• No voip traffic with gateway failover

    4
    0 Votes
    4 Posts
    872 Views
    A
    Is it possible that, like the 2.6 bug that was later fixed with a patch, which didn't let upd traffic pass through the captive portal, in this case it doesn't let udp traffic pass through the failover gateway?
  • Direcionar o tráfego de um PC para navegação da minha WAN 2

    23
    0 Votes
    23 Posts
    2k Views
    M
    @idanielluiz said in Direcionar o tráfego de um PC para navegação da minha WAN 2: @mcury como faço isso? [image: 1679326852322-d63da61b-df77-46b0-8f0b-d46b962f4c72-image.png] Só clicar na mãozinha rsrs
  • 0 Votes
    1 Posts
    603 Views
    No one has replied
  • UPnP & NAT-PMP with Gateway Groups

    1
    0 Votes
    1 Posts
    401 Views
    No one has replied
  • Connect 2 routers but maintain separate internet?

    vpn routing multiple pfsens
    3
    0 Votes
    3 Posts
    1k Views
    F
    @steveits I may be interested in knowing more. My ATT router has a 5G port that is unused, but only 1 of the 2 routers has 5G capability, the pfSense. The other router is a MikroTik, but none of it's eth ports have 5G. For clarity, my pfSense router has a 5G wan input, and 2 10G SFP+ ports as potential outputs. I wanted perfect separation at the WAN connection, but I could use the 5G ethernet port on the ATT machine and go to the pfRouter, then split the connection to a second router via SFP+ and then to a switch for VPN access via the 2nd SFP+. This would give me 5G all the way to each router, than separate LANs from there.
  • OSPF Database routes Redistributed into BGP

    3
    0 Votes
    3 Posts
    908 Views
    S
    @michmoor Firewall A: 2.6.0-RELEASE][admin@pfSense0.lab.lan]/root: vtysh Hello, this is FRRouting (version 7.5.1). Copyright 1996-2005 Kunihiro Ishiguro, et al. pfSense0.lab.lan# sh running-config Building configuration... Current configuration: ! frr version 7.5.1 frr defaults traditional hostname pfSense0.lab.lan log syslog service integrated-vtysh-config ! password 123 ! ip router-id 10.10.10.1 ! interface em3 ip ospf area 0 ! router bgp 9990 bgp router-id 172.16.1.1 bgp log-neighbor-changes no bgp network import-check neighbor 192.168.1.23 remote-as 9991 neighbor 192.168.1.23 description pfsense1 neighbor 192.168.1.23 update-source 192.168.1.22 ! address-family ipv4 unicast redistribute ospf route-map allow-all no neighbor 192.168.1.23 send-community neighbor 192.168.1.23 route-map allow-all in neighbor 192.168.1.23 route-map allow-all out exit-address-family ! address-family ipv6 unicast redistribute ospf6 route-map allow-all neighbor 192.168.1.23 activate no neighbor 192.168.1.23 send-community neighbor 192.168.1.23 route-map allow-all in neighbor 192.168.1.23 route-map allow-all out exit-address-family ! router ospf ospf router-id 10.10.10.1 log-adjacency-changes detail neighbor 10.10.12.1 ! route-map allow-all permit 100 ! line vty ! end pfSense0.lab.lan# Firewall B: [2.6.0-RELEASE][admin@pfSense1.lab.lan]/root: vtysh Hello, this is FRRouting (version 7.5.1). Copyright 1996-2005 Kunihiro Ishiguro, et al. pfSense1.lab.lan# sh running-config Building configuration... Current configuration: ! frr version 7.5.1 frr defaults traditional hostname pfSense1.lab.lan log syslog service integrated-vtysh-config ! password 123 ! ip router-id 10.10.10.1 ! interface em3 ip ospf area 0 ! router bgp 9991 bgp router-id 10.10.10.1 bgp log-neighbor-changes no bgp network import-check neighbor 192.168.1.22 remote-as 9990 neighbor 192.168.1.22 description pfsense0 neighbor 192.168.1.22 update-source 192.168.1.23 ! address-family ipv4 unicast redistribute ospf route-map allow-all no neighbor 192.168.1.22 send-community neighbor 192.168.1.22 route-map allow-all in neighbor 192.168.1.22 route-map allow-all out exit-address-family ! address-family ipv6 unicast redistribute ospf6 route-map allow-all neighbor 192.168.1.22 activate no neighbor 192.168.1.22 send-community neighbor 192.168.1.22 route-map allow-all in neighbor 192.168.1.22 route-map allow-all out exit-address-family ! router ospf ospf router-id 172.16.1.1 log-adjacency-changes detail neighbor 172.18.1.1 ! route-map allow-all permit 100 set weight 1000 ! line vty ! end
  • Enabling Multiple Subnets to Communicate

