• Best practices for apinger, gateway monitoring / DNS

    13
    0 Votes
    13 Posts
    8k Views
    V

    Any re-thought about adding this? while sending the fail signal if multiple points are down could be useful, we really want it to for Historical Quality reporting, Packet Loss, Latency… really like the new easy to read Std. deviation in 2.3.. nice

    We always have multiple points of reference, in EU ISP network, Our data center, Our ISP and all possible interconnects between. Having this historical info in EU end points would be very helpful in a lot of ways.

    anyway the first step in getting multiple fail confirm, is to have multiple monitoring!!!!

  • RDP problem L2tp

    1
    0 Votes
    1 Posts
    588 Views
    No one has replied
  • Multi WAN Failover..??

    2
    0 Votes
    2 Posts
    737 Views
    DerelictD

    2.3.2 uses dpinger, not apinger.

    What does System > Logs, Gateways have to say?

  • Routing between Subnets

    3
    0 Votes
    3 Posts
    980 Views
    C

    Sounds like you need to check "Bypass firewall rules for traffic on the same interface" under System>Adv, Firewall/NAT.

  • PfSense as WAN router

    3
    0 Votes
    3 Posts
    830 Views
    J

    @heper:

    are you able to ping from those interfaces towards the web ? (you can use diagnostics–>ping to select them individual interfaces)

    No, im not able to ping anything else than i wrote above unfortunately.
    But i can ping 172.16.0.1, and that should not be possible. But i can reject access to RFC 1918 networks on the interfaces. Then that problem is solved.

  • VLAN's on Bridge interface not passing traffic

    9
    0 Votes
    9 Posts
    3k Views
    R

    I thank you for trying to help, but you're missing the point of the topic and I'm not sure theres anything else you can add to be helpful in this instance.  There's nothing 'mangled' about it.  It's simply assigning a VLANs to members of a Bridged interface as required.  I know how to fix it with a managed switch, that is not the issue.

    My point is that VLAN's on Bridged interfaces don't appear to work as intended, or, I have something wrong in the configuration.  If I have something wrong on the configuration side, I'd like to troubleshoot to know what it is.  If there is some bug that affects VLAN's on Bridge interfaces, then I'd like to hear others input and see if they can replicate the issue so a bug report can be submitted.

  • Share files from LAN1 to LAN2?

    15
    0 Votes
    15 Posts
    3k Views
    D

    Hi,

    Thx for the reply but I did not understand exactly what you mean. Should i remove any of my rules then add another rule to every sub-net? I dont want anything leaking, all internet connection outside the local networks should go trough the VPN. Can you please explain so I can understand it? I am new to all this.

  • Two WAN , one DHCP config and other not DHCP , PFsense use always DHCP

    8
    0 Votes
    8 Posts
    1k Views
    M

    @heper:

    you can change the default gateway at system>>routing

    I change default gateway , but pfsense choose always DHCP WAN

  • No DNS resolution on failover WAN

    5
    0 Votes
    5 Posts
    1k Views
    I

    Hello,

    so I enabled the Forwarding mode and Default gateway switching, but neither worked. The Forwarding mode steered me towards DNS Forwarder service instead of DNS Resolver service (not quite sure what's the difference). Using the DNS Forwarder with Default gateway switching disabled seems to be working.

    Thanks for Your help!

  • State killing on gateway failure

    9
    0 Votes
    9 Posts
    7k Views
    luckman212L

    Thanks I will definitely take a look.

  • Routing UDP broadcasts across subnets

    3
    0 Votes
    3 Posts
    3k Views
    J

    @heper:

    https://www.reddit.com/r/Chromecast/comments/454fsi/chromecast_across_subnetsvlans_pfsense/

    Awesome!  This worked perfectly thanks!

  • Making OPT1 work as a WAN interface

    2
    0 Votes
    2 Posts
    597 Views
    pttP

    Take a look at:

    https://doc.pfsense.org/index.php/Multi-WAN

    https://doc.pfsense.org/index.php/Gateway_Settings

  • How to Route from One DMZ <> Two Subnets using Two separate Firewalls

    1
    0 Votes
    1 Posts
    530 Views
    No one has replied
  • For traffic from WAN don't apply route policy firewall rule applied in LAN

    19
    0 Votes
    19 Posts
    2k Views
    M

    @johnpoz:

    If traffic comes in wan1 it going to go back out wan 1 for the answer.

