<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with route]]></title><description><![CDATA[A list of topics that have been tagged with route]]></description><link>https://forum.netgate.com/tags/route</link><generator>RSS for Node</generator><lastBuildDate>Sat, 14 Mar 2026 02:06:33 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/tags/route.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[Virtual PFsense behind physical router]]></title><description><![CDATA[Problem 2 fixed by adding route to 192.168.5.0/24 on Mikrotik side
]]></description><link>https://forum.netgate.com/topic/188757/virtual-pfsense-behind-physical-router</link><guid isPermaLink="true">https://forum.netgate.com/topic/188757/virtual-pfsense-behind-physical-router</guid><dc:creator><![CDATA[Dante4]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Option to disable wireguard adding routes (Table = off)]]></title><description><![CDATA[@cmcdonald thank you for the explanation. indeed the problem was my frr configuration, all is working fine now.
]]></description><link>https://forum.netgate.com/topic/174940/option-to-disable-wireguard-adding-routes-table-off</link><guid isPermaLink="true">https://forum.netgate.com/topic/174940/option-to-disable-wireguard-adding-routes-table-off</guid><dc:creator><![CDATA[trunet]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[Zebra Routes Missing in System Route Table - v2.5]]></title><description><![CDATA[As an update, I have done some more troubleshooting on the issue:


Switching to static routes over the VTI tunnel works. Using regular tunnel IPv4 also works Its only when we use FRR via OSPF (have not tested BGP) that traffic does not flow between hub and spoke.

Topology is 1 Hub (virtual) with 3 spokes (2 virtual, 1 physical pfSense). Its the physical pfSense spoke that is having issue



Enable IPsec MSS Clamping with different values, 1400, 1350, 1200, etc. on both hub and spoke and no issue. Also adjusted the VTI MTU value as well with no luck


Both sides are using AES-NI CPU Crypto. Enable/Disabling this has no effect


Both sides are using IPsec Asynchronous Cryptography. Enable/Disabling this has no effect


Tried different P2 encryption options but no luck. Currently using

P1: AES128-GCM (128 bits) AES-XCBC via 14 (2048) DH Group
P2: ESP AES128-GCM (128 bits) PFS Group: 14 (2048). NO Hash algorithms



It appears another user on Reddit is facing similar issues: https://www.reddit.com/r/PFSENSE/comments/mzab6v/251_and_ipsec_vti/
Any ideas why FRR and OSPF is not sending traffic over the network? What troubleshooting steps can I take to debug this further?
]]></description><link>https://forum.netgate.com/topic/164445/zebra-routes-missing-in-system-route-table-v2-5</link><guid isPermaLink="true">https://forum.netgate.com/topic/164445/zebra-routes-missing-in-system-route-table-v2-5</guid><dc:creator><![CDATA[helloadam]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[how to make pfsense work as multiple proxy server]]></title><description><![CDATA[<p dir="auto">hi<br />
my pfsense work as non-transparent proxy in the lan network for accessing internet with port 9050. i want to know if i have proxy server in the internet network how i can make pfsense to pass the client internet via my private proxy server just with changing port  in the client side? something like this:</p>
<pre><code>host&lt;&gt;192.168.1.50:9050(pfsense)&lt;&gt;google.com
host&lt;&gt;192.168.1.50:9060(pfsense)&lt;&gt;proxy1&lt;&gt;google.com
host&lt;&gt;192.168.1.50:9070(pfsense)&lt;&gt;proxy2&lt;&gt;google.com
</code></pre>
<p dir="auto">and also can i use proxychans in pfsense?</p>
]]></description><link>https://forum.netgate.com/topic/149819/how-to-make-pfsense-work-as-multiple-proxy-server</link><guid isPermaLink="true">https://forum.netgate.com/topic/149819/how-to-make-pfsense-work-as-multiple-proxy-server</guid><dc:creator><![CDATA[tcpzix]]></dc:creator><pubDate>Invalid Date</pubDate></item><item><title><![CDATA[pritunl VPN - pass traffic  to private network]]></title><description><![CDATA[First of all, you need to clarify if the pritunl VPN users (while connected) will be "going" out with their 192.168.22.x IP address , or with the IP address of the Pritunl network interface (192.168.226.1).
Also, I assume that you have created a Server in the pritunl that assigns the 192.168.226.x IP addresses. In that server, you will have to add a route towards the 172.17.172.x network (see below)
[image: 1560265449597-b7fc52a1-f8e5-4555-8671-6d04a35c5b5b-image.png]
After you do the above, then you can start pinging from a VPN user towards your Servers. In order to see if the Pritunl VPN user is going out with its assigned IP addres (192.168.2226.2) and not with the Pritunl server IP (192.168.226.1), go to Packet Capture in pfsense and check the traffic on the pfsense interface that belongs to 172.17.172.x network.
*I would create an alias for these VPN users and name it "OpenVPN_Users" (Alias type is network with an IP address 192.168.226.0/24).
Then I would go to the firewall rules and I would add a rule to allow the OpenVPN_Users network towards the 102.17.172.0 network. Not sure if you have to configure the Advanced Settings on that rule, but if you still cannot ping the servers, you may have to go and change the TCP flags to "Any" and the State Type to "sloppy" (see below)
[image: 1560264877380-4e012871-d683-4bee-a1e1-8e3c38a6307e-image.png]
Also, I assume these VPN users will be having internet access via your pfsense, which means that they will be going to the outside world via the WAN interface. If so, maybe you would have to add a NAT rule, but check first if it works without any NAT rule.
]]></description><link>https://forum.netgate.com/topic/143823/pritunl-vpn-pass-traffic-to-private-network</link><guid isPermaLink="true">https://forum.netgate.com/topic/143823/pritunl-vpn-pass-traffic-to-private-network</guid><dc:creator><![CDATA[ChrisT]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>