Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    2 ADSL PPPoE lines… what's the best way to setup multi WAN?

    Routing and Multi WAN
    4
    7
    10428
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      ElectricDreams last edited by

      I have 2 ADSL PPPoE lines: 8000/600 and 2000/300. What are the steps to setup multi WAN in the good way?

      I previously used a wiki but didn't work (I know I'm a bit silly, hehe). Please, be sensible.

      Many thanks!!!

      1 Reply Last reply Reply Quote 0
      • C
        cmb last edited by

        Only one WAN connection can be PPPoE at this time.  Static IP and DHCP connections are both supported as an extra WAN interface.  This will not change in 1.0, but may in future versions.

        1 Reply Last reply Reply Quote 0
        • H
          hoba last edited by

          What exactly are you trying to do with the multiwan? Do you just want to divide different types of traffics? Or are you planning to loadbalance the both WANs?

          pfSense supports only one PPPoE-WAN at the moment. This means you need a PPPoE-Modem-Router in front of your OPT-WAN that can be used as static gateway. Most PPPoE-Modems nowadays can be set to routermode instead of bridgemode as well. Forward everything from the modemrouter to your pfsense or enter the pfsense as DMZ-IP if this is an option in the modemrouter. The modemrouter then will do the dialin.

          If you got both your WANs working this way you can create Rules at "Firewall>NAT Outbound-tab" and "Firewall>Rules LAN-tab" (look at the gateway-field at the bottom of the rules) to specify what traffic should go out which WAN.

          If you are planning to do loadbalancing you need 2 modemrouters to be used with each of your WANs. pfSense needs static gateways to be able to loadbalance. Additionally to what we did above you need to create a Gateway-Pool at "Services>Loadbalancer". Put in both your modemrouters as gateways. For monitoring IPs enter a high availability IP somewhere near you (maybe your ISP-Gateway). Monitoring isn't implemented yet but after it gets implemented it will monitor the connection for availability and exclude a WAN temporarily from the pool on nonavailability.

          Loadbalancing in pfsense works roundrobin new connections (old open connections will remain on the same WAN they were initiated -> "sticky states"). It won't reflect different WAN-Bandwidth like you have.

          Finally there are 2 resources additionally describing the needed steps:
          http://wiki.pfsense.com/wikka.php?wakka=OutgoingLoadBalancing
          and
          http://pfsense.blogspot.com/2005/06/multi-wan.html

          Holger

          1 Reply Last reply Reply Quote 0
          • R
            RoboK last edited by

            @hoba:

            What exactly are you trying to do with the multiwan? Do you just want to divide different types of traffics? Or are you planning to loadbalance the both WANs?

            pfSense supports only one PPPoE-WAN at the moment. This means you need a PPPoE-Modem-Router in front of your OPT-WAN that can be used as static gateway. Most PPPoE-Modems nowadays can be set to routermode instead of bridgemode as well. Forward everything from the modemrouter to your pfsense or enter the pfsense as DMZ-IP if this is an option in the modemrouter. The modemrouter then will do the dialin.

            If you got both your WANs working this way you can create Rules at "Firewall>NAT Outbound-tab" and "Firewall>Rules LAN-tab" (look at the gateway-field at the bottom of the rules) to specify what traffic should go out which WAN.

            If you are planning to do loadbalancing you need 2 modemrouters to be used with each of your WANs. pfSense needs static gateways to be able to loadbalance. Additionally to what we did above you need to create a Gateway-Pool at "Services>Loadbalancer". Put in both your modemrouters as gateways. For monitoring IPs enter a high availability IP somewhere near you (maybe your ISP-Gateway). Monitoring isn't implemented yet but after it gets implemented it will monitor the connection for availability and exclude a WAN temporarily from the pool on nonavailability.

            Loadbalancing in pfsense works roundrobin new connections (old open connections will remain on the same WAN they were initiated -> "sticky states"). It won't reflect different WAN-Bandwidth like you have.

            Finally there are 2 resources additionally describing the needed steps:
            http://wiki.pfsense.com/wikka.php?wakka=OutgoingLoadBalancing
            and
            http://pfsense.blogspot.com/2005/06/multi-wan.html

            Holger

            Would you happen to be able to provide some screenshots of the relevant Loadbalancer, NAT and Rules pages?
            Thanx.

            1 Reply Last reply Reply Quote 0
            • H
              hoba last edited by

              …it's time to do a tutorial for this I guess...volunteers? I have set this up with several people already at irc. nobody who wants to do it?  ;)

              1 Reply Last reply Reply Quote 0
              • R
                RoboK last edited by

                @hoba:

                …it's time to do a tutorial for this I guess...volunteers? I have set this up with several people already at irc. nobody who wants to do it?  ;)

                Hi,
                is enough to make LoadBalancing work /using round robin function/, configure only  >Services>LoadBalancer?

                1 Reply Last reply Reply Quote 0
                • H
                  hoba last edited by

                  sure, just a basic setup wiht some introduction what is needed, maybe a small visio drawing.  :)

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post

                  Products

                  • Platform Overview
                  • TNSR
                  • pfSense Plus
                  • Appliances

                  Services

                  • Training
                  • Professional Services

                  Support

                  • Subscription Plans
                  • Contact Support
                  • Product Lifecycle
                  • Documentation

                  News

                  • Media Coverage
                  • Press
                  • Events

                  Resources

                  • Blog
                  • FAQ
                  • Find a Partner
                  • Resource Library
                  • Security Information

                  Company

                  • About Us
                  • Careers
                  • Partners
                  • Contact Us
                  • Legal
                  Our Mission

                  We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

                  Subscribe to our Newsletter

                  Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

                  © 2021 Rubicon Communications, LLC | Privacy Policy