• PPPoE - NBN FTTP AAPT (No gateway address) WAN /32

    1
    0 Votes
    1 Posts
    154 Views
    No one has replied
  • One Static Public IP from ISP in multiWAN pfsense environment.

    2
    0 Votes
    2 Posts
    211 Views
    RicoR

    https://www.netgate.com/docs/pfsense/routing/multi-wan.html
    https://www.netgate.com/docs/pfsense/book/multiwan/index.html

    -Rico

  • This topic is deleted!

    1
    0 Votes
    1 Posts
    12 Views
    No one has replied
  • Policy Based Routing

    2
    0 Votes
    2 Posts
    378 Views
    DerelictD

    You essentially have two choices when dealing with an OpenVPN provider "WAN."

    DO NOT check Don't pull routes in the OpenVPN client configuration and policy route the traffic you DO NOT WANT to go over the VPN.

    DO check Don't pull routes in the OpenVPN client configuration and policy route the traffic you DO WANT to go over the VPN.

    I generally prefer option 2 but that presents problems if you do not understand the ramifications of the fact that connections originating FROM THE FIREWALL ITSELF cannot easily be policy routed.

  • How can I direct requests internally?

    6
    0 Votes
    6 Posts
    538 Views
    DerelictD

    In the case of using just the 2LD for a web server (too bad that actually became a thing 20 years ago) you probably have to set the hostname to domain and the domain to com.

    Or set the hostname to www and the domain to domain.com and set the additional name for the host to hostname domain and domain to com.

    I would also see if it works instead with a blank hostname and a domain domain.com in the additional names section. If that makes a proper CNAME that's probably the say to go.

  • Pfsense IPv6 behind AT&T Uverse 5268AC

    12
    1 Votes
    12 Posts
    5k Views
    P

    @ttmcmurry
    I do not recall any options in 5268Ac which allows turning off IPv4 on WAN side and more problematic is the part that Pace 5268AC only allows one interface to be outside of DMZ which gets assigned the WAN side global IPv4 address. All other interfaces are forced to assume an internal IPv4 address behind its DMZ. I think this set up is designed for average users who may not be as knowledgeable but working with these limitations is quiet frustrating.

  • 1 Votes
    7 Posts
    697 Views
    R

    -----UPDATE-----

    I decided to reboot the work firewall. I've seen instances where a reboot would implement something that I thought would be dynamic and for whatever reason would not.

    After the reboot. I tethered laptop to phone, verified internet, connected vpn and was able to access resources on both work and home network.

    Going to try at remote location later today, but it would appear this has been a success.

  • 1 wan 2 lan

    26
    0 Votes
    26 Posts
    2k Views
    DerelictD

    Pass traffic on LAN2 for things they need (like DNS)
    Reject traffic to things you want to keep them from accessing (LAN net, RFC1918, This firewall)
    Pass any (the internet)

    That is the only correct way to do it.

    Passing to ! LAN Net and expecting that to function as a block rule to LAN net is no way to roll.

    If you care about security, block the traffic you want to block and pass the rest.

  • 0 Votes
    2 Posts
    1k Views
    H

    Hi Antonio,

    I've used google translate to translate your post. By the way if you want more responses you should post in English.

    To answer your question, yes you can do what you asked. You need to use VLANs. VLANs will allow you to have multiple subnets running on the same wire and physical NIC. But there are some requirements in order to have it work.

    Requirements:

    Manageable switch that supports VLANs. In order for VLANs to work you'll need to tell your switch what VLANs each port is allowed to talk to. Ex: port 13 on the switch is allowed to "talk" with VLAN 758 and 759.

    that's the only requirement.

    Here's the basic setup:

    Write down on a paper which VLAN is corresponding to each one of your subnets. You can use whatever number for your VLAN between 1 and 4094 (VLAN 0 and VLAN 4095 are reserved and should not be used). There's no rule and you can have your VLAN 1 named VLAN 788 it doesn't matter. Just make sure you write down on a paper all the information before you start configuring anything or you'll get lost. 2 or 3 VLANs are easy to remember but in a virtualized environment you can end up with 10s of VLANs or even more. Use VLANs in a logical way, use common sense, use VLANs when you need to have a different subnet for security reasons. Don't create VLANs that have no use.

    Carefully read the manual of your manageable switch, some switches do not accept more than 8 VLANs by default but can have this value modified to leave you enough room for the VLANs you create.

