<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with multiwan]]></title><description><![CDATA[A list of topics that have been tagged with multiwan]]></description><link>https://forum.netgate.com/tags/multiwan</link><generator>RSS for Node</generator><lastBuildDate>Fri, 06 Mar 2026 05:01:55 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/tags/multiwan.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[global IPV6 addresses are not routed into the LAN and to the client]]></title><description><![CDATA[@Globaltrader312  I have now also removed the firewall rules under NAT
]]></description><link>https://forum.netgate.com/topic/187973/global-ipv6-addresses-are-not-routed-into-the-lan-and-to-the-client</link><guid isPermaLink="true">https://forum.netgate.com/topic/187973/global-ipv6-addresses-are-not-routed-into-the-lan-and-to-the-client</guid><dc:creator><![CDATA[Globaltrader312]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Dual OpenVPN-Setting, CARP &amp; Failover (HA, MultiWAN)]]></title><description><![CDATA[@Sperber said in Dual OpenVPN-Setting, CARP &amp; Failover (HA, MultiWAN):

(Vorkbaard hat das bereits beschrieben: https://vorkbaard.nl/openvpn-in-a-pfsense-carp-cluster/ )

Die Info ist aber relativ alt und nicht zutreffen. Wir haben da sehr verschiedene und komplexe Services laufen und keiner braucht irgendwelche seltsamen Settings mit "local &lt;extIP&gt;" o.ä. - das sollte heute überhaupt nicht mehr nötig sein. Macht im CARP Setup auch keinen Sinn, da die CARP VIPs alle auf dem Master laufen und man diese so nicht ansprechen kann. Split CARP mit Master/Backup auf dem selben Node  ist in der FreeBSD Variante von CARP/pf nicht enthalten, das ist leider nur in OpenBSD enthalten.
Mich interessiert allerdings auch wie @viragomann wie man überhaupt auf der 2. pfSense im CARP die Annahme von OpenVPN erlauben will. Der Traffic kommt ja nicht bei ihr an, weil der via CARP IMMER zur primären läuft, nicht auf den sekundären Node. Und wenn man das forwarden sollte auf Node 2, würde der Node versuchen asymmetrisch zu antworten (oder es läuft alles wieder über Node1), was auch wieder nicht sehr schön ist.
Wie ist das also realisiert, dass die Clients sich auf Node2 connecten und das auch funktioniert, wenn Node2 mal aktiv wird und Node1 passiv weil vlt. gerade gewartet wird o.ä.?
Ansonsten wäre mir schleierhaft wie das im Redundanzfall wirklich sauber funktionieren sollte ohne dass manuell eingegriffen wird?
Cheers
\jens
]]></description><link>https://forum.netgate.com/topic/182115/dual-openvpn-setting-carp-failover-ha-multiwan</link><guid isPermaLink="true">https://forum.netgate.com/topic/182115/dual-openvpn-setting-carp-failover-ha-multiwan</guid><dc:creator><![CDATA[JeGr]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[How would I combine 2 WAN routing the same subnets ?]]></title><description><![CDATA[<p dir="auto">So I got a pretty shit setup to work with and my networking knowledge is limited.</p>
<p dir="auto">We have 2 WAN on premise behind CGNAT e.g. Main &amp; Backup</p>
<p dir="auto">2 Cloud PoP's announce our IPv4/IPv6 PA and route it via tunnel to our 2 WAN.</p>
<p dir="auto">Let's say on Pfsense WAN1 will have ASxxxx1 via PoP1 and WAN2 will have ASxxxx2 via PoP2</p>
<p dir="auto">Routing 5.5.5.5/28 and 2001<img src="https://forum.netgate.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f522.png?v=d0a5ddc94ac" class="not-responsive emoji emoji-android emoji--1234" style="height:23px;width:auto;vertical-align:middle" title=":1234:" alt="🔢" />:/48</p>
<p dir="auto">My guess would be I setup a third interface let's just call it WAN with 192.168.1.1/24 and fd00::/8 and then setup routes to route 5.5.5.5/28 via 192.168.1.1/24 and same for IPv6 ? Then I can setup VIP's, do outbound PBR / NAT using a weighted gateway group and just setup DHCP4/6 as usual via the single WAN interface ?</p>
<p dir="auto">I have the feeling I'm doing something wrong and there is a better way ?</p>
<p dir="auto">My head hurts, please don't talk about CGNAT it is what it is.</p>
]]></description><link>https://forum.netgate.com/topic/181382/how-would-i-combine-2-wan-routing-the-same-subnets</link><guid isPermaLink="true">https://forum.netgate.com/topic/181382/how-would-i-combine-2-wan-routing-the-same-subnets</guid><dc:creator><![CDATA[bgpnoob]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Concurrent Multi-WAN]]></title><description><![CDATA[@aiden21c it’s always the last place you look…
]]></description><link>https://forum.netgate.com/topic/178165/concurrent-multi-wan</link><guid isPermaLink="true">https://forum.netgate.com/topic/178165/concurrent-multi-wan</guid><dc:creator><![CDATA[SteveITS]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[wireguard multiwan doesnt properly round robin traffic]]></title><description><![CDATA[<p dir="auto">Hello!</p>
<p dir="auto">Multiwan wireguard setup in round-robin doesn't treat traffic the same as exactly the same setup without wireguard.</p>
<p dir="auto">My setup:<br />
I have a dual-isp setup (cox &amp; starlink), and I have all outbound traffic flowing across wireguard tunnels to a second pfsense appliance in a colo.</p>
<p dir="auto">I've been able to force wireguard to create tunnels on the appropriate interfaces (since you cant bind it to one) by using static routes. The receiving end is using two IPs for this, and I've created rules on the far end to only permit the appropriate source IP to land on the designated target IP.</p>
<p dir="auto">The issue:<br />
When using the wireguard tunnels, the same exact round-robin multiwan setting (two gateways, both set to tier 1) traffic only flows over one gateway and the second is idle.  If I switch to just using the naked gateways versus the wireguard interfaces, traffic flows as expected and is properly load balanced across both links.</p>
<p dir="auto">A wrinkle:<br />
If I setup policy rules on the LAN firewall section to specify the same exact gateway group, and also have the default gateway for the firewall using the same group "it kinda works", but I only get about 75% of the bandwidth - the graphs do show traffic flowing across both links, though.</p>
<p dir="auto">Expected functionality: I would expect that round-robin multiwan would work exactly the same over wireguard versus over naked isp links.</p>
<p dir="auto">I'm not 100% sure why using wireguard tunnels in a round-robin config would cause the round-robin part to just 'not apply', and I'm even more confused about adding the policy routing component making it mostly work.</p>
<p dir="auto">Any help here would be great!</p>
]]></description><link>https://forum.netgate.com/topic/174825/wireguard-multiwan-doesnt-properly-round-robin-traffic</link><guid isPermaLink="true">https://forum.netgate.com/topic/174825/wireguard-multiwan-doesnt-properly-round-robin-traffic</guid><dc:creator><![CDATA[Viss]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[MTU question with MultiWan&#x2F;OpenVPN&#x2F;Wireguard]]></title><description><![CDATA[<p dir="auto">Hi everyone,</p>
<p dir="auto">I have some questions about MTU values.<br />
Note that I have not set MSS values anywhere</p>
<p dir="auto">Current MTU values for my interfaces:<br />
LAN: 1500<br />
VDSL PPPoE: 1492<br />
5G DHCP: 1380 (provider using the same value to get optimal upload speed)<br />
OpenVPN: (nothing set)<br />
WG1: 1320 (over 5G)<br />
WG2: 1320 (over 5G)<br />
WG3: 1432 (over VDSL)<br />
WG4: 1432 (over VDSL)</p>
<p dir="auto">Now if I try to test my MTU from my Windows 10 PC (1500 MTU set), I get  "Packet needs to be fragmented but DF set" with 1472 (1500-28).</p>
<p dir="auto">I assume that this is happening because it tries to route through the PPPoE which is 1492 or even through the 5G which is 1380 (depending on rules).</p>
<p dir="auto">For example, I solved download problems of my VMs that go through WG2 by setting the MTU size in Windows to 1292.</p>
<p dir="auto">Question now is that I have devices that I can't really set/change the MTU size - e.g. LG TV.</p>
<p dir="auto">So what are the optimal values for MTU (and possibly MSS) that I should be setting on PFSense side without touching and configuring other devices (e.g. the TV)</p>
<p dir="auto">Sorry I'm not an expert with MTU/MSS so any help is appreciated.</p>
]]></description><link>https://forum.netgate.com/topic/172019/mtu-question-with-multiwan-openvpn-wireguard</link><guid isPermaLink="true">https://forum.netgate.com/topic/172019/mtu-question-with-multiwan-openvpn-wireguard</guid><dc:creator><![CDATA[murdof]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[pfBlockerNG blocking SMTP]]></title><description><![CDATA[@alek said in pfBlockerNG blocking SMTP:

