• VPN in seperate interface

    1
    0 Votes
    1 Posts
    115 Views
    No one has replied
  • Policy Based Routing Works Outbound Not Inbound

    2
    0 Votes
    2 Posts
    7k Views
    C

    After more testing I am beginning to suspect that PFSense is just straight up ignoring the state table when handling this traffic. This is the state table for 10.110.200.12 after performing a reset on the system state table and then re-running the test.

    States DCLINTRTG2550 tcp 198.199.98.246:54237 -> 10.110.200.12:8080 SYN_SENT:ESTABLISHED 2 / 2 120 B / 120 B DCLINTSTORJ200 tcp 198.199.98.246:54237 -> 10.110.200.12:8080 ESTABLISHED:SYN_SENT 2 / 2 120 B / 120 B DCLINTRTG2550 tcp 198.199.98.246:54240 -> 10.110.200.12:8080 SYN_SENT:ESTABLISHED 2 / 2 120 B / 120 B DCLINTSTORJ200 tcp 198.199.98.246:54240 -> 10.110.200.12:8080 ESTABLISHED:SYN_SENT 2 / 2 120 B / 120 B DCLINTRTG2550 tcp 198.199.98.246:54243 -> 10.110.200.12:8080 SYN_SENT:ESTABLISHED 2 / 2 120 B / 120 B DCLINTSTORJ200 tcp 198.199.98.246:54243 -> 10.110.200.12:8080 ESTABLISHED:SYN_SENT 2 / 2 120 B / 120 B

    If I'm not mistaken, a statefull firewall should be returning traffic out the interface it received it on if it is tracking the TCP state but PFSense does not appear to be doing that. Not sure if another rule somewhere is overriding that but all I have for rules outside of the policy based routes but outside of those rules my only other rules are permit any/any until I can get things working on this.

  • Port Forward to LAN with multiple subnets

    8
    0 Votes
    8 Posts
    759 Views
    D

    If you sniff the traffic on the Prod_Front interface, where the destination device is connected to and you can see the outgoing packets, PrepaidCardStatus but nothing comes back, so obviously the device does not respond.

  • DMZ to multi-WAN over VPN

    1
    0 Votes
    1 Posts
    154 Views
    No one has replied
  • Dhcp6 gateway down even though its getting a ip

    1
    0 Votes
    1 Posts
    70 Views
    No one has replied
  • VLAN's and ssh timeouts, is this asymmetric routing?

    2
    0 Votes
    2 Posts
    325 Views
    J

    Hello!
    Do you have ip address assigned on the vlans in the switch? I have a similar setup and had a similar problem, ssh timed out after 30 sec. I had missed to remove an ip address on the client vlan in the core switch. After removing that it worked fine.

  • Outbound NAT return packet gets dropped on IPSec VTI tunnel

    6
    0 Votes
    6 Posts
    837 Views
    jimpJ

    Did you confirm with packet captures that things were taking the proper paths? And check the firewall logs? firewall states?

  • Packets take unexpected route

    4
    0 Votes
    4 Posts
    424 Views
    C

    Have you tried to disable negate rules?
    See: https://docs.netgate.com/pfsense/en/latest/book/config/advanced-firewall-nat.html#disable-negate-rules

    I had a similar problem with multi-wan routing and it seems to be working as expected after I disabled this.

  • Help routing 2 layer 2 networks

    1
    0 Votes
    1 Posts
    142 Views
    No one has replied
  • ARP 00:11:22:ab:cd:ee is using my IP address

    17
    0 Votes
    17 Posts
    3k Views
    M

    I just remembered that I didn't close the loop here.

    So, it turns out my wife's company uses some L2 VPN and due to a server misconfiguration, I was seeing the vpn client on her laptop misbehave. She raised a ticket with their IT and the rest is beyond our control.
    As far as the issue in my network, after turning off the ISP router's wifi and putting all our devices behind pfsense box, I'm not seeing those issues any more.

    Phew! The moment I was about to turn off the capture I saw the smoking gun. I was almost getting ready to call the device malicious and return it.

    Thanks for helping look into this issue guys. Much appreciated!

    Cheers!

  • Interface Groups vs LAGG: Multi-Wan DNS Streaming Service Problems

    9
    0 Votes
    9 Posts
    699 Views
    J

    @jimp said in Interface Groups vs LAGG: Multi-Wan DNS Streaming Service Problems:

    Don't select any outgoing interfaces, so the OS can decide on its own which egress path to use.