    Log on the manageable switch. Go to the VLAN configuration menu. This changes from vendor to vendor so I suggest you familiarize with your switch management interface by reading the manual. Create your VLANs. Once again use common sense, don't create VLANs just for jolly, you'll find yourself in a hell later on when you'll need to pass traffic for each subnet/vlan you created.

    On the physical RJ45 port where you want to plug your PfSense firewall set it to accept ALL the VLANs you created (ex: vlan 758, 759, 760). Your firewall must have an IP for each VLAN in order to act as a gateway, even if you don't intend to send traffic through the firewall.

    Now go back to PfSense -> Interfaces -> Assignments and then just below "Interface Assignments" you'll have other sub-menus : "Interface Assignments", "Interface Groups", etc..., "VLANs". Click VLANs. Click the "ADD" buton, you should see something like this:

    Parent Interface: this is the physical (can be a virtual NIC as well of course) NIC that will be used. The very one you already configured your switch for at point 4.
    VLAN Tag: choose your number as you see fit between 1 and 4094
    VLAN Priority: VLAN Priority is used for double tagging and Quality of Service. Leave it to zero. !!! This is mainly used by ISP and I'm not the one that can give you the right technical explanation, my knowledge is limited as well and maybe someone on this forum will give you examples when you can modify this setting !!!
    Description: This is very important. This "description" will be used later during the configuration and if you leave it empty you'll get lost. Create a "Excel" sheet with the following columns:

    VLAN ID | Description | Network ID | Subnet mask | First assignable IP (usually the default gateway of your network aka your PfSense IP) | Last assignable IP (the last IP you can assign to a device) | Broadcast address | Hostname | Physical NIC (so that you can easily identify the right network card)

    You will need to identify which VLAN you assign to the OPT interface you will create now. Examples of good descriptions: "Customers WIFI network", "ESXi Datastore network", "VM traffic network", etc... Just make sure you'll understand what this network is used for in 1 year when you'll need to modify something.

    Once you have created all your VLANs and gave them a good description, save the settings. Then go to the "Interface Assignments". This is where you will create your OPT interfaces and assign them to the VLANs you created and linked with a physical NIC in the previous steps. By default you should have at least the "WAN" and "LAN" interfaces assigned to a physical NIC (physical can also be virtual if your PfSense is virtualized). At the bottom you will have the "Add" buton and on the left the available VLANs you have created in the steps above. This will create a "OPT" interface "linked" with VLAN's you selected and therefore the physical NIC assigned to this VLAN.

    Congratulation you created your first interface linked to a VLAN. Click on the "Interfaces" menu at the top, you should now see the "OPT" interface you created. Click it so that you can change its settings. Configure as follow:

    Enable: check box

    Description: You can use the same description as for your VLANs. This is the description of the PfSense interface and not the VLAN description but for obvious reasons they should be named the same. WARNING, this name will be used in the firewall tabs as well so don't go crazy mode and use extremely long names. As soon as you save the changes you'll see in the "Interfaces" menu that your "OPT" interface is now named as your description".

    IPv4 Configuration Type: Choose "Static IPv4". This tells your PfSense how to get the IP address you will assign to your PfSense on this specific VLAN. It will be the default gateway for your computers within this subnet. Honestly I always use "Static" and assign the first usable IP address within the subnet. This doesn't mean you won't be able to use the DHCP server for your computers on this VLAN.

    IPv4 Address: This is the IP you will assign to the PfSense interface. It must reside within the subnet you assigned to the VLANs you created earlier.
    Reserved Networks: un-check "Block private networks and loopback addresses" unless you're configuring your VLAN with IPs that are routable on the Internet. You can leave the "Block bogon networks" checked.

    You can now click the "SAVE" buton.

    !!! I strongly recommend you create only 1 VLAN at a time, then create the Interface and assign the VLAN you just created to it and change its settings as in point 7. If you create all the OPT interfaces you might get lost while trying to identify which interface is doing what.

    At this point, you have configured your manageable switch so that the port you plug your Pfsense on is configured to accept all the VLANs you want to use. You also configured the first VLAN and interface on your PfSense.

    Now you need to repeat the process in PfSense for each VLAN you want. Create the next VLAN, create the next "OPT" interface and link it with the VLAN you created. Assign a static IP for each new "OPT" interface for each one of your subnets.

    You now have multiple "OPT" interfaces each with a IP within a different subnet, each with a different name and linked with a different VLAN, you can now go to the "Firewall" menu then "Rules". You should have all your "OPT" interfaces. Add the default "Allow" OPT LAN to ANY rule so that you can run tests without the firewall blocking anything.

