• Split Routing over WAN and VPN [gui bug]

    6
    0 Votes
    6 Posts
    730 Views
    4
    what a bumber…... imported 2006 networks, have discovered i need to add a new one but there is a gui bug. Have tried to add via Edge and Firefox on Windows and Linux, but experience the following; page load time is long when adding the network, is takes a while to respond and firefox gives "a webserver is slowing down your browser" page refreshes and the new network is not added The work around was to add the new address to the import list in excel, and create a new alias from scratch.
  • Routing LAN VLAN to to WAN VLAN

    8
    0 Votes
    8 Posts
    3k Views
    DerelictD
    When I changed the oubound nat rule from using the WLWAN to the WAN interface, it started working. That is because that is how it works. No mystery here. Outbound NAT on the WLWAN interface NATs traffic going out WLWAN, not WAN. Outbound NAT does zero to affect what traffic is routed where. It only defines what translations take place when traffic flows out that interface.
  • 10gb routing not even close

    5
    0 Votes
    5 Posts
    5k Views
    D
    moved to https://forum.pfsense.org/index.php?topic=139588.0
  • CARP Secondary Unreachable Over VPN

    2
    0 Votes
    2 Posts
    364 Views
    V
    The rule should be active on both, so you can also access FW1 while FW2 is master. However, since you will have activated NAT rule sync in System > High Availability Sync you only need to set it on FW1 and must set up a rule, which can work on both. Assuming you want to access your firewall by their LAN IPs: First add an alias for both LAN IPs, the master and backup. Firewall > Aliases > IP. Call it e.g. FW1_2_LAN. Go to Firewall > NAT > Outbound. If the Outbound NAT Mode is set to Automatic check "Hybrid Outbound NAT rule generation" and hit Save below. Then add a new rule: Interface: LAN Protocol: TCP Source: <vpn tunnel="" subnet="">Destination: "Network" and enter "FW1_2_LAN" (the alias you've added first) Translation Address: Interface address Save the rule. Now source addresses of outgoing packets leaving the masters LAN interface destined for the backups LAN are translated to the masters LAN address, so the backup sends its responses back to the master and they are directed back to the VPN client. This also works reverse on the other firewall while it's the master and the vpn client is connected to it.</vpn>
  • Routing problem between LAN and DMZ net

    3
    0 Votes
    3 Posts
    2k Views
    A
    @johnpoz: "MultiWAN with Gateway Groups , Tier 1 WAN 1  and Tier 2 WAN 2" "When I do a traceroute from a windows computer from LAN to DMZ the packets go outside the WAN .. " Well yeah.. If your forcing traffic out a gateway how would it get to your other local network "dmz" Just create a rule above the rule that is forcing your lan out the gateway to allow the access you want into the dmz. Thanks for the tip! Now it works with a new rule to allow traffic from LAN to DMZ, without forcing dual wan gateway, on top of default rule to internet. BR, Adrian
  • Multi-WAN via VLAN

    1
    0 Votes
    1 Posts
    557 Views
    No one has replied
  • Need Help with getting my clients to communicate over LAN (Plex, RDP, etc.)

    27
    0 Votes
    27 Posts
    2k Views
    K
    Pfsense 2 vcore… A small share,  2vcore... plex - 4vcores It can take it.  Its fast.  Assuming its just 1 or 2 people on the plex at a time. You bought a fast machine.
  • WAN, LAN + OPT1 - CORRECT WAY OF SETUP

