<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN — WatchGuard Community</title>
        <link>https://community.watchguard.com/watchguard-community/</link>
        <pubDate>Tue, 21 Apr 2026 01:39:43 +0000</pubDate>
        <language>en</language>
            <description>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN — WatchGuard Community</description>
    <atom:link href="https://community.watchguard.com/watchguard-community/categories/firebox-networking/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>TCP/UDP &quot;crashing&quot; when Nessus-Scan is running</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4575/tcp-udp-crashing-when-nessus-scan-is-running</link>
        <pubDate>Wed, 15 Apr 2026 08:41:56 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>Ludwig_Beck_80331</dc:creator>
        <guid isPermaLink="false">4575@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello from munich,</p>

<p>has anybody an idea of what could cause the following behaviour:</p>

<p>When doing a Nessus-Scan from VLAN A to VLAN B after some time (Whether existing or non-existent IP addresses are scanned, regardless of the throttling applied) the whole TCP/UDP communication in ALL VLANs (also those not affected by the scan) go down. BUT: as soon as the scan is stopped it all comes back and is fine again AND the whole time , even when TCP/UPD is "down" as described, pinging (ICMP) is OK.</p>

<p>Has anybody an idea on what that could be ? It must be the Watchguard, as only it has all routes to all networks.</p>

<p>Many thanks and kind regards,</p>

<p>Markus</p>
]]>
        </description>
    </item>
    <item>
        <title>How to inject &quot;classic&quot; IPSec VPN routes into OSPF</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4568/how-to-inject-classic-ipsec-vpn-routes-into-ospf</link>
        <pubDate>Fri, 03 Apr 2026 10:38:03 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>JMH</dc:creator>
        <guid isPermaLink="false">4568@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Apologies if this is already a well know thing, but I failed to find info about it when I was researching it.</p>

<p>I was looking how a firebox could inject "classic" IPSec routes into OSPF, so that the rest of our network could use the routes, rather than having to declare them as static routes on internal routers behind the firebox. This is easy for BOVPN virtual interfaces, but appears not to be a supported option for "classic" VPNs, as the remote end of the VPN isn't seen as a connected network for inclusion in the OSPF calculations.</p>

<p>The Status Report section of System Manager shows the network at the far end of the VPN in the "Run-time IPSec Routes" section, with the "Out Interface" being the physical interface of the external connection.</p>

<p>Static routes on the firebox can be injected into the OSPF table using the "redistribute static" command in the OSPF configuration.</p>

<p>On the firebox, I configured a static route to the far end of the VPN via the default gateway of the external interface. This did not affect the routing down the VPN within the firebox, and the traffic for the remote end of the VPN continued being sent down the IPSec tunnel.</p>

<p>The result is a static route to the VPN destination that can be injected into OSPF which doesn't affect how the Firebox handles the VPN traffic. (I used a route map to control which static routes get redistributed, but this isn't necessary if all your static routes should be injected into OSPF.)</p>

<p>The internal routers now see the "classic" VPN destinations in the OSPF tables and there is no longer the need to configure the static routes within the internal network. The route seen in OSPF isn't via the external default gateway, but via the firebox itself. (The routes you see on the routers connected to the firebox will show via the firebox, and for the routers behind the routers connected to the firebox, you will see the route via the connected router, etc.)</p>

<p>How useful this is depends on your network, but for ours, this ability to have the routes in the OSPF tables has been extremely helpful.</p>

<p>Hopefully this info will be useful for someone else.</p>

<p>James</p>
]]>
        </description>
    </item>
    <item>
        <title>Best Practices for DNS via WatchGuard DHCP on Windows PCs</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4560/best-practices-for-dns-via-watchguard-dhcp-on-windows-pcs</link>
        <pubDate>Wed, 25 Mar 2026 17:18:56 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>AnthonyM</dc:creator>
        <guid isPermaLink="false">4560@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello everyone,</p>

<p>Sorry if this topic has already been discussed, but I haven't been able to find the answer to my question.</p>

