp
pass in quick on $wan proto udp from 70.227.28.14 to 209.218.218.138 
port = 500 keep state label IPSEC: EMS Building - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 70.227.28.14 
keep state label IPSEC: EMS Building - outbound esp proto
pass in quick on $wan proto esp from 70.227.28.14 to 209.218.218.138 
keep state label IPSEC: EMS Building - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 70.237.44.110 
port = 500 keep state label IPSEC: Computer Support - outbound isakmp
pass in quick on $wan proto udp from 70.237.44.110 to 209.218.218.138 
port = 500 keep state label IPSEC: Computer Support - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 70.237.44.110 
keep state label IPSEC: Computer Support - outbound esp proto
pass in quick on $wan proto esp from 70.237.44.110 to 209.218.218.138 
keep state label IPSEC: Computer Support - inbound esp proto


pass in quick on em0 inet proto tcp from any to $loopback port 8021 keep 
state label FTP PROXY: Allow traffic to localhost
pass in quick on em0 inet proto tcp from any to $loopback port 21 keep 
state label FTP PROXY: Allow traffic to localhost
pass in quick on em1 inet proto tcp from port 20 to (em1) port  49000 
user proxy flags S/SA keep state label FTP PROXY: PASV mode data 
connection

# enable ftp-proxy
pass in quick on em4 inet proto tcp from any to $loopback port 8022 keep 
state label FTP PROXY: Allow traffic to localhost
pass in quick on em4 inet proto tcp from any to $loopback port 21 keep 
state label FTP PROXY: Allow traffic to localhost


Vaughn


Scott Ullrich wrote:

On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

I didn't get the request, but I'll be happy check to see if rules are
being added.  Should I remove

Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III

Oops!  Sorry for the double post.

Vaughn L. Reid III wrote:
Here is the relevant text of my rules.debug file.  It looks like the 
interface on the connection computer support has the same interface 
as the rest of the tunnels.  This is the test connection that should 
be using OPT3.


# let out anything from the firewall host itself and decrypted IPsec 
traffic
pass out quick on $lan proto icmp keep state label let out anything 
from firewall host itself
pass out quick on $wan proto icmp keep state label let out anything 
from firewall host itself
pass out quick on em1 all keep state label let out anything from 
firewall host itself

# pass traffic from firewall - out
anchor firewallout
pass out quick on em1 all keep state label let out anything from 
firewall host itself
pass out quick on em0 all keep state label let out anything from 
firewall host itself
pass out quick on em4 all keep state label let out anything from 
firewall host itself
pass out quick on em2 all keep state label let out anything from 
firewall host itself
pass out quick on $pptp all keep state label let out anything from 
firewall host itself pptp

pass out quick on $enc0 keep state label IPSEC internal host to host

# let out anything from the firewall host itself and decrypted IPsec 
traffic
pass out quick on em4 proto icmp keep state label let out anything 
from firewall host itself
pass out quick on em4 all keep state label let out anything from 
firewall host itself



# VPN Rules
pass out quick on $wan proto udp from 209.218.218.138 to 
65.119.178.137 port = 500 keep state label IPSEC: Fire Station 3 - 
outbound isakmp
pass in quick on $wan proto udp from 65.119.178.137 to 209.218.218.138 
port = 500 keep state label IPSEC: Fire Station 3 - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 
65.119.178.137 keep state label IPSEC: Fire Station 3 - outbound esp 
proto
pass in quick on $wan proto esp from 65.119.178.137 to 209.218.218.138 
keep state label IPSEC: Fire Station 3 - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 
65.119.178.129 port = 500 keep state label IPSEC: Street Department - 
outbound isakmp
pass in quick on $wan proto udp from 65.119.178.129 to 209.218.218.138 
port = 500 keep state label IPSEC: Street Department - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 
65.119.178.129 keep state label IPSEC: Street Department - outbound 
esp proto
pass in quick on $wan proto esp from 65.119.178.129 to 209.218.218.138 
keep state label IPSEC: Street Department - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 
65.119.178.154 port = 500 keep state label IPSEC: Fire Station 2 - 
outbound isakmp
pass in quick on $wan proto udp from 65.119.178.154 to 209.218.218.138 
port = 500 keep state label IPSEC: Fire Station 2 - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 
65.119.178.154 keep state label IPSEC: Fire Station 2 - outbound esp 
proto
pass in quick on $wan proto esp from 65.119.178.154 to 209.218.218.138 
keep state label IPSEC: Fire Station 2 - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 70.227.28.14 
port = 500 keep state label IPSEC: EMS Building - outbound isakmp
pass in quick on $wan proto udp from 70.227.28.14 to 209.218.218.138 
port = 500 keep state label IPSEC: EMS Building - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 70.227.28.14 
keep state label IPSEC: EMS Building - outbound esp proto
pass in quick on $wan proto esp from 70.227.28.14 to 209.218.218.138 
keep state label IPSEC: EMS Building - inbound esp proto
pass out quick on $wan proto udp from 209.218.218.138 to 70.237.44.110 
port = 500 keep state label IPSEC: Computer Support - outbound isakmp
pass in quick on $wan proto udp from 70.237.44.110 to 209.218.218.138 
port = 500 keep state label IPSEC: Computer Support - inbound isakmp
pass out quick on $wan proto esp from 209.218.218.138 to 70.237.44.110 
keep state label IPSEC: Computer Support - outbound esp proto
pass in quick on $wan proto esp from 70.237.44.110 to 209.218.218.138 
keep state label IPSEC: Computer Support - inbound esp proto


