forum.netgate.com Open in urlscan Pro
2610:160:11:18::199  Public Scan

Submitted URL: http://forum.netgate.com/
Effective URL: https://forum.netgate.com/
Submission Tags: falconsandbox
Submission: On July 30 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET /search

<form action="/search" method="GET">
  <button type="button" class="btn btn-link"><i class="fa fa-lg fa-fw fa-search" title="Suche"></i></button>
  <input autocomplete="off" type="text" class="form-control hidden" name="term" placeholder="Suche">
  <button class="btn btn-primary hidden" type="submit"></button>
  <input type="text" class="hidden" name="in" value="titles">
</form>

GET

<form component="search/form" id="search-form" class="d-flex justify-content-end align-items-center" role="search" method="GET">
  <div component="search/fields" class="hidden" id="search-fields">
    <div class="input-group flex-nowrap">
      <input autocomplete="off" type="text" class="form-control" placeholder="Suche" name="query" value="">
      <button href="#" class="btn btn-outline-secondary">
        <i class="fa fa-gears fa-fw advanced-search-link"></i>
      </button>
    </div>
    <div id="quick-search-container" class="quick-search-container dropdown-menu d-block mt-2 hidden">
      <div class="form-check filter-category mb-2 ms-4">
        <input class="form-check-input" type="checkbox" checked="">
        <label class="form-check-label name"></label>
      </div>
      <div class="text-center loading-indicator"><i class="fa fa-spinner fa-spin"></i></div>
      <div class="quick-search-results-container"></div>
    </div>
    <button type="submit" class="btn btn-outline-secondary hide">Suche</button>
  </div>
  <li id="" class="nav-item"><a component="search/button" id="search-button" href="#" class="nav-link"><i class="fa fa-search fa-fw" title="Search"></i></a></li>
</form>

Text Content

 * Kategorien
 * Aktuell
 * Tags
 * Beliebt
 * Benutzer
 * Suche
 * Registrieren
 * Anmelden


 * Kategorien
 * Aktuell
 * Tags
 * Beliebt
 * Benutzer
 * Suche

 * 


Suche
 * Registrieren
 * Anmelden

Your browser does not seem to support JavaScript. As a result, your viewing
experience will be diminished, and you have been placed in read-only mode.

Please download a browser that supports JavaScript, or enable it if it's
disabled (i.e. NoScript).




KATEGORIEN


 * TNSR
   
   Discussions about TNSR
   
   TNSR Announcements Feedback Installation and Upgrades
   vor etwa einer Stunde
   372
   Themen
   1.3k
   Beiträge
   
   R vor etwa einer Stunde
   
   @dx said in Does TNSR support PPPOE client and UPNP service ?:
   
   > widely used in home broadband.
   
   In the US the only carrier I know of that uses this is Quantum Fiber née
   Lumen Technologies née CenturyLink.


 * PFSENSE® SOFTWARE
   
   Discussions about pfSense Software, click a category below
   
   Messages from the pfSense Team General pfSense Questions Installation and
   Upgrades Firewalling NAT HA/CARP/VIPs L2/Switching/VLANs Routing and Multi
   WAN Traffic Shaping DHCP and DNS IPv6 IPsec OpenVPN Captive Portal webGUI
   Wireless SNMP Documentation Development Gaming Virtualization Hardware
   Bounties Retired
   vor 8 Minuten
   111.8k
   Themen
   690.1k
   Beiträge
   
   R vor 8 Minuten
   
   @tknospdr
   I use this 5353 UDP rule on my (IoT) VLAN and include IPv6:
   
   2023-07-30 at 15.47.59.png
   
   I also have the somewhat odd-looking block rule below it just to stop the
   logs being spammed.
   
   (My IoT / Untrusted network is called 'VLAN" and my main trusted LAN is
   called "LAN", with dedicated management on "MAN" - radical, I am not...)
   
   ☕️


 * PFSENSE PACKAGES
   
   Discussions about pfSense software packages
   
   Cache/Proxy IDS/IPS Traffic Monitoring pfBlockerNG ACME FRR Tailscale
   WireGuard
   vor 2 Stunden
   18.5k
   Themen
   116.1k
   Beiträge
   
   S vor 2 Stunden
   
   Thank guys,
   
   I have a Wireguard client set up like
   https://docs.netgate.com/pfsense/en/latest/recipes/wireguard-client.html with
   a gateway group that prefers routing over Wireguard (tun_wg0) and fails over
   to normal WAN GW in case of Wireguard failure.
   
   I have found that the best way of disabling Wireguard from GUI is to disable
   the tun_wg0 interface. In that way traffic fails over to WAN GW.
   