<p>In an infrastructure with Active Directory (DNS) servers in the cloud connected via IPsec VPN to WatchGuard appliances at branch offices where there are only Windows PCs, what are WatchGuard engineers’ recommendations regarding the DNS provided to the PCs? I’ve heard that Windows does not recommend public DNS servers like 8.8.8.8, even as a secondary DNS server?</p>

<p>Thank you,</p>
]]>
        </description>
    </item>
    <item>
        <title>USB modem diagnostics</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4546/usb-modem-diagnostics</link>
        <pubDate>Fri, 06 Mar 2026 19:47:09 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>maestro</dc:creator>
        <guid isPermaLink="false">4546@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello,</p>

<p>I setup a Pantech UML295 USB modem on WatchGuard Firebox T15 for Internet redundancy many years ago, and I am trying to troubleshoot it now remotely, because the users were not able to connect to Internet when the main Internet connection went down.</p>

<p>So, I use Network tab of Diagnostics page in WebUI to</p>

<p>ping -I <strong>eth0</strong> 8.8.8.8<br />
and I get<br />
PING 8.8.8.8 (8.8.8.8) from "IP address" <strong>eth0</strong>: 56(84) bytes of data...</p>

<p>and when I do<br />
ping -I <strong>modem0</strong> 8.8.8.8<br />
I get<br />
PING 8.8.8.8 (8.8.8.8) from "IP address" <strong>modem0</strong>: 56(84) bytes of data...</p>

<p>and I get replies both times, but I am confused seeing the same "from IP address" of the main Internet connection of interface eth0, when I am actually trying to ping using modem0 interface.</p>

<p>I suppose this is probably normal behavior, just want to confirm.</p>

<p>Aslo, the USB modem has Red light on it. Can someone remind me if this is because it is just a backup connection and does not pass the traffic when the main connection is up?</p>

<p>Thanks.</p>
]]>
        </description>
    </item>
    <item>
        <title>Blocking BOGON addresses</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4536/blocking-bogon-addresses</link>
        <pubDate>Wed, 18 Feb 2026 23:32:45 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>keysd</dc:creator>
        <guid isPermaLink="false">4536@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I recently discovered I can do a traceroute to say 192.168.100.101, and the traffic is allowed out the external interface via the Outgoing policy.  The traffic made it a few hops and was dropped by my ISP.  I was surprised that BOGON addresses aren't just dropped at the firebox.  Is there any easy way to block BOGON address from passing the external interface.</p>

<p>I did some searching for Watchgaurd specific configuration on BOGON filtering but didn't find any discussions or notes in the Watchguard documentation.  I did see configuration for other firewall vendors to achieve this.</p>

<p>I thought about using blocked sites and block site exception to achieve this.  I first added network addresses for all of my internal networks to Blocked Site Exceptions.  When I went to add 10.0.0.0/8 to blocked sites, I received an error message that I would have to create exceptions for each internal firebox interface within that range.  That's going to be a lot of work for multiple sites with multiple VLANs per site.  I was surprised that my blocked site exception of 10.X.0.0/16 wouldn't have already covered the firebox's internal interfaces.</p>

<p>Maybe all this doesn't matter and I'm being paranoid.  For anyone interested, here is the reddit thread that got me thinking about this.</p>

<p><a rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/1r87rcr/what_is_everyones_traceroute_for_192168200101/">https://reddit.com/r/sysadmin/comments/1r87rcr/what_is_everyones_traceroute_for_192168200101/</a></p>
]]>
        </description>
    </item>
    <item>
        <title>loopback ip</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4532/loopback-ip</link>
        <pubDate>Tue, 17 Feb 2026 15:01:52 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>Norman</dc:creator>
        <guid isPermaLink="false">4532@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello,<br />
can the loopback ip by part of 192.168.114.0  or 192.168.113.0 networks <br />
these are used for muvpn ikev2 and sslvpn.</p>