pass in quick on em0 inet proto tcp from any to $loopback port 8021 
keep state label FTP PROXY: Allow traffic to localhost
pass in quick on em0 inet proto tcp from any to $loopback port 21 keep 
state label FTP PROXY: Allow traffic to localhost
pass in quick on em1 inet proto tcp from port 20 to (em1) port  49000 
user proxy flags S/SA keep state label FTP PROXY: PASV mode data 
connection

# enable ftp-proxy
pass in quick on em4 inet proto tcp from any to $loopback port 8022 
keep state label FTP PROXY: Allow traffic to localhost
pass in quick on em4 inet proto tcp from any to $loopback port 21 keep 
state label FTP PROXY: Allow traffic to localhost


Vaughn


Scott Ullrich wrote:

On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

I didn't get the request, but I'll

Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III
The ones ones that say Computer Support are from the test tunnel that I 
created to use OPT2.


The interfaces on this machine are labeled like this:

LAN = em0
WAN = em1
ATTDSL = em4 -- This is the OPT interface that I was using for the 
Computer Support VPN test

wireless = em2

Vaughn

Scott Ullrich wrote:

Okay, so that I am on the same page as you.  Those $wan rules should
have read $optX ??

Scott


On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

Oops!  Sorry for the double post.

Vaughn L. Reid III wrote:
 Here is the relevant text of my rules.debug file.  It looks like the
 interface on the connection computer support has the same interface
 as the rest of the tunnels.  This is the test connection that should
 be using OPT3.

 # let out anything from the firewall host itself and decrypted IPsec
 traffic
 pass out quick on $lan proto icmp keep state label let out anything
 from firewall host itself
 pass out quick on $wan proto icmp keep state label let out anything
 from firewall host itself
 pass out quick on em1 all keep state label let out anything from
 firewall host itself
 # pass traffic from firewall - out
 anchor firewallout
 pass out quick on em1 all keep state label let out anything from
 firewall host itself
 pass out quick on em0 all keep state label let out anything from
 firewall host itself
 pass out quick on em4 all keep state label let out anything from
 firewall host itself
 pass out quick on em2 all keep state label let out anything from
 firewall host itself
 pass out quick on $pptp all keep state label let out anything from
 firewall host itself pptp
 pass out quick on $enc0 keep state label IPSEC internal host to host

 # let out anything from the firewall host itself and decrypted IPsec
 traffic
 pass out quick on em4 proto icmp keep state label let out anything
 from firewall host itself
 pass out quick on em4 all keep state label let out anything from
 firewall host itself


 # VPN Rules
 pass out quick on $wan proto udp from 209.218.218.138 to
 65.119.178.137 port = 500 keep state label IPSEC: Fire Station 3 -
 outbound isakmp
 pass in quick on $wan proto udp from 65.119.178.137 to 209.218.218.138
 port = 500 keep state label IPSEC: Fire Station 3 - inbound isakmp
 pass out quick on $wan proto esp from 209.218.218.138 to
 65.119.178.137 keep state label IPSEC: Fire Station 3 - outbound esp
 proto
 pass in quick on $wan proto esp from 65.119.178.137 to 209.218.218.138
 keep state label IPSEC: Fire Station 3 - inbound esp proto
 pass out quick on $wan proto udp from 209.218.218.138 to
 65.119.178.129 port = 500 keep state label IPSEC: Street Department -
 outbound isakmp
 pass in quick on $wan proto udp from 65.119.178.129 to 209.218.218.138
 port = 500 keep state label IPSEC: Street Department - inbound 
isakmp

 pass out quick on $wan proto esp from 209.218.218.138 to
 65.119.178.129 keep state label IPSEC: Street Department - outbound
 esp proto
 pass in quick on $wan proto esp from 65.119.178.129 to 209.218.218.138
 keep state label IPSEC: Street Department - inbound esp proto
 pass out quick on $wan proto udp from 209.218.218.138 to
 65.119.178.154 port = 500 keep state label IPSEC: Fire Station 2 -
 outbound isakmp
 pass in quick on $wan proto udp from 65.119.178.154 to 209.218.218.138
 port = 500 keep state label IPSEC: Fire Station 2 - inbound isakmp
 pass out quick on $wan proto esp from 209.218.218.138 to
 65.119.178.154 keep state label IPSEC: Fire Station 2 - outbound esp
 proto
 pass in quick on $wan proto esp from 65.119.178.154 to 209.218.218.138
 keep state label IPSEC: Fire Station 2 - inbound esp proto
 pass out quick on $wan proto udp from 209.218.218.138 to 70.227.28.14
 port = 500 keep state label IPSEC: EMS Building - outbound isakmp
 pass in quick on $wan proto udp from 70.227.28.14 to 209.218.218.138
 port = 500 keep state label IPSEC: EMS Building - inbound isakmp
 pass out quick on $wan proto esp from 209.218.218.138 to 70.227.28.14
 keep state label IPSEC: EMS Building - outbound esp proto
 pass in quick on $wan proto esp from 70.227.28.14 to 209.218.218.138
 keep state label IPSEC: EMS Building - inbound esp proto
 pass out quick on $wan proto udp from 209.218.218.138 to 70.237.44.110
 port = 500 keep state label IPSEC: Computer Support - outbound 
isakmp

