Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Dual WAN Setup on XG-7100

    Official Netgate® Hardware
    10
    36
    5.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      ragnarXYZ
      last edited by

      Hello all. I am attempting to setup my XG-7100 for load balancing. I want ETH1 to be WAN A and ETH2 to be WAN B. I have ETH1 setup, that's easy. However, ETH2, I have no clue how to set it up. Right now, I have the default VLANs 4090 and 4091 (ETH2 is in 4091). I had assumed I could remove ETH2 and then go to Interface Assignments and add ETH2 that way and then setup the gateway group, however, I was incorrect. I'm at a loss here, any help would be appreciated. Thank you.

      1x SG-2220 2.4.3-RELEASE (test)
      1x XG-7100 2.4.3-RELEASE (home)

      W 1 Reply Last reply Reply Quote 0
      • N
        naalpv
        last edited by

        Hello,
        I also encountered this problem but I succed to set up the Dual WAN.
        Here (http://naalpv.tk/memo/2018/08/24/pfsense-configuration-dual-wan-avec-xg-7100/) you will find the configuration steps I made.
        Thank you.

        W S 2 Replies Last reply Reply Quote 1
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          Check out https://www.youtube.com/watch?v=NgRy14rYhV8 -- Last month for the hangout I walked through how to configure the switch for separate ports like you're after.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          R 1 Reply Last reply Reply Quote 2
          • R
            ragnarXYZ @jimp
            last edited by

            @jimp this was perfect, thank you!

            1x SG-2220 2.4.3-RELEASE (test)
            1x XG-7100 2.4.3-RELEASE (home)

            B 1 Reply Last reply Reply Quote 0
            • B
              bartekmao @ragnarXYZ
              last edited by

              @ragnarxyz could you give your insight on how you have accomplished to have the second wan up and working?

              1 Reply Last reply Reply Quote 0
              • RicoR
                Rico LAYER 8 Rebel Alliance
                last edited by Rico

                You need to separate your switch Port(s) first: https://www.netgate.com/resources/videos/configuring-netgate-appliance-integrated-switches-on-pfsense-244.html

                After that it is the default pfSense MultiWAN Configuration:
                https://www.netgate.com/docs/pfsense/routing/multi-wan.html
                https://www.netgate.com/docs/pfsense/book/multiwan/index.html
                https://www.netgate.com/resources/videos/multi-wan-on-pfsense-23.html

                -Rico

                B 1 Reply Last reply Reply Quote 0
                • B
                  bartekmao @Rico
                  last edited by

                  @rico thanks a lot!

                  1 Reply Last reply Reply Quote 0
                  • W
                    wintok
                    last edited by

                    I have the same problem as well. I tried dual wan being wan (default 4090) as the first wan connection, and for the second wan I created another vlan 4092 and assigned port members 2,9t,10t, and removed port 2 from vlan 4091.
                    Then enabled the interface , setup rules, add gateway groups. and it did not work. The second wan connection is offline ..not sure why ... see my configs below

                    1.PNG

                    2.PNG

                    3.PNG

                    4.PNG

                    5.PNG

                    any suggestions ?

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by stephenw10

                      What we can see looks correct. We don't see the vlan 4092 interface setup.

                      The gateway IP (which looks like a private IP that doesn't need to be obscured) might not respond to pings. Can you ping out to some public IP choosing that WAN as source?

                      Steve

                      W 1 Reply Last reply Reply Quote 0
                      • W
                        wintok @stephenw10
                        last edited by

                        Thanks stephew10 for your reply. Now that I manually set it the Monitro IP for second wan connection (ocean link) the status is still offline while RTT, RTTsd , and Loss values some activities going on.

                        6.PNG

                        For the second WAN connection my ISP has assigned me private , and I already made request for my truly public IP.

                        So having the true public will solve the issue ?

                        1 Reply Last reply Reply Quote 0
                        • RicoR
                          Rico LAYER 8 Rebel Alliance
                          last edited by

                          Show your WAN Interface configuration via screenshots.

                          -Rico

                          W 1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            What is the Oceanlink WAN, what tyep of connection. You are showing zero packet loss but 650ms lattency.

                            If it's some sort of wireless link you might just need to tune the monitoring parameters to match it.

                            Steve

                            W 1 Reply Last reply Reply Quote 0
                            • W
                              wintok @stephenw10
                              last edited by

                              It is a wireless link to our ISP here , about 100 meters away from our office. I think there is another issue , ISP block ICMP protocol , and the ping to the oceanlink gateway blocked , and I asked them last yesterday to allow ping and they did. I checked this morning in pfsense Status->Gateways and there were both online. The 650 ms latency is our normal internet speed from both ISPs here, very slow but we have no choice.

                              Now that both gateways are online I tested to see if load balance worked by disabling the other gateway (ATHKL) and it did'n work. There are no internet at all. Pfsense did realize that one gateway has gone and jumped to Oceanlink but no internet access.

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                If 650ms is normal for that link then tune the latency values for dpinger by editing the gateway. That way it will only throw an alarm if latency rises unexpectedly high.

                                How are you using the load-balance gateway? Let's see the rules where that is set.

                                Steve

                                W 1 Reply Last reply Reply Quote 0
                                • W
                                  wintok @stephenw10
                                  last edited by

                                  I use load balance
                                  Floating rules below
                                  7.PNG
                                  Gateway status
                                  8.PNG

                                  1 Reply Last reply Reply Quote 0
                                  • W
                                    wintok @naalpv
                                    last edited by

                                    Hi naalpv

                                    The link did not work. I wonder how you actually did it. Can you fix the link so we can see what configurations you made

                                    1 Reply Last reply Reply Quote 0
                                    • W
                                      wintok @Rico
                                      last edited by

                                      First Wan connection configurations (default 4090)
                                      9.PNG
                                      10.PNG

                                      Second WAN connection
                                      11.PNG
                                      12.PNG

                                      1 Reply Last reply Reply Quote 1
                                      • stephenw10S
                                        stephenw10 Netgate Administrator
                                        last edited by

                                        What it that floating rule applied to?

                                        W 1 Reply Last reply Reply Quote 0
                                        • W
                                          wintok @stephenw10
                                          last edited by

                                          floating rules applies to Lan + other vlans created. Beside the floating rules I also set each vlans to use groupgateway instead of the default.

                                          see below for one of the vlans I created
                                          13.PNG

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            Hmm, that floating rule cannot be applied correctly. There are no states and no traffic recorded against it. Instead evetything is hitting the rule on the interface.
                                            However that should work for load-balancing as long as clients are using some DNS server other than Unbound in pfSense.

                                            Does it load-balance correct when both WANs are up?

                                            Steve

                                            W 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.