• Multi ISP without failover

    7
    0 Votes
    7 Posts
    739 Views
    F
    @viragomann said in Multi ISP without failover: pfSense routes incoming traffic just to the destination IP. If the packet is destined to a LAN2 IP it will be routed to it, no matter if both LANs are defined on the same NIC or on different ones, and no matter, on which WAN NIC the packet as entered. Ah, now I understand. Thanks :)
  • Load balancing, cpu et bande passante...

    1
    0 Votes
    1 Posts
    103 Views
    No one has replied
  • Corte de Conexão Failover/Interface

    1
    0 Votes
    1 Posts
    97 Views
    No one has replied
  • Route traffic throught a site-to-site ipsec

    ipsec routing
    11
    1
    0 Votes
    11 Posts
    1k Views
    A
    @viragomann It’s a Cisco Meraki the router Site A! But, i’m thinking now: The traffic should be routed to 192.168.100.222, not for the gateway 192.168.100.1 (this is the router with the VPN tunnel). In the 100.1 router have static routes for route the traffic specified throught the 100.222 Is it the same solution (change phase 2 to 0.0.0.0/24)??? Thanks again
  • Return traffic from route to another LAN not arriving

    4
    0 Votes
    4 Posts
    230 Views
    J
    Another thing worth mentioning is that I've tested with an old Cisco RV320 router this same setup and it worked without any issues. The only things I did on that RV320 were configure the WAN with the same parameters as the pfSense, a static route and a resolver for the FQDN of the PBX server. Hope someone can give me a hint.
  • Interfaces/Gateways with Same Subnet Range

    2
    1 Votes
    2 Posts
    443 Views
    G
    I found the solution: ProtonVPN allows alternate gateways following the format: 10.x.0.2/32 I have tested 2 through 9 (10.2.0.2/32, 10.3.0.2/32, ... 10.9.0.2/32) and they work.
  • WAN going UP and DOWN in CE 2.7

    ce 2.7 amd64 wan
    24
    0 Votes
    24 Posts
    5k Views
    J
    Similar problem in CE2.7.2 in AGO 2024
  • How to set up/Check routing Metric

    2
    0 Votes
    2 Posts
    326 Views
    M
    @wojciech__ https://docs.netgate.com/pfsense/en/latest/multiwan/index.html
  • 0 Votes
    6 Posts
    432 Views
    johnpozJ
    @frog yeah that config ;) What do you have connected to all your ports? I can not think of a sane reason to have a setup like that.. pfsense can not even ping its own interface, on pfsense? Do you have it enabled? So you have ports 2-8 all connected to the same usw-pro? Sounds like a loop to me.. You have 2-8 all in a lagg/port channel/etherchannel/lacp - whatever unifi calls it on their end.. Did you set that up on pfsense? Why would you have all 3 of your vlans tagged on every port unless they were connected to different switches or APs, or different vm hosts? With the info provided that setup looks wrong to me.
  • block url based on active WAN

    2
    0 Votes
    2 Posts
    187 Views
    johnpozJ
    @kunundrum0 put your block in floating on wan outward direction.. Your prob routing through a gateway failover group. This if traffic is leaving wan 1 it would be allowed, but leaving wan 2 it would not.
  • Haproxy Backend Outbound Interface

    14
    0 Votes
    14 Posts
    2k Views
    R
    @viragomann Sorry I never replied back with what I found out. It turns out that you can do this but it requires a setting in the OpenVPN client and Outbound NAT settings. I only figured this out through many iterations of trying every possible reasonable setting. Create a firewall Host alias that contains the domains you want to force through a specific gateway. Enter the domains/URL's there. When you save it will fetch the URL's, so do this first or your list might not be updated with resolved IP's. Add your firewall "host" alias (that contains the list of fqdn's you wish to force through the specific VPN Gateway) to the "IPv4 Remote Networks" field in the OpenVPN client settings. This is what updates the routing table. Note that the remote networks field does not auto-complete the alias when you type it (unlike most fields), but it'll fail if it's the wrong type or non-existent. For the outbound NAT settings: set the interface to the VPN you want to force the domains through, IPV4, any protocol, source any, destination -> network or alias - use an alias created in pfblockerng OR the one you use above, [gateway] translation [your vpn client name] Address, and place it at the very top of the Outbound NAT rules For pfblockerng alias, it can be used for the outbound NAT config but cannot be used for the OpenVPN client config (you can probably ignore pfblockerng and just use the built in URL alias option). In the pfblockerng settings create IPV4 alias and set the domains for Whois with state On and enter the domains. Under settings use Alias Native and pick your update settings (For local alias I'm pretty sure you can just leave it disabled, but it doesn't really matter). It ended up not working for what I wanted to use it for because the domains in question end up forwarding, but at least there is a way. I did not find this documented anywhere.
  • Internet is dropping out in WAN 2 often

