• Map LANX to always use CARP WANX for outgoing traffic

    2
    0 Votes
    2 Posts
    258 Views
    S

    @planetinse That’d be hybrid or manual outbound NAT: https://docs.netgate.com/pfsense/en/latest/nat/outbound.html

  • ProxyARP Outbound Proxy Pool Application Question

    1
    0 Votes
    1 Posts
    131 Views
    No one has replied
  • Possible to have 2 gateways on the same network

    2
    0 Votes
    2 Posts
    294 Views
    NogBadTheBadN

    @orphen76 Would an IP alias work ?

    https://docs.netgate.com/pfsense/en/latest/firewall/virtual-ip-addresses.html

  • ATT Modem DNS Hijack on Failover

    1
    1 Votes
    1 Posts
    2k Views
    No one has replied
  • 0 Votes
    3 Posts
    285 Views
    M

    @viragomann thanks for the suggestions. Masquerading could work, I see.

    I will not be trying this only because I found a workaround that suits what I needed, even if it's not a solution that would apply to everyone. For information to other forum members: I disabled the monitoring of the public IP gateway, so now it is considered always up. I made a gateway group with the private and public IP gateways, and configured private as tier 1 and public as tier 2. Then I made this gateway group the default gateway of the firewall. Now thing work as I had planned: if the upper level firewall is connected to LAN4, it becomes the gateway. If it is disconnected and the ISP router is connected to LAN4 instead, the router becomes the gateway.

    The use of the "physical" IP only occurs for the monitoring ping. When routing packets to the public IP gateway, the firewall uses the virtual IP and everything works just fine.

  • Routing Probleme, pfsense und WAN aus LAN nicht erreichbar

    39
    0 Votes
    39 Posts
    4k Views
    V

    @tmevent
    Danke für das Angebot. 🙂 Könnte mal sein...

    Gut möglich auch, dass die Chancen auf Hilfe in einem anderen Forum besser stehen. Bspw. reddit oder administrator.de.
    Azure mit seinem SDN spielt da nach ganz anderen Regeln als ein Standard-Router wie pfSense, und ich glaube dort liegt das Problem.

  • Routing Probleme, pfsense (auf AZURE) und WAN aus LAN nicht erreichbar

    3
    0 Votes
    3 Posts
    374 Views
    T

    Der aktuelle Stand ist folgender:

    Ich habe auf AZURE eine Eigene Pfsense aufgesetzt und greife dort per IKEv2 drauf zu.
    Leider erreiche ich aus dem Azure-LAN nur meine Pfsense. Weder das Internet noch die per site2site verbundenen Netze sind erreichbar

    Setup:
    Azure WAN 192.168.0.0/24, PfSense 192.168.0.4
    auf dieser Seite gibt es keine Routing Tabelle, lediglich die Azure NSGs mit den Regeln für meine IPsec Tunnel

    Azure LAN 10.3.0.0/24, Pfsense 10.3.0.5
    Hier gibt es eine Routing Tabelle:

    Unbenannt.PNG

    Azure Server Windows Server 2019 10.3.0.4
    2x Site2Site IPsec Verbindung 10.0.0.0/24 und 10.2.0.0/24 zur pfsense
    mehrer Client IPsec Verbindungen zur Pfsense

    Ich erreiche von der GUI der Pfsense sowohl meine Azure Server, als auch das Internet.
    Ich erreiche über die Tunnel die Pfsense und den Server auf Azure.

    Ich habe nun ein bisschen versucht die Pakete zu verfolgen(Diagnose>Paketverfolgung).
    Wenn ich von meiner Azure-VM auf 8.8.8.8 pinge, sehe ich diesen Ping am LAN Port
    20:41:46.674926 IP 10.3.0.4 > 8.8.8.8: ICMP echo request, id 1, seq 1054, length 40
    und am WAN Port
    20:45:53.162014 IP 8.8.8.8 > 10.3.0.4: ICMP echo reply, id 1, seq 1058, length 40

    Was mir unklar ist warum sehe ich den Ping nur eingehend und nicht ausgehend? An welcher Stelle verlässt das Paket mein Netz und warum schickt die pfsense es nicht raus?

    Wenn ich über Diagnose>Ping meine VM 10.3.0.4 pinge sehe ich eingehende und ausgehende Nachrichtem, so wie es sein soll.

    WAN
    20:48:47.679123 IP 192.168.0.4 > 10.3.0.4: ICMP echo request, id 39016, seq 0, length 64
    20:48:47.680056 IP 10.3.0.4 > 192.168.0.4: ICMP echo reply, id 39016, seq 0, length 64

    LAN
    nichts

    Ich stehe leider echt auf dem Schlauch. Mehr Infos schicke ich auch gerne, einfach fragen.
    Ich freue mich auf jeden Hinweis ....

  • Netgate 4200 loses some configurations upon reboot

    3
    0 Votes
    3 Posts
    480 Views
    T

    @SteveITS
    Thanks.
    I tryied to restore to the default settings and configuring again the system.
    Now seems to work.
    I opened a ticket but we are still investingating.

  • Single website unreachable

    2
    0 Votes
    2 Posts
    238 Views
    L

    ok, I was not looking at the correct palce.

    Snort was just blocking the IP

    I added it to whitelist
    37c041c6-7455-4b5d-b5ac-0bbfc12be6cc-image.png

  • Static WAN Settings

    6
    0 Votes
    6 Posts
    553 Views
    V

    @gwrobinjj
    So which interface settings do you have on the Zywall, which works as you said?

    Maybe the ISP has a MAC lock?

    Outbound NAT rules are generated correctly?

  • Remote Access ( SSL/TLS )

    5
    0 Votes
    5 Posts
    457 Views
    R

    @viragomann Thank you very much, it worked.

  • Problem with PPPoe

    1
    0 Votes
    1 Posts
    138 Views
    No one has replied
  • Source IP of traffic from OpenVPN Client through pfSense to LAN

    2
    0 Votes
    2 Posts
    192 Views
    Z

    Solved!

    This is what I did:

    Change from Automatic Outbound NAT to Hybrid Outbound NAT Create a rule at the top like this:

    3a5ef097-03b1-4c4b-8092-4beeb4570dbc-image.png

  • Routes over OpenVPN not working after reboot

    5
    0 Votes
    5 Posts
    466 Views
    F

    @viragomann

    Thanks, I will try this out, i'll keep you informed if something goes wrong.

  • Quagga ospfd crashes when changing network type over GRE tunnel

    1
    0 Votes
    1 Posts
    204 Views
    No one has replied
  • Multi WAN setup on 2100

    2
    0 Votes
    2 Posts
    340 Views
    S

    @Happydog For group 7 try 4 instead of 4t:

    "18. Type 4084 for the VLAN Tag and 4 for Member(s). This represents LAN4 (port 4) and tagged should be unchecked.

    Click + Add Member to add the LAN Uplink, 5. This member should be tagged as shown."

    4df9afa3-aaa8-40ac-9436-a34240dd9272-netgate-2100-edit-vlan-group-0.jpg

  • Cannot remove old Interface

    1
    0 Votes
    1 Posts
    187 Views
    No one has replied
  • WAN Offline - part 2

    2
    0 Votes
    2 Posts
    176 Views
    Z

    Nevermind, everyone. This was magically solved for no reason at all.

    Network engineering, ladies and gentlemen.

  • Fellover wrong default connection

    6
    0 Votes
    6 Posts
    524 Views
    L

    Thanks ip worked

  • Dual WAN bug

    1
    0 Votes
    1 Posts
    259 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.