    OK, I am IMMENSELY grateful for the help...because I would have never thought "all" would be the correct choice. Based on the documentation:

    Outgoing Network Interfaces: Specific interface(s) to use for sourcing outbound queries. By default any interface may be used. Can be useful for selecting a specific WAN or local interface for VPN queries. outgoing-interface: <ip address or ip6 netblock> ****If none are given the default (all) is used.****

    it would seem "all" would use every interface (including a VPN client which obviously I would NOT want to use generally).

    007478c1-d46d-4610-af57-be74654e2a31-image.png

    Anyhow, with "all" selected there are NO "outgoing-interface" records in /var/unbound/unbound.conf
    dnsleaktest looks good (only primary wan dns being used)
    And there are NO DNS queries on the failover WAN.
    😂

    I would politely suggest a documentation change may be helpful.

  • Not sure if my load balancing works

    4
    0 Votes
    4 Posts
    250 Views
    DaddyGoD

    Try to create a test condition that places a heavy load on the WAN-side connection (gateway group).
    The test should be stronger than your lower performing WAN connection and watch the graphs or log with Zabbix (for example)

  • Low throughput LAN <-> WAN, Router on a stick

    2
    0 Votes
    2 Posts
    199 Views
    M

    There are lots of variables to dig though, but the first thing I would do is dedicate two NIC's to your VM. In other words, make sure the LAN interface has a dedicated NIC that is patched to your switch and isn't being shared with other VM's.

  • Lan network through the WAN interface

    3
    0 Votes
    3 Posts
    262 Views
    RicoR

    Recheck if your Siemens really need layer 2.
    With layer 3 you could run any default Site to Site VPN like OpenVPN in tun mode.

    -Rico

  • 0 Votes
    3 Posts
    313 Views
    N

    @t-np I'll second that...
    I ve tried systat -ifstat 1
    and I get correct stats like this
    6652a2e9-830c-4eea-93ac-2a53c81f4506-image.png

    But only this on dashboard
    0d1fe276-9f8c-40af-9d72-3ed89c1dc3c5-image.png

    I'm also on vlans

  • 0 Votes
    5 Posts
    500 Views
    D

    @viragomann
    Ah, yes those devices do indeed have Windows firewalls on. I thought you meant like actual firewall hardware. My bad. :)

    I'll check those too. Anyway, here are the subnet infos I promised.

    WAN 1000baseT <full-duplex> 84.*********
    LAN1 1000baseT <full-duplex,master> 10.0.0.1/28 (10.0.0.1 - 10.0.0.14 range / 10.0.0.10 - 10.0.0.14 for DHCP)
    LAN2 none ......... 10.0.0.17/28 (10.0.0.17 - 10.0.0.30 / Fully allocated for DHCP)
    LAN3 1000baseT <full-duplex> 10.0.0.33/28 (10.0.0.33 - 10.0.0.46 / Fully allocated for DHCP)
    LAN4 1000baseT <full-duplex> 10.0.0.100/27 (10.0.0.97 - 10.0.0.126 / 10.0.0.101 - 10.0.0.126 for DHCP, 10.0.0.101 Static Leased for Access Point)

  • Sharing WANs between 2 Pfsense Routers

    3
    0 Votes
    3 Posts
    375 Views
    R

    @Fehler21 said in Sharing WANs between 2 Pfsense Routers:

    you have a dedicated interface/subnet for routing between the two pfsense via the Ubiquiti bridge.

    Yes I Do.

    Thanks for the info, I will give it a shot and report back.

    Thanks!!!

  • Transparent failover gateway how?

    4
    0 Votes
    4 Posts
    365 Views
    ?

    Thanks mate, I'll give a go. Cheers.

    Eoin

  • strange Log for WAN interface "can't handle af183"

    9
    0 Votes
    9 Posts
    1k Views
    noplanN

    @Gertjan

    yessssss and a pain in the a*%&§ when u ignored that uu knowed it

  • Outbound Routing

    2
    0 Votes
    2 Posts
    233 Views
    RicoR

    Covered in jimps Multi WAN hangout: https://www.netgate.com/resources/videos/multi-wan-on-pfsense-23.html

    -Rico

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.