pfSense Advanced Settings - System Advanced Guide

The System > Advanced section groups parameters that require understanding of pfSense architecture and directly affect system security, performance, and stability. Incorrect configuration can result in loss of web GUI access or degraded network functions. Before modifying advanced settings, create a configuration backup .

Admin Access

The Admin Access tab controls the protocols and parameters for accessing the firewall management interface.

Web Interface (webConfigurator)

Protocol and Port

SettingDescriptionDefault
ProtocolHTTP or HTTPS. HTTPS is recommended for all environmentsHTTPS
SSL/TLS CertificateCertificate for the HTTPS connection. A self-signed certificate is generated during installationAutomatic
TCP PortWeb interface port443
Max ProcessesNumber of nginx worker processes2

Increasing Max Processes to 4-6 may be necessary when multiple administrators work concurrently. Each additional process consumes extra memory.

Warning:

Do not expose the pfSense web interface to untrusted networks. Use a VPN for remote administration.

Redirect and Security

SettingDescriptionRecommendation
WebGUI RedirectRedirects HTTP (port 80) to the configured HTTPS GUI portEnable unless port 80 is needed by other services
HSTSHTTP Strict Transport Security - browser remembers HTTPS-onlyEnable for regular administrators
OCSP Must-StapleEnforces OCSP stapling for the GUI certificateEnable when using a public CA
Login AutocompleteAllows browsers to save the login passwordDisable in environments with shared workstations
Anti-Lockout RulePrevents deny rules from blocking GUI/SSH access on LANDo not disable without alternative access

Security Checks

DNS Rebind Check - prevents DNS rebinding attacks by rejecting DNS responses containing private IP addresses. Disable if internal DNS records point to pfSense by private address and GUI access is blocked as a result.

HTTP_REFERER Enforcement - validates the Referer header to protect against cross-site request attacks. May cause false blocks when proxy servers modify headers.

Alternate Hostnames - a list of additional hostnames accepted by the DNS Rebind and HTTP_REFERER checks. Add all names through which administrators access the interface.

Browser Tab Text - by default the browser tab shows the hostname first, then the page name. Enabling this option reverses the order.

SSH Access

SettingDescriptionDefault
Enable Secure ShellActivates the SSH daemon; generates keys on first startDisabled
SSHd Key OnlyAuthentication method: password or key, key only, both requiredPassword or key
Allow Agent ForwardingPermits SSH agent key forwardingDisabled
SSH PortSSH server port22

SSH security recommendations:

  • Use key-only authentication in production environments
  • Changing the port from 22 to a non-standard value provides minimal security and does not replace firewall rules
  • User SSH keys are managed in the user management section
  • For access from external networks, use a VPN rather than direct SSH through WAN

Serial Console

SettingDescriptionDefault
Serial TerminalEnables the console on the first serial portDisabled
Serial SpeedData rate in bits per second115200
Primary ConsoleSelects the primary console: video or serialVideo (VGA)

Enabling the serial console requires a reboot. On headless systems (servers without video output), the serial console is often the only means of physical access.

Console Menu Protection

The Console menu protection setting enables password protection on the physical console using web interface credentials. This is a supplementary measure and does not replace physical security of the server room. A reboot is required for activation.

Firewall and NAT

The Firewall & NAT tab contains packet processing, state table, and address translation parameters.

Packet Processing

IP Packet Options

SettingDescription
IP Do-Not-FragmentClears the DF bit in packets instead of dropping them. Resolves compatibility issues with operating systems that generate fragmented packets with DF set
IP Random IDReplaces predictable IP ID field values with random ones. Applies only to non-fragmented packets
Firewall ScrubPF packet normalization. Disabling may be necessary for NFS and VoIP traffic

Firewall Optimization

The Firewall Optimization Options setting determines the algorithm for expiring state table entries:

ModeDescriptionUse Case
NormalStandard algorithmMost environments
High LatencyExtended timeoutsSatellite and high-latency links
AggressiveFaster expiration of idle connectionsHigh-throughput environments
ConservativeMaximum connection preservationEnvironments where session continuity is critical

State Table

SettingDescriptionDefault
Maximum StatesMaximum number of tracked connections. Each state consumes approximately 1 KB of memory~10% of RAM
Maximum Table EntriesMaximum entries in address tables (aliases, blocked hosts)400,000
Maximum Fragment EntriesMaximum fragments in the reassembly table (when scrub is enabled)5,000

Adaptive Timeouts

Controls state table behavior as it approaches capacity:

  • Adaptive Start - threshold at which timeout reduction begins (default: 60% of Maximum States)
  • Adaptive End - threshold for maximum timeout reduction (default: 120% of Maximum States)

Timeouts scale linearly between these thresholds, preventing table overflow.

