Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    After adding second wan, pfsense hangs

    Routing and Multi WAN
    2
    5
    1723
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      TLP last edited by

      Hello, after adding the second wan, the firewall hangs and cant navigate to pfsense webgui or to the internet, it keep hanging and returning

      what can it be??
      thanks

      1 Reply Last reply Reply Quote 0
      • T
        TLP last edited by

        I receive the following error

        503 - Service Not Available
        
        1 Reply Last reply Reply Quote 0
        • T
          TLP last edited by

          And after setting the new wan(opt1), I started receiving the following errors on my openvpn and lan
          I deleted the wan(opt1) but the error persists

          edit
          Not sure if this helps but these are my NICs
          bce0 - OPT1 - Offboard - Broadcom BCM5709 PCI-Express Dual Port Gigabit
          bce1 - Never used - Offboard - Broadcom BCM5709 PCI-Express Dual Port Gigabit
          bce2 - Never used - Offboard - Broadcom BCM5709 PCI-Express Dual Port Gigabit
          bce3 - Never used - Offboard - Broadcom BCM5709 PCI-Express Dual Port Gigabit
          bce4 - LAN - Onboard - Broadcom BCM5716 Dual Port Gigabit
          bce5 - WAN - Onboard - Broadcom BCM5716 Dual Port Gigabit




          1 Reply Last reply Reply Quote 0
          • G
            galaxy60 last edited by

            In your firewall rules can you make sure that your openvpn has an allow all rule, also what rule do you have on your LAN  for outbound traffic some screen shots would be nice

            1 Reply Last reply Reply Quote 0
            • T
              TLP last edited by

              Both have rules "Allow All-to-All"
              The problem is with the fragmented packets, that pfsense blocks by default (which is the correct thing to do)

              1 Reply Last reply Reply Quote 0
              • First post
                Last post

              Products

              • Platform Overview
              • TNSR
              • pfSense
              • Appliances

              Services

              • Training
              • Professional Services

              Support

              • Subscription Plans
              • Contact Support
              • Product Lifecycle
              • Documentation

              News

              • Media Coverage
              • Press
              • Events

              Resources

              • Blog
              • FAQ
              • Find a Partner
              • Resource Library
              • Security Information

              Company

              • About Us
              • Careers
              • Partners
              • Contact Us
              • Legal
              Our Mission

              We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

              Subscribe to our Newsletter

              Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

              © 2021 Rubicon Communications, LLC | Privacy Policy