 pass in quick on $wan proto udp from 70.237.44.110 to 209.218.218.138
 port = 500 keep state label IPSEC: Computer Support - inbound isakmp
 pass out quick on $wan proto esp from 209.218.218.138 to 70.237.44.110
 keep state label IPSEC: Computer Support - outbound esp proto
 pass in quick on $wan proto esp from 70.237.44.110 to 209.218.218.138
 keep state label IPSEC: Computer Support - inbound esp proto

 pass in quick on em0 inet proto tcp from any to $loopback port 8021
 keep state label FTP PROXY: Allow traffic to localhost
 pass in quick on em0 inet proto tcp from any to $loopback port 21 keep
 state label FTP PROXY: Allow traffic to localhost
 pass in quick on em1 inet proto tcp

Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III
Thanks for your hard work.  I appreciate it and I'm sure my customers do 
too.


Vaughn

Vaughn L. Reid III wrote:
The ones ones that say Computer Support are from the test tunnel that 
I created to use OPT2.


The interfaces on this machine are labeled like this:

LAN = em0
WAN = em1
ATTDSL = em4 -- This is the OPT interface that I was using for the 
Computer Support VPN test

wireless = em2

Vaughn

Scott Ullrich wrote:

Okay, so that I am on the same page as you.  Those $wan rules should
have read $optX ??

Scott


On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

Oops!  Sorry for the double post.

Vaughn L. Reid III wrote:
 Here is the relevant text of my rules.debug file.  It looks like the
 interface on the connection computer support has the same interface
 as the rest of the tunnels.  This is the test connection that should
 be using OPT3.

 # let out anything from the firewall host itself and decrypted IPsec
 traffic
 pass out quick on $lan proto icmp keep state label let out anything
 from firewall host itself
 pass out quick on $wan proto icmp keep state label let out anything
 from firewall host itself
 pass out quick on em1 all keep state label let out anything from
 firewall host itself
 # pass traffic from firewall - out
 anchor firewallout
 pass out quick on em1 all keep state label let out anything from
 firewall host itself
 pass out quick on em0 all keep state label let out anything from
 firewall host itself
 pass out quick on em4 all keep state label let out anything from
 firewall host itself
 pass out quick on em2 all keep state label let out anything from
 firewall host itself
 pass out quick on $pptp all keep state label let out anything from
 firewall host itself pptp
 pass out quick on $enc0 keep state label IPSEC internal host to 
host


 # let out anything from the firewall host itself and decrypted IPsec
 traffic
 pass out quick on em4 proto icmp keep state label let out anything
 from firewall host itself
 pass out quick on em4 all keep state label let out anything from
 firewall host itself


 # VPN Rules
 pass out quick on $wan proto udp from 209.218.218.138 to
 65.119.178.137 port = 500 keep state label IPSEC: Fire Station 3 -
 outbound isakmp
 pass in quick on $wan proto udp from 65.119.178.137 to 
209.218.218.138

 port = 500 keep state label IPSEC: Fire Station 3 - inbound isakmp
 pass out quick on $wan proto esp from 209.218.218.138 to
 65.119.178.137 keep state label IPSEC: Fire Station 3 - outbound esp
 proto
 pass in quick on $wan proto esp from 65.119.178.137 to 
209.218.218.138

 keep state label IPSEC: Fire Station 3 - inbound esp proto
 pass out quick on $wan proto udp from 209.218.218.138 to
 65.119.178.129 port = 500 keep state label IPSEC: Street 
Department -

 outbound isakmp
 pass in quick on $wan proto udp from 65.119.178.129 to 
209.218.218.138
 port = 500 keep state label IPSEC: Street Department - inbound 
isakmp

 pass out quick on $wan proto esp from 209.218.218.138 to
 65.119.178.129 keep state label IPSEC: Street Department - outbound
 esp proto
 pass in quick on $wan proto esp from 65.119.178.129 to 
209.218.218.138

 keep state label IPSEC: Street Department - inbound esp proto
 pass out quick on $wan proto udp from 209.218.218.138 to
 65.119.178.154 port = 500 keep state label IPSEC: Fire Station 2 -
 outbound isakmp
 pass in quick on $wan proto udp from 65.119.178.154 to 
209.218.218.138

 port = 500 keep state label IPSEC: Fire Station 2 - inbound isakmp
 pass out quick on $wan proto esp from 209.218.218.138 to
 65.119.178.154 keep state label IPSEC: Fire Station 2 - outbound esp
 proto
 pass in quick on $wan proto esp from 65.119.178.154 to 
209.218.218.138