VPN Parameters

SettingDescription
VPN IP Do-Not-FragmentSame as IP Do-Not-Fragment but applies only to VPN traffic
IP Fragment ReassembleBuffers fragments until a complete packet is formed before filtering
MSS ClampingLimits the maximum TCP segment size in IPsec tunnels. Default: 1,400 bytes

Advanced Firewall Parameters

SettingDescription
Disable FirewallDisables PF entirely, converting the device into a router. Also disables NAT
State PolicyInterface Bound (more secure) or Floating (for asymmetric routing)
Static Route FilteringBypasses rules for traffic entering and exiting through the same interface
Disable Auto-added VPN rulesDisables automatic IPsec rules, giving the administrator full control
Disable Reply-ToDisables automatic binding of reply traffic to the ingress interface
Disable Negate rulesRemoves automatic rules for local and VPN connectivity in Multi-WAN
Allow APIPARemoves the block on 169.254.0.0/16 traffic

Bogon Networks

The Update Frequency setting controls how often bogon network lists (reserved and unallocated IP ranges) are refreshed. Regular updates are important because IANA periodically allocates new address blocks.

NAT Reflection

NAT Reflection allows internal clients to access port-forwarded services using the firewall’s public IP address.

ModeDescriptionLimitations
DisabledPort forwards accessible from WAN onlyDefault
Pure NATReflection via NAT rulesBetter scalability
NAT + ProxyReflection via a helper programLimited to 500-port ranges, 1,000 total ports

Additional reflection settings:

  • Reflection Timeout - forced timeout for reflected connections in NAT + Proxy mode
  • NAT Reflection for 1:1 NAT - enables reflection for static NAT mappings
  • Automatic Outbound NAT for Reflection - creates outbound NAT rules for reflection when client and server reside in the same subnet

TFTP Proxy

A built-in proxy for the TFTP protocol, enabling internal clients to connect to external TFTP servers. Interfaces must be selected to activate.

State Timeouts

The State Timeouts section provides fine-grained control over protocol-specific timeouts (in seconds) for TCP, UDP, ICMP, and other protocols. In most cases timeouts are managed by the optimization mode, but manual adjustment may be needed for specific devices or applications.

Networking

The Networking tab contains IPv6 settings, hardware offloading, and network event logging parameters.

IPv6

SettingDescription
Allow IPv6Controls IPv6 traffic blocking. Disabling blocks all IPv6 but does not remove IPv6 configuration
IPv6 over IPv4 TunnelingForwards protocol 41 (RFC 2893) traffic to a specified IPv4 address. Requires rules permitting protocol 41 on WAN
Prefer IPv4 over IPv6The firewall prefers IPv4 when DNS returns both record types. Affects updates and packages, not clients
IPv6 DNS EntryWhen enabled, only IPv4 DNS entries are created for the firewall itself

Hardware Offloading

Hardware offloading settings control the delegation of computational tasks to the network adapter. In the context of routers and firewalls, these features often cause problems.

SettingEffect When CheckedRecommendation
Hardware Checksum OffloadingDisables hardware checksum calculationCheck (disable offloading) for Realtek and virtual adapters
Hardware TCP Segmentation OffloadingDisables TSOCheck (disable offloading) - TSO is undesirable for routers
Hardware Large Receive OffloadingDisables LROCheck (disable offloading) - LRO degrades routing performance

Warning:

The checkboxes in this section work inversely: checking the box disables the offloading feature. Read each parameter description carefully to avoid confusion.

Virtual NIC ALTQ Support - enables ALTQ support for hypervisor virtual network adapters, which is required for the traffic shaper to function in virtualized environments. Requires a reboot.

Suppress ARP Messages

The Suppress ARP Messages setting prevents logging of messages about MAC address changes for IP addresses. Useful in environments with frequent legitimate binding changes (for example, VRRP or virtual machine migration).

Notifications

The Notifications tab configures alerting channels for system events.

