• All comunications got down with inter-vlan communication

    4
    0 Votes
    4 Posts
    454 Views
    johnpozJ
    So you have user in Vlan A doing a copy from vlan B to vlan C.. With a copy paste highlight file in B and paste on machine in C.. So yeah all those copies go through PC on vlan A.. Through multiple hairpins..  Not going to be good.. Talk about a hairpin nightmare.. your flowing all the traffic through pfsense multiple times, and the pc multiple times all over the same interfaces.. If they need to move a file from B to C.. Then rdp to B or C and copy or paste the file directly - don't have it flow through the PC on A..  Is that better??  Either way that many vlans that all do intervlan traffic using 1 interface is going to be horrible..  Hope your devices are all set to use 10mbps and your trunk is gig.. [image: trafficflow.png] [image: trafficflow.png_thumb]
  • Multiple monitor notification emails for every event

    7
    0 Votes
    7 Posts
    1k Views
    D
    No worries, the progress remains firmly undisturbed by any complaints here or elsewhere.  ;D ::)
  • Can't properly configure multi-wan and NAT together

    3
    0 Votes
    3 Posts
    611 Views
    M
    @Fabio72: For the first problem, check dns. In my case the pfsense resolver was unable to work on the backup WAN. The solution should be activate default gateway switching OR set dns resolver in forwarding mode. That's because you set policy routing for LAN but pfsense itself does not follow the LAN rules. Howtos are not so clear because there's a mix of older and newer approaches to multiwan. Thanks, that actually solved the first problem, now the second problem still remains
  • How to configure 2Wan - 2 Lan ?

    1
    0 Votes
    1 Posts
    330 Views
    No one has replied
  • Static Routes Fail

    6
    0 Votes
    6 Posts
    1k Views
    johnpozJ
    Your first page shows that link to 192.168.0/24 is via bge0, your next posts shows its out your vpn connection ovpnc1 So if you need to go out ovpnc1 to get there, and you have it on your bge0 which looks to have a 10.20.61/24 network on it - then yeah its not going to work. [image: differentroutes.png] [image: differentroutes.png_thumb]
  • Dual WAN SIP VoIP not failing over

    5
    0 Votes
    5 Posts
    2k Views
    J
    State Killing on Gateway Failure Flush all states when a gateway goes down The monitoring process will flush all states when a gateway goes down if this box is checked. The problem I have with this is when one gateway goes down ALL states on ALL gateways are killed. Like I said I have a primary WAN that is fiber and an unreliable Comcast connection as secondary. When this option is enabled and the Comcast connection goes down the calls going through the primary connection drop.
  • 0 Votes
    1 Posts
    440 Views
    No one has replied
  • Please, could I get some help with load balancing/multiwan setup

    1
    0 Votes
    1 Posts
    402 Views
    No one has replied
  • PfSense w/2 LAN interfaces for AP bridging?

    3
    0 Votes
    3 Posts
    492 Views
    B
    I've determined I needed to do this with VLANS.  Here is an excellent reference that really help me get things configured.
  • Can't figure out VLANs

    19
    0 Votes
    19 Posts
    3k Views
    A
    I got it working for now. Thanks guys. Working on firewall rules at this time.
  • 0 Votes
    5 Posts
    1k Views
    S
    While you researching tcpdump, pfSense has an option for logging matching rules (this is configured on rule itself). Try it.
  • Dual WAN - Setting 1:1 NAT Causes not able to ping out.

    1
    0 Votes
    1 Posts
    462 Views
    No one has replied
  • Static route seem not work

    11
    0 Votes
    11 Posts
    2k Views
    johnpozJ
    Not seeing where your lan network is called out.. is it also 192.168.1/24??  Or some other sub of 192.168.1 that overlaps with 192.168.1/24 - if so then NO you can not do it that way.. You for sure could have multiple routes to different IPs on your wan that is your transit network..  But you can not expect it to work if your lan side clients are on 192.168.1/?  And you want them to go to the internet or this other 10.200 network
  • Looking for pointers on segregating WiFi utilizing shared bandwidth.

    1
    0 Votes
    1 Posts
    293 Views
    No one has replied
  • Multiple "virtual" interfaces for VLANs

    1
    0 Votes
    1 Posts
    309 Views
    No one has replied
  • VLAN routing overhead

    28
    0 Votes
    28 Posts
    7k Views
    H
    this is a hairpinned vlan setup, in production, around 300 clients behind it. "LAN" is the parent interface for all the vlans. (oh yea, pfsense is running on esxi) [image: 1OMSm2M.png]
  • Adding a 2nd VPN interface

    1
    0 Votes
    1 Posts
    393 Views
    No one has replied
  • Dual Internet, PBR, Virtual pfSense

    3
    0 Votes
    3 Posts
    1k Views
    L
    Hi PacketLoss I guess so far my biggest issue seems to be the return route. The router is effectively hosting the core of the network, an SVI for each vlan etc. I can either set the default route to the be the IP of the LAN interface of the pfSense or I can use PBR to point vlans to the LAN interface of the pfSense box. That works fine and traffic goes out. However, my issue arrises when it comes back in, the router because its directly connected to every VLAN can just pass the packet back to the host completely bypassing the pfSense WAN port thus creating an asymmetric route which pfSense then goes on to block further traffic. How do you get around the return route issue for packets coming back in. Currently in my design im only using 1 internet connection which is sitting in the mgmt vlan. The current configuration is: pfSense WAN is in vlan 102 pfSense LAN is in vlan 101 I am using a 3650 as my router, the internet connection is in vlan 100. I am using ip route  0.0.0.0 0.0.0.0 10.59.219.10 (pfSense LAN) and then the pfSense WAN has a router IP (10.59.219.2 vlan 100). Going from LAN -> Internet or LAN <-> LAN is fine, its when the packet comes back in from the router interface in vlan 100, it bypasses the pfSense box and sends it directly to the client vlan (21,22,23 etc) thus thats where the asymmetric routing shows up. How do I force the packets to go back via the WAN interface of the pfSense? Thanks
  • Static routing cutting off HTTP POSTs

    7
    0 Votes
    7 Posts
    922 Views
    M
    @jimp: System > Advanced, Firewall & NAT tab, check "Bypass firewall rules for traffic on the same interface" See also: https://doc.pfsense.org/index.php/Asymmetric_Routing_and_Firewall_Rules https://doc.pfsense.org/index.php/Why_do_my_logs_show_%22blocked%22_for_traffic_from_a_legitimate_connection "Bypass firewall rules for traffic on the same interface" was already checked. Maybe it's not working. I setup a manual rule with sloppy states and it appears to be fixed! There were no rules for this route before - simply a static route and gateway in System > Routing. It really does sound like that option isn't working as it did in older pfSense versions. Thanks much! Months of changing routes directly on workstations can finally be retired!
  • Mutiple SSID in 1 pfsense

    2
    0 Votes
    2 Posts
    352 Views
    jimpJ
    Is the wireless handled by an external access point on the local network? Or is a wireless card in the firewall? That would make a massive difference in if or how the goal can be achieved.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.