 keep state label IPSEC: Fire Station 2 - inbound esp proto
 pass out quick on $wan proto udp from 209.218.218.138 to 70.227.28.14
 port = 500 keep state label IPSEC: EMS Building - outbound isakmp
 pass in quick on $wan proto udp from 70.227.28.14 to 209.218.218.138
 port = 500 keep state label IPSEC: EMS Building - inbound isakmp
 pass out quick on $wan proto esp from 209.218.218.138 to 70.227.28.14
 keep state label IPSEC: EMS Building - outbound esp proto
 pass in quick on $wan proto esp from 70.227.28.14 to 209.218.218.138
 keep state label IPSEC: EMS Building - inbound esp proto
 pass out quick on $wan proto udp from 209.218.218.138 to 
70.237.44.110
 port = 500 keep state label IPSEC: Computer Support - outbound 
isakmp

 pass in quick on $wan proto udp from 70.237.44.110 to 209.218.218.138
 port = 500 keep state label IPSEC: Computer Support - inbound 
isakmp
 pass out quick on $wan proto esp from 209.218.218.138 to 
70.237.44.110

 keep state label IPSEC: Computer Support - outbound esp proto
 pass in quick on $wan proto esp from 70.237.44.110 to 209.218.218.138
 keep state label IPSEC: Computer Support - inbound esp proto

 pass in quick on em0 inet proto tcp from any to $loopback port 8021
 keep state label FTP PROXY: Allow traffic to localhost
 pass in quick on em0

Re: [pfSense Support] IPSEC over an OPT interface Problems

2007-03-29 Thread Vaughn L. Reid III
Have the IPSEC changes been committed and built yet?  I'm looking at the
update files, and they all still say March 27 2007.  I'm using this
repository http://snapshots.pfsense.com/FreeBSD6/RELENG_1/updates/

Should I be looking somewhare else for the update with the IPSEC fix?

Thanks,

Vaughn 

On Thu, 29 Mar 2007 15:26:58 -0400, Vaughn L. Reid III
[EMAIL PROTECTED] said:
 Thanks for your hard work.  I appreciate it and I'm sure my customers do 
 too.
 
 Vaughn
 
 Vaughn L. Reid III wrote:
  The ones ones that say Computer Support are from the test tunnel that 
  I created to use OPT2.
 
  The interfaces on this machine are labeled like this:
 
  LAN = em0
  WAN = em1
  ATTDSL = em4 -- This is the OPT interface that I was using for the 
  Computer Support VPN test
  wireless = em2
 
  Vaughn
 
  Scott Ullrich wrote:
  Okay, so that I am on the same page as you.  Those $wan rules should
  have read $optX ??
 
  Scott
 
 
  On 3/29/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:
  Oops!  Sorry for the double post.
 
  Vaughn L. Reid III wrote:
   Here is the relevant text of my rules.debug file.  It looks like the
   interface on the connection computer support has the same interface
   as the rest of the tunnels.  This is the test connection that should
   be using OPT3.
  
   # let out anything from the firewall host itself and decrypted IPsec
   traffic
   pass out quick on $lan proto icmp keep state label let out anything
   from firewall host itself
   pass out quick on $wan proto icmp keep state label let out anything
   from firewall host itself
   pass out quick on em1 all keep state label let out anything from
   firewall host itself
   # pass traffic from firewall - out
   anchor firewallout
   pass out quick on em1 all keep state label let out anything from
   firewall host itself
   pass out quick on em0 all keep state label let out anything from
   firewall host itself
   pass out quick on em4 all keep state label let out anything from
   firewall host itself
   pass out quick on em2 all keep state label let out anything from
   firewall host itself
   pass out quick on $pptp all keep state label let out anything from
   firewall host itself pptp
   pass out quick on $enc0 keep state label IPSEC internal host to 
  host
  
   # let out anything from the firewall host itself and decrypted IPsec
   traffic
   pass out quick on em4 proto icmp keep state label let out anything
   from firewall host itself
   pass out quick on em4 all keep state label let out anything from
   firewall host itself
  
