Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Netgate SG-2100 pfSense 32GB Router & Firewall and a Sercomm Model: LTE2122GR router

    Scheduled Pinned Locked Moved General pfSense Questions
    28 Posts 2 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      It depends exactly what those devices are doing currently.

      Which of them is NATing? What subnets are in use?

      I assume there is some physical separation between the router and your house? Because the 4G router need to be placed for better signal?

      Potentially the 2100 could be at either side.

      Steve

      U 1 Reply Last reply Reply Quote 0
      • U
        Unusual Systems @stephenw10
        last edited by

        @stephenw10

        Thanks for your reply Steve. Currently, without the SG-2100 installed, the router is assigning IP addresses. I'm not sure about subnets, I just have them set to the usual 255.255.255.0, perhaps that's not what you mean...

        Good point about having the SG-2100 pfSense network connected after the receiving Ubiquiti NanoStation M5 in the house. That would keep the existing WAN setup coming in which would simplify things.

        Yes the router is connected to an antenna in the garage (I am in the countryside).

        So if I try this all I should have to do is configure pfSense. Does it matter how I have the WAN configured or is the standard IP setup okay?

        Thanks for your help.

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Ok so it sounds like there is only one subnet in use if host devices in the house get their IP addresses directly from the 4G router.

          That implies the wireless link is purely layer 2, it just passes the traffic?

          Ideally you want only one NAT translation so only one private subnet in use. So with two routers in the chain you would want to put one of them in bridge mode of some sort. That may not be possible. And your 4G carrier may be using CG-NAT anyway. But however it's configured you need to avoid a subnet conflict. pfSense uses 192.168.1.X/24 by default, if the 4G router is also using that subnet on its LAN then one of them must be changed.

          U 1 Reply Last reply Reply Quote 0
          • U
            Unusual Systems @stephenw10
            last edited by

            @stephenw10

            Thanks for the info Steve, much appreciated. I will read up more on what you have said. Could you point me in the right direction of the best guide to configure pfSense or area on here for someone new to this?

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Aside from changing the subnet to avoid a conflict it should 'just work' using the default config. I'd recommend running it in a basic config like that for a while before adding anything more complex.

              Asking questions here is as good a place an any though.

              U 1 Reply Last reply Reply Quote 0
              • U
                Unusual Systems @stephenw10
                last edited by

                @stephenw10

                Hi Steve. So I have the SG-2100 reset and I was thinking of changing the subnet to a 10.0.0.0 config but I would like to install surfshark VPN in the pfSense so perhaps it would be better to do that first as it may need a specific type of subnet for the LAN? Also Will it be possible for me to still gain access to administer the router and repeaters on the 192.168.1.x WAN subnet while connected to the SG-2100 or would I have to plug in directly to do that?

                Thanks again for your help, much appreciated.

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  The LAN subnet you choose would have to not conflict with an OpenVPN tunnel subnet but that's unlikely. There are a lot to choose from in the 10.0.0.0/8 address space. Try 10.100.1.1/24 as LAN

                  Yes you will still be able to reach the management interfaces of other devices in the 192.168.1.0/24 subnet from the pfSense LAN.

                  U 1 Reply Last reply Reply Quote 1
                  • U
                    Unusual Systems @stephenw10
                    last edited by

                    @stephenw10

                    Hi Steve. So I have the SG-2100 installed with the latest pfsense. I set up the LAN network as suggested. I had a problem accessing web pages so thought to manually configure the DNS in the router and that has done the trick. If fact web pages seem to be much more responsive which is great. Now to look into the VPN.

                    This seems to be a powerful little box that can do lots of different things. I used my own domain when doing the basic instal does that mean you could actually host a webpage or is it just a domain name for the local network?

                    Thanks again.

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      It's just for the local network. You can't host web servers in pfSense itself.

                      Steve

                      U 1 Reply Last reply Reply Quote 1
                      • U
                        Unusual Systems @stephenw10
                        last edited by

                        @stephenw10

                        Hi Steve. I was checking is Disk Management and in the pfSense dashboard and I'm not sure if the full 32GB is being used correctly.....