Certificate Monitoring

SettingDescription
Certificate ExpirationEnables notifications as certificates approach expiration
Ignore Revoked CertificatesExcludes revoked certificates from CRL checks
Expiration ThresholdNotification threshold in days (default: 27). Uses the lesser of the specified value or one-third of remaining certificate lifetime

SMTP (Email)

Core settings for sending notifications by email:

SettingDescription
E-mail ServerSMTP server address
SMTP PortPort number (25 or 587 for submission)
Connection TimeoutConnection timeout in seconds
Secure SMTP ConnectionDirect SSL/TLS connection (not STARTTLS)
Validate SSL/TLSValidates the SMTP server certificate
From / ToSender and recipient addresses (multiple recipients separated by comma)
Auth Username / PasswordCredentials for authenticated SMTP
Auth MechanismPLAIN or LOGIN

After configuration, use the Test button to verify delivery.

Telegram, Pushover, Slack

pfSense supports notifications through messaging and push services:

ServiceRequired Parameters
TelegramBot API key, Chat ID or channel username
PushoverAPI key, User Key, notification priority and sound
SlackAPI key, channel name

All services include a test button for validating the configuration before saving.

Sound Notifications

  • Console Bell - the system speaker emits a tone for emergency messages
  • Startup/Shutdown Sound - audio notification when the system starts or stops

Miscellaneous

The Miscellaneous tab covers cryptographic acceleration, power management, gateway monitoring, and RAM disk configuration.

Cryptographic Acceleration

SettingDescription
IPsec-MBSoftware acceleration for AES-CBC, AES-GCM, and ChaCha20-Poly1305 in VPN
Cryptographic HardwareHardware acceleration: Intel QAT, BSD Crypto Device, AES-NI, or combinations

The appropriate acceleration method depends on the hardware platform. AES-NI is available on most modern Intel and AMD processors and provides significant acceleration for IPsec and OpenVPN.

Thermal Sensors

ValueDescription
None/ACPIReads sensors through the standard ACPI interface
Intel CoreLoads the coretemp module for Intel processors
AMD K8, K10, K11Loads the amdtemp module for AMD processors

Power Management

Speed Shift - hardware-controlled CPU frequency management. The processor adjusts its frequency independently without OS intervention. The Power Preference slider (0-100) shifts the balance between energy efficiency and performance.

PowerD (SpeedStep) - software-controlled CPU frequency management:

SettingDescription
Enable PowerDActivates the frequency management daemon
AC Power ModeMode when on mains power: Maximum, Minimum, Adaptive, Hiadaptive
Battery Power ModeMode when on battery power
Unknown Power ModeMode when the power source is indeterminate

Gateway Monitoring

These settings control state table behavior during gateway failures and recoveries:

SettingDescription
State Killing on Gateway RecoveryControls state clearing when a higher-priority gateway returns
State Killing on Gateway FailureDo not kill / kill states for down gateways / flush all states
Skip Rules When Gateway is DownOmits rules bound to an unavailable gateway

The Skip Rules When Gateway is Down setting removes rules entirely rather than routing through the default gateway. Traffic will be processed by the next matching rule.

RAM Disks

Using RAM disks for /tmp and /var reduces SSD/CF card wear and accelerates I/O operations:

SettingDescriptionDefault
Use RAM DisksEnables RAM disks (requires reboot)Disabled
/tmp SizeRAM disk size for /tmp40 MB
/var SizeRAM disk size for /var60 MB

Recommended /var size for production systems: 512-1024 MB.

Periodic backups - interval (in hours) between saving RAM disk data to persistent storage:

DataDescription
RRD DataGraph databases
DHCP LeasesDHCP lease tables
Log DirectorySystem logs
Captive Portal DataCaptive portal databases

Additional Parameters

SettingDescription
Proxy SupportProxy server settings for outbound connections (URL, port, authentication)
Load BalancingSticky Connections and Source Tracking Timeout for maintaining session affinity
WatchdogHardware watchdog timer for automatic reboot on system hang
Kernel PTI / MDS MitigationSpectre/Meltdown vulnerability protections (affects performance)
PHP Memory LimitMemory limit for GUI processes
Hard Disk StandbyIdle time (minutes) before the disk enters power-saving mode

Configuration Order

Recommended sequence for configuring advanced settings after completing general configuration :

  1. Configure the web interface protocol and port (Admin Access)
  2. Enable and configure SSH if required
  3. Review hardware offloading settings (especially in virtualized environments)
  4. Set up notification channels
  5. Optimize firewall parameters for your workload

For managing the firewall through the physical or serial console, proceed to the console access section.

Last updated on