Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense as a router and default gateway with multiwan

    Scheduled Pinned Locked Moved Routing and Multi WAN
    35 Posts 7 Posters 34.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bravo_prochu
      last edited by

      Hello
      I'm fresh in pfsens, so sorry for that question, but I really tried to find out the answer on this forum/gogle but no solutions found…
      Here is an example of my network.

      PfSense works as a router and default gateway;
      Static routes for
      192.168.10.0 gw: 192.168.0.2 descr lan10
      192.168.50.0 gw: 192.168.0.2 descr lan50
      192.168.32.0 gw 192.168.0.2 descr lan32
      Etc…

      LAN rules looks like this for every single IP of my whole networks ie: (i use aliases)

      • | 192.168.32.115/24 | port: * | dest: * | gateway: DEFAULT [use in/out for that IP]
      • | 192.168.40.235/24 | port: * | dest: * | gateway: DEFAULT [use in/out for that IP]
      • | 192.168.50.25/24 | port: * | dest: * | gateway: DEFAULT [use in/out for that IP]
      • | 192.168.10.95/24 | port: * | dest: * | gateway: DEFAULT [use in/out for that IP]
        Etc…

      At pfSense I added a gateway (192.168.0.2/24) and traffic between networks and pfSense works great when I use only one WAN int.

      How can I configure pfSense to use MulitWAN (https://doc.pfsense.org/index.php/Multi-WAN_2.0; ) Because if i set rules default Gateway: ‘multiWAN’ (WANPPPoE1 Tier1 and WANPPPoE2 Tier1):

      • | 192.168.32.115/24 | port: * | dest: * | gateway: multiWAN [use in/out for that IP]
      • | 192.168.40.235/24 | port: * | dest: * | gateway: multiWAN [use in/out for that IP]
        Etc…

      ..There is no trafic to static routes.

      Best regards
      bravo prochu

      ![PFSense network.jpg](/public/imported_attachments/1/PFSense network.jpg)
      ![PFSense network.jpg_thumb](/public/imported_attachments/1/PFSense network.jpg_thumb)

      1 Reply Last reply Reply Quote 0
      • Z
        ziconick
        last edited by

        I have the same problem, have you solved it?

        1 Reply Last reply Reply Quote 0
        • B
          bravo_prochu
          last edited by

          No, i did not;

          Still searching…
          I guess it's impossible on pfsense;

          Right now i'm considering changing my whole networ into bridge and vlans ...or drop pfsense.

          1 Reply Last reply Reply Quote 0
          • R
            Reiner030
            last edited by

            @bravo_prochu:

            No, i did not;

            Still searching…
            I guess it's impossible on pfsense;

            Right now i'm considering changing my whole networ into bridge and vlans ...or drop pfsense.

            mmh… do you both used the search function of this board with the right keywords? ;)  just ready some posts "before"

            @Nachtfalke:

            So if you put all your 4 WAN connections into a group and all gateways have the same Tier then these do loadbalancing and if one GW hoes down the other 3 WAN connectiongs do loadbalancing.

            If you use "Sticky connections" on SYSTEM –> ADVANCED then this one group will be enough.
            If you do not use sticky connections you should create another group which will handly traffic for https and other secure protocols because https and other secure connections do not like loadbalancing because the IP switches.

            I guess that your routing problems comes also from non-sticky loadbalancing connections…

            BTW: if you want monitor your sub-networks there was found a "fix" for it:
            http://forum.pfsense.org/index.php/topic,69443.0.html

            Bests

            1 Reply Last reply Reply Quote 0
            • B
              basitkhan
              last edited by

              I have something similar configuration  but i have layer3 switch instead of your routers and pfsense is working as gateway with 5 wans,
              each and everything is going fine.

              In interfaces LAN, do not select any gateway just leave it blank.
              hope this will fix your problem!

              1 Reply Last reply Reply Quote 0
              • H
                heper
                last edited by

                why do you have 2 pfsense machines in the first place ? unless i'm missing something (i generally do), i don't see any reason for that pfsense between the ppoe-pfsense and the lans ?