    1
    0 Votes
    1 Posts
    134 Views
    No one has replied
  • Unable to access a remote network.

    3
    1
    0 Votes
    3 Posts
    238 Views
    V
    @McMurphy Remember that the routes have been added correctly on both VPN endpoints to work. So also check the remote site. Also ensure the the respectively remote networks are entered in the Wireguard settings at allowed networks on both sites.
  • Routing rather than Gateway Group?

    4
    0 Votes
    4 Posts
    302 Views
    V
    @Ximulate said in Routing rather than Gateway Group?: but at least in my use case I think policy routing might be easier to manage Why? You can specify the failover group as the default gateway. So it is used by any device behind pfSense as well as by pfSense itself. Policy routing rules have to be defined on each interface on the other hand. The meaning of policy routing is to direct traffic from certain sources or to certain targets to a specific gateway. If this is, what you want, you can go with it. Otherwise I'd prefer a gateway group as the default.
  • VLAN ON WAN

    5
    0 Votes
    5 Posts
    315 Views
    G
    @oscar-pulgarin What VLAN ID's does your ISP say that you need? If for example they use ID 100 for internet, I'm thinking you should do the following... Create a VLAN with ID 100, using the physical interface used for WAN (igb0 for example). This is under Interfaces > VLAN's Under Interfaces / Assignments, click the drop down box for WAN and select the newly created VLAN. That should take case of your internet traffic. To pass through IPTV I suppose you have to add that VLAN ID to both WAN and LAN as well as any switches that sit between pfsense and your TV-box.
  • liberar acesso a sites com porta 444

    14
    0 Votes
    14 Posts
    1k Views
    F
    @fcostars Descobri! O link da operadora ALGAR não deixa passar, mudei o link para a operadora da vivo para testar e funcionou! Que loucura! Obrigado pessoal!
  • Netgate 4200 -> Linksys N600 wireless bridge -> Starlink wifi

    8
    0 Votes
    8 Posts
    889 Views
    G
    @Gertjan Thanks for the tip @Gertjan! I have done similar modifications of the config when changing NIC's. And it is as you say nothing more than search and replace. Didn't think about that for this type of change though, so this goes into my list of good things to remember...
  • MULTIPLE WAN PAT+NAT Forwarding to LAN

    2
    0 Votes
    2 Posts
    202 Views
    V
    @prochid Ensure that the firewall rules for allowing incoming access are defined on the respective WAN interface tab. Don't use interface groups for the WANs and don't configure floating rules for allowing incoming traffic!
  • Correct gateway is not used

    10
    0 Votes
    10 Posts
    566 Views
    G
    @uggiz A simple test would be to open a browser on a PC that is on the CREWVSAT73 subnet and check "whatismyip.com"...
  • PFSENSE 2.72, can't get the 1gb internet working on 10G LAN

    4
    0 Votes
    4 Posts
    590 Views
    G
    @larrygs Ah, so the PC's also have SFP+ ports, not RJ45? Anyway, sounds like you are on to something there, with the Qotom (2.5G) and 10G (TP-Link) connection. So in that case you have an RJ45 module plugged into the TP-Link and ethernet cable to the Qotom, right? And that port is set manually to 1G in pfsense as well, or is it set to auto? I have read that there were problems with the i226's but I thought it was fixed in 2.7.2. And one solution is actually to virtualize pfsense on the Qotom (Proxmox) and give it a virtual NIC, instead of a full pass thru. Assuming the drivers in debian are working... You will not have any problems getting the full 1G even in such a setup (actually way more than that with that CPU). The only issue I have had with the SX3008 is that it doesn't autonegotiate to 1G and that it overheated. But I have not tested with any of my devices that have 2.5G NIC's, as they are connected to a SX3206HPP which works fine @2.5G.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.