• Multi Routers with Multi WAN

    4
    1
    0 Votes
    4 Posts
    1k Views
    Z
    Thank you for the response. I took your advise and upgraded to one router with multiple NICs.
  • Internet Load balancing has limit 6 link?

    2
    2
    0 Votes
    2 Posts
    365 Views
    B
    @benzepoj pfSense Version 2.5.2-RELEASE (amd64) built on Fri Jul 02 15:33:00 EDT 2021 FreeBSD 12.2-STABLE
  • Internet Load balancing has limit 6 WAN?

    1
    0 Votes
    1 Posts
    275 Views
    No one has replied
  • Path monitor multiple IPs

    1
    0 Votes
    1 Posts
    339 Views
    No one has replied
  • Pfsense HA CARP with mode only routing (firewall disabled)

    1
    0 Votes
    1 Posts
    266 Views
    No one has replied
  • Connecting Two Subnets with pfSense

    26
    0 Votes
    26 Posts
    23k Views
    B
    In anyone is still interested, here is how I got it to work with 3 pfsense setup. I wanted to setup an environment where I have a datacenter and a remote lab. All machines in the datacenter have the domain datacenter.home.arpa. All machines in the lab have the domain lab1.home.arpa. I wanted machines in the lab to be able to reach machines in the datacenter. pfSense1: Hostname: pfSense Domain: home.arpa WAN (dhcp) LAN: 192.168.0.1 Block private networks and loopback addresses: Unchecked Forward packets for datacenter subnet 192.168.2.0/24 to datacenter router - 192.168.0.2 Added gateway Name: datacentergw Interface: LAN Gateway: 192.168.0.2 Added static route Network: 192.168.2.0/24 gateway: datacentergw pfSense2: Hostname: pfSense Domain: datacenter.home.arpa WAN: 192.168.0.2 (static) LAN: 192.168.2.1 Block private networks and loopback addresses: Unchecked NAT Forward ICMP and TCP/UDP from source:192.168.0.0/16, destination: LAN net to LAN Address This automatically added necessary firewall rules as well pfSense3: Hostname: pfSense Domain: lab1.home.arpa WAN: 192.168.0.3 LAN: 192.168.3.1 Block private networks and loopback addresses: Unchecked DNS Add a domain override for datacenter.home.arpa and send its queries to datacenter DNS: 192.168.2.1 DHCP Set lab1.home.arpa;datacenter.home.arpa as DNS Search
  • Can't route between VLANs

    8
    1
    0 Votes
    8 Posts
    1k Views
    S
    @stewart Just wanted to report that this was the solution. Thanks @johnpoz!
  • Failover / Failback not working for me in 2.6.0

    10
    0 Votes
    10 Posts
    1k Views
    N8LBVN
    @dataideas-josh Yeah I need to get back to testing this soon.
  • Outbound NAT rules not working

    6
    0 Votes
    6 Posts
    1k Views
    O
    @operations no one with an idea?
  • 1 Virtual IP and 2 multiple WAN

    2
    0 Votes
    2 Posts
    464 Views
    DataIdeas-JoshD
    pfSense from what I've seen won't work if the gateway is the same on both WAN interfaces. Are you doing this in a VM environment or BareMetal?
  • pfsense proxy + mikrotik

    1
    0 Votes
    1 Posts
    510 Views
    No one has replied
  • default gateway override route ?

    11
    0 Votes
    11 Posts
    2k Views
    R
    thanks so much for the help @viragomann and @johnpoz , I seem to have a working route out now with FW rules using policy route!
  • dpinger and ISP package loss

    6
    0 Votes
    6 Posts
    1k Views
    F
    @jaspery Based on my 2nd episode with crash, I suspect it was crash that caused my dpinger to fail (in this case).
  • Nested Firewalls Issues

    4
    0 Votes
    4 Posts
    899 Views
    S
    @ashtonianagain Can't speak to Wireguard but we've used it for our office (behind our building router) for many years and have had port forwards set up at several clients that put the router in a DMZ. There is a guide at https://docs.netgate.com/pfsense/en/latest/troubleshooting/nat-port-forwards.html but if it connects initially it would seem the forwarding is correct. Unless maybe it's trying to use additional ports? There are examples for Wireguard setup.
  • Failover failback guide

    2
    0 Votes
    2 Posts
    620 Views
    J
    @latimeria I think you will get the most out of this video on YouTube. How to use Multiple WAN on pfsense for Fail over and or Load Balancing
  • Complex, working, config now needs to use CGNAT, UGH.

    13
    0 Votes
    13 Posts
    2k Views
    Dobby_D
    @chrisjx Maybe I'm over thinking it and it's just a different way to do what DDNS does but for a non-ip CGNAT service. You need a so called jump host in the internet, free to reach from else where, that is connected to you home network. Thats it, at a "Hoster" of your choice for some coin per month and all is done.
  • Routing public IPs with single /29

    6
    0 Votes
    6 Posts
    923 Views
    L
    @steveits Yes, it was surprisingly easy to set up the 1:1 NAT logic. For the Medusa, its used for someone who rents single office tenant spaces to their own clients so lots of small VLAN's with one or two clients requesting public IP's directly.
  • Pfsense IPsec configuration Working example wanted/Bounty

    2
    0 Votes
    2 Posts
    444 Views
    V
    @cool_corona IPsec Site-to-Site VPN Example with Pre-Shared Keys If you want to allow access to a small segment of the LAN subnet you can state this in the phase 2 at "Local Network", type "Network". Additionally you need a firewall rule on the IPSec tab to allow access. Here you can also state an alias with single IPs and ports as destination to lock permission down to the necessary destinations only.
  • Multiple LAN segments accessed from single IP address

    14
    0 Votes
    14 Posts
    2k Views
    J
    Guys, i am still working on this trying to configure it. I think i am doing some kind of progress. Please bear with me as today i don't have that much time. I'll come back tomorrow. Thank you for all your advises!
  • Routing from BGP Network out through NAT

    6
    0 Votes
    6 Posts
    1k Views
    DerelictD
    @computingdon You'll need to post details. The source address of the connection, the route back to it, the firewall rules passing that traffic when it enters pfSense, and the outbound NAT rules.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.