                        SG-2100 pfSense Disk Management 01.png

                        SG-2100 pfSense Disks Dashboard 001.png

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          You probably have some space used by ZFS Boot Environment snapshots. Check System > Boot Environments

                          U 1 Reply Last reply Reply Quote 0
                          • U
                            Unusual Systems @stephenw10
                            last edited by

                            @stephenw10

                            There are few entries in there but only one of any size is "default" Base version: 23.09 / Space: 3.31G

                            Would it be worth restoring via a recovery image or do you think this is normal? I thought there would have been more space available on the 32GB.

                            Thanks.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              The size shown there is not the size used on disk by the snap. It's an issue without an easy fix but we are looking at it.
                              Remove any snaps you don't need there and see how it affects the available disk space.

                              U 1 Reply Last reply Reply Quote 1
                              • U
                                Unusual Systems @stephenw10
                                last edited by

                                @stephenw10

                                Hi Steve.

                                I have a Surfshark VPN account. I'm wondering if the VPNs available within pfSense are free or do I need my Surfshark account to be used by one of the options (pictured) within pfSense?

                                pfSense VPN 001.png

                                I'm a bit confused. I'd like to be able to have a VPN running within pfSense so that I don't have to turn on and off in my PC all the time.

                                Also when I do eventually have a VPN set up in pfSense, I take it you can turn on and off from within pfSense in the same way you can locally?

                                Thanks.

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  The VPNs listed in pfSense are just types of VPN. You still need to configure a server for it to connect to. That could be Surfshark and you would need an account with them to get a login.

                                  U 1 Reply Last reply Reply Quote 1
                                  • U
                                    Unusual Systems @stephenw10
                                    last edited by

                                    @stephenw10

                                    Hi Steve, Surfshark will allow me to set up the VPN using either WireGuard, OpenVPN or IKEv2. It seems that OpenVPN is the preferred. Would you agree?

                                    Also could you recommend a pfSense+ VPN configuration guide? I'm having a bit of trouble finding a basic walkthrough.

                                    I found this one specifically from Surfshark which seems like the right thing to do but some of the options mentioned within are not available in my pfsense+ :

                                    "Then navigate to System > Cert. Manager > CAs." - does this mean System\Certificates\Certificates ?

                                    https://support.surfshark.com/hc/en-us/articles/360010789259-How-to-set-up-pfSense-2-4-4-with-Surfshark

                                    Thanks.

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      OpenVPN is the most tested and most flexible.

                                      No that line is for adding the Surfshark CA cert. You'd have to add it using the CA tab there so System > Certificates > Authorities.

                                      U 1 Reply Last reply Reply Quote 1
                                      • U
                                        Unusual Systems @stephenw10
                                        last edited by

                                        @stephenw10

                                        That's working.

                                        I was wondering: can I have multiple clients setup for different server locations and if so is there a quick way to change between them or is the easiest thing to just open up the existing client and add a different Server host or address as this would be the only information that would be changing in the config (as far as I can remember)?

                                        Thanks for your help again Steve.

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Yes you can as long as the clients use different tunnel subnets and gateway IPs. That can be a problem with some VPN providers.

                                          U 1 Reply Last reply Reply Quote 0
                                          • U
                                            Unusual Systems @stephenw10
                                            last edited by

                                            @stephenw10

                                            "different tunnel subnets"

                                            Each Surfshark server location is on a different subnet, at least they all start with a different three digit prefix in their addresses - is that what you mean?

                                            My current config does not actually use a specific IP but rather the host name specific to the server region I am connecting to.

                                            You can chose to use a specific IP from their servers rather than using the host name but as each location that I will be connecting to has it's own subnet (I think) I am assuming sticking to hostnames instead of IPs will be okay for configuring multiple VPN interfaces within pfSense?

                                            When you say gateway are you referring to:

                                            When I set up the "description" in: Interfaces > Interface Assignments and add Surfshark VPN interface.

                                            Are you saying that I should create a different "description" for each VPN connection so that each IPv4 rule (within: Firewall > Rules > LAN) can choose a different "Gateway" that relates to the specific VPN interface selected/server location configured above?

                                            I read a post saying:

                                            "One simple way I've done it is with firewall rules. So if I had 4 VPN servers configured, I'd have 4 rules for my interface. 3 rules stay disabled, 1 rule stays enabled. The enabled rule is the VPN Server I route traffic to. The gateway for each rule is set to a different VPN server location.

                                            If I want to hop servers, I just disable the current rule and enable the rule to the new gateway."

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.