    Once you have configured your PfSense you can configure the switch for each computer/device. Plug a computer on the switch port you want. Go in your switch management interface and assign a VLAN for this port. This will allow the computer you plug on this port to communicate with machines configured on the same VLAN as long as you put an IP that is in the corresponding subnet. Always refer to your Excel sheet to avoid misconfiguration or you'll waste a lot of time.

    You can then test your configuration with ping. You should be able to ping the default gateway within the same subnet/VLAN and Internet hosts.

    Last step is to configure the DHCP server on your PfSense box for each "OPT" interface so that each VLAN device get an IP. You can alternatively use the DHCP Relay and link it with your DHCP server (like a Windows Domain Controller). I highly recommend using DHCP Relay and have a single DHCP server within your network where you can configure all the settings. Not using a centralized DHCP can create chaos within your network if you forget that this subnet is already assigned somewhere else within your organization.

    I hope it helps, if you have any troubles don't hesitate,

    Cheers

    Headhunter

  • 0 Votes
    7 Posts
    3k Views
    DudleydoggD

    @derelict I know this was an Old Topic, but due to how I have moved some physical interfaces around I lost Internet access on 3 of my Vlans, but since they were things like Vmotion, iSCSI I never noticed till months later when I wanted to update one of the Freenas Boxes on one of those vlans and realized it did not have internet any longer. This baffled me greatly but it always has worked just fine with out any routes.
    I heeded your suggestion above and sure enough this was my problem,
    So again you have assisted me with out even realizing.

  • multi wan with 1 LAN port

    1
    0 Votes
    1 Posts
    196 Views
    No one has replied
  • Gateway IP RTT Increases Slowly Over Time

    1
    0 Votes
    1 Posts
    187 Views
    No one has replied
  • Routing Specific IP's using MultiWAN

    3
    0 Votes
    3 Posts
    392 Views
    M

    Pfsense is looking from top to bot. So first rule first ;)
    You can see how much Traffic goes over this Rules. If there is any you have triggert it.
    Or do a Tracert from one of the PS4 and look if they go other ways.

  • Failover

    3
    0 Votes
    3 Posts
    375 Views
    M

    Did you set the Lan rule right? To use the GW Group?
    Rules - Lan - Allow Lan to anywhere - advanced - outgoing gateway (or something similair)

  • Moving vlan/dhcp off Pfsense Plan

    3
    0 Votes
    3 Posts
    426 Views
    C

    @johnpoz
    Yeah i didn't want to give it a vlan, however when i created the interface on the MS250 switch it required i give it one.

  • Load-Balancing Multi-WAN, Issues with Some Websites

    4
    0 Votes
    4 Posts
    782 Views
    johnpozJ

    Pretty much all websites prob have issues with this, anything that does any sort of session or login for sure would have issues with this especially from a security point of view where you would have a cookie coming from multiple IPs, etc. etc.

  • Backup route with single WAN box?

    8
    0 Votes
    8 Posts
    928 Views
    F

    @marvosa said in Backup route with single WAN box?:

    You will have to setup PFsense for a dual WAN or configure a 2nd gateway on your workstations and edit your metric there.

    And that is exactly what I did. Easy and it works!!
    Thanks to everyone for your help and support

  • No Internet after reboot, wrong gateway.

    19
    0 Votes
    19 Posts
    3k Views
    A

    It finally worked after enabling gateway monitoring and thus setting Gateway to dynamic instead of WAN DHCP.

  • Multiwan Traffic not "sticking" to the source interface

    5
    0 Votes
    5 Posts
    529 Views
    J

    Ok, for anyone else who is unable to get port forward OpenVPN to work with multi wan, where you forwarded all vpn traffic to local host. The issue I had above was a result of allowing the default protocol listing for OpenVPN. I left it at UDP for IPv4 and IPv6 on all interfaces (multihome). Once I changed it to UDP for IPv4 only, everything worked as described in the online manuals. Good luck out there!

  • Cannot access gateway admin panel on dual wan scenario

    5
    0 Votes
    5 Posts
    538 Views
    A

    i'm accessing dsl modems from LAN net (isn't it obvious from the configuration i present?), when take down a WAN gateway by force the other is accessible but not when both are active.
    disable firewall functionality on where ? pfsense is the firewall and there isn't any rule limiting access from lan to wan, default allow rules are active.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.