  
   # VPN Rules
   pass out quick on $wan proto udp from 209.218.218.138 to
   65.119.178.137 port = 500 keep state label IPSEC: Fire Station 3 -
   outbound isakmp
   pass in quick on $wan proto udp from 65.119.178.137 to 
  209.218.218.138
   port = 500 keep state label IPSEC: Fire Station 3 - inbound isakmp
   pass out quick on $wan proto esp from 209.218.218.138 to
   65.119.178.137 keep state label IPSEC: Fire Station 3 - outbound esp
   proto
   pass in quick on $wan proto esp from 65.119.178.137 to 
  209.218.218.138
   keep state label IPSEC: Fire Station 3 - inbound esp proto
   pass out quick on $wan proto udp from 209.218.218.138 to
   65.119.178.129 port = 500 keep state label IPSEC: Street 
  Department -
   outbound isakmp
   pass in quick on $wan proto udp from 65.119.178.129 to 
  209.218.218.138
   port = 500 keep state label IPSEC: Street Department - inbound 
  isakmp
   pass out quick on $wan proto esp from 209.218.218.138 to
   65.119.178.129 keep state label IPSEC: Street Department - outbound
   esp proto
   pass in quick on $wan proto esp from 65.119.178.129 to 
  209.218.218.138
   keep state label IPSEC: Street Department - inbound esp proto
   pass out quick on $wan proto udp from 209.218.218.138 to
   65.119.178.154 port = 500 keep state label IPSEC: Fire Station 2 -
   outbound isakmp
   pass in quick on $wan proto udp from 65.119.178.154 to 
  209.218.218.138
   port = 500 keep state label IPSEC: Fire Station 2 - inbound isakmp
   pass out quick on $wan proto esp from 209.218.218.138 to
   65.119.178.154 keep state label IPSEC: Fire Station 2 - outbound esp
   proto
   pass in quick on $wan proto esp from 65.119.178.154 to 
  209.218.218.138
   keep state label IPSEC: Fire Station 2 - inbound esp proto
   pass out quick on $wan proto udp from 209.218.218.138 to 70.227.28.14
   port = 500 keep state label IPSEC: EMS Building - outbound isakmp
   pass in quick on $wan proto udp from 70.227.28.14 to 209.218.218.138
   port = 500 keep state label IPSEC: EMS Building - inbound isakmp
   pass out quick on $wan proto esp from 209.218.218.138 to 70.227.28.14
   keep state label IPSEC: EMS Building - outbound esp proto
   pass in quick on $wan proto esp from 70.227.28.14 to 209.218.218.138
   keep state label IPSEC: EMS Building - inbound esp proto
   pass out quick on $wan proto udp from 209.218.218.138 to 
  70.237.44.110
   port = 500 keep state label IPSEC: Computer Support

[pfSense Support] IPSec Keep Alive Question

2007-03-26 Thread Vaughn L. Reid III
I have a question about the IPSec keep-alive feature in pfsense.  What 
is the preferred IP address to ping with this feature, the public IP of 
the remote tunnel end-point, or a host that is not the remote router on 
the private network side of the remote end-point, or the private IP 
address of the remote router?


Thanks,

Vaughn Reid III

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] IPSec Keep Alive Question

2007-03-26 Thread Vaughn L. Reid III
Thanks for the information.  I appreciate it.

Vaughn Reid III

On Mon, 26 Mar 2007 16:32:01 +0200, Holger Bauer
[EMAIL PROTECTED] said:
 Any IP in the remote subnet range (remote internal IP that is inside the
 remote subnet tunnel definition). It doesn't even have to answer or
 exist. It's just to bring up the tunnel or keep it alive as there is
 traffic for the remote subnet.
 
 Holger 
 
 -Original Message-
 From: Vaughn L. Reid III [mailto:[EMAIL PROTECTED] 
 Sent: Monday, March 26, 2007 1:53 PM
 To: support@pfsense.com
 Subject: [pfSense Support] IPSec Keep Alive Question
 
 I have a question about the IPSec keep-alive feature in pfsense.  What
 is the preferred IP address to ping with this feature, the public IP of
 the remote tunnel end-point, or a host that is not the remote router on
 the private network side of the remote end-point, or the private IP
 address of the remote router?
 
 Thanks,
 
 Vaughn Reid III
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED] For additional
 commands, e-mail: [EMAIL PROTECTED]
 
 
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 
-- 
  Vaughn L. Reid III
  [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Firewall Rule Help?

2007-03-20 Thread Vaughn L. Reid III
Oops!  I found my firewall configuration problem.  I managed to put 
allow * from 192.168.0.0/24 to * on the LAN interface of the firewall 
rules page.  Once I changed it to allow * from 192.168.0.0/16 to * on 
the LAN interface, everything worked properly.  That will teach me to do 
firewall configs after midnight.  :-)


Vaughn

Vaughn L. Reid III wrote:
I'll post the config file a little later today, when I get to my test 
box.  In the mean time, I want to make it clear that subnet 2 is not 
directly connected to the pfsense box.


Currently, the pfsense box has 4 interfaces:  a Lan interface which is 
connected to subnet 1, a Wan interface, and 2 Opt interfaces.  Opt 1 
is called ATTDSL.  This interface is the point of internet contact for 
a proxy server that lives on subnet 1 and was configured for this 
usage via a firewall rule as described in the policy routing tutorial 
on the pfsense website.  The second Opt interface is called Wireless 
and will be used to test external VPN connections between offices via 
802.11 access points.  Subnet 2 is not directly physically connected 
to the pfsense box.  An openSuse router sits between subnet 1 and 
subnet 2 and handles routing between these two subnets.


A review of the symptoms of the problem that I'm having is that when I 
replace the pfsense with a linksys RV series router or Hotbrick 
router, both subnet 1 and subnet 2 are able to access the internet and 
to ping the router.  When the pfsense box is in place, even with 
explicit rules allowing all traffic to all locations from the entire 
192.168.0.0/16 network on the LAN interface, the pfsense box 
explicitly denies and logs all traffic trying to pass to it or through 
it from subnet 2.