<p>background<br />
i have a firebox without trusted interface , it is used for bovpn and muvpn only.<br />
works as a vpn concentrator. <br />
Radius traffic is intented to go through bovpn tunnel. it is send through the tunnel but sender adress is the public ip.</p>

<p>Deny xxx.x58.14.151 192.168.7.222 radius/udp 58277 1812 BovpnVif.V Firebox ip spoofing sites 110 64 (Internal Policy)  proc_id="firewall" rc="101" msg_id="3000-0148" flags="SR" duration="0" sent_pkts="1" rcvd_pkts="0" sent_bytes="110" rcvd_bytes="0"  Traffic</p>

<p>adding a loopback would be the easyest without changes to the bovpn tunnels</p>
]]>
        </description>
    </item>
    <item>
        <title>Beware using VLAN 1 with tagged &amp; untagged for Firebox T115-W, Firebox T125, T125-W, Firebox T145</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4514/beware-using-vlan-1-with-tagged-untagged-for-firebox-t115-w-firebox-t125-t125-w-firebox-t145</link>
        <pubDate>Fri, 30 Jan 2026 20:28:31 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>Bruce_Briggs</dc:creator>
        <guid isPermaLink="false">4514@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Known Issue:</p>

<p>Untagged VLAN fails when VLAN 1 is tagged on the same interface<br /><a href="https://techsearch.watchguard.com/KB?type=Known%20Issues&amp;SFDCID=kA1Vr000000EdzBKAS&amp;lang=en_US" rel="nofollow">https://techsearch.watchguard.com/KB?type=Known Issues&amp;amp;SFDCID=kA1Vr000000EdzBKAS&amp;amp;lang=en_US</a></p>

<p>This bug bit me in the butt converting from a T20w to a T125w.<br />
VLAN1 was defined as tagged on 1 interface and as untagged on a 2nd interface.<br />
On the T125W, the untagged interface connection did not work - no DHCP address was provided. <br />
Worked fine on the T20 for V12.11.6 and earlier.<br />
T125W has the issue running 2025-1-1, 2025-1-4 &amp; 2026-1-1</p>
]]>
        </description>
    </item>
    <item>
        <title>Veeam Vault</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4507/veeam-vault</link>
        <pubDate>Mon, 26 Jan 2026 16:38:22 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>jeang</dc:creator>
        <guid isPermaLink="false">4507@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi</p>

<p>I'm trying to restrict traffic from my Backup server Veeam to limited internet access.</p>

<p>I need to allow to veeam cloud vault servers.</p>

<p>Anyone have the full ip or FQDN list ?</p>

<p>I know it has to go through ports 80/443, are there any other ports needed?</p>

<p>Thank you!<br />
Jean</p>
]]>
        </description>
    </item>
    <item>
        <title>FireCluster - add second firebox</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4506/firecluster-add-second-firebox</link>
        <pubDate>Mon, 26 Jan 2026 16:37:14 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>NexusTK</dc:creator>
        <guid isPermaLink="false">4506@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello, <br />
a piece of advice, I should migrate the configuration from the current FireboxV to one of 2 M395, make it work by migrating the configuration (same trusted IP, same IPs of 2 ISPs (WAN), etc) and then create a FireCluster A/P. Now it accesses from (wsm or UI) using "192.168.0.7" which is also the gateway for LAN clients. From what I understand in the FireCluster creation phase I have to associate a different IP to each firebox, fb1 = 192.168.0.2 and fb2 = 192.168.0.3, is there a way to leave "192.168.0.7" as the Cluster IP? Right?</p>
]]>
        </description>
    </item>
    <item>
        <title>ping to 8.8.8.8 denied, should not be</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4505/ping-to-8-8-8-8-denied-should-not-be</link>
        <pubDate>Fri, 23 Jan 2026 17:01:15 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>FTINC</dc:creator>
        <guid isPermaLink="false">4505@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have a Watchguard T20 firewall, 12.11.6 (Build 728370) (Latest Release).  It's blocking pings to 8.8.8.8 and i'm not sure why.</p>