    12
    0 Votes
    12 Posts
    9k Views
    johnpozJ
    So lets repeat, since clearly your not grasping this "IPv4 *  OPT1 net  *  WAN net  *  *  none            " No that is NOT correct.. wan net is just that!  The wan net.. That would explain why it works via proxy..  Wan net is not the internet… Its just the network your wan is on..  Create an ANY ANY rule on opt1, just like your lan.. but use opt1 net as source network. Lets say your wan is 1.2.3.4/24… Wan net is means you could only talk to devices with IP 1.2.3.1-254...  That is the WAN net, this is NOT the interent...  The internet is ANY!!!  Since pretty much the internet could be ANY public IP address.. You have no rule listed that would allow you to say googledns 8.8.8.8 or say forums.pfsense.org forum.pfsense.org [208.123.73.18] Your internet is only working via proxy because pfsense itself can get to the internet, and with proxy your just asking pfsense - hey go to this place for me..  If you want to get there direct than you have to allow that on the firewall. How hard its it put up a screenshot?  From those can not tell if those are blocked or allowed.. You can see here I allow ping to wlan guest address, ipv4 and ipv6 I allow access to my ntp servers that are on different vlans ipv4 and ipv6 I allow the guest to go to public DNS, I hand out google in the dhcp server for this guest wifi network.  Via rule that is allow for anything NOT rfc1918(see alias created) I then block (reject actually with logging) any other access to any other firewall IP, be it lan, wan, or any other vlan IP. I then allow guests to go anywhere else as long as not rfc1918, or my local IPv6 networks. Where in you rules top down, first rule to trigger wins - no other rules allowed would your clients be able to go to any IP on the internet..  This is why the rules out of the box on pfsense are ANY ANY on the lan… [image: examplerules.png] [image: examplerules.png_thumb]
  • How do I set up my WAN for an ISP that uses L2TP?

    2
    0 Votes
    2 Posts
    331 Views
    K
    They're using weird lingo. I have a subnet of IPs routed to me as well. Have many ports do you have on your pfSense box? Also, I don't think anything is coming in over L2TP.
  • Gif interface MTU stuck on 1280

    1
    0 Votes
    1 Posts
    263 Views
    No one has replied
  • Tunneling select IP's over VPN

    4
    0 Votes
    4 Posts
    483 Views
    W
    Port were used enough, provide VPN. IP check before.
  • Wan to Lan Printing

    1
    0 Votes
    1 Posts
    383 Views
    No one has replied
  • "centerless" virtual network

    1
    0 Votes
    1 Posts
    324 Views
    No one has replied
  • MOVED: Redirecionamento de de Acesso a Internet

    Locked
    1
    0 Votes
    1 Posts
    204 Views
    No one has replied
  • Port Forwarding not working while routing traffic over OpenVPN interface

    2
    0 Votes
    2 Posts
    391 Views
    M
    What ip(s) are port 80 and 22 being forwarded to? You would need to setup a superseding rule to make the gateway of that IP address be pfsense's default gateway. I suspect the IP address is pfsense's LAN IP so just make the rule and the mask would be /32 and move it ahead of the rule that directs all the other traffic over the VPN. By the way if I'm right about the LAN IP I suggest you use https.
  • Multi VPN client/device bypass

    7
    0 Votes
    7 Posts
    849 Views
    K
    I did the same. All kind of interesting questions come up and resolve themselves by the passing of time.
  • Gateways for openvpn connections using wrong gateway/monitoring IP

    1
    0 Votes
    1 Posts
    436 Views
    No one has replied
  • 0 Votes
    3 Posts
    1k Views
    K
    Configure Sophos in bridge mode ? It is weird at start, but it grows on you.
  • Simple Problem: Static route not working

    5
    0 Votes
    5 Posts
    5k Views
    johnpozJ
    Wouldn't it be simpler to just create the vpn client connection on pfsense directly… Vs what is a hairpin and asymmetrical routing mess that you have to bypass rules on your interface, etc.. Other solution is to put this vpn endpoint on transit network connected to pfsense, so you remove the asymmetrical routing..  You could still have hairpins depending on where you put the transit vlan or its own physical interface and what other vlans are using the transit to get to this downstream machine.
  • [Solved] Can not route between Multi-Homed Clients Behind pfSense

    4
    0 Votes
    4 Posts
    640 Views
    johnpozJ
    Sure that works.. Another solution would not to multi home you boxes like that.. Seems kind of pointless if you ask me.. Also such a setup doesn't stop them from talking to each other on their other network..  Why would you not just put the clients behind pfsense for everything? What is the point of the multihomed setup?  That you want/need to firewall?
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.