![untangle firewall block all untangle firewall block all](https://i2.wp.com/edtechdigest.com/wp-content/uploads/2020/08/CREDIT-Untangle.png)
- #UNTANGLE FIREWALL BLOCK ALL HOW TO#
- #UNTANGLE FIREWALL BLOCK ALL UPDATE#
- #UNTANGLE FIREWALL BLOCK ALL ANDROID#
#UNTANGLE FIREWALL BLOCK ALL ANDROID#
The clients are a mixture of Win7 desktops/laptops and Android smartphones if that's important.
#UNTANGLE FIREWALL BLOCK ALL HOW TO#
I thought pfsense's Captive Portal would be my solution, but I can't see how to make it transparent and just work off IP address. I can ensure they get the same IP all the time & they don't have the knowledge/permissions to change it :) Just by their IP address (or DNS would be even better) will be fine. ie, I don't want to have to force them through a login screen. (Internal LAN is fine, but given they are all on the same switch and same subnet, that won't be a problem).īut I want it to be transparent to them. I want to be able to, say, set them to 1GB/day and when they've used that then the internet is blocked. I'm running pfsense 2.1.2-release for my home firewall and I want to set a limit (say daily) for some of the internal users - the kids. I'm hoping I can get this working again before there's a mutiny on my hands. While it's a worthy conversation, especially to those of us that bought multi-year licenses, it's not going to make any difference in the immediate future. I'm hoping we can leave the discussion around Untangle's decision to make this change to another thread. DFS connections are going all over the place now. I've got +300 computers thinking their in the wrong sites, authenticating to the wrong DC's. Has anyone else experienced this or have any ideas how to fix it? I've tried a bunch of combinations (checking/unchecking/rebooting/turning OpenVPN on/off). Checked or unchecked, NATing through the VPN tunnels is occurring now. I went in the config file and removed the appropriate line to expose the check box and got it back but it doesn't seem to do anything now. Main site's Untangle is currently at 10.2.1.
#UNTANGLE FIREWALL BLOCK ALL UPDATE#
I'm assuming from an automatic update (probably from 10.1 to 10.2 or 10.2.1).
![untangle firewall block all untangle firewall block all](https://avidpractice.com/wp-content/uploads/image-3.png)
I Checked on the main site's Untangle today and the NAT check box was hidden again. Exact same issues as when NATing is turned on in OpenVPN. I was off for a couple days and there were reports of issues on the network. I'm sure I'm not the only one that's had to resort to the "hack" ( ) to turn off NATing with OpenVPN in version 10.x but the problem has risen from the dead. And I haven't been able to find any clear info for hardware compatibility for 10.
![untangle firewall block all untangle firewall block all](https://support.untangle.com/hc/article_attachments/360030875533/Final_Restrict_Access.png)
I've looked at the Wiki HCL, but it all seems to pertain to version 9, not 10. Or maybe to find out what add-in NICs folks are using that work. So the point of the post is, I suppose, to poll the community and get an idea if anyone has had a similar issue. If we can't find a working solution within two weeks, we'll be falling back to 9.X. We're getting away with that hardware for now because we're a school on summer break and user load is really low. The strangest part in this story, we installed 10.2 on an OLD HP ProLiant DL585 and it works with no problem. We're now going to try a newer Intel i350 card to see if we have better results. The result was the same, 10 or so packets dropped every 75/80 pings. So we purchased a add-in Intel Pro-1000 quad port. Untangle support told us it may be a compatibility issue with the NICs. The problem is, when doing a ping sweep to Google (all 8's) after 75 to 80 packets, it would drop approximately 10 packets. We installed 10.2, using the onboard Broadcom NICs and tested.Įverything looked ok, the NICs showed up fine. We have a Dell PowerEdge R610 with fantastic specs (2 X 4 Core CPU, 64 GB RAM, 2 X 146GB 15K RPM SAS).