<p>From traffic monitor, I have the following entry showing that ping to 8.8.8.8 is denied:<br /><code spellcheck="false" tabindex="0">2026-01-23 10:50:03 Deny 192.168.1.7 8.8.8.8 echo-request/icmp Trusted SHAW blocked sites 40 63 (Ping-00) proc_id="firewall" rc="101" msg_id="3000-0173" duration="0" sent_bytes="40" rcvd_bytes="0" type="8"</code></p>

<p>In Firewall -&gt; firewall policies -&gt; Ping:<br />
(no changes, factory default policy)<br />
Enable: checked<br />
From: Any-Trusted, Any-Optional<br />
To: Any</p>

<p>In Firewall -&gt; blocked sites, there are no blocked sites.<br />
In Firewall -&gt; blocked sites exceptions, I added 8.8.8.8, still blocked.</p>

<p>In System status -&gt; diagnostics, ping 8.8.8.8, result is <code spellcheck="false" tabindex="0">"ping: sendmsg: Operation not permitted"</code><br />
In System status -&gt; diagnostics, ping 8.8.4.4, result is <code spellcheck="false" tabindex="0">"64 bytes from 8.8.4.4: icmp_seq=1 ttl=120 time=29.2 ms"</code></p>

<p>From desktop computer, ping 8.8.8.8, no response.<br />
From desktop computer, ping 8.8.4.4, good response.</p>

<p>What would cause this and how do I fix?</p>

<p>To add to above, all traffic to 8.8.8.8 is being blocked:</p>

<p><code spellcheck="false" tabindex="0">2026-01-23 11:01:03 Deny 192.168.1.141 8.8.8.8 dns/udp 53457 53 Trusted SHAW blocked sites 60 127 (DNS-00) proc_id="firewall" rc="101" msg_id="3000-0173" duration="0" sent_bytes="60" rcvd_bytes="0"</code></p>

<p><code spellcheck="false" tabindex="0">2026-01-23 11:11:03 Deny 192.168.1.128 8.8.8.8 https/tcp 57947 443 Trusted SHAW blocked sites 52 127 (HTTPS-proxy-00) proc_id="firewall" rc="101" msg_id="3000-0173" tcp_info="offset 8 S 482552011 win 61690" duration="0" sent_bytes="52" rcvd_bytes="0"</code></p>
]]>
        </description>
    </item>
    <item>
        <title>Web application timeout only via VPN and WIFI, not LAN ...</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4498/web-application-timeout-only-via-vpn-and-wifi-not-lan</link>
        <pubDate>Wed, 14 Jan 2026 15:26:58 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>elbPV</dc:creator>
        <guid isPermaLink="false">4498@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>i'm investigating an issue with a web app (QNAP Notesstation) based on a T85 with current firmware:</p>

<p>If the user are connected to the local LAN, everything works as expected an has unlimited access to the web app regardless of time. Connected to Watchguard WIFI or IKEv2 mobile VPN with the same windows client and app user accounts, all user have the same problem: After estimated 60 minutes the web app has disconnected in the background, regardless of idle time or activity. <br />
The QNAP Support has reconstructed our issue and has discovered that there is no problem in the web app code; other tested WIFI connections were without any timeouts.</p>

<p>It seems that the T85 influences something like KeepAlive, Timeouts etc. for this special app if the HTTP/HTTPS traffic is routed, but I'm not sure how to resolve this issue.</p>

<p>Any tips or ideas?</p>

<p>Many thanks,<br />
Erik</p>
]]>
        </description>
    </item>
    <item>
        <title>Disable TCP SYN checking Cloud Managed</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3754/disable-tcp-syn-checking-cloud-managed</link>
        <pubDate>Sat, 06 Apr 2024 04:27:10 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>GeorgeWillow</dc:creator>
        <guid isPermaLink="false">3754@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Moved all my Fireboxes to be cloud managed and now I'm troubleshooting a brief connectivity issue every few minutes.  I used to turn of syn checking from the old days but I don't see that option in the settings available to cloud managed Fireboxes.  Not sure if it will make a difference but I'd sure like to try it.</p>
]]>
        </description>
    </item>
    <item>
        <title>Firebox M290 to Draytek</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4458/firebox-m290-to-draytek</link>
        <pubDate>Mon, 17 Nov 2025 15:18:59 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>StuartPW</dc:creator>
        <guid isPermaLink="false">4458@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Ok I'm sure this is very simple, but I'm not having much luck fixing the issue.</p>