No ?

That's the easy / easier way.
Have a look at this list : Youtube Netgate everything you always wanted to know, and more.
There is a Muti WAN video. There is a video about VIP, Carps, etc.
The videos are old, but still very valid and very informative. It's a guy from Netgate talking about Netgate/pfSense.
]]></description><link>https://forum.netgate.com/topic/171497/pfblockerng-blocking-smtp</link><guid isPermaLink="true">https://forum.netgate.com/topic/171497/pfblockerng-blocking-smtp</guid><dc:creator><![CDATA[Gertjan]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Issue with multi wan &amp; high availability setup - authenticating with radius]]></title><description><![CDATA[please see this post for way more information.
]]></description><link>https://forum.netgate.com/topic/170729/issue-with-multi-wan-high-availability-setup-authenticating-with-radius</link><guid isPermaLink="true">https://forum.netgate.com/topic/170729/issue-with-multi-wan-high-availability-setup-authenticating-with-radius</guid><dc:creator><![CDATA[se_marc]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[WireGuard MultiWAN Not Failing Back to Tier1]]></title><description><![CDATA[@luckman212 Has this been integrated into a subsequent release or is this patch still valid? I'm having the same issue on 23.05.1-RELEASE.
]]></description><link>https://forum.netgate.com/topic/161795/wireguard-multiwan-not-failing-back-to-tier1</link><guid isPermaLink="true">https://forum.netgate.com/topic/161795/wireguard-multiwan-not-failing-back-to-tier1</guid><dc:creator><![CDATA[rafe]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>