• 0 Votes
    6 Posts
    947 Views
    Y
    yes i configure gateway monitoring and also DNS in general setup till now doesn't work policy based routing un firewall rules.. :'( :'( :'( :'( :'(
  • Tripple WAN with IPv6

    1
    0 Votes
    1 Posts
    522 Views
    No one has replied
  • Sticky Connection Doesn't Work

    4
    0 Votes
    4 Posts
    635 Views
    C
    @dotdash: I haven't tried the feature in years, but it was problematic in the past. If I need to load-balance these days, I just add a rule to send https to a failover group and LB the rest of the traffic. Can't do that. I have a lot of HTTPS over custom port such as 8888, 8890 and many many more on remote client access. it would be impractical to put all the ports over fail over rule Thank you
  • OSPF between Cisco & PFsense

    3
    0 Votes
    3 Posts
    3k Views
    S
    Problems: (1) Seems PFsense interfaces rely on static route for 10.0.0.0/24 hosts to be able to http webconfigurator (2) 192 hosts can't access the internet or ping from the PFsense interface (3) Can't ssh 192 hosts from 10.0.0.0/24 (4) But 192 hosts can talk to each other (5) From ASA, I can ping PFsense interfaces but none of 192 hosts. (6) Disabled firwall/packet-filtering on PFsense for now to fix route issues. (ASA output) cisASA# show route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2       E1 - OSPF external type 1, E2 - OSPF external type 2       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2       ia - IS-IS inter area, * - candidate default, U - per-user static route       o - ODR, P - periodic downloaded static route, + - replicated route Gateway of last resort is 107.204.168.1 to network 0.0.0.0 S*    0.0.0.0 0.0.0.0 [1/0] via 107.204.168.1, outside O IA    10.10.2.0 255.255.255.0 [110/20] via 10.0.0.119, 15:17:07, inside C        107.0.0.0 255.0.0.0 is directly connected, outside L        107.204.169.233 255.255.255.255 is directly connected, outside C        10.0.0.0 255.255.0.0 is directly connected, inside L        10.0.0.1 255.255.255.255 is directly connected, inside O IA  192.168.122.0 255.255.255.0 [110/20] via 10.0.0.119, 15:17:07, inside cisASA# show ospf nei Neighbor ID    Pri  State          Dead Time  Address        Interface 100.100.100.100  1  FULL/BDR        0:00:39    10.0.0.119    inside cisASA# (PFsense output) IPv4 Routes Destination Gateway Flags  Use Mtu Netif  Expire 0.0.0.0/32  10.0.0.1    UGS 0  1450    em3 default 10.0.0.1    UGS 57016  1450    em3 8.8.8.8 00:3d:2c:15:26:57  UHS 17  1450    em3 10.10.2.0/24    link#2  U  0  1450    em1 10.10.2.1  link#2  UHS 212364  16384  lo0 84.200.69.80    00:3d:2c:15:26:57  UHS 166 1450    em3 127.0.0.1  link#8  UH  823 16384  lo0 10.0.0.0/16 10.0.0.1    UGS 120297  1450    em3 10.0.0.119  link#4  UHS 0  16384  lo0 192.168.122.0/24    link#3  U  63230  1450    em2 192.168.122.1  link#3  UHS 212299  16384  lo0 Quagga OSPF Neighbors     Neighbor ID Pri State          Dead Time Address        Interface            RXmtL RqstL DBsmL 5.5.5.5          1 Full/DR          34.501s 10.0.0.1      em3:10.0.0.119        0    0    0 (ASA Config) cisASA# show run : Hardware:  ASA5505, 512 MB RAM, CPU Geode 500 MHz : ASA Version 9.2(4) ! hostname cisASA enable password .jaY8R6W./JP9tz1 encrypted xlate per-session deny tcp any4 any4 xlate per-session deny tcp any4 any6 xlate per-session deny tcp any6 any4 xlate per-session deny tcp any6 any6 xlate per-session deny udp any4 any4 eq domain xlate per-session deny udp any4 any6 eq domain xlate per-session deny udp any6 any4 eq domain xlate per-session deny udp any6 any6 eq domain names ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 !            interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1 nameif inside security-level 100 ip address 10.0.0.1 255.255.0.0 ! interface Vlan2 nameif outside security-level 0 ip address 7.4.1.2 255.0.0.0 ! interface Vlan3 no nameif    no security-level no ip address ! boot system disk0:/asa924-k8.bin ftp mode passive clock timezone PST -8 clock summer-time PDT recurring dns domain-lookup inside dns server-group DefaultDNS name-server 84.200.69.80 name-server 8.8.8.8 same-security-traffic permit inter-interface same-security-traffic permit intra-interface object network obj-100 subnet 10.0.0.0 255.255.0.0 object network loader object network ospf-10 subnet 10.0.2.0 255.255.255.0 object network ospf-20 subnet 10.0.20.0 255.255.255.0 object network ospf-30 subnet 10.0.30.0 255.255.255.0 object network ospf-40 subnet 192.168.122.0 255.255.255.0 object-group service DM_INLINE_SERVICE_1 access-list inside_access_in extended permit ip object obj-100 any4 access-list inside_access_in extended permit ip object ospf-10 any4 access-list inside_access_in extended permit ip object ospf-20 any4 access-list inside_access_in extended permit ip object ospf-30 any4 access-list inside_access_in extended permit ip object ospf-40 any4 access-list outside_access_in extended permit ip 192.168.0.0 255.255.0.0 any access-list outside_access_in extended permit ip 10.0.0.0 255.0.0.0 any access-list outside_access_in extended permit ip 172.16.0.0 255.240.0.0 any pager lines 24 logging enable logging buffer-size 987564 logging buffered informational logging asdm informational mtu inside 1450 mtu outside 1450 ip verify reverse-path interface inside ip verify reverse-path interface outside icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-762-150.bin no asdm history enable arp timeout 14400 no arp permit-nonconnected ! object network obj-1000 nat (inside,outside) dynamic interface object network ospf-10 nat (inside,outside) dynamic interface object network ospf-20 nat (inside,outside) dynamic interface object network ospf-30 nat (inside,outside) dynamic interface object network ospf-40 nat (inside,outside) dynamic interface ! nat (inside,outside) after-auto source dynamic any interface access-group inside_access_in in interface inside access-group open-acl in interface outside router ospf 5505 router-id 5.5.5.5 network 10.0.0.0 255.255.0.0 area 0 log-adj-changes redistribute static subnets ! route outside 0.0.0.0 0.0.0.0 7.4.1.1 management-access inside dhcp-client client-id interface outside dhcpd dns 84.200.69.80 8.8.8.8 dhcpd update dns both override dhcpd option 3 ip 10.0.0.1 ! dhcpd address 10.0.1.100-10.0.1.130 inside dhcpd enable inside ! threat-detection basic-threat threat-detection statistics host threat-detection statistics access-list threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200 ntp server 216.228.192.69 source outside ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters   message-length maximum client auto   message-length maximum 512 policy-map global_policy class inspection_default   inspect dns preset_dns_map   inspect ftp   inspect h323 h225   inspect h323 ras   inspect rsh   inspect rtsp   inspect esmtp   inspect sqlnet   inspect skinny    inspect sunrpc   inspect xdmcp   inspect sip    inspect netbios   inspect tftp   inspect ip-options   inspect icmp ! service-policy global_policy global prompt hostname context no call-home reporting anonymous Cryptochecksum:72ade258e5ac8ab26363b2a9beb2724a : end cisASA# (PFsense Config is in GUI format) But pretty much the same
  • Help with my setup on a Non-Nat and local ip subnet DHCP environment