                After closer inspection i concluded i have no clue what you are trying to accomplish by putting 2 routers behind each other, and then using 4 additional routers lateral of each other, pointing to the X.X.10.X gateway (router2).

                So i'm fairly confident it is possible to make it work somehow … we probably need more info to sort out what goes wrong.
                If it works for 1 WAN, but does not for 2 WANs then you should probably look at a NAT issue. => disable automatic NAT (AON)
                and create your own nat rules as needed.

                1 Reply Last reply Reply Quote 0
                • B
                  bravo_prochu
                  last edited by

                  Hello

                  That is how my network works. I use routers (with disabled nat function) and pfSense works as a 'NAT serwer' (in a future dhcp serwer too)
                  Everything works great when I use only one (default gateway);

                  To make it multiWAN works I need to specify default gateway in firewall rules and thats the problem, because when I point 'mulitWAN' gateway - there are no traffic (out) from static routes. [with static routes - there are mulit LAN gateways]

                  Disabling AON, to do what ?

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    "At pfSense I added a gateway (192.168.0.2/24) and traffic between networks and pfSense works great when I use only one WAN int."

                    Why would you set a gateway, that is not a WAN interface its a LAN interface - you would not set a gateway, you would only setup routes.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • B
                      bravo_prochu
                      last edited by

                      Did You ever try to set up static routes on pfsense ?

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        Have I?  Yes quite simple. You don't set gateways on LAN interfaces.

                        If you would use a non 192.168 range between pfsense and your first router pfsense route table would be quite simple with one entry for 192.168.0.0/16

                        Its seems you have a cluster of a setup there that seems way more complicated than it needs to be.

                        LAN rules looks like this for every single IP of my whole networks ie: (i use aliases)

                        • | 192.168.32.115/24 | port: * | dest: * | gateway: DEFAULT [use in/out for that IP]
                        • | 192.168.40.235/24 | port: * | dest: * | gateway: DEFAULT [use in/out for that IP]
                        • | 192.168.50.25/24 | port: * | dest: * | gateway: DEFAULT [use in/out for that IP]
                        • | 192.168.10.95/24 | port: * | dest: * | gateway: DEFAULT [use in/out for that IP]

                        What???  Every single IP has its own entry - WTF were you thinking?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • B
                          bravo_prochu
                          last edited by

                          Every single IP has its own rule entry, because I want to control bandwidth of every single alias-ip;
                          I use limiters - for every IP - as many limiters as aliases (ip)

                          How can I set static routes to routers without seting up geteways ?
                          (i need a remote connection to devices behind those routers)

                          I'm newbie so if You can, please, share an idea how to do it different way..

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            "How can I set static routes to routers without seting up geteways ?
                            (i need a remote connection to devices behind those routers)"

                            Yeah you set the routes here - see attached.  And yes in the routes you pick a gateway.. But you do not apply that gateway to your lan interface.  If you apply the gateway to the interface directly then pfsense thinks thats a wan interface.

                            routespfsense.png
                            routespfsense.png_thumb

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • B
                              bravo_prochu
                              last edited by

                              I still don't understand: 'But you do not apply that gateway to your lan interface' ?
                              First i needed to setup lan gateway (see attached - staticRoutes02) to pick it up to the destinated network (see attached - staticRoutes01)

                              staticRoutes01.jpg
                              staticRoutes01.jpg_thumb
                              staticRoutes02.jpg
                              staticRoutes02.jpg_thumb

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                But is that applied to your interface?

                                Look - here is dummy gateway I created for network 10.0.0.0/24 – it uses my DMZ interface.. But notice on the actual dmz interface there is NO gateway set!!

                                routestatic.png
                                routestatic.png_thumb
                                interfracedmz.png
                                interfracedmz.png_thumb

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • B
                                  bravo_prochu
                                  last edited by

                                  Gateway is on my LAN interface… so there is no 'gateway' for LAN int..

