Netgate SG-2100 pfSense 32GB Router & Firewall and a Sercomm Model: LTE2122GR router
-
Thanks for the info Steve, much appreciated. I will read up more on what you have said. Could you point me in the right direction of the best guide to configure pfSense or area on here for someone new to this?
-
Aside from changing the subnet to avoid a conflict it should 'just work' using the default config. I'd recommend running it in a basic config like that for a while before adding anything more complex.
Asking questions here is as good a place an any though.
-
Hi Steve. So I have the SG-2100 reset and I was thinking of changing the subnet to a 10.0.0.0 config but I would like to install surfshark VPN in the pfSense so perhaps it would be better to do that first as it may need a specific type of subnet for the LAN? Also Will it be possible for me to still gain access to administer the router and repeaters on the 192.168.1.x WAN subnet while connected to the SG-2100 or would I have to plug in directly to do that?
Thanks again for your help, much appreciated.
-
The LAN subnet you choose would have to not conflict with an OpenVPN tunnel subnet but that's unlikely. There are a lot to choose from in the 10.0.0.0/8 address space. Try 10.100.1.1/24 as LAN
Yes you will still be able to reach the management interfaces of other devices in the 192.168.1.0/24 subnet from the pfSense LAN.
-
Hi Steve. So I have the SG-2100 installed with the latest pfsense. I set up the LAN network as suggested. I had a problem accessing web pages so thought to manually configure the DNS in the router and that has done the trick. If fact web pages seem to be much more responsive which is great. Now to look into the VPN.
This seems to be a powerful little box that can do lots of different things. I used my own domain when doing the basic instal does that mean you could actually host a webpage or is it just a domain name for the local network?
Thanks again.
-
It's just for the local network. You can't host web servers in pfSense itself.
Steve
-
Hi Steve. I was checking is Disk Management and in the pfSense dashboard and I'm not sure if the full 32GB is being used correctly.....
-
You probably have some space used by ZFS Boot Environment snapshots. Check System > Boot Environments
-
There are few entries in there but only one of any size is "default" Base version: 23.09 / Space: 3.31G
Would it be worth restoring via a recovery image or do you think this is normal? I thought there would have been more space available on the 32GB.
Thanks.
-
The size shown there is not the size used on disk by the snap. It's an issue without an easy fix but we are looking at it.
Remove any snaps you don't need there and see how it affects the available disk space. -
Hi Steve.
I have a Surfshark VPN account. I'm wondering if the VPNs available within pfSense are free or do I need my Surfshark account to be used by one of the options (pictured) within pfSense?
I'm a bit confused. I'd like to be able to have a VPN running within pfSense so that I don't have to turn on and off in my PC all the time.
Also when I do eventually have a VPN set up in pfSense, I take it you can turn on and off from within pfSense in the same way you can locally?
Thanks.
-
The VPNs listed in pfSense are just types of VPN. You still need to configure a server for it to connect to. That could be Surfshark and you would need an account with them to get a login.
-
Hi Steve, Surfshark will allow me to set up the VPN using either WireGuard, OpenVPN or IKEv2. It seems that OpenVPN is the preferred. Would you agree?
Also could you recommend a pfSense+ VPN configuration guide? I'm having a bit of trouble finding a basic walkthrough.
I found this one specifically from Surfshark which seems like the right thing to do but some of the options mentioned within are not available in my pfsense+ :
"Then navigate to System > Cert. Manager > CAs." - does this mean System\Certificates\Certificates ?
https://support.surfshark.com/hc/en-us/articles/360010789259-How-to-set-up-pfSense-2-4-4-with-Surfshark
Thanks.
-
OpenVPN is the most tested and most flexible.
No that line is for adding the Surfshark CA cert. You'd have to add it using the CA tab there so System > Certificates > Authorities.
-
That's working.
I was wondering: can I have multiple clients setup for different server locations and if so is there a quick way to change between them or is the easiest thing to just open up the existing client and add a different Server host or address as this would be the only information that would be changing in the config (as far as I can remember)?
Thanks for your help again Steve.
-
Yes you can as long as the clients use different tunnel subnets and gateway IPs. That can be a problem with some VPN providers.
-
"different tunnel subnets"
Each Surfshark server location is on a different subnet, at least they all start with a different three digit prefix in their addresses - is that what you mean?
My current config does not actually use a specific IP but rather the host name specific to the server region I am connecting to.
You can chose to use a specific IP from their servers rather than using the host name but as each location that I will be connecting to has it's own subnet (I think) I am assuming sticking to hostnames instead of IPs will be okay for configuring multiple VPN interfaces within pfSense?
When you say gateway are you referring to:
When I set up the "description" in: Interfaces > Interface Assignments and add Surfshark VPN interface.
Are you saying that I should create a different "description" for each VPN connection so that each IPv4 rule (within: Firewall > Rules > LAN) can choose a different "Gateway" that relates to the specific VPN interface selected/server location configured above?
I read a post saying:
"One simple way I've done it is with firewall rules. So if I had 4 VPN servers configured, I'd have 4 rules for my interface. 3 rules stay disabled, 1 rule stays enabled. The enabled rule is the VPN Server I route traffic to. The gateway for each rule is set to a different VPN server location.
If I want to hop servers, I just disable the current rule and enable the rule to the new gateway."
-
I mean when you connect to a VPN server the client get's an IP address in the private tunnel subnet and passed a gateway IP in the subnet to route traffic to. So that could before example:
IP 10.10.0.47/24 with a gateway at 10.10.0.1If a VPN provider uses that same subnet for all of it's servers (which some do) then pfSense can only connect to one at a time otherwise there's a conflict.
-
I've got multiple locations up and running. Thanks again.
One question - under:
Services / DNS Resolver / General Settings - Once a new VPN client/connection is enabled - the VPN under: "Outgoing Network Interfaces" auto updates .
I take it as long as the correct VPN is available here you don't need to highlight it and save this page? It just needs to be listed here for the VPN to connect correctly?
-
If you set anything there then it will only use those that are selected. If nothing is set it will use any available interface, normally the default route.