    I do not know why not work, on both WAN interfaces is configured the corresponding gateway(L3). If that were working well for us, we would be very happy… maybe is something wrong configured but I can´t find it.

    @johnpoz:

    If your using GLBP and connection from l3-1 to pfsense fails, then no traffic would come in that interface so why would pfsense send a respond out an interface that did not see the traffic?

    Each L3 can ping the correspondig WAN interface in pfsense and also can ping a server inside server networks.

    @johnpoz:

    Why do you need to set any routes?? is not l3-1 and l3-2 different gateways?  Why are you needing to create routes to this user network at all?

    Yes, L3-1 and L3-2 are different gateways. I used Packet Capture in WAN1 interface when a host in User Network ping to a server in Server Network and I see the  "ICMP echo request" packets, but don´t see the corresponding "ICMP echo reply". The only way we've found to make work it is to set a static route to reach network user through one of the L3 (but is not a real solution for us because for access to networks Servers would not have fail-over L3s)

    @johnpoz:

    Only place you can go is out l3-1 or l3-2.. Is there some part of this network that you did not show that requires you to create routes that are out your wan interfaces?  Where you can only go to either l3-1 or l3-2, those devices might have to make a routing decision on how to send the traffic to the user network, but why would pfsense have to?

    All traffic to reach networks that are not directly connected to pfsense (ie. other networks than WAN1 [L3-1], WAN2 [L3-2], LAN [network server]) we want pfsense send it to "any" of the L3s (as you say early:  "traffic comes in wan1 it going to go back out wan 1 for the answer", That would be fine!!). Both L3s know how to route traffic to the User networks or other networks.

    Thank you very much for your time. We want to use pfsense and will make every effort to try to configure it properly to our needs.

    PD: Packet Capture in LAN interface when a host in User Network ping to a server in Server Network show the "ICMP echo request" packets and corresponding "ICMP echo reply" packets.

  • Redundant LAN with Wifi and VPN routing question

    1
    0 Votes
    1 Posts
    412 Views
    No one has replied
  • "xinetd: readjusting service" resulting in failover

    2
    0 Votes
    2 Posts
    2k Views
    C

    It's not that the filter reload is causing a failover, the filter reload occurs because you're having a WAN failure. Likely that you are having loss, but why on two diff gateways at the same time isn't clear from that limited context. Check your gateway logs.

  • VPN Trunk/Loadbalancing possible? (site to site)

    1
    0 Votes
    1 Posts
    453 Views
    No one has replied
  • Backup WAN with Karma Go

    1
    0 Votes
    1 Posts
    444 Views
    No one has replied
  • [ASK]Separate Browsing and Gaming for Dual Wan

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ

    There has to be some way to match the traffic will firewall rules to identify traffic to put on specific WANs.

    If your gaming is all done from a console, put the console IP address(es) in an alias, then match those and send them out your "gaming" WAN.

    If you game and browse on the same PC, that's much different and a more difficult problem to solve. You might be able to just send TCP ports 80 and 443 out the "browsing" WAN but undoubtedly there will be other non-gaming traffic on other ports (e-mail, FTP, torrents, etc).

  • Routing problems

    3
    0 Votes
    3 Posts
    2k Views
    R

    @heper:

    so:

    -all vlan_clients have access to the internet & can access the pfsense webgui

    That's correct.

    -you have 'allow all rules' on all vlan_interfaces (with proto=any)?

    Yes, just like on the default LAN interface. Allow any type of traffic from abc net to any destination. I will eventually build rest of my rules on top of these.

    are you sure the clients are accepting connections from each-other? have you tried to turn off windoze firewall ?

    Yes I can reach the clients from pfSense but not from a different subnet/vlan. Most of my traffic is ssh/slp anyway so beloved Windows FW doesn't play a role here.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.