Categories

  • 375 Topics
    1k Posts
    fractal_boyF
    @gigabitguru What TNSR version do you run? This bugs were fixed on TNSR 23.11. Here is the details: https://docs.netgate.com/tnsr/en/latest/releases/release-notes-23.11.html#vrrp
  • 122k Topics
    779k Posts
    SteveITSS
    @dorabiatto I’m confused, the in/out in your example are set to none? Are you clearing states after you apply the change?
  • 20k Topics
    130k Posts
    D
    Some preface; Currently SSL and http-https redirect is handled on the webserver. The webserver also proxies to other services on the network that need to me accessed from the web because I am using NAT for forward 80/443 to the webserver. This obviously isn't great, because everything relies on the webserver, so if the main server goes down then everything is down. Currently Im using the DNS forwarder, with host overrides so I can access these services within my LAN, again, a bit clunky to set up. HAproxy looks like the solution, and I have tried to set it up and failed. Basically: Server A: domain1.com subdomain.domain1.com domain2.com domain3.com domain4.ca -SSL with Letsencrypt, http->https Server B: subdomain2.domain1.com -using apache to forward Server C: subdomain3.domain1.com -using apache to forward Server D: subdomain4.domain1.com - new server, not accessable So, I setup an ACME certificate in PFsense, removed the NAT rule, created a new allow all wan rule, (80, 443) moved the pfsense webconfig port, disabled the SSL sites in Apache2, and removed the SSL stuff from the sites-available. Set up a couple frontends and backends and enable Haproxy. Server D: Subdomain4.domain1.com - works! servs over https and theres no SSL on the server! nice! (pc.daynewaterlow.com) Server A, B, and C - all go to the "Default Ubuntu Apache2 Page" - Which makes me feel like the headers aren't getting sent from HAproxy to the backend. I tried everything from host-matches *.domain1.com to host ends with domain1.com in the front end. I tried to add things like: http-request set-header Host %[hdr(host)] into frontend passthrough, or backend passthrough (grasping at straws) I gave up and reverted everything after hours of googling and tweaking frontend and backend settings. I don't understand ! Maybe there is a better solution? Or maybe I'm missing something simple. Here is the my last try HAproxy Config from 1 in the morning (Copied from "show config"): # Automaticaly generated, dont edit manually. # Generated on: 2026-03-30 01:02 global maxconn 100 stats socket /tmp/haproxy.socket level admin expose-fd listeners uid 80 gid 80 nbthread 1 hard-stop-after 15m chroot /tmp/haproxy_chroot daemon server-state-file /tmp/haproxy_server_state listen HAProxyLocalStats bind 127.0.0.1:2200 name localstats mode http stats enable stats admin if TRUE stats show-legends stats uri /haproxy/haproxy_stats.php?haproxystats=1 timeout client 5000 timeout connect 5000 timeout server 5000 frontend hackserv-merged bind *myWANip*:443 name *myWANip*:443 ssl crt-list /var/etc/haproxy/hackserv.crt_list bind *myWANip*:80 name *myWANip*:80 mode http log global option http-keep-alive timeout client 30000 http-request set-header Host %[hdr(host)] acl luckfox var(txn.txnhost) -m str -i pc.daynewaterlow.com acl matrix2 var(txn.txnhost) -m str -i matrix2.daynewaterlow.com acl headscale var(txn.txnhost) -m str -i headscale.daynewaterlow.com acl daynewaterlow var(txn.txnhost) -m end -i daynewaterlow.com acl waterlowphotography var(txn.txnhost) -m end -i waterlowphotography.com acl titsnbeans var(txn.txnhost) -m end -i titsnbeans.com acl gfarc var(txn.txnhost) -m end -i gfarc.ca acl kettlerivercycling var(txn.txnhost) -m end -i kettlerivercycling.com acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^([^\.]*)\.daynewaterlow\.com(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^([^\.]*)\.dwhacks\.com(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^([^\.]*)\.gfarc\.ca(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^([^\.]*)\.kettlerivercycling\.com(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^([^\.]*)\.titsnbeans\.com(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^([^\.]*)\.waterlowphotography\.com(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^daynewaterlow\.com(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^dwhacks\.com(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^gfarc\.ca(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^kettlerivercycling\.com(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^titsnbeans\.com(:([0-9]){1,5})?$ acl aclcrt_hackserv var(txn.txnhost) -m reg -i ^waterlowphotography\.com(:([0-9]){1,5})?