Vaughn

sai wrote:

On 3/18/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

I have a pfsense firewall in a test network like the one below.

   Internet
  provider 1 |  | 
provider 2
 Pfsense Firewall -- 
LAN

IP 192.168.10.1/24
 |
 Subnet 1 --
192.168.10.x/24
 |
   Internal Router  --
Subnet 1 IP 192.168.10.14 -- Subnet 2 IP 192.168.12.1
 |
 Subnet 2
192.168.12.x/24


I am having trouble getting the clients on Subnet 2 to get access to
either the Internet or to the interface of the pfsense box.  I have the
following rules entered into the firewall and NAT:
Firewall:
LAN
Allow * from 192.168.0.0/16 to *

NAT:
Do Outbound NAT on 192.168.0.0/16

Here are the symptoms of the problem that I'm having.
When I try to ping or connect to the pfsense box from subnet 1, I can
ping and connect to it without any problems.  When I try to ping or
connect to it from subnet 2, the connection is refused.  In addition, I
can connect to Internet resources normally from subnet 1, but not from
subnet 2.

I thought that maybe the internal router was the problem, so I replaced
the pfsense box with an el-cheapo router and everything worked 
correctly

from both subnets without any changes to the internal router. I have
also tried specifying allow rules for each subnet in the pfsense
firewall rules page, but that seemed to have no effect.  I am using the
March 18th, 2007 daily build of the pfsense stable.

I also noticed that the firewall log on the pfsense box is logging that
it is dropping everything that is coming to it from subnet 2.

If anyone can help me come up with a solution, I'd appreciate it.

Thanks,

Vaughn




Firewall Rules  add a rule for the subnet2 interface that allows the 
traffic.


post the config for the interface and also the firewall rules for  
subnet2


sai

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Firewall Rule Help?

2007-03-18 Thread Vaughn L. Reid III
I'll post the config file a little later today, when I get to my test 
box.  In the mean time, I want to make it clear that subnet 2 is not 
directly connected to the pfsense box.


Currently, the pfsense box has 4 interfaces:  a Lan interface which is 
connected to subnet 1, a Wan interface, and 2 Opt interfaces.  Opt 1 is 
called ATTDSL.  This interface is the point of internet contact for a 
proxy server that lives on subnet 1 and was configured for this usage 
via a firewall rule as described in the policy routing tutorial on the 
pfsense website.  The second Opt interface is called Wireless and will 
be used to test external VPN connections between offices via 802.11 
access points.  Subnet 2 is not directly physically connected to the 
pfsense box.  An openSuse router sits between subnet 1 and subnet 2 and 
handles routing between these two subnets.


A review of the symptoms of the problem that I'm having is that when I 
replace the pfsense with a linksys RV series router or Hotbrick router, 
both subnet 1 and subnet 2 are able to access the internet and to ping 
the router.  When the pfsense box is in place, even with explicit rules 
allowing all traffic to all locations from the entire 192.168.0.0/16 
network on the LAN interface, the pfsense box explicitly denies and logs 
all traffic trying to pass to it or through it from subnet 2.


Vaughn

sai wrote:

On 3/18/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:

I have a pfsense firewall in a test network like the one below.

   Internet
  provider 1 |  | provider 2
 Pfsense Firewall -- LAN
IP 192.168.10.1/24
 |
 Subnet 1 --
192.168.10.x/24
 |
   Internal Router  --
Subnet 1 IP 192.168.10.14 -- Subnet 2 IP 192.168.12.1
 |
 Subnet 2
192.168.12.x/24


I am having trouble getting the clients on Subnet 2 to get access to
either the Internet or to the interface of the pfsense box.  I have the
following rules entered into the firewall and NAT:
Firewall:
LAN
Allow * from 192.168.0.0/16 to *

NAT:
Do Outbound NAT on 192.168.0.0/16

Here are the symptoms of the problem that I'm having.
When I try to ping or connect to the pfsense box from subnet 1, I can
ping and connect to it without any problems.  When I try to ping or
connect to it from subnet 2, the connection is refused.  In addition, I
can connect to Internet resources normally from subnet 1, but not from
subnet 2.

I thought that maybe the internal router was the problem, so I replaced
the pfsense box with an el-cheapo router and everything worked correctly
from both subnets without any changes to the internal router. I have
also tried specifying allow rules for each subnet in the pfsense
firewall rules page, but that seemed to have no effect.  I am using the
March 18th, 2007 daily build of the pfsense stable.

I also noticed that the firewall log on the pfsense box is logging that
it is dropping everything that is coming to it from subnet 2.

If anyone can help me come up with a solution, I'd appreciate it.

Thanks,

Vaughn




Firewall Rules  add a rule for the subnet2 interface that allows the 
traffic.


post the config for the interface and also the firewall rules for  
subnet2


sai

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Firewall Rule Help?

2007-03-17 Thread Vaughn L. Reid III
I have a pfsense firewall in a test network like the one below. 
   
