• Multiple LAN segments accessed from single IP address

    14
    0 Votes
    14 Posts
    3k Views
    J
    Guys, i am still working on this trying to configure it. I think i am doing some kind of progress. Please bear with me as today i don't have that much time. I'll come back tomorrow. Thank you for all your advises!
  • Routing from BGP Network out through NAT

    6
    0 Votes
    6 Posts
    1k Views
    DerelictD
    @computingdon You'll need to post details. The source address of the connection, the route back to it, the firewall rules passing that traffic when it enters pfSense, and the outbound NAT rules.
  • PPTP VPN not connecting

    Locked
    2
    1
    0 Votes
    2 Posts
    489 Views
    jimpJ
    The PPTP WAN type is not meant for VPNs, but for ISPs which require PPTP for the first hop (like PPPoE). Trying to use it for a VPN is not going to work properly. PPTP as a VPN protocol is dead. It's been completely cracked open and worthless for over 10 years. It's beyond time to stop using it for that purpose, no matter the reasoning.
  • Can't Route Site To Site

    7
    8
    0 Votes
    7 Posts
    2k Views
    D
    @lnguyen said in Can't Route Site To Site: @dma_pf What are the allowed networks under "Peers" for both sites? Thanks for pointing me in this direction...that was it! There was an error in one of the peer IP addresses: [image: 1681327143506-00155179-c7b4-4b05-be81-a0a7f79d6e1c-image.png] The Site 2 network should have been 192.168.164.0. I made the error of seeing that the Wireguard handshake was completed and made the assumption that by doing so it was confirming that: 1) the cryptographic keys matched and 2) that the peer trying to connect had come from the Allowed IP networks. As a result I never rechecked the peer Allowed IPs because I saw a successful handshake. But now I've got to dig deeper into the Wireguard protocol as it appears that the handshake only requires the keys to match and the Allowed IPs are only used as a routing ACL to allow or reject traffic across the tunnel. Thanks again for your help!
  • ipsec tunnels load balancing issue

    7
    0 Votes
    7 Posts
    2k Views
    M
    @jazzl0ver ahhh ok not available in the kernel. That makes sense.
  • Secondary WAN can ping & resolve hostnames, can't browse

    8
    2
    0 Votes
    8 Posts
    1k Views
    S
    @viragomann Ok yeah, that makes sense, now that you mention it, I've seen that before. Just not something I typically pay attention to. Guess that leaves me pretty well stumped here.
  • Increasing the gateway monitoring interval

    1
    0 Votes
    1 Posts
    421 Views
    No one has replied
  • MPLS Routing

    20
    0 Votes
    20 Posts
    2k Views
    DerelictD
    @rustydusty1717 Accurate, comprehensive, numbered diagrams always help.
  • OVPN route to 0.0.0.0/0 via a static route with LAN GW

    17
    0 Votes
    17 Posts
    2k Views
    A
    @viragomann One more question please. VLANs. What is the general concept if I want VLANs to work through PFSENSE? In this case, PFSENSE, as the core of the network, has OVPN and IPSEC clients. Should I want VLAN111 on the OVPN1 client to see VLAN111 on the OVPN2 client, or even more VLAN111 to see on the IPSEC1 client?
  • Pfsense doesn't see a specific network

    1
    0 Votes
    1 Posts
    392 Views
    No one has replied
  • ISP Provided Lan and Wan Blocks

    16
    1
    0 Votes
    16 Posts
    3k Views
    B
    Got everything up and working now with the LAN block as virtual IP's. FYI: For anyone changing the WAN adapter assignment, I found that I needed to go back through the CLI instead of the web browser to reassign all adapters before it would start routing traffic. Initially, I made the change on the adapter in Esxi, but nothing connected to the internet. Then, I created a completely new adapter and assigned it as the WAN interface in the web browser, but still, nothing happened. Eventually, I went through the CLI assignment for just the WAN and LAN, and then traffic started routing again. After that, I was able to reassign and reset the interfaces with the web browser.
  • WAN 1 and 2 Up, but no internet access

    4
    0 Votes
    4 Posts
    879 Views
    V
    @darkcorner said in WAN 1 and 2 Up, but no internet access: Or leave the two Google DNS without associating them to the Gateways? Exactly this one.
  • "Disable gateway monitoring action" NOT working

    8
    0 Votes
    8 Posts
    3k Views
    F
    @rcoleman-netgate said in "Disable gateway monitoring action" NOT working: You have to monitor an IP address with dual-WAN to make sure the interface is up I do have IP addresses setted as you can check in the first 3 images. @rcoleman-netgate said in "Disable gateway monitoring action" NOT working: Taking it offline from monitoring will treat it as though it is always up and the "member down" setting is made redundant. That is the configuration I am using now but only because the "disable gateway monitoring action" is not working. I read all the documentation about multiple wans. But still, the "disable gateway monitoring action" checkmark should be self evident. If you mark that option it should never take any action when monitoring and should never set the interface down. But it does...
  • OSPF learned routes not passing packets for one VTI partner

    1
    0 Votes
    1 Posts
    497 Views
    No one has replied
  • Dynamic Routing on WAN with RIP

    3
    0 Votes
    3 Posts
    779 Views
    H
    @johnpoz Thanks I will look into the FFR package. As to them using RIP like I said they are a crappy ISP... They used to use all just regular SurfBoard docsis 3.0 modems and everything was great. But they got sold on this shitty taiwanese Askey hardware and management software (I think because they took over time warner and roadrunner, this is the junk they were using). Well I think I might have gave it away to you which ISP this is, hopefully I don't piss off the ISP overlords and they zap my hardware for being an ungrateful customer LMAO...
  • BGP Failover WAN, Hi Availability pfSense

    1
    0 Votes
    1 Posts
    377 Views
    No one has replied
  • Routing via ISP router and avoiding double NAT

    5
    0 Votes
    5 Posts
    1k Views
    johnpozJ
    @pduk82 well its not the end of the world - double nat is not all that bad, while there are some special apps that might have problems. Generally speaking most users can be behind a double nat, even triple or have seen quadruple and never notice any issues.. More nats in your chain before public IP can be problematic for allowing inbound traffic via port forwards, but still able to do - just have to port forward on the device(s) upstream of your pfsense
  • TCP handshake RTT monitor

    1
    0 Votes
    1 Posts
    532 Views
    No one has replied
  • Gateway Latency Alarms

    2
    0 Votes
    2 Posts
    904 Views
    M
    @dtnb Simply means the path to your monitor IP or maybe the monitor IP itself is not healthy. edit: I see the monitor IP is 192.168.1.254 which is your ATT modem in this case. Perhaps a cabling problem? Have you tried swapping the patch cable?
  • ipsec tunnel aggregation

    1
    1 Votes
    1 Posts
    738 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.