• Blocking WAN route if ISP quota exceeded

    5
    0 Votes
    5 Posts
    1k Views
    M
    So there would be no way of using ipfw on the WAN interface as well and using that to block once the quota had been reached?
  • Separate Network

    3
    0 Votes
    3 Posts
    3k Views
    D
    This post is a few weeks old so i'm not sure you've fixed this, but…. If your pfSense box has room for a 3rd NIC (OPT1) then you could configure you network like this [WAN]–-PfSense---[LAN]–-Switch|----Pc1                 |                                  |----Pc2             [WLAN]                            |–--Pc3                 |                 |----------------------Router AP1|----Pc4                                                               |.....Mobiles                                                               |.....Pc3 Your rules on your LAN would not change. You would simply configure rules on your WLAN interface to allow the Wireless clients appropriate access out the WAN GW. your Wish list would be as follows: 1.    To have all the rules in the PFSense Rules would be set on each individual interface (i.e. WAN, LAN, WLAN) 2.    Make sure that no one can access the LAN with network 192.168.2.0 See Comment #6 3.    Make sure that no one can access the WLAN with network 192.168.1.0 See Comment #6 4.    Manage all rules and in PFSense See comment #1 5.    DHCP for all subnets in PFSense With a 3rd NIC (OPT1) interface added, you can configure different DHCP rules for each interface 6.    WLAN and LAN can talk freely with each other Points 2 & 3 would be isolated as per my setup suggestion above; but point 6 somewhat contradicts the two subnets not accessing eachother.
  • Rule Access List

    3
    0 Votes
    3 Posts
    2k Views
    K
    That did the trick, Thanks. Chris
  • [Help] Running with fiber

    2
    0 Votes
    2 Posts
    791 Views
    Z
    Hello, My ISP has assigned the VLANs in the "router" they supplied. I have 4 ports, 1 of which is for internet. VLAN is handled in that router. If you want to skip the ISP supplied router, you need to establish which VLANs they use, and assign them in pfSense to various ports. This would mean that you would have to connect your IPTV box to pfSense.
  • Multi wan gateway routing ? (packet marking ?)

    1
    0 Votes
    1 Posts
    633 Views
    No one has replied
  • Routing daemon log entries…

    3
    0 Votes
    3 Posts
    2k Views
    S
    Thanks BB! Got this in the logs when all interfaces were "saved" once again. Aug 3 10:34:59 radvd[26818]: removing /var/run/radvd.pid Aug 3 10:34:59 radvd[26818]: sendmsg: Operation not permitted Aug 3 10:34:59 radvd[26818]: sending stop adverts Aug 3 10:34:59 radvd[26818]: Exiting, sigterm or sigint received. I will see if it continues.
  • InterVLAN Routing Failing When Assigning Different Gateway

    10
    0 Votes
    10 Posts
    2k Views
    V
    @Supermule: Why not just use outbound NAT to route the traffic via WAN2? Wouldn't he still need a rule to route the traffic out WAN2, when the default gateway is on WAN1?
  • Simple setup stumping me - not new to this setup

    1
    0 Votes
    1 Posts
    600 Views
    No one has replied
  • Error in same lan other gateway routing

    1
    0 Votes
    1 Posts
    728 Views
    No one has replied
  • Multi WAN - same ISP, same WAN Gateway (Utilizing two pfsense Boxes)

    12
    0 Votes
    12 Posts
    16k Views
    S
    This is not working in 2.1.4 when routing from OPT1 interface to WAN VIP
  • Second ip public nat on second lan interface. How to do?

    1
    0 Votes
    1 Posts
    629 Views
    No one has replied
  • How to use another gateway on another pfsense?

    11
    0 Votes
    11 Posts
    1k Views
    C
    ah, no expensive!!! What other advantages give me? Very interesting
  • Outbound NAT to VIP not working :o(

    7
    0 Votes
    7 Posts
    1k Views
    S
    I use alias' as well on the opt1 interface that I renamed DMZ. So the routing is from one alias to VIP on WAN interface. But even routing from the OPT1/DMZ interface using any instead of alias but keeping the VIP on the WAN, still render it useless regarding traffic redirection to VIP.
  • Routing problem

    4
    0 Votes
    4 Posts
    993 Views
    S
    You can use VLANS on pfsense instead af aliases. Just assign vlans under interfaces and choose the parent interface. Then pfsense will handle the routing. Unless you traverse traffic via switched hardware then vlan hardware support should be ok.
  • Routing traffic through 2 gateways with 2 firewalls

    2
    0 Votes
    2 Posts
    696 Views
    M
    So I tried adding MAC address control in both firewalls for one of my Roku3 devices. Firewall1 was set to deny access to the MAC in the DHCP server settings and Firewall2 was set to "deny unknown clients" in it's DHCP server. I set the static IP assignment in Firewall2 to only the one device. Cleared the ARP cache in both firewalls, rebooted the Roku, verified the IP and gateway assignment in the Roku once it restarted. Tried testing it and…..... it is stilling accessing the internet through Firewall1?!?!!?!?!?  I am going to try blocking all access to the LAN interface on Firewall1 to this device and see if that makes any progress. Hopefully it will force the traffic out the other firewall like it should be.
  • Selecting Public IPs on Dual WAN?

    3
    0 Votes
    3 Posts
    941 Views
    S
    @jimp: You can't load balance the traffic out both WANs using one public IP address (without BGP or other means that are far beyond what you're talking about) You can force a specific PC out a specific WAN by adding a rule above the current rules to match them and send their traffic out one gateway (or a failover group that prefers one gateway) Since I only have 2 devices on my LAN that need load balancing, I ended up creating 2 rules specifically for them and left everyone else use the faster WAN by default. Seemed more logical than creating exceptions for each PC.
  • Internal pfSense + external pfsense + WAN Router = limited internet

    2
    0 Votes
    2 Posts
    2k Views
    D
    Good morning to all! Well!  Thanks to all that read my issue. And this isn't an issue any more.  Turns out the last two attempts by the ISP failed because of them.  We finally were assigned an engineer who knew what he was doing and did it right. As for my post, if anyone can give me some advice on how I could have done it differently so that anyone would have tried to help me out sooner, I would appreciate it for future posts. dbennett
  • 0 Votes
    3 Posts
    977 Views
    D
    So after reading a bunch of other posts it would appear that the preferred method to get this working is to use gateway groups. This has a bunch of advantages as well. I got my setup working with the settings below: [image: i69Um3Q.png] [image: gBqqrVS.png]
  • Does "Use sticky connections" apply to a Multi-Wan 2.0 setup?

    1
    0 Votes
    1 Posts
    975 Views
    No one has replied
  • How do I setup pfSense with only one physical NIC

    1
    0 Votes
    1 Posts
    640 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.