<p>We have a fully working Watchguard Firebox M290</p>

<p>External - Vodaone Broadband<br />
Tusted - 10.1.16.254</p>

<p>Desktop PC 10.1.16.113</p>

<p>Added the following:-</p>

<p>PTP connection set to another site</p>

<p>I've configured port 2 as the following:-</p>

<p><strong>External</strong><br />
Name: "Site X to Site Y External"<br />
IP: 194.184.180.2/30<br />
GW: 194.184.180.1</p>

<p>On the Draytek router at the other end of the PTP</p>

<p><strong>WAN/External</strong><br />
Name: "Site Y to Site X External"<br />
IP: 194.184.180.1/30<br />
GW: 194.184.180.2</p>

<p>LAN - 10.18.20.0/24<br />
GW - 10.18.20.1</p>

<p>Laptop: DHCP: 10.18.20.10</p>

<p>I can ping from the Laptop 10.18.20.10 over the WAN/External connection to 10.1.16.113</p>

<p>But I cant ping the other way?</p>

<p>I've tried a few things in Firewall policies and static routes, but nothing seems to work. I'm missing somthing really simple, but what</p>
]]>
        </description>
    </item>
    <item>
        <title>Firewall or ISP problem?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4339/firewall-or-isp-problem</link>
        <pubDate>Fri, 27 Jun 2025 08:32:50 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>niel</dc:creator>
        <guid isPermaLink="false">4339@/watchguard-community/discussions</guid>
        <description><![CDATA[im a fresh graduate turned IT support and the company I support suddenly lost internet connection. field technician and I proved that the isp modem is indeed providing internet connection but it's lost when the rest of the setup (watchguard/firewall &gt; switch &gt; domain controller and the rest of the devices) is in play <br /><br /> connected to the isp modem via Lan gives me internet connection <br /><br /> I can ping and access local devices/network, but don't have "internet" access or browse the web. tracert stops at first hop (1 * * * request timed out to 2 * * results: destination net unreachable)<br /><br /> nslookup resolves DNS server and gateway properly<br /><br /> watchguard/fireware web UI configuration settings seem to be proper, as nothing really changed. it's just a few days ago until the company lost internet connection <br /><br /> I sought help from their IT support I'm Germany and he said he absolutely have no idea aside the public IP address being changed (it didn't) or the PPPoE credentials might have been expired<br /><br /> I have reached out to the ISP to confirm this problem, but can I please get your insights as to how to proceed? I'm a fresh graduate and don't have much experience with network.<br /><br /> I can provide pictures/tests if needed. thank you very very much]]>
        </description>
    </item>
    <item>
        <title>Can my ISP router have the same IP as the firewall?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4439/can-my-isp-router-have-the-same-ip-as-the-firewall</link>
        <pubDate>Mon, 27 Oct 2025 14:19:17 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>Jorge</dc:creator>
        <guid isPermaLink="false">4439@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello<br />
I'm having trouble setting up a new connection with a new ISP. Their router has the same IP address as the firewall, 192.168.1.1. Is this a network conflict?</p>

<p>After saving that configuration, if I enter a PIN to 192.168.1.1, the firewall doesn't respond.</p>
]]>
        </description>
    </item>
    <item>
        <title>New wan not working configuration / Nuevo</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4435/new-wan-not-working-configuration-nuevo</link>
        <pubDate>Mon, 20 Oct 2025 18:48:06 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>Jorge</dc:creator>
        <guid isPermaLink="false">4435@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello, I have a new WAM:<br />
IP Pool removed<br />
Gateway removed<br />
removed PUBLIC IP</p>