    2
    0 Votes
    2 Posts
    731 Views
    S
    @s3v3nd34dly51ns the LAN interface by default has an allow all rule. Other interfaces do not do default to deny all. What rules are on 192.168.55.0/24? Does the wireless device to which you’re trying to connect allow 192.168.55.0/24 in its firewall?
  • Virtual Router

    7
    0 Votes
    7 Posts
    1k Views
    natethegreat21N
    @viragomann Makes sense. Thank you!
  • system routing with default gateway set to ovpnc interface

    10
    0 Votes
    10 Posts
    2k Views
    V
    @simpletechguy All ok. I created an Alias with a list of domains where I need the router to go through the VPN. Created a static route where NETWORK this alias and selected VPN gateway. Did you do the same?
  • 0 Votes
    33 Posts
    7k Views
    G
    @denbir @denbir Glad you got it working, although I see no reason you shouldn't be able to when running in Proxmox.
  • Unable to add Wan 2 interface

    2
    0 Votes
    2 Posts
    517 Views
    S
    @bdjackson https://docs.netgate.com/pfsense/en/latest/solutions/netgate-2100/opt-wan.html which will need a port isolated: https://docs.netgate.com/pfsense/en/latest/solutions/netgate-2100/configuring-the-switch-ports.html Edit: you can also undo it if necessary by backing out the steps.
  • Transmit traffic from a specific machine to wireguard (192.168.1.10)

    1
    0 Votes
    1 Posts
    389 Views
    No one has replied
  • 0 Votes
    1 Posts
    338 Views
    No one has replied
  • After backup-restore HW-upgrade, IPv6 traffic is no longer routed to LAN

    3
    0 Votes
    3 Posts
    801 Views
    C
    @cb831 Issue solved. Apparently my ISP had locked my WAN-MAC address for IPv6 communication but NOT for IPv4 communication. When I set the WAN-MAC of my new firewall to the WAN-MAC of the old one - everything worked for IPv6. For the info the uplink at my ISP is Juniper Networks and they had some problems before supporting especially FreeBSD based routers because the Juniper communication is doing some tricks that FreeBSD does not accept. Months ago I had to add the tunable net.inet6.icmp6.nd6_onlink_ns_rfc4861 To fix broken DHCP6 against Juniper 1 because Juniper DHCP6 answers from another IPv6 address than the edge IP. CASE CLOSED
  • Dual WAN and routing to ISP modems

    2
    0 Votes
    2 Posts
    685 Views
    RicoR
    https://docs.netgate.com/pfsense/en/latest/recipes/modem-access.html -Rico
  • Extra routing options for OpenVPN clients

    5
    0 Votes
    5 Posts
    931 Views
    morgensternM
    @viragomann Ha, that worked! I also had to adjust the OpenVPN fw rule to allow the VoIP traffic from the road warrior tunnel network to pass through the HQ to Remote office tunnel. Wonderful! Thank you muchly sir!
  • Routing Problem

    11
    0 Votes
    11 Posts
    1k Views
    O
    @viragomann it's already the case, on Site 1 et Site 2 i have already the routes And if I disable NAT on Site 2, it doesn't matter, Site 1 still can't reach Site 3 Routes Site 1 [image: 1677577963859-48045dd9-271b-440e-a778-6facaabecbe2-image.png] Routes Site 2 [image: 1677578404758-007960ab-9e9f-47e3-8597-d8f18590593f-image.png]
  • Route all OPT1 trafic to other site connected by OpenVPN site-to.site

    2
    0 Votes
    2 Posts
    620 Views
    G
    This guy explain perfectly everything I made it work with the tutorial: https://www.youtube.com/watch?v=ulRgecz0UsQ&ab_channel=LawrenceSystems
  • Firewalling or otherwise restricting some traffic to backup WAN

    3
    0 Votes
    3 Posts
    811 Views
    N
    @nmeth Of course I have now found the answer myself... I did not have the "Skip rules when gateway is down" checkbox checked in the Advanced/Miscellaneous/Gateway Monitoring settings. Information is at https://docs.netgate.com/pfsense/en/latest/config/advanced-misc.html#skip-rules-when-gateway-is-down
  • Slow speeds for internal static routes

    11
    0 Votes
    11 Posts
    1k Views
    D
    The new interface and routing through there resolved the slowness. Thanks for the help!
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.