• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

How to setup an interface-specific default gateway?

Scheduled Pinned Locked Moved Routing and Multi WAN
2 Posts 2 Posters 1.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N
    networknotwork
    last edited by networknotwork May 25, 2023, 8:02 PM May 25, 2023, 7:51 PM

    I have two LAN interfaces, 192.168.2.1 and .31.1 on my pfSense VM, with VLAN ID 2 and 31, and two WAN interfaces, my ISP and an OpenVPN client.

    I've set the allow any firewall rule on the .31 interface to use the OpenVPN interface as the gateway and it works as expected, whatismyip.com shows the VPN IP address for clients on the .31 subnet, however traffic originating from the pfSense box itself on .31.1 goes out over the WAN interface, like it's bypassing the firewall rule.

    How do I redirect this traffic to the OpenVPN interface?

    In other words, the OpenVPN interface address should be the default gateway for the .31 interface. I can't use the push routes option in the OpenVPN client settings because I don't want all traffic going out over the VPN, only the .31 subnet.

    I found this out when I setup a SOCKS5 proxy that listens on 192.168.2.1:1080 with egress IP 192.168.31.1 and the proxied traffic goes out over my WAN, not my VPN. When I set the egress IP to the OpenVPN interface IP, it works as intended.

    V 1 Reply Last reply May 25, 2023, 8:20 PM Reply Quote 0
    • V
      viragomann @networknotwork
      last edited by May 25, 2023, 8:20 PM

      @networknotwork
      The route of packets from pfSense itself follows only the default gateway setting. It doesn't obey any policy routing rule you've added to an interface, even if you use its IP as source, since this rule is only applied to incoming packets on that interface.

      So you would have to set the VPN gateway as default.
      Since this is not available before the VPN is established, create a gateway failover group and add the VPN as tier 1 and WAN as tier 2. Then set this as default.

      To avoid that the VPN is used by the other LAN as well, you'll have to policy route its incoming traffic to the WAN gateway then.

      1 Reply Last reply Reply Quote 0
      • M mik256 referenced this topic on Dec 16, 2024, 3:46 PM
      2 out of 2
      • First post
        2/2
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
        This community forum collects and processes your personal information.
        consent.not_received