  Internet

 provider 1 |  | provider 2
Pfsense Firewall -- LAN 
IP 192.168.10.1/24

|
Subnet 1 -- 
192.168.10.x/24

|
  Internal Router  -- 
Subnet 1 IP 192.168.10.14 -- Subnet 2 IP 192.168.12.1

|
Subnet 2 
192.168.12.x/24



I am having trouble getting the clients on Subnet 2 to get access to 
either the Internet or to the interface of the pfsense box.  I have the 
following rules entered into the firewall and NAT:

Firewall:
LAN
Allow * from 192.168.0.0/16 to *

NAT:
Do Outbound NAT on 192.168.0.0/16

Here are the symptoms of the problem that I'm having.
When I try to ping or connect to the pfsense box from subnet 1, I can 
ping and connect to it without any problems.  When I try to ping or 
connect to it from subnet 2, the connection is refused.  In addition, I 
can connect to Internet resources normally from subnet 1, but not from 
subnet 2. 

I thought that maybe the internal router was the problem, so I replaced 
the pfsense box with an el-cheapo router and everything worked correctly 
from both subnets without any changes to the internal router. I have 
also tried specifying allow rules for each subnet in the pfsense 
firewall rules page, but that seemed to have no effect.  I am using the 
March 18th, 2007 daily build of the pfsense stable.


I also noticed that the firewall log on the pfsense box is logging that 
it is dropping everything that is coming to it from subnet 2.


If anyone can help me come up with a solution, I'd appreciate it.

Thanks,

Vaughn

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Logoff Capability

2007-02-12 Thread Vaughn L. Reid III
I have posted a $400.00 USD bounty for implementing a logoff feature in
the fourms.  Also, I have added a $100.00 USD bonus for the
implementation of a checkbox that will enable or disable https access
via the WAN interface.

Vaughn Reid III


On Tue, 13 Feb 2007 00:54:27 +1100, Dave Hall [EMAIL PROTECTED]
said:
 On Mon, 2007-02-12 at 07:32 -0500, Vaughn L. Reid III wrote:
  I'm not sure this is the correct forum for this sort of item, but I'll
  ask anyway.
  
  Is there any sort of extension available to provide a logoff capability
  from the web gui?  I need this capability for HIPAA compliance.  If not,
  how would I go about offering a bounty to get one implemented?  Any
  coding that I sponsor and gets produced from this will be given back to
  the project lead for incorporation into the product.  If anyone has any
  information or is interested in implementing this, please respond, and
  I'll provide contact information.
  
 
 As pfSense uses http authentication there is 2 easy options:
 
 1 Close your browser when you are done
 
 2 install the web developer toolbar extension for firefox and use the
 Misc  Clear Private Data  HTTP Authentication option
 
 This is a limitation of how browsers implement HTTP Authentication.
 
 bte I am not a pfSense developer, so someone else might have other ideas
 on how to deal with this.
 
 Cheers
 
 Dave
 -- 
 L
 L*LLL
 L
 L DAVE
 L HALL
   CONSULTING
 
   Open Source
   Business Solutions
 
   p +61 410 47 42 55
   e [EMAIL PROTECTED]
   w davehall.com.au
   f +61 3 8610 0029
 
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 
-- 
  Vaughn L. Reid III
  [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Pfsense Server Crash

2007-02-09 Thread Vaughn L. Reid III
I am experiencing the same problem with the daily snapshots as I am with
the 1.0.1 release version.  The following items cause the pfsense
firewall to stop responding to anything:
1.  Removing a static route
2.  Doing anything in the Miscellaneous or Traffic Shaper and Firewall
Advanced sections of Advanced System setup
3.  Checking or unchecking the userland proxy box on any interface
4.  Checking or unchecking Block Private Networks on the WAN interface
page
5.  Checking or unchecking Bogons Networks on the WAN interface page

In addition, the firewall seems to stop working with any LAN side
ethernet interface after adding or removing VPN tunnels.

Any additional help would be appreciated.


On Thu, 8 Feb 2007 00:29:09 -0500, Scott Ullrich [EMAIL PROTECTED]
said:
 On 2/8/07, Vaughn L. Reid III [EMAIL PROTECTED] wrote:
  I have a pfsense firewall up and running with the following specs:
  3.0 ghz Pentium IV processor
  1 gigabyte of ECC (unregistered unbuffered) ram
  1 40 gigabyte western digital hard drive
  Tyan entry level server motherboard with 2 onboard intel gigabyte
  network cards
  2 dual port pci-x intel server gigabyte network cards (4 ports total
  between the two cards)
  1 single port intel desktop gigabyte network card
  1 hifn pci vpn accelerator card (from soekris engineering)
 
  I'm running psense 1.0.1
  I have 2 dsl connections, and 3 lan connections.  I have one port
  reserved for sync and one unused ethernet port.  I've got about 50 users
  hitting the firewall on a regular basis and have approximately 5 vpn
  connections using ipsec and 2 pptp users.
 
  All of my ethernet cards use different irqs.  The hifn card uses the
  same irq as one of the embedded ethernet cards.
 
