• Single Port Firewall Using VLANs (NOOB QUESTION)

    3
    0 Votes
    3 Posts
    1k Views
    T
    Thanks ab0tj, now I can order the last part needed and start muddling through the process. The best way to lean IMO! Again thanks for the conformation.
  • [Solved] The routing rules not function.

    3
    0 Votes
    3 Posts
    1k Views
    P
    Some others have posted about this also. Perhaps the previous alias types are not getting upgraded correctly. If you have a copy of config.xml from before the upgrade, then post the routes and aliases sections. Then the issue might become traceable.
  • Multi-Wan with SQUID Theoretical Setup

    13
    0 Votes
    13 Posts
    5k Views
    T
    @rubic: Hi, turk182 This scenario will not work unless each of 3 ISP you are connected to has a static route to ip3 through pfSense01. Being ISP1 how could I know that ip3 given to you by ISP3 is behind WAN1 of pfSense01? Suppose I accept incoming packet from you with source ip3, where should I send answer? According to my routing table I will send it to ISP3 which will send it to your WAN3 where it will be dropped as packet comming in on wrong interface. You do not need public IP net between pfSense boxes. Using private net with double NAT is mach easier. Thank Rubic, So if it were double NAT, pfsense01 will just have one client which is pfsense02.
  • Remote ping to multi GW IP's

    7
    0 Votes
    7 Posts
    2k Views
    G
    I hope you didn't disable reply-to on System: Advanced: Firewall and NAT. Look at your outgoing NAT rules: The source address shouldn't include the WAN addresses. I use an alias with all internal used (or all private networks) as source addresses.
  • WAN interfaces dialing sequence

    1
    0 Votes
    1 Posts
    777 Views
    No one has replied
  • 0 Votes
    3 Posts
    4k Views
    E
    Many thanks for taking the time to review and answer. I guess I was baffled due to that document saying the switch chip on RB750UP does NOT support Rule tables. I gather from your previous message that this does not matter for our scenario. Thanks again for your kind assistance.
  • Outgoing traffic redirected to internal interface

    2
    0 Votes
    2 Posts
    819 Views
    H
    Or is there maybe an option to capture the dns request and change it?
  • Pfsense spamming

    4
    0 Votes
    4 Posts
    2k Views
    G
    Interface Cable is down: Why do I get "GW_Cable, Gathering data" in gateway status and gateway group status. There is nothing to probe if the interface is down.
  • Server should use the other WAN IP

    1
    0 Votes
    1 Posts
    682 Views
    No one has replied
  • Multi Wan sending packets through ungrouped gateway

    3
    0 Votes
    3 Posts
    927 Views
    P
    And it sounds like you have default gateway switching enabled, that would be why default traffic is failing over to some other gateway, in this instance the gateway on LAN. The LANGW should just be a gateway, it should not also be selected as the gateway for the LAN interface (on Interffaces->LAN). If the LAN interface config has a gateway specified, then the system will consider that a possible general way out to "the internet" and may use it when default gateway switching is enabled.
  • Gateway groups no options

    12
    0 Votes
    12 Posts
    3k Views
    H
    Hi, ok I was busy with checking the source code, when I noticed that one gateway disappeared from the summery. When I tried to re-add it, it says : You can not use a IPv4 Gateway Address on a IPv6 only interface. _So I went to the Gateway (which was disabled, but that is fine!) and enabled it to check the settings. It says: ipv6: none! Weird._ –> The Error came because it is an PPPoE device. But the message makes no sense ;) But it is fine now. Ok, it's working now, when the device/gateway is set to "enable". The Thing was disabled because it is not connected,yet. This was fine in pfsense 2.04. Anyway… I now know how to get the thing to work! THANK YOU VERY MUCH!
  • 3 WANS, slow internet. . .

    3
    0 Votes
    3 Posts
    2k Views
    T
    Thanks for the suggestion deviant. But according to https://doc.pfsense.org/index.php/Multi-WAN_2.0, 5 is the highest priority: "By default all WANs on the same tier are considered equal when doing load balancing. If your WANs are different speeds, the weight parameter lets you give the system some bias toward a faster link. If you had a 50Mbit line and a 10Mbit line you probably would not want to share them equally, as it would often leave the 50Mbit line underloaded and the 10Mbit line overloaded. You can give your 50MBit line a weight of 5 so that you get a 5:1 ratio of usage to prefer the faster WAN."
  • Problem with port forwarding

    1
    0 Votes
    1 Posts
    986 Views
    No one has replied
  • Multi-WAN DNS failover

    4
    0 Votes
    4 Posts
    1k Views
    T
    If you have gateways set for your DNS, it sets the static routes. The way I've found the most success with is setting a floating output rule for your WAN interfaces with your failover group as the gateway.
  • VOIP: Wan + Bridge + VLan or just give up and set up another box?

    1
    0 Votes
    1 Posts
    881 Views
    No one has replied
  • Routing between multiple interfaces

    30
    0 Votes
    30 Posts
    8k Views
    K
    They were on your Whatttttt????  That doesn't sound comfortable.
  • PfSense and Layer 3 Switch Doing Inter VLAN Routing

    3
    0 Votes
    3 Posts
    2k Views
    marcellocM
    I'm doing a fix fot that. Take a look on bounty topic.
  • Squid and multiwan pppoe load balancing doesn't work

    1
    0 Votes
    1 Posts
    839 Views
    No one has replied
  • Interconnecting 2 independent LAN segs via Opt1

    14
    0 Votes
    14 Posts
    2k Views
    H
    Thank you for your patience, now I found the real solution for that problem: You find it in: System: Advanced: Firewall and NAT There mark Bypass firewall rules for traffic on the same interface This option only applies if you have defined one or more static routes. If it is enabled, traffic that enters and leaves through the same interface will not be checked by the firewall. This may be desirable in some situations where multiple subnets are connected to the same interface. Conclusion: pfSense CAN handle asymetric routings! And you showed me where to look for that. Thank you again. Best regards, Holger P.S. Where can I mark the thread as solved (manually editing the head line?)
  • Access LAN subnet from WAN IP

    4
    0 Votes
    4 Posts
    3k Views
    P
    The route looks fine. The first WAN rule lets everything in, so you can't go wrong there - but it kind of defeats the idea of calling it a firewall :) The 2nd WAN rule by itself should also work. routers on the LAN Segment Now I see that the LAN segment has other routers, and presumably routes, behind it. Maybe those routers do not use the pfSense LAN IP (192.168.x.y) as their default gateway? Those routers will need to know that the route back to you at 10.0.0.0/24 is through the pfSense LAN IP 192.168.x.y - then they will be able to reply to your connection attempts. Post a network diagram if you get stuck further.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.