Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Dual WAN and IPSEC traffic

    Scheduled Pinned Locked Moved Routing and Multi WAN
    2 Posts 2 Posters 3.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      oriontechllc
      last edited by

      We've used Monowall/pfSense for over a year and really appreciate the hard work.  I just donated cash today to pay my part for the continued development of Monowall/pfSense.

      We moved offices last week, so I took the opportunity to replace our simple Monowall setup with a dual wan pfSense box (PIII866,256MB,3 NICS) with two ADSL connections (static IPs).  The dual WAN load balancing is setup and working.

      At each customer site, we have a WRAP based Monowall box to which we establish an IPSEC tunnel (Main Office LAN to Remote Client LAN) in order to monitor servers, routers, access points, etc.  Each LAN is on a different subnet.  The tunnels will establish and pass traffic without dual wan load balancing implemented, but enabling load balancing prevents traffic from passing.  A quick look at a TRACERT from the Main Office LAN to the Remote Client LAN shows that traffic is being passed out one of the WAN links instead of across the tunnels.  I've played with static routes and firewall rules, but I can't seem to get the packets going through the tunnel.  Any thoughts or suggestions are appreciated.

      1 Reply Last reply Reply Quote 0
      • H
        hoba
        last edited by

        You have to add a firewallrule with default gateway for all the vpn destination networks on dual WAN/loadbalanced pfSense or the loadbalancer/multiwan will send traffic directly to the WAN gateways bypassing the internal routingtable. I have the same setup at the office and it'S working fine when these rules are in place. You should move them to the top of your lan rules.

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.