  Here's the problem that I'm experiencing.  When I try to perform some
  actions with the pfsense configuration, the machine simply stops
  responding.  Rebooting does not help.  Even though the network stops
  responding and even though the web gui stops responding, I can still log
  onto the system from the console and it appears that everything is
  working correctly.  Specifically, the logs seem normal, ifconfig returns
  the expected values and show that the interfaces are up.  The system
  just won't respond to pings, won't route or forward or filter traffic,
  and won't allow access to the web gui.  The only way that I can seem to
  fix the problem is to re-install pfsense from cd and then reload my
  configuration file.
 
  Most actions don't cause this.  For example adding nat and firewall
  rules, setting up pptp and ipsec connections, doing things with the dhcp
  server and dns forwarder seem to work normally.
 
  But, specifically I have found the following items cause the lock-up for
  lack of a better work.  Trying to change anything under the advanced
  system tab that is in under the sub heading of Traffic Shaper and
  Firewall Advanced and trying to check or uncheck Block private
  networks or bogon networks on the wan tab seems to cause this
  behavior.  Also attempting to check or uncheck the Disable the userland
  FTP-Proxy application on any interface seems to cause the behavior
  noted above.
 
  If anyone can provide some insight into this, I'd appreciate it.  I've
  done some searching on my own of the forums and the existing
  documentation, but I can't seem to find anything that answers my questions.
 
 Please try a recent snapshot that is based on FreeBSD 6.2.
 
 More information can be found here.
 
 http://pfsense.blogspot.com/2007/01/102-beta-period-will-start-soon-5-9s.html
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 
-- 
  Vaughn L. Reid III
  [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Pfsense Server Crash

2007-02-09 Thread Vaughn L. Reid III
 is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
arplookup 192.168.10.1 failed: host is not on local network
arpresolve: can't allocate route for 192.168.10.1
em0: link state changed to DOWN
em0: link state changed to UP
arplookup 192.168.10.102 failed: host is not on local network
arplookup 192.168.10.39 failed: host is not on local network
arplookup 192.168.10.253 failed: host is not on local network
arplookup 192.168.10.253 failed: host is not on local network
arplookup 192.168.10.33 failed: host is not on local network
arplookup 192.168.10.61 failed: host is not on local network
arplookup 192.168.10.37 failed: host is not on local network
em0: link state changed to DOWN
em0: link state changed to UP
WARNING: pseudo-random number generator used for IPsec processing
em1: link state changed to DOWN
em1: link state changed to UP



On Fri, 09 Feb 2007 10:51:55 -0500, Vaughn L. Reid III
[EMAIL PROTECTED] said:
 I am experiencing the same problem with the daily snapshots as I am with
 the 1.0.1 release version.  The following items cause the pfsense
 firewall to stop responding to anything:
 1.  Removing

[pfSense Support] Pfsense Server Crash

2007-02-07 Thread Vaughn L. Reid III

I have a pfsense firewall up and running with the following specs:
3.0 ghz Pentium IV processor
1 gigabyte of ECC (unregistered unbuffered) ram
1 40 gigabyte western digital hard drive
Tyan entry level server motherboard with 2 onboard intel gigabyte 
network cards
2 dual port pci-x intel server gigabyte network cards (4 ports total 
between the two cards)

1 single port intel desktop gigabyte network card
1 hifn pci vpn accelerator card (from soekris engineering)

I'm running psense 1.0.1
I have 2 dsl connections, and 3 lan connections.  I have one port 
reserved for sync and one unused ethernet port.  I've got about 50 users 
hitting the firewall on a regular basis and have approximately 5 vpn 
connections using ipsec and 2 pptp users.


All of my ethernet cards use different irqs.  The hifn card uses the 
same irq as one of the embedded ethernet cards.


Here's the problem that I'm experiencing.  When I try to perform some 
actions with the pfsense configuration, the machine simply stops 
responding.  Rebooting does not help.  Even though the network stops 
responding and even though the web gui stops responding, I can still log 
onto the system from the console and it appears that everything is 
working correctly.  Specifically, the logs seem normal, ifconfig returns 
the expected values and show that the interfaces are up.  The system 
just won't respond to pings, won't route or forward or filter traffic, 
and won't allow access to the web gui.  The only way that I can seem to 
fix the problem is to re-install pfsense from cd and then reload my 
configuration file. 

Most actions don't cause this.  For example adding nat and firewall 
rules, setting up pptp and ipsec connections, doing things with the dhcp 
server and dns forwarder seem to work normally.


But, specifically I have found the following items cause the lock-up for 
lack of a better work.  Trying to change anything under the advanced 
system tab that is in under the sub heading of Traffic Shaper and 
Firewall Advanced and trying to check or uncheck Block private 
networks or bogon networks on the wan tab seems to cause this 
behavior.  Also attempting to check or uncheck the Disable the userland 
FTP-Proxy application on any interface seems to cause the behavior 
noted above.


If anyone can provide some insight into this, I'd appreciate it.  I've 
done some searching on my own of the forums and the existing 
documentation, but I can't seem to find anything that answers my questions.


Thanks,

Vaughn Reid III
Indiana USA

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]