• IPV4 Failover with IPV6

    1
    0 Votes
    1 Posts
    243 Views
    No one has replied
  • 2 pfSense with gateway on the second

    10
    0 Votes
    10 Posts
    1k Views
    S
    Regarding the first problem, setting the mtu and the mss really solved my problem. Thank you. I just set the MTU to 1400 and the MSS to 1360. How can i easily find out the highest i can get?
  • Multi WAN Routing Split

    3
    0 Votes
    3 Posts
    386 Views
    S
    @Rico said in Multi WAN Routing Split: Check out the great Multi WAN hangout by jimp: https://www.netgate.com/resources/videos/multi-wan-on-pfsense-23.html -Rico Thanks, exactly what i needed. Was thinking i needed to add the gateway to the WAN rules....doh!
  • From static routing to policy routing with gateway groups

    1
    0 Votes
    1 Posts
    181 Views
    No one has replied
  • Servers on same lan

    11
    0 Votes
    11 Posts
    889 Views
    GertjanG
    Routes are not to be mixed up with Firewall rules. Firewall rules are for traffic that comes IN to an interface. pfSense is the "inside" in this point of view. Firewall rules do not apply to outgoing traffic (just forget about floating rules right now, themselves rarely being used) To be sure that firewall rules are not an issue, put on any (V)LAN type interface a first rule that is a pass-all rule. Routes : every LAN type network that is not declared as a WAN type can reach other because an (LAN's) network mask matches. If there is no match with an existing local network, then a WAN type network is used to send the traffic out to have the traffic being handled by an upstream router. In the vast majority of all possible network scenarios, there is no need to manipulate the routing table. I know, I'm probably not answering your question. What I want to say is : routing tables is never a problem. They can seem to be a problem if the network structure is fckd up severely. In that case the network's logical structure needs to be redone. Not the routing table. Example : Like you, I'm using the OpenVPN server build into to access my companie's nerwork. My LAN is 192.168.1.1/24 - all companie's PC's, printers, file servers, backup units, etc are on this LAN. A second LAN network uses 192.168.2.1/24 My VPN tunnel network is a third local network 192168.3.1/24 (and surely not 192.168.1.1/24 which will conflict with LAN - breaking the routing) So, when I connect remotely, my PC @home will have a 192.168.3.2 IP. Traffic going to my OpenVPN server comes into pfSense and can go 192.168.1.0/24 which is local Anywhere else : the Internet, so it's leaving on the WAN interface.
  • Dual wan fallover works but fallback doesnt

    12
    0 Votes
    12 Posts
    916 Views
    F
    I been having this Issue for a long time as well, It will not fail back to the primary circuit, i have to go to the secondary circuit and mark getaway as down and force to fail over.
  • Route WAN to interface - simple pass everything through

    5
    0 Votes
    5 Posts
    203 Views
    J
    I think what I'm after is a gateway between guest and WAN. Usually the last visible rule created is what's allowed out. I say visible because the actual last rule is to block everything (built in / default rule). So if you create a pass rule at the end of the list to allow, (your previous rules will block to LAN, WiFi, VPN) then you should be sweet.
  • Port Forwarding + Routing

    8
    0 Votes
    8 Posts
    668 Views
    DerelictD
    I would use Split DNS there.
  • Slow PBR for Interface

    1
    0 Votes
    1 Posts
    181 Views
    No one has replied
  • How to route to Virtual LAN IP on LAN interface?

    2
    0 Votes
    2 Posts
    194 Views
    H
    I fixed the problem by removing the virtual ip, then putting it back in.
  • Unable to select gateway group in static route

    5
    0 Votes
    5 Posts
    2k Views
    jimpJ
    You will need a routing protocol of some kind, there isn't likely to be any other way connecting to a third party could manage two separate tunnels which are up all the time. The failover is much slower but you could maybe get away with only having one tunnel set to use a hostname for the remote gateway, and Dynamic DNS on the Fortigate side set to switch the hostname depending on which WAN is preferred at the time. That's assuming Fortigate supports that kind of function for Dynamic DNS.
  • Bandwidth exhaustion not detected on WAN links

    1
    0 Votes
    1 Posts
    86 Views
    No one has replied
  • Gateways drop

    8
    0 Votes
    8 Posts
    772 Views
    J
    @mohkhalifa said in Gateways drop: Problem Solved by un-check "Flush all states when a gateway goes down" in the advanced setting. That box is not checked on my pfSense. I think most of that is still set at the defaults. Never had a reason to change it. At some point if all this doesn't get resolved, I'll just revert to pfSense 2.4.4 p3 till it's fixed.
  • Routing between 2 firewalls in the same subnet

    3
    0 Votes
    3 Posts
    439 Views
    ?
    @viragomann Thanks alot, this worked. So dumb of me :)
  • Routing from LAN1 to LAN2 slow - Build on P4 3Ghz 1GB Ram [SOLVED]

    1
    0 Votes
    1 Posts
    110 Views
    No one has replied
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    6 Views
    No one has replied
  • Routing with Dual WAN question

    4
    0 Votes
    4 Posts
    416 Views
    L
    @Rico The video you pointed me to was very useful, and I now have MultiWAN set up, mostly working. The two weirdnesses I have are: I have a group set with Tier 1 on my Fiber connection, and Tier 2 on my cable connection. My LAN uses this group. When I pull the cable on my Fiber it seems that TCP connections fail over, but things like ping (ICMP etc) out the failed over to WAN do not. I can't see where that is set :-( Second issue is that I have my mail server in a subnet called DMZ, off it's own port from the router. It is set to have it's WAN traffic to only go to the cable connection - which works. What I cannot do is get it to make connections to the LAN. Even if I set up a rule for DMZ-net to LAN-net all I can't ping or ssh from DMZ. I really need/want just Bonjour and ping to be able to initiate DMZ->LAN but I can't even get DMZ-net -> LAN-net all to work, even though on the LAN I have LAN-NET - RFC1918 set and working, and I did try it as LAN-net -> DMZ-net and that works too. Thank you Cheers, Liam
  • Multi-WAN & with Multiple NordVPN Connections in one box

    2
    0 Votes
    2 Posts
    1k Views
    G
    Regarding the NordVPN issue, i use 2 NordVPN connections and one VPN connection from another provider at the same time on one pfSense gateway. I have checked the "Don't pull routes" and "Don't add/remove routes" as those would be problematic with the pfSense configuration. I have not experienced any DNS resolver issues. As it is now, i only have one internet connection. The Netflix issue have been described in other posts using pfBlockerNG. Hope it helps a little.
  • Internal bgp and upstream gateway

    1
    0 Votes
    1 Posts
    117 Views
    No one has replied
  • 2nd IP address on WAN keeps dying

    8
    0 Votes
    8 Posts
    641 Views
    DerelictD
    Right. Chances are the ISP was intermittently forwarding the traffic to you so you were therefore intermittently able to forward the traffic inward. Can only work on what you receive. Glad it looks like they found it.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.