Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Removal of LAGG

    Scheduled Pinned Locked Moved General pfSense Questions
    41 Posts 3 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      stevencavanagh @johnpoz
      last edited by

      @johnpoz

      Sort out get it, so this mean I have an issue in the outbound nat?

      S 1 Reply Last reply Reply Quote 0
      • S
        stevencavanagh @stevencavanagh
        last edited by

        Cant see anything wrong in NAT

        S 1 Reply Last reply Reply Quote 0
        • S
          stevencavanagh @stevencavanagh
          last edited by

          f9314b6a-bc3d-47cd-82ac-86e430b8500d-image.png

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @stevencavanagh
            last edited by

            @stevencavanagh well its not going to work if you don't nat..

            Here I just setup a policy route. To route traffic out a vpn client I have for testing.. You can see its natted to the vpn IP.

            vpn.jpg

            Without a full picture there is no way to know what you have missing.. What is the rest of the nat outbound rules.. What are the rules on the interface client is hitting.

            But if your vpn client sends on the traffic with a source of 192.168.0.100 your vpn service isn't going to do anything with it.. So yeah no response.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            S 1 Reply Last reply Reply Quote 0
            • S
              stevencavanagh @johnpoz
              last edited by

              @johnpoz

              What I cannot get my head around is that same NAT rules work fine on old interface but not on new. I cannot find anywhere in pfsense where the interface is used except LAGG and assignments.

              S 1 Reply Last reply Reply Quote 0
              • S
                stevencavanagh @stevencavanagh
                last edited by

                LAN interface rules

                af6bfa5e-4546-4eeb-9791-1a828f0fdb01-image.png

                75338859-98ff-4eee-b667-313034f0d31f-image.png

                S 1 Reply Last reply Reply Quote 0
                • S
                  stevencavanagh @stevencavanagh
                  last edited by

                  Outbound NAT

                  6cc88da3-7e9d-4a5b-9e92-e6b23ee07028-image.png
                  a3c94202-501f-4125-98e7-9c8d915ac763-image.png
                  2815073d-0abd-4547-b89c-63f8d1d39380-image.png
                  458854c8-3edf-4ff0-b1eb-fcefb9b4156f-image.png
                  e080777c-31a7-4753-b6a7-4e8585cfe8d2-image.png
                  bbf2bd4d-f318-4c7b-a4e5-ee74b7e9ad11-image.png

                  S 1 Reply Last reply Reply Quote 0
                  • S
                    stevencavanagh @stevencavanagh
                    last edited by

                    Not changed anything but...............

                    It now all works and only thing that seems to have changed is it is using PIA Belgium as VPN...........

                    0fc7bb59-79e6-432f-9033-98390458aba7-image.png

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      stevencavanagh @stevencavanagh
                      last edited by

                      What I cannot understand is why it wasn't working with NordVPN as nothing has changed at all

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @stevencavanagh
                        last edited by

                        @stevencavanagh Maybe just needed to reset/re save the rules after your interface change?

                        Maybe a policy route issue.. Not sure why you have wan rules along with your vpn interfaces in what look all broken apart but say auto created?

                        What you should see is a few hybrid rules and then those auto rules with all of your networks - but looks like you have rule for the vpn interface and wan in the hybrid mapping? Odd..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        S 1 Reply Last reply Reply Quote 0
                        • S
                          stevencavanagh @johnpoz
                          last edited by

                          @johnpoz
                          Not sure why I ended up with so many rules either, just following guides how to set up VPNs.

                          When you say some are broken, how are you determining which?

                          S johnpozJ 2 Replies Last reply Reply Quote 0
                          • S
                            stevencavanagh @stevencavanagh
                            last edited by

                            @stevencavanagh If it all works for a while I will swap the 4 port rj45 card (igb2-igb5) for the 2 port sfp+ and try and get a 10G link to the core switch, which is where I am trying to get to.

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @stevencavanagh
                              last edited by

                              @stevencavanagh said in Removal of LAGG:

                              just following guides how to set up VPNs.

                              All of them are pure crap - the ones I have read at least, but yeah they have you go to manual rules for ZERO reason..

                              Did I say broken? I meant make no sense, if your in hybrid mode why would you have rules in mapping in your hybrid section for your normal wan interface? Maybe it was how you snipped up and posted the images?

                              Also hybrid are evaluated top down as well.. So then you have multiple in row with the same source network I see multiple with 192.168.20 and then 192.168.50..

                              How are you doing your policy routing.. Your going to have issues trying to switch between them - unless you kill all the existing states..

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              S 1 Reply Last reply Reply Quote 0
                              • S
                                stevencavanagh @johnpoz
                                last edited by

                                @johnpoz said in Removal of LAGG:

                                @stevencavanagh said in Removal of LAGG:

                                just following guides how to set up VPNs.

                                All of them are pure crap - the ones I have read at least, but yeah they have you go to manual rules for ZERO reason..

                                Did I say broken? I meant make no sense, if your in hybrid mode why would you have rules in mapping in your hybrid section for your normal wan interface? Maybe it was how you snipped up and posted the images?

                                Also hybrid are evaluated top down as well.. So then you have multiple in row with the same source network I see multiple with 192.168.20 and then 192.168.50..

                                How are you doing your policy routing.. Your going to have issues trying to switch between them - unless you kill all the existing states..

                                I snipped them up from top to bottom.

                                If I remember I had set them up so multiple VPN gateways were in a group (all Tier 1) and I could then use policy routing to send all traffic from certain IPs (all static) out via VPN and the rest via the default gateway. The outbound NAT for 192.168.20, 192.168.50 etc are all VLANs, hence why there are so many.

                                Also, floating rule exists (kill switch).

                                What I cannot remember is how Pfsense determines which of the Tier 1 VPNs to select as my IP address switches regularly from country to country, which is fine.

                                Fairly certain I'm not killing all the states, what problems will I have?

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  If they're actually set as the same tier it will just move to the next gateway in the group in the event of a failover.

                                  S 1 Reply Last reply Reply Quote 0
                                  • S
                                    stevencavanagh @stephenw10
                                    last edited by

                                    @stephenw10

                                    Must be failing fairly regularly then!

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Depends how you are using it. If they are in a group you're policy routing to (which I think they are) then pf will will load-balance between them so you will see connections change continually.

                                      S 1 Reply Last reply Reply Quote 0
                                      • S
                                        stevencavanagh @stephenw10
                                        last edited by

                                        @stephenw10

                                        They are inna group and they do appear o load share but only seems to be 3 of them at any one time for some reason.

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Are they all connected? Are they all at the same tier?

                                          S 1 Reply Last reply Reply Quote 0
                                          • S
                                            stevencavanagh @stephenw10
                                            last edited by

                                            @stephenw10 Yes, they are all connected and all at tier 1

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.