You wouldn't be able to use the WAN address for the GUI without firewall rules and/or NAT translations in place. I'm not too familiar with the VMware side (use Hyper-V mostly), do you have the right interface (LAN and WAN) assigned to the right network card? They should still be separate physical cards unless you have some special config or are trying to use VLANs.
FWIW I had this exact problem with a 2.0BETA5 build on a firewall I built back in January. After several attempts and reinstalls I grabbed a current snapshot and it worked just fine. Not sure what the problem was, I had used the disc before with no problem so I don't think it was a bug in a snapshot nor do I think it was the disc. I was trying to access it plugged in to the wifi AP with my desktop on wireless but when that didn't work I pulled the firewall to my desk and used a small switch and made my own LAN (on a different range) and still no luck. So all that said, are you using a 2.0 build or 1.2.3?
Can you point me in the right direction for hand editing the config? Is there information on how to do this? I would assume I burn the image to the USB and then modify? I know the NIC assignments, just need help with pre-modifying this config
I have a load of asphalt and a local permitting system that's a pain in the butt to deal with in the way of using something wired. I have basically 10 days to get this working (they're moving on the 30th) and one of the IT guys at one of the companies has a pile of old WRT54G v3 routers running dd-wrt, so I'm thinking I'm going to build a directional antenna bridge with those and call it a day.
If you can get to the console you can get the LAN IP. If the GUI doesn't respond on the LAN side either your LAN has a problem (or the workstation you used to attempt a connection has a problem) or pfSense itself has a problem, either of which could be the cause of the problem for your client. I too am not sure what you mean by "changed WAN IP to online active system". That almost sounds like you had a static IP configured and now they are providing you with something like PPPoE or DHCP for the IP and the static IP you had configured is no longer valid.
honestly I'm just not sure yet what I'm trying to do myself.
Until you work that out (and why you want to do what you decided) why not run a configuration with just one public IP on the WAN side, private IP addresses on LAN and OPT1 and port forwarding through the firewall? This would give you some experience with pfSense and that may help you decide what you really want to do.
Afaik you should be able to restore a config.xml from monowall directly on the pfSense and have everything moved over.
Yes, it is in xml file but import not working as it should - after import "unable to find uid for XXX" error flashes during the initial boot. I dont want to force users to retype passwords.
Many thanks for all your answers I really have learned a lot.
My solution is just to not do to have the all-in-one machine. The penalty in either security or performance is too big. I have ordered an Alix 2D2 (for firewall+router) and it will sit beside my Openvox in the IX110 housing.
On a side note: I did install some services using jails on pfSense just for now (it is not connected the modem yet :)) just to get some experience. I can really say that I love pfSense and FreeBSD. I didn't have any experience with any of the BSDs but it feels so much more solid than linux (or windows).
Is there any way to do remote administration on the system? That's what I am searching on now. Thaks for your support.
As dotdash stated, enable SSH and HTTPS under Settings->Advanced in the menus.
What he didn't mentioned was that you MUST add firewall rules on WAN tab to allow incoming connections on these ports. To reduce SSH brute force attacks, you might want to change the default SSH port from '22' to say.. '222'.
If you do not want to reveal HTTPS on your WAN, you can always do a SSH tunnel socks proxy on the client then access the HTTPS webgui via the LAN IP.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.