   If I do the same in CLI using ifconfig tun_wg0 down, the interface goes down,
   but traffic never fails over to WAN GW. What is the CLI equivalence of
   disabling tun_wg0 in GUI?


 * PFSENSE INTERNATIONAL SUPPORT
   
   Discuss pfSense in other languages
   
   Chinese Deutsch Español Français Indonesian Italiano Russian Nederlands
   Norwegian Portuguese Polish Romanian Swedish Turkish
   vor etwa einer Stunde
   41.6k
   Themen
   262.1k
   Beiträge
   
   A vor etwa einer Stunde
   
   Hallo,
   
   im Gartenhaus steht ein Router, der ein Android-Handy als Modem nutzt
   (Tethering). Dieser Router soll eine OpenVPN-Verbindung zu meiner pfSense
   aufbauen und deren Netze (LAN und DMZ) im Gartenhaus erreichbar machen.
   
   Die Konfiguration auf der pfSense:
   
   pfsense_unkenntlich_1.png
   pfsense_unkenntlich_2.png
   pfsense_unkenntlich_3.png
   pfsense_unkenntlich_4.png
   
   Die Konfigurationsdatei für den Router:
   
   client dev tunproto udp remote meinepfsense.zapto.org 1194 resolv-retry
   infinite nobind persist-key persist-tun <ca> -----BEGIN CERTIFICATE-----
   Zertifikat von der CA (pfSense) -----END CERTIFICATE----- </ca> <cert>
   -----BEGIN CERTIFICATE----- Client Zertifikat -----END CERTIFICATE-----
   </cert> <key> -----BEGIN PRIVATE KEY----- Client privater Key -----END
   PRIVATE KEY----- </key> remote-cert-tls server key-direction 1 auth SHA256
   <tls-auth> -----BEGIN OpenVPN Static key V1----- TLS-Key -----END OpenVPN
   Static key V1----- </tls-auth> data-ciphers-fallback AES-256-CBC verb 3
   
   Im Gartenhaus erhalte ich folgende (Fehler-)Meldung:
   
   gartenhaus_unkenntlich.png
   
   Das Pendant auf dem Router:
   
   Jul 30 14:55:29 openvpn 22412 109.42.115.56:5677 TLS Error: TLS handshake
   failed Jul 30 14:55:29 openvpn 22412 109.42.115.56:5677 TLS Error: TLS key
   negotiation failed to occur within 60 seconds (check your network
   connectivity)
   
   Ich habe den TLS-Schlüssel (in meinem Beispiel unkenntlich gemacht) habe ich
   diesen per Cut and Paste aus dem Webinterface der pfSense gezogen und in die
   Konfigurationsdatei kopiert.
   
   Die pfSense hängt als exposed Host an der FRITZ!Box. Laut Firewallregeln wird
   nichts geblockt (ich habe 1194 UDP eingehend freigegeben). Der OpenVPN Server
   ist für andere Clients erreichbar.
   
   Kurzum: Ich sehe den Wald vor Bäumen nicht :-(
   
   Gruß,
   Jörg


 * OFFICIAL NETGATE® HARDWARE
   
   Information about hardware available from Netgate
   
   vor 9 Stunden
   2.1k
   Themen
   16.4k
   Beiträge
   
   J vor 9 Stunden
   
   It's been a few years since purchase but my SG-1100 has always had an issue
   with rebooting. Recently there was some corruption. I've done a fresh install
   of 23.01 and restored minimal data from a backup. I've also upgraded to
   23.05.1 immediately after the upgrade. Any advice would be nice. I have a
   putty logs of the output from the crash if that'd help.


 * NETGATE ANNOUNCEMENTS
   
   Information about hardware available from Netgate
   
   vor 17 Tagen
   27
   Themen
   113
   Beiträge
   
   J vor 17 Tagen
   
   @jimp I love my 2100


 * OFF-TOPIC & NON-SUPPORT DISCUSSION
   
   Feel free to talk about anything and everything here
   
   Forum Feedback Community Job Board
   vor 2 Tagen
   3.2k
   Themen
   17.0k
   Beiträge
   
   B vor 2 Tagen
   
   @Gertjan
   
   It might have been pulled in, when i installed iproute2.
   I did that in order to play with some VRF "lookalike" on linux.
   
   /Bingo

 * 
 * 

 * 
 * 
 * 1 / 1
 * 
 * 




Es scheint als hättest du die Verbindung zu Netgate Forum verloren, bitte warte
während wir versuchen sie wieder aufzubauen.