• Exchange Server on Multi WAN

    5
    0 Votes
    5 Posts
    1k Views
    dotdashD
    @DJBenson: Am I right in assuming if I use a port alias containing 25,465 and 587 and assign that to the rule you suggested, any other traffic originating from the mail server will still load balance (i.e. normal HTTP/S traffic)? Yes, set the destination for smtp, etc and the other traffic will progress to the default rule. You may want to put https on a failover group (not load balanced) to avoid the problems you saw with banking sites, etc.
  • Check MultiWAN speed and load balancing in real time

    1
    0 Votes
    1 Posts
    412 Views
    No one has replied
  • Policy based routing, multi-WAN and gateway on same subnet

    39
    0 Votes
    39 Posts
    9k Views
    G
    Hi Jim, Regarding all the tests my colleague has made and his results, do you think it could be a bug ? Thank you :-)
  • Routing issue between two network

    7
    0 Votes
    7 Posts
    1k Views
    johnpozJ
    What dok said ;) That is not how you would set it up.. If you want 192.168.1/24 to be your internal network - then it would go behind pfsense..  Just like your wifi network..  You can have another firewall between pfsense and the internet if you want.. kind of pointless..  But you end up with like the attached.  Now you can firewall or talk between your segments all you want.  You can run a captive portal on the wifi segment, etc. You don't put devices on a transit network between 2 routers.  If you do then they have put routes on them to tell them which router to use for which network.  If your pfsense is natting now you also have to port forward to allow traffic from your transit into your downstream network.  Your prob going to have asymmetrical issues because you miss a route on 1 of your hosts in your transit.. If you want to use pfsense as a downstream router/firewall and have a segment hang off the upstream router then you would connect them with a transit, but now your going to have to create routing on your upstream router.. See 2nd pic.. I wouldn't be natting at psfense in this case.  Your upstream router would do the natting for any networks behind it.  So there is more config on upstream router in this setup. [image: transitnetwork.png_thumb] [image: typicalsetup.png] [image: typicalsetup.png_thumb] [image: transitnetwork.png]
  • Static routing to same LAN

    13
    0 Votes
    13 Posts
    12k Views
    johnpozJ
    Help you with why asymmetrical causes issues in applications?  Yeah its going  to be hit and miss - its a borked config, there is little use trying to make it work.
  • Multi proxy port directed to WAN and VPN

    1
    0 Votes
    1 Posts
    563 Views
    No one has replied
  • Can't access other LAN

    7
    0 Votes
    7 Posts
    2k Views
    P
    Cool, there is actually a HOWTO for this! The "Configure a new Interface" part I had right but I didn't know about the "Configure NAT" part. The information in it is a bit outdated, I selected Hybrid instead and now it's working! ![2017-01-11 15_39_13-Program Manager.png](/public/imported_attachments/1/2017-01-11 15_39_13-Program Manager.png) ![2017-01-11 15_39_13-Program Manager.png_thumb](/public/imported_attachments/1/2017-01-11 15_39_13-Program Manager.png_thumb)
  • WAN Failover - Member Down

    2
    0 Votes
    2 Posts
    1k Views
    A
    Sorry, did a bit more research and found this thread: https://forum.pfsense.org/index.php?topic=37451.0 Fixed it with increase the threshold values.
  • Guys please i need script as soon as possible

    4
    0 Votes
    4 Posts
    3k Views
    M
    Thanks guys, I got the solution.
  • Two subnets communication issue

    15
    0 Votes
    15 Posts
    2k Views
    DerelictD
    Your design is broken. Put "Plex Devices" on another interface so your routers can route properly or maintain all the necessary gateways and routes on them.
  • Port forwarding

    1
    0 Votes
    1 Posts
    553 Views
    No one has replied
  • Restricting access during Multi-Wan failover

    2
    0 Votes
    2 Posts
    473 Views
    F
    You should use firewall rules to separate the traffic of mission critical devices and set the fail-over group as gateway, while the gateway rule for all other lan hosts will be your wan1.
  • Cascaded Router Setup

    2
    0 Votes
    2 Posts
    971 Views
    johnpozJ
    So your asus wifi router is in front of pfsense, or behind it?  There should be no devices connected to your asus router if that is your internet connection and you want to now use pfsense.  Pfsense can use a double nat, but things have to be behind it to be "protected"  If going to use the asus behind pfsense for your wifi, then you would jsut use it as an access point not a router.
  • Floating rules : gateway does not discriminate rules

    2
    0 Votes
    2 Posts
    558 Views
    Q
    should that topic to be moved on another forum subsection? Firewalling Traffic Shaping I'm not sure that it's on the best place for the moment, since it's concerned by firewalling, shamping, and multiwan…
  • WAN packetloss after IP change on a LAN computer

    2
    0 Votes
    2 Posts
    427 Views
    I
    New pfSense has three LAN rules, in this order: Allow connections to the Web GUI on the LAN interface of the pfSense from any subnet Allow traffic that is sourced from an IP address in the same subnet as the interface (implied rule at the end of the list, does not normally explicitly appear) drop all traffic that didn't match one of the allow rules You need to either change the default allow rule to allow every subnet you want, or add another rule that allows the subnet you're interested in. Note that if your computers on the other subnet don't have some way to route traffic to the pfSense, you won't be moving traffic this way probably (like if those computers want internet access through this pfSense).  You may want a virtual IP address on the LAN interface so that the pfsense has an IP address on both subnets to use, or something like that.
  • Howto Multi WAN on single WAN Interface

    1
    0 Votes
    1 Posts
    412 Views
    No one has replied
  • I don't want to load balance or fall over, I need 2 WANs independent

    12
    0 Votes
    12 Posts
    2k Views
    N
    I think that you misunderstood. I am not trying to force ALL traffic to use the VPN just browsing and basic services I want routed to the VPN both http and https especially, and my daughters' games and Netflix. Every thing else must go out on the unencrypted satellite connection.
  • Multiwan & 1:1 NAT – only working on one WAN interface

    2
    0 Votes
    2 Posts
    436 Views
    K
    Solved the problem and hope this is helpful to others… Rebooting the "modems" on 74.92.10.128 and 74.92.16.120 solved the problem. Maybe something to do with APP? What was confusing me was that the "WAN" port worked.
  • Static route without gateway

    2
    0 Votes
    2 Posts
    1k Views
    D
    https://doc.pfsense.org/index.php/Why_can%27t_I_query_SNMP,_use_syslog,_NTP,_or_other_services_initiated_by_the_firewall_itself_over_IPsec_VPN
  • Multiple subnets on one interface (hetzner public IP block)

    9
    0 Votes
    9 Posts
    4k Views
    N
    I finally found the problem… There was never any problems with my config. My ISP had routed the subnet through the wrong gateway!
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.