$ http-request set-var(txn.txnhost) hdr(host) use_backend luckFox_ipvANY if luckfox use_backend hackserv_ipvANY if daynewaterlow aclcrt_hackserv use_backend matrixbtw_ipvANY if matrix2 aclcrt_hackserv use_backend hackserv_ipvANY if waterlowphotography aclcrt_hackserv use_backend hackserv_ipvANY if titsnbeans aclcrt_hackserv use_backend hackserv_ipvANY if gfarc aclcrt_hackserv use_backend hackserv_ipvANY if kettlerivercycling aclcrt_hackserv use_backend headscale_ipvANY if headscale aclcrt_hackserv use_backend hackserv_ipvANY if aclcrt_hackserv backend luckFox_ipvANY mode http id 105 log global timeout connect 30000 timeout server 30000 retries 3 load-server-state-from-file global server luckFox 192.168.2.219:80 id 103 check inter 1000 backend hackserv_ipvANY mode http id 102 log global http-check send meth OPTIONS timeout connect 30000 timeout server 30000 retries 3 load-server-state-from-file global option httpchk server Hackserv 192.168.2.7:80 id 103 check inter 1000 backend matrixbtw_ipvANY mode http id 100 log global http-check send meth OPTIONS timeout connect 30000 timeout server 30000 retries 3 load-server-state-from-file global option httpchk server matrixbtw 192.168.2.87:8008 id 101 check inter 1000 backend headscale_ipvANY mode http id 104 log global timeout connect 30000 timeout server 30000 retries 3 load-server-state-from-file global server headscale 192.168.2.201:443 id 103 ssl verify none
  • 43k Topics
    267k Posts
    micneuM
    @d4rkw4rden hast du mal einen grafischen netzwerkplan für dein setup (kann helfen beim verständnis) Warum brauchst du die Fritzbox vor der sense? Was ist das für ein Internet zugang (GLASFASER, *DSL)? Ich hatte Früher bevor ich GLASFASER hatte VDSL und hatte direkt ein Draytek Modem angeschloßen. Hier mein Aktuelles Setup ┌──────────────────────────┐ ┌──────────────────────────┐ │ WAN / Internet (PPPoE) │ │ WAN2 / Internet (ETH) │ │ Willy.tel │ │ 300/100Mbit/s 5G Telekom │ │ 1000/250Mbit/s Glasfaser │ │ gl-inet Mudi 7 │ │ (DualStack) │ │GEPLANT/warte auf Hardware│ │ │ │ │ └──────────────────────┬───┘ └──────┬───────────────────┘ ─ ─ ─ ─ ─ ─ ─ ─WAN─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ WAN ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ │ │ ┌────────────────┐ ┌────────────────┐ ╔═════════════╩════════════╩════════ pfSense+ ═══╗ │ TrueNAS SCALE │ │ Switch │ ║ Netgate 6100║ Stand: ─ ─ ┐ │ ORICO CF56 Pro ├───┤ USW-Flex-XG ├────╣ Netzwerk Block: 172.30.0.0/19║ │ │ │ │ │ ║ LAN Block: 172.30.0.0/20║ 17.03.2026 │ └────────────────┘ └───┬─┬──┬───────┘ ║ VPN Block: 172.30.16.0/20║ │ ┌────────────────┐ │ │ │ ║ LAN: 172.30.3.0/24║ ─ ─ ─ ─ ─ ─ ┘ │ UBNT │ │ │ │ ║ Gäste (W)LAN (VLAN2): 172.30.2.0/24║ │UniFI AP AC Pro ├───────┘ │ │ ║ IoT WLAN (VLAN4): 172.30.4.0/24║ │ │ │ │ ║ DynDNS über deSEC.io mit eigener Domain║ └────────────────┘ │ │ ║ VPN's:║ ┌────────────────┐ │ │ ║ 1 x S2S WireGuard FB 7490 (172.30.20.0/24)║ │ Proxmox │ │ │ ║ 1 x S2S WireGuard FB 6591 (172.30.19.0/24)║ │ Intel NUC ├─────────┘ │ ║ 1 x pfSense S2S (Netgate 6100) IPSec║ │BNUC11TNHV50L00 │ │ ║ 1 x OpenVPN Road Warrior DCO (172.30.16.0/24)║ └────────────────┘ │ ║ 1 x WireGuard RA Hetzner (172.30.17.0/24)║ │ ║ 1 x WireGuard Road Warrior (172.30.18.0/24)║ │ ╚════════════════════════════════════════════════╝ ┌────────────────┐ ┌────────┴───────────┐ ┌────────────────────┐ ┌──────────────────┐ │ Fritzbox 7490 │ │ Switch │ │ Switch │ │ UBNT │ │ IPClient ├───┤ USW Pro Max 16 PoE ├─┤ USW Pro XG 8 PoE ├─┤ UniFi AP-Flex-HD │ │ (Nur VoIP) │ │ │ │ │ │ │ └────────────────┘ └────┬───────────────┘ └──┬─────────────────┘ └──────────────────┘ ┌────────────────┐ │ │ ┌───────────┐ │ UBNT │ │ │ │ │ │UniFI AP AC Pro ├────────┘ └────┤ Clients │ │ │ │ │ └────────────────┘ └───────────┘
  • Information about hardware available from Netgate

    3k Topics
    21k Posts
    publictoiletbowlP
    @stephenw10 yes that 25.11.1
  • Information about hardware available from Netgate

    44 Topics
    211 Posts
    AriKellyA
    It looks like unified web management could be coming soon. It would be great if it means easier control and management of all web services in one place. Let's see if any companies announce more details about it!
  • Feel free to talk about anything and everything here

    4k Topics
    19k Posts
    BBcan177B
    There are alias deny for blocking and using that option the events will show in the Deny Stats. Alias Native doesn't use any deduplication. Alias Permit/Match should be selected if they are destined for a permit or match rule.
Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.

Looks like your connection to Netgate Forum was lost, please wait while we try to reconnect.