• Internet drops causing another issues?

    1
    0 Votes
    1 Posts
    267 Views
    No one has replied
  • 0 Votes
    1 Posts
    267 Views
    No one has replied
  • Load balancing issue

    1
    0 Votes
    1 Posts
    383 Views
    No one has replied
  • 2 Lan's One PFsene with own Wan (Wifi Unification)

    4
    0 Votes
    4 Posts
    385 Views
    johnpozJ
    " each their own subnet / switches and firewall's / own dhcp /dns" If these switches are separate connect them… So once a client connects to the specific ssid/vlan they can get to either side.. forget about the routing between these networks - you do not need to do that until the networks join into 1. But really easy leverage all the AP for both networks - where clients can be put on any network you want via the vlan and that ssid, or the dynamic vlan.. As long as the switches the AP connect to are managed this is simple setup. Does this drawing help. Does not matter what brand firewall is on the side - your just doing doing everything at layer 2 with vlan IDs.. As long as the switches share the same vlan IDs for the different networks you can let traffic flow wherever you want be it to pfsense or the other firewall, etc.  Clients will be on the vlan they join via ssid, etc. [image: thishelp.png_thumb] [image: thishelp.png]
  • Load-balancing 2 opevpn's in bridged mode?

    1
    0 Votes
    1 Posts
    283 Views
    No one has replied
  • 2 wan and protcol binding

    4
    0 Votes
    4 Posts
    357 Views
    DerelictD
    What I suggested completely bypasses the round-robin configuration since you are explicitly policy routing to that WAN. As long as those policy routing rules are higher in the rule set.
  • OpenBGP and IPSec playing nice.

    2
    0 Votes
    2 Posts
    247 Views
    DerelictD
    Use frr instead of OpenBGPd. It appears to be fixed if using that combination.
  • Behind a Router/NAT with a Bridge (Only option)

    8
    0 Votes
    8 Posts
    818 Views
    R
    @chpalmer: @rast4man: Now that I think about it, bridging the modem would lose my NanoBeam bridge over 5ghz. This is how I currently get my network so that's a bust. Using their modems built in Wifi? Yes. Since I rely on the NanoBeam for the bridge, if I put the modem in bridge, I'd have to put an AP on their side and recreate the bridge. I don't have the ability to hard wire their modem to my equipment. Essentially, this is a huge PITA.
  • I need help to understand

    6
    0 Votes
    6 Posts
    512 Views
    AnjouWebA
    Thank’s for yours replies, I try it.
  • Multi WAN setup with DSL Router on LAN(VIP)

    1
    0 Votes
    1 Posts
    278 Views
    No one has replied
  • Dual WAN/Multi WAN

    1
    0 Votes
    1 Posts
    400 Views
    No one has replied
  • Meaning of "Default" Gateway

    3
    0 Votes
    3 Posts
    642 Views
    W
    Thank you very much for a very clear answer. Cheers
  • HUAWEI E3372 as WAN failover

    1
    0 Votes
    1 Posts
    343 Views
    No one has replied
  • Routing using a managed HPE Switch

    9
    0 Votes
    9 Posts
    742 Views
    M
    What? Does that have to do with anything?  Outbound nat has zero to do with access to other segments.. Pfsense doesn't even nat between networks on the lan side.  It only would nat between a lan side interface and a wan (one with gateway set on it directly).. I attach my outbound nat rules so that you can figure it out.. even if comments are in italian :-) 192.168.10.0/24 is a subnet leading via an Ubiquiti Antenna to my house. To let this have access to the OpenVPN via the pfbox i had to create that rule.. otherwise… no result... 192.168.4.0/24 is another subnet under which i have a couple of machines that need access to the VPN as well.. so i natted it... You cold have 100's of vlans on your switch.. .Doesn't make it layer 3 routing… Did you set a SVI (Switched Virtual Interface) on these vlans? Ie set an IP address on these vlans? I set 2 different virtual interfaces on the respective Vlans and gave them IP address, ending .1 for each subnet. I imagined that natting was not the top, but creating the firewall rules for each interface was not enough to allow traffic, for example, from "madhouse" to "openvpn". And actually, from the other end of the vpn i cant access "madhouse"… the vpn tunnels in 192.168.30.0/24, and the subnet on the other hand is 192.168.0.0/24, so not conflicting with any other of the interfaces... [image: NAT.png] [image: NAT.png_thumb]
  • Multi Lan setup do not work properly.

    7
    0 Votes
    7 Posts
    538 Views
    J
    Thanks. I will give it a try  :)
  • Multi-WAN, High Availability, policy routing. Failover breaks connections

    28
    0 Votes
    28 Posts
    5k Views
    Z
    Thank you for your reply, I really appreciate. I've double/triple checked and the pfsense/os interface names are following on both nodes: WAN: vmx0 (WAN1) LAN: vmx2 (LAN) OPT1: vmx1 (WAN2) OPT2: vmx3 (SYNC) OPT3: vmx4 (DMZ) not used yet edit: LAN and WAN2 description swapped.
  • 0 Votes
    3 Posts
    3k Views
    J
    Faced the same issue. Can't avoid using gateway switching since pfsense itself will not be able to reach Internet in this case. Any suggestions?
  • Unable to access a host on another subnet but can from pfSense [SOLVED]

    33
    0 Votes
    33 Posts
    4k Views
    L
    Thanks for the info and all the help. Cheers. 8)
  • Two ISP connections and a wireless bridge, probably with VLANs

    1
    0 Votes
    1 Posts
    246 Views
    No one has replied
  • Routing with multiple gateways on a single WAN intarface

    15
    0 Votes
    15 Posts
    993 Views
    E
    That would be great. Might see if I can spin up a test setup & see what happens.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.