                                  What does it change ? Because I still don't get it..

                                  I would like to use multiwan tutorial, so when I specify default gateway in rules ('multiWAN' = PPPoE1 [tier1] and PPPoE2 [tier1]) there is no traffic to routers..
                                  (on attachement i don't  have created multiWan gateway yet but i already tried it)

                                  staticRoutes03.jpg
                                  staticRoutes03.jpg_thumb

                                  1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator
                                    last edited by

                                    "What does it change ? Because I still don't get it.."

                                    If there is a gateway on the interface - pfsense thinks its a WAN, and will auto nat it for starters.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      bravo_prochu
                                      last edited by

                                      There is no gateway on LAN interface, but still when I change default gateway on FIREWALL-RULES-LAN…alias..- gateway to multiWAN instead of default - there are no traffic

                                      staticRoutes04.jpg
                                      staticRoutes04.jpg_thumb

                                      1 Reply Last reply Reply Quote 0
                                      • P
                                        phil.davis
                                        last edited by

                                        Not sure where you are up to, but here are the general principles when you have some internal networks and multi-WAN with gateway groups…

                                        1. Define a gateway for each other internal router (gateway) that leads to an internal network that is NOT directly connected to pfSense.
                                        2. Define a static route to each of these internal networks pointing to the correct internal gateway.
                                        3. Add gateway group(s) that group together your real public WANs in whatever tiers you wish.
                                        4. First add rules on LAN to pass traffic to the the internal networks - without specifying any gateway in the rules - the packets will be passed to the ordinary routing table and the static route/s you defined will get them to their destination.
                                        5. If you have VPN site-to-site links to other offices, these also need to use the ordinary routing table - put pass rules for traffic to subnets that are across the VPN, and let the ordinary routing table and VPN software deal with it.
                                        6. Further down in the LAN rule list, put rules that send traffic to particular gateway groups (e.g. near or at the end you might commonly have a rule that passes all protocols source LANnet destination any gateway LoadBalanceGWG - to load balance everything that did not match any previous special rule)
                                          Some screen shots attached of one of my setups, with a test Firebox internally that goes to various test subnets in 10.99.0.0/16. The LAN rule passing INF_Subnets to INF_Subnets matches this Firebox traffic (among other stuff). INF_Subnets is an alias that contains all my internal subnets, local to pfSense, at the same office and across VPNs at other offices. This makes it easy to write 1 pass rule that lets all this internal private traffic pass through to the ordinary routing table, before any rules that pump traffic into a gateway or gateway group.

                                        Gateways.png
                                        Gateways.png_thumb
                                        Static-Route.png
                                        Static-Route.png_thumb
                                        GWGroups.png
                                        GWGroups.png_thumb
                                        LAN-Rules.png
                                        LAN-Rules.png_thumb

                                        As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                        If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator
                                          last edited by

                                          ^exactly – needs to be turned into a doc..  If I find time tmrw at work (its been slow normally as we get closer to holidays) I will do just that ;)

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          1 Reply Last reply Reply Quote 0
                                          • B
                                            bravo_prochu
                                            last edited by

                                            Thanks for Your answers Guys !

                                            Still have some questions
                                            I use limitters for every aliases (clients) (att.  staticRoutes06) on my network; My LAN rules looks like (att.  staticRoutes05)
                                            Instead of 'Private_devices' (block private devices to outside DNSserver) can I use all local subnets ??
                                            Do 'Inf_Subnets' have LAN subnet included ? (pfsense box IP) ?

                                            Can You help me with this ?

                                            How to drop any other stations to the Internet (but aliases..) and still have local connections to the lan routers/Access points using multiWAN..

                                            Can You point me a basic firewall isolation for that kind of policy ?

                                            staticRoutes05.jpg
                                            staticRoutes05.jpg_thumb
                                            staticRoutes06.jpg
                                            staticRoutes06.jpg_thumb

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.