<p>I'm getting configuration errors, but I managed to configure it without any errors, but browsing still isn't working.</p>

<p>Please help.</p>

<p>Thank you.</p>

<hr /><p>Hola, tengo un nuevo WAM:<br />
Pool de IP  removed<br />
Puerta de Enlace  removed<br />
removed  IP PUBLICA</p>

<p>Me da errores de configuración y logré configurar sin errores pero tampoco funciona navegar.</p>

<p>Su ayuda por favor,</p>

<p>Gracias</p>

<p>** removed public IP addresses from post - JC</p>
]]>
        </description>
    </item>
    <item>
        <title>Routing between two local networks</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4416/routing-between-two-local-networks</link>
        <pubDate>Tue, 23 Sep 2025 23:38:38 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>hbengtsson</dc:creator>
        <guid isPermaLink="false">4416@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi</p>

<p>I need to route from 10.20.1.0/24 to 10.68.39.160/27<br />
We are using 10.74.3.225 and 10.74.3.225 to route the traffic.<br />
My main routers default route points to my firewall.</p>

<p>10.20.1.0 lives on my network.<br />
10.68.39.160 lives behind a vendors firewall, on our campus.</p>

<p>10.74.3.226 is assigned to an optional interface on my firewall.<br />
10.74.3.225 is assigned to an interface on the vendors firewall.</p>

<p>I have two routes on the firewall for this</p>

<p>10.74.3.226=&gt;10.74.3.225<br />
10.74.3.225=&gt;10.68.39.160/27</p>

<p>When I ping, the vendor see traffic coming from 10.74.3.226 instead of 10.20.1.0/24</p>

<p>They need to see that its coming an 10.20.1.0/24 address, so they can respond accordingly.</p>

<p>Any ideas?</p>
]]>
        </description>
    </item>
    <item>
        <title>two lans with two wans</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4393/two-lans-with-two-wans</link>
        <pubDate>Thu, 04 Sep 2025 14:23:26 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>FTINC</dc:creator>
        <guid isPermaLink="false">4393@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have a scenario that I am hoping is possible with a firebox.  I have two independent lans and two internet connections. Currently they are completely separate. I would like to have 1 firebox with both lans and both internet providers connected. Normally Lan1 uses Wan1 and Lan2 uses Wan2. If Wan1 goes down, both Lan1 and Lan2 use Wan2, and if Wan2 goes down, both Lan1 and Lan2 use Wan1.  Is possible?</p>
]]>
        </description>
    </item>
    <item>
        <title>NAT loopback from optional back to optional again</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4390/nat-loopback-from-optional-back-to-optional-again</link>
        <pubDate>Wed, 03 Sep 2025 16:42:35 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>vbuk</dc:creator>
        <guid isPermaLink="false">4390@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Some of the smaller HPE Proliant servers don't have a dedicated iLO (Management) port, they share the LAN port with the iLO. This all works fine except the server itself cannot access the iLO because it's like a loopback issue. The server and the iLO each have their own IP address, and the iLO can be accessed from any other host on the subnet ok.</p>

<p>I had a theory that I could NAT loopback off the Firebox interface. So, from the server I could query the address &lt;firebox.optional.interface.ip&gt; and this would NAT it back to &lt;hpe.ilo.interface.address&gt;. To be clear, these are both in the same subnet on the same eth port on the Firebox.</p>

<p>So I added a policy with a SNAT to do this:</p>

<p>FROM: &lt;hpe.server.address&gt;<br />
TO: SNAT: &lt;any.optional&gt; --&gt; &lt;hpe.ilo.interface.address&gt;</p>

