• Multi-Wan with failover and bonding.

    Locked
    5
    0 Votes
    5 Posts
    3k Views
    GruensFroeschliG

    Do you mean you want to write your own code to add to have this functionality?

    I'm not sure.
    I think the page: services_dyndns.php would be a start to look at.

  • Dual wan (but internet ) USE " static route " ???

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Dual Wan- 1 Lan

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Multi-WAN and SIP UDP Session Closure

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    M

    @foxtrop:

    Hi, I solved this by increasing the waiting time, registration of the phone was 3600 seconds and the waiting time in the rule that applied was 3700 seconds, and so far I have had more problems.

    My problem turned out to be some type of SIP proxy my fiber ONT has enabled.

  • Daul-WAN LoadBalancing killing https sessions

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    dotdashD

    AFAIK, stickies are still broken. I just create a rule for 443 that uses a failover pool instead of a LB pool. Last time I looked, this was mentioned in the dual-WAN howto.

  • Triple Wan and Load Balancing/Failover

    Locked
    8
    0 Votes
    8 Posts
    5k Views
    dotdashD

    You just need to pick a unique IP for each connection to monitor. I usually use something on the provider's side- other side of the T circuit, etc. If the gateways for two connections were the same, it would cause routing problems, as the firewall would not which interface to route the traffic out.

  • Some kind of multi wan and lan

    Locked
    7
    0 Votes
    7 Posts
    3k Views
    Cry HavokC

    That's because it relates to the web server - try reading this article.

  • Proxy and VPN : how to setup 2 different gateways ?

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    X

    @fernandov:

    To answer your question briefly

    1. Yes, you need to install a second ethernet card for your second GW

    You are not clear about which traffic will go thru which GW.  Is the GW1 only to be used by VPN users? Will all LAN users go out thru GW2 only or they will go out either GW (1&2)?

    Let me thank you for your answer  ;D (so long awaited !!!)

    The two gateways will be only used for the right service :

    GW1 ONLY for VPN

    GW2 ONLY for proxy navigation

    Hope you could help me more  :)

    Sincerely,

  • Routing between 2 pfsense LANs

    Locked
    2
    0 Votes
    2 Posts
    5k Views
    L

    @soma:

    I have been playing with static routes… for example adding 192.168.2.1/24 on the pfsense box that contains LAN1, and giving it a gateway of 10.1.1.1, but I don't think it's what I need to do, or I'm not doing everything I need to for routing between these LANs.

    The 10.1.1.1 box doesn't know where 192.168.2.0/24 is so that won't work.  You have to set the gateway to the IP of the box that knows where the other subnet is.

    DHCP box:

    Static route 192.168.2.0/24 to 10.1.1.2

    PPPoE box:

    Static route 192.168.1.0/24 to 10.1.1.1

    You will probably need to add rules to the OPT interfaces to allow traffic from the OTHER box's LAN subnet when the destination address is in the LOCAL box's LAN subnet.

    Just add the routes and test first.  Do not make a lot of changes all at once.

  • Virtual IPs from separate range & gateway

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    S

    Right, understand that and that is what we are going to do.

  • Outbound FTP stopped working and WAN address TTL expires

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Pfsense and Win 2003 server dhcp superscope

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    L

    Solved this on my own with the help of http://doc.pfsense.org/multiple-subnets-one-interface-pfsense.pdf. That was all that was needed, and I added the superscope to my dhcp. Now clients on the subnet can browse the network!

  • Routing in LAN = unstable

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    D

    @phospher:

    hey, is this still an issue? if i understand this correctly it sounds like bad network design here…

    if you ping from your lan to your ipsec GW to you get ICMP redirects?

    are your two gateway's connected to the same switch? if so, you are probably having problems with redirects. i've seen this same issue occur when attaching two gateways to a cut through switch. if this is in-fact how yours is setup I would plug the ipsec Gateway into it's own physical interface on the firewall.

    Yes, both LAN interfaces are on the same switch and both WAN are on same switch.

  • Http load pool marking servers down

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    R

    :( Increasing the number of states did not seem to do anything.  Looking at the states table, it might have been possible that the number of states was exceeding 10,000 at certain times of day.  But now that I've set it to 20,000, I don't think that is the problem.

    I've also tried tweaking the apache server KeepAlive setting and also turned KeepAlive off.  No luck there either.

    I guess if no solution presents itself, I'll have to switch load balancing to LVS or something.

    The two pfSense boxes are Dell 1850 dual Xeon 3.4Ghz with 4GB of memory and a 2-port Intel PRO 1000 network card for WAN and LAN.

  • DNS Server Issues while Load Balancing - 2WAN 1LAN, pfSense 1.2.2

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    dotdashD

    IMO, the easiest way to deal with multi-WAN is to use internal DNS servers. If you cannot do this, following the multi-WAN instructions and adding a static route to one of your DNS servers via the secondary interface should work. You should watch your states, and verify the DNS queries are going out the correct interface.

  • Load Balance Incoming Dual WAN

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Transparent NAT/Bridge/Routing only

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    F

    Hey,

    Got a work around in the end. I turned the firewall and everything back to normal so the captive portal worked. I then setup a Virtual IP for my whole WAN range and then added a NAT 1:1 rule for each IP address. Since this cant include the WAN IP address I couldnt just do a /24 range. I therefore setup NAT 1:1 for a /25, /26, /27, /28, /29 and a /30 range so that I covered 192.168.0.4-255. Now if a PC on my LAN network with a IP address of 192.168.1.123 uses the internet the traffic appears to come from 192.168.0.123.

    There was probably a better way to do this but it worked for me.

  • PfSense chaining (sort of)

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Multi-WAN and one LAN

    Locked
    5
    0 Votes
    5 Posts
    3k Views
    C

    GruensFroeschli
    can you help me with image upload ?

    im newbie  :'(  :'(  :'(  :'(

  • Linking / connecting VSAT VPN and Pfsense Gateway to one lan

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.