    2
    0 Votes
    2 Posts
    720 Views
    johnpozJ
    "I have a block of IPs provided by my ISP, routed directly to me. " So this block is routed to you over what transit network??  Or is more what is common is they gave you say a /29 with 1 of those /29 being your gateway your suppose to point to.. This is completely different than a routed network. If they routed your block to you, then you would have a transit network connection.. So for example lets say they gave you public 4.5.6.0/29, and your pfsense wan IP might be 1.2.3.2/30  You could then yes put that 4.5.6.0/29 behind pfsense and not nat it.  But if all they gave you was 1.2.3.0/29 and told you to point to 1.2.3.1 as your gateway.. That is not a routed network.. You just have /29 hanging off their network.  And sure you could use .2 - .6 as other VIPs on pfsense wan.. Placing those IPs behind pfsense would require subnet of that network or bridge..
  • WAN Failover OpenVPN Issues on WAN1 Recovery

    2
    0 Votes
    2 Posts
    730 Views
    G
    Same problem here (OpenVPN not switching back from backup to main connection) - so perhaps I can push up the topic? regards Luggi
  • MultiWan+ Squid proxy

    6
    0 Votes
    6 Posts
    1k Views
    T
    Ok thanks
  • Load Balancing with per-packet

    5
    0 Votes
    5 Posts
    2k Views
    L
    Hello, Could you please add Multipath TCP (MPTCP) feature on 2.4.0 version? Link : https://redmine.pfsense.org/issues/4632
  • Two pfSense serving same LAN

    8
    0 Votes
    8 Posts
    1k Views
    johnpozJ
    "request come from the .40.x side." So your source natting as well?  Putting a host in both your dmz and your lan via multihoming pretty much defeats the whole purpose of a "dmz"
  • Exchange Server on Multi WAN

    5
    0 Votes
    5 Posts
    1k Views
    dotdashD
    @DJBenson: Am I right in assuming if I use a port alias containing 25,465 and 587 and assign that to the rule you suggested, any other traffic originating from the mail server will still load balance (i.e. normal HTTP/S traffic)? Yes, set the destination for smtp, etc and the other traffic will progress to the default rule. You may want to put https on a failover group (not load balanced) to avoid the problems you saw with banking sites, etc.
  • Check MultiWAN speed and load balancing in real time

    1
    0 Votes
    1 Posts
    409 Views
    No one has replied
  • Policy based routing, multi-WAN and gateway on same subnet

    39
    0 Votes
    39 Posts
    8k Views
    G
    Hi Jim, Regarding all the tests my colleague has made and his results, do you think it could be a bug ? Thank you :-)
  • Routing issue between two network

    7
    0 Votes
    7 Posts
    1k Views
    johnpozJ
    What dok said ;) That is not how you would set it up.. If you want 192.168.1/24 to be your internal network - then it would go behind pfsense..  Just like your wifi network..  You can have another firewall between pfsense and the internet if you want.. kind of pointless..  But you end up with like the attached.  Now you can firewall or talk between your segments all you want.  You can run a captive portal on the wifi segment, etc. You don't put devices on a transit network between 2 routers.  If you do then they have put routes on them to tell them which router to use for which network.  If your pfsense is natting now you also have to port forward to allow traffic from your transit into your downstream network.  Your prob going to have asymmetrical issues because you miss a route on 1 of your hosts in your transit.. If you want to use pfsense as a downstream router/firewall and have a segment hang off the upstream router then you would connect them with a transit, but now your going to have to create routing on your upstream router.. See 2nd pic.. I wouldn't be natting at psfense in this case.  Your upstream router would do the natting for any networks behind it.  So there is more config on upstream router in this setup. [image: transitnetwork.png_thumb] [image: typicalsetup.png] [image: typicalsetup.png_thumb] [image: transitnetwork.png]
  • Static routing to same LAN

    13
    0 Votes
    13 Posts
    12k Views
    johnpozJ
    Help you with why asymmetrical causes issues in applications?  Yeah its going  to be hit and miss - its a borked config, there is little use trying to make it work.
  • Multi proxy port directed to WAN and VPN

    1
    0 Votes
    1 Posts
    556 Views
    No one has replied
  • Can't access other LAN

    7
    0 Votes
    7 Posts
    2k Views
    P
    Cool, there is actually a HOWTO for this! The "Configure a new Interface" part I had right but I didn't know about the "Configure NAT" part. The information in it is a bit outdated, I selected Hybrid instead and now it's working! ![2017-01-11 15_39_13-Program Manager.png](/public/imported_attachments/1/2017-01-11 15_39_13-Program Manager.png) ![2017-01-11 15_39_13-Program Manager.png_thumb](/public/imported_attachments/1/2017-01-11 15_39_13-Program Manager.png_thumb)
  • WAN Failover - Member Down

    2
    0 Votes
    2 Posts
    1k Views
    A
    Sorry, did a bit more research and found this thread: https://forum.pfsense.org/index.php?topic=37451.0 Fixed it with increase the threshold values.
  • Guys please i need script as soon as possible

    4
    0 Votes
    4 Posts
    3k Views
    M
    Thanks guys, I got the solution.
  • Two subnets communication issue

    15
    0 Votes
    15 Posts
    2k Views
    DerelictD
    Your design is broken. Put "Plex Devices" on another interface so your routers can route properly or maintain all the necessary gateways and routes on them.
  • Port forwarding

    1
    0 Votes
    1 Posts
    539 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.