<p>And I just get this in the log:</p>

<p> <time> Allow &lt;hpe.server.address&gt; &lt;firebox,optional.interface&gt; cmip-man/udp 53838 163 &lt;optional.network&gt; &lt;external.interface&gt; Allowed 69 127 (SNMP.loopback.to &lt;hpe.server.ilo&gt;-00)  proc_id="firewall" rc="100" msg_id="3000-0148" src_ip_nat=&lt;firebox.external.interface&gt; dst_ip_nat=&lt;hpe.ilo.interface.address&gt; dst_port_nat="161"    Traffic</time></p>

<p>So, it's kind of working but I think it it doing the NAT using the firebox external interface IP which is not going to work.</p>

<p>Have I just got something a bit wrong on the SNAT or am I asking the impossible?</p>

<p>Thanks!</p>
]]>
        </description>
    </item>
    <item>
        <title>Hide a vlan from another vlan?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4382/hide-a-vlan-from-another-vlan</link>
        <pubDate>Thu, 21 Aug 2025 12:06:10 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>martindavidsson</dc:creator>
        <guid isPermaLink="false">4382@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>Is it somehow possible to "hide" a vlan from another vlan?<br />
Example vlan17 should not even know about vlan13.<br />
I know I can block access ofcourse but I want to "hide" it completely.</p>

<p>And yes, both vlans do exist in same firebox...</p>

<p>/Martin</p>
]]>
        </description>
    </item>
    <item>
        <title>how to debug bgp?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4351/how-to-debug-bgp</link>
        <pubDate>Fri, 18 Jul 2025 13:28:17 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>vanessa</dc:creator>
        <guid isPermaLink="false">4351@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>hello community,<br />
i'm using bgp and want to manipulate the AS-Path from my internal network before exporting to an ebgp neighbor. no big deal i thought... but it's not working. I'm really missing any kind of bgp debugging possibilities, like a vtysh on cli. The only way i found to get bgp routes (with AS!) is from 'show status-report' somewhere in the middle of thousands of lines, but I can't imagine that this is the intended way? Even if i see the bgp routing table from the status-report, i don't see what i advertise...<br />
how do you debug or monitor your bgp sessions?</p>

<p>Firebox M5800<br />
Firmware v12.11.3</p>

<p>kind regards,<br />
vanessa</p>
]]>
        </description>
    </item>
    <item>
        <title>Moving External Interface IP to a Secondary IP of Another External Interface</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4343/moving-external-interface-ip-to-a-secondary-ip-of-another-external-interface</link>
        <pubDate>Mon, 07 Jul 2025 14:13:29 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>BazMac</dc:creator>
        <guid isPermaLink="false">4343@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi Team,</p>

<p>The description above will seem like there is a simple solution but there is a more complex situation in progress.</p>

<p>The WG unit we are discussing here is new. The config has been brought from a M370 unit. As part of a project to deploy this new WG, the client is has got a new WAN solution which uses BGP. The new WAN solution has two circuits which are now configured on separate External interfaces of this WG and BGP has been configured and working (with a test advertised prefix).</p>

<p>We will be migrating the customers IP ranges to this new solution and therefore the public IP(s) that are currently in use will no longer be configured on an external interface but rather advertised via BGP. This poses some questions I would like help with:</p>

<ol><li>The customer prefixes that are now to be advertised; should these IPs now be configured as secondary IPs on the External interfaces now participating in BGP? I had thought this would be the case but it turns out that an IP can only exist on 1 external interface at a time.</li>
</ol><p>Here is a snaitized version of the topology:</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/z7/0eb2yv1ysqrs.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/z7/0eb2yv1ysqrs.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/z7/0eb2yv1ysqrs.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/z7/0eb2yv1ysqrs.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/z7/0eb2yv1ysqrs.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/z7/0eb2yv1ysqrs.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/z7/0eb2yv1ysqrs.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/z7/0eb2yv1ysqrs.png" sizes="100vw" /></p>
]]>
        </description>
    </item>
    <item>
        <title>Policy based routing</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4331/policy-based-routing</link>
        <pubDate>Mon, 16 Jun 2025 09:49:29 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>sokratis_laskaridis</dc:creator>
        <guid isPermaLink="false">4331@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi , I m on a M390 ver 12.11<br />
I have 2 external interfaces and running many policies using SDWAN for failover<br />
I want a specific IP in my rusted network to reach internet from a specific external. I thing now the policy based routing is not used any more.<br />
How can I route from a specific external interface , based on source and destination IP ? (like Policy routing of Fortigat) thanks</p>
]]>
        </description>
    </item>
    <item>
        <title>UDP flood attacks &amp; false positives</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4295/udp-flood-attacks-false-positives</link>
        <pubDate>Tue, 06 May 2025 23:24:12 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>GePo</dc:creator>
        <guid isPermaLink="false">4295@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>A long time, in our Firebox's Default Packet Handling, I enabled the defaults without thinking much of it — including 1,000 packets/second for UDP.</p>

