• pf box installation as a load balance and router for internet lines

    Moved
    3
    0 Votes
    3 Posts
    307 Views
    S
    Thank you so much :D
  • Load Balancing Problem

    5
    0 Votes
    5 Posts
    611 Views
    P
    @derelict said in Load Balancing Problem: Load balancing works best when lots of states are being distributed between the various WAN interfaces. Okay, thanks for the clearification. As it happens we do have many "small" connections, so pfsense will do its job (7 VOIP Phones, 7 PCs with Mail and Database acces, file transfers). Next step will be traffic shaping... Priority for VOIP ;-) By the way: Until now I used ipfire. But a single WAN will be to slow and ipfire does only support failover but not Multi WAN.
  • Need Respond To Work Around

    1
    0 Votes
    1 Posts
    171 Views
    No one has replied
  • IPSEC load balancing with multiple WANs

    2
    0 Votes
    2 Posts
    851 Views
    jimpJ
    If you use Routed IPsec (VTI) then you would have an IPsec gateway for each tunnel that you could use with a gateway group. Though because VTI doesn't support reply-to it may not be as ideal as it could be, the return traffic would only take one of the two WAN tunnels. You can pull it off easier with OpenVPN (tunnel up on each WAN, assign the interfaces, use gateway groups + firewall rules only on the assigned interface tabs)
  • Can I use gateway groups to add an OpenVPN Client?

    9
    0 Votes
    9 Posts
    658 Views
    V
    Probably you're missing the outbound NAT rule for the VLAN you want to direct over the VPN. To get better help here, you have to provide more details about your setup: vpn client config interface settings firewall rules outbound NAT rules
  • Dual WAN, one with static routes, the other with NAT

    1
    0 Votes
    1 Posts
    177 Views
    No one has replied
  • 2 pfSenses, 2 WAN and 1 Local Server

    15
    0 Votes
    15 Posts
    2k Views
    DerelictD
    Well I can safely say that "It's not pfSense."
  • Esxi, Trunk, Vlan, Bridge and nothing works

    10
    0 Votes
    10 Posts
    1k Views
    N
    hi again and thanks. i built a trunk port on Cisco then set 3 vlan on pfsense ethernet. 1 managment 2 for wan1 and 2. on the other pfsense ether i just set other 2 vlan for out put to mikrotik. on mikrotik i built 2 vlan on one of the ether. thanks lot for helping me.
  • AWS Load Balancers and AWS

    2
    0 Votes
    2 Posts
    282 Views
    J
    @joshuamichaelsanders said in AWS Load Balancers and AWS: ancers with pfSense? Can anyone step me toward a b BUMP. Curious if anyone has used ELB, either classic or the new model, with pfSense.
  • Help with Routing

    5
    0 Votes
    5 Posts
    632 Views
    V
    The PC2 will not be connected to the OpenVPN interface! The outbound NAT rule has to be on the interface where PC2 is connected to.
  • COnnected routes are not being advertised via ospfd

    10
    0 Votes
    10 Posts
    988 Views
    T
    I dont think it is because of bug as we found no issue in Backup firewall. there must be some malfunction happened while changing the IP of WAN interface... Still searching for the root cause...
  • Rules complementing static routes

    2
    0 Votes
    2 Posts
    448 Views
    stephenw10S
    Give us an example of traffic that you are trying to pass here, actual source and destination IPs. It seems likely that the traffic is not hitting the outer firewall at all. Alternatively the target may not be using that as route back if the source is a public address. Run packet captures. See what traffic is actually arriving on which interfaces. Steve
  • Adding second WAN interface what will happen with the VPN?

    vpn
    4
    0 Votes
    4 Posts
    577 Views
    stephenw10S
    Yes, nothing will change unless you change it. For example: https://www.netgate.com/docs/pfsense/book/openvpn/openvpn-and-multi-wan.html Steve
  • Statefull Failover

    2
    0 Votes
    2 Posts
    347 Views
    stephenw10S
    Not without a client side program to manage that. The existing firewall state(s) will be via the WAN that went down so that needs to timeout and be re-established on the the WAN. Steve
  • Webmail session problem with Load Balancing/Failover

    4
    0 Votes
    4 Posts
    346 Views
    E
    You have no idea how thankful I am. This works for me perfectly (https://forum.netgate.com/topic/131412/solved-alternative-to-sticky-connection-option/2) Thanks.
  • Using Cisco L3 switch with pfSense - static route needed?

    9
    0 Votes
    9 Posts
    2k Views
    G
    Ahh, okay. So one static route in the pfSense: 192.168.0.0/17 via 192.168.120.2 Thanks so much for your help dotdash!
  • pfSense Routing

    3
    0 Votes
    3 Posts
    480 Views
    N
    Thanks for that. I will cross post this in VPN. These are all IPSec site to site connections.
  • routing and openvpn

    1
    0 Votes
    1 Posts
    272 Views
    No one has replied
  • 0 Votes
    2 Posts
    240 Views
    A
    You need: to add this second IP as IP Alias (Firewall/Virtual IPs) to add Outbound NAT rule for this VLAN ("for traffic originating from only one of my VLANS") like Source: this VLAN net Destination: Any Translation Address: this Virtual IP https://www.netgate.com/docs/pfsense/book/nat/outbound-nat.html?highlight=outbound%20nat
  • /28 subnet on DMZ

    15
    0 Votes
    15 Posts
    1k Views
    C
    Thanks for the support given so far. At seems as though I was to early. A couple of hours after Hetzner said they made the change in routing it started working. So now everything works as it should.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.