• 0 Votes
    1 Posts
    8k Views
    No one has replied
  • WAN Interface Drops

    6
    0 Votes
    6 Posts
    39 Views
    patient0P
    @thefixersson btw: I forgot to mention that you should xxx-out your public IP. ifconfig: That looks indeed good, can't see anything wrong. Is the ISP gateway still in the ARP table? And the routing table is also ok? I was just on the phone with the ISP while it was down and they could ping my device They could ping your WAN IP on the pfSense? Unless you have created a firewall rule for it on WAN that's not possible.
  • Multiple tunnels to connect two boxes

    2
    1
    0 Votes
    2 Posts
    23 Views
    O
    @ncat I don't understand the use of gateway groups. Why not use a routing protocol like OSPF to select an active OpenVPN tunnel to send traffic over?
  • Many /32 routes in the routing table

    5
    0 Votes
    5 Posts
    31 Views
    M
    @SteveITS No gateway monitoring is active on the pfSense This is the routing table (in the file attachment) pfs-pmx-v4-routes.txt
  • 0 Votes
    1 Posts
    32 Views
    No one has replied
  • 0 Votes
    4 Posts
    49 Views
    tinfoilmattT
    @Bob.Dig Works as expected. Thank you, sir! (And thank you, @cmcdonald!!!)
  • Multi-WAN acting as Load Balancing instead of Failover

    6
    0 Votes
    6 Posts
    363 Views
    J
    FreeBSD 14.0-CURRENT #1 RELENG_2_7_0-n255866-686c8d3c1f0 I can see similar issues. Have two WAN interfaces in a gateway group with one on a lower tier. Trigger level is set to member down. Despite this, if I tcpdump both my main WAN and lower tier failover WAN, I see traffic on both while both interfaces are up and reporting no packet loss. Model is https://www.mini-box.com/APU-2E4-System?sc=8&category=2019 AFAIK.
  • 2nd WAN Interface DHCP Renew Failing

    4
    2
    0 Votes
    4 Posts
    85 Views
    J
    @patient0 Hi and thanks for taking the time to respond. Yes, I have an x550 add in card. This morning I decided to factory reset and still could not get the WAN interface on LAGG0.4090 to get a public IP through DHCP. I had a suspicion that the x550 card, with the same hardware id's as the XG-7100 switch (ix0, ix1 SFP+ ports) was inducing a conflict. I put an older 4 port gigabit nic in it's place and now everything is working as I would expect it to. Fiber worked on this x550 card until I tried to use the built in LAN/WAN ports ETH1, ETH2. There may be another work around but for now I really have no benefit from 2 gigabit synchronous fiber, and plan to just drop it back to the gigabit tier. Again, thanks for pointing out the ix5 DHCPDISCOVER in the log. Looks like the LAGG0.4090 interface never bothered to reach out for an address and I suspect the issue was the x550 nic. Have a great day.
  • Gateway Monitoring Daemon (dpinger) issues resolved

    5
    0 Votes
    5 Posts
    670 Views
    D
    In my instance, monitoring a different IP instead of ISP didn't make a difference. I have disabled monitoring for now, we'll see if it helps.
  • wan and gateways on different networks,

    9
    2
    0 Votes
    9 Posts
    177 Views
    johnpozJ
    @MyKroFt said in wan and gateways on different networks,: ip and gatewas had first 3 the same with 4 being different Well if your old IP started with 69 from your ddns info you posted. Seems like they changed the IP range you are connected too is all. As @patient0 pointed out your IP and its gateway are in the same network. 47.5.16.1 - 47.5.31.254 Doesn't really matter what the 2 IPs are, as long as they are in that range they are the same network. Your old gateway most likely answered ping, your new one in this 47 network does not it seems.
  • bgp on two wan interfaces on the same l2

    1
    1
    0 Votes
    1 Posts
    48 Views
    No one has replied
  • 0 Votes
    2 Posts
    95 Views
    S
    @ivo.a.v.tavares yes because the 192.168.4.0/24 is not in DMZ SUBNETS. Also any software firewall in the target needs to allow connections from the other subnet.
  • Tailscale and Multi-WAN

    8
    0 Votes
    8 Posts
    3k Views
    E
    For anyone that has found this topic and dont want to create container or VM with tailscale running, Just swap your WAN1 and WAN2 in interfaces and restart tailscale on pfsense. You might need to adjust your default gateway in routing and any other rules that rely on that naming BUT it works. I was able to move my tailscale connection to my secondary WAN with this method.
  • default failover settings for gateway groups

    3
    0 Votes
    3 Posts
    125 Views
    S
    @beloc I think you mean https://docs.netgate.com/pfsense/en/latest/routing/gateway-configure.html#:~:text=The%20amount%20of%20time%2C%20in%20milliseconds which is the averaging time period not necessarily a maximum. (?)
  • 0 Votes
    11 Posts
    737 Views
    GertjanG
    @SenseiNYC That's probably the core of your issue : @SenseiNYC said in pfsense UI hangs up and internet stops working until device is restarted.: it magically came back online We all presume that a "2.5 Gbit NIC" works like a 10,100 1000 NIC, but faster. When you run the numbers on a "2.5 Gbit NIC" (how it works, what it does, whats needed to make it works) you'll find situation where the electric pulses must be going faster as what we know is "the speed of light". So, special care is needed. Above 1 Gbit, the quality of NIC plugs (both sides), the cables used, and even the position of the moon right now become important factors. Ok, maybe not the moon. Btw : Yes, I saw 10 Gbit electric NICs working in front of me. I could use it in the kitchen and boil eggs on it. For me, it can't work, but it some how does ^^ error 64 : the interface used was 'not available', 'not ready' or 'out of sync' or more commonly said : it is 'down'. Check the NIC leds, get the doc of the NIC, check what the colors mean. Are the (very fast) flashing ? If so : sync errors => NIC is going up down very fast => it's having a hard time syncing. Keep in mind : I'm just thinking out loud here, except for the '64 error'.
  • Policy based routing over WireGuard tunnel

    1
    0 Votes
    1 Posts
    73 Views
    No one has replied
  • 0 Votes
    4 Posts
    275 Views
    F
    Ok got it, on the allow ipv4 rule it was set to allow from port2 networks. My nested router isn't a port2 network so it would never be passed on and thus hit the default deny. Switched that to any source network as a test and it worked.
  • Help Routing a second internet routable subnet

    2
    0 Votes
    2 Posts
    183 Views
    V
    @wzkds See: Routing Public IP Addresses
  • BGB Routing with multi WAN and own AS

    6
    1
    0 Votes
    6 Posts
    420 Views
    patient0P
    @Jaritura I wonder if that really works. On WAN direction 'in' means connections from the public to the WAN. Your first rule keeps the state for all these connections. Have you implemented this and it works?
  • Traffic on Tier2 Gateway w/out Failover Event

    6
    6
    0 Votes
    6 Posts
    678 Views
    A
    Really appreciate you circling back with the full explanation — this is extremely useful for anyone running multi-WAN with Starlink in the mix.
Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.