<p>Our organization relies on UDP for lots of SRT-based remote desktop access (not RDP), 4K video streaming, and IBM FASP UDP-based file transfers.</p>

<p>Last week, we had an internet outage, caused by losing DNS. After analyzing our Firebox logs with Watchguard's help, it turned out that a video streaming test we ran, triggered the UDP flood protection.</p>

<p>This has me looking at this feature, of course. What actually confuses me is… For file transfers alone, we routinely upload/download 350Mb/s, if not multiples of that. At 1500 MTU, that's 30,000 packets per second. And we've been running those smoothly for years, on the Firebox, with Default Packet Handling at 1K packets/sec enabled.</p>

<p>Similarly, while troubleshooting the DNS drop I rebooted our Firebox, and now the same video streaming test went fine. We upped it to 8x30Mbps UDP streams (20K packets/sec) while the CDN provider monitored the data streams, and all was well.</p>

<p>The math doesn't add up: How come this flood protection doesn't trigger all the time??</p>
]]>
        </description>
    </item>
    <item>
        <title>easy way to search mac-address</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3342/easy-way-to-search-mac-address</link>
        <pubDate>Wed, 05 Jul 2023 15:35:22 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>OLD_WG_Wolf</dc:creator>
        <guid isPermaLink="false">3342@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi There, I was looking for a mac-address in to the firewall arp Table but I understand that it seems is quite an annoying task:<br />
First I tried using the firebox system manager -&gt; system status and with a ctrl+f searching the ip address in the arp table but I realized that system manager only shows a partial list of the arp table.<br />
So I used the web UI, the list here is complete but I had to search in more than 30 pages to find the mac-address i was looking for.....<br />
This is not easy at all... is there an easier/faster way to accomplish this task?<br />
Thanks!<br />
Gabriele</p>
]]>
        </description>
    </item>
    <item>
        <title>Traffic monitor, history</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4311/traffic-monitor-history</link>
        <pubDate>Thu, 22 May 2025 19:42:53 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>tantony</dc:creator>
        <guid isPermaLink="false">4311@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have a couple of users reporting issue with connecting to a website sometimes.  But then later, they can access the same website.  We're not blocking this website (uline.com).  Since I can't always watch traffic monitor when they have issue, how can I check the traffic monitor for that computer for example, from 2 days ago?</p>

<p>Does traffic monitor only show live view?</p>
]]>
        </description>
    </item>
    <item>
        <title>Using Ubiquity Cloud Gateways with L2 Fiber Connection to bridge to internet</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4292/using-ubiquity-cloud-gateways-with-l2-fiber-connection-to-bridge-to-internet</link>
        <pubDate>Thu, 01 May 2025 20:57:39 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>GoldenArtist_Dan1</dc:creator>
        <guid isPermaLink="false">4292@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We have a remote location that is connected with layer 2 fiber.  The previous tech set this up in the following manner:</p>

<p>Remote Loc User &gt; DHCP Provided by local server &gt; L2 HP Switch &gt; Cisco Meraki E2 &gt; Telecom provider Fiber &gt; Cisco Meraki E2 &gt; Firebox E3 VLAN &gt; Firebox E1 &gt; Internet</p>

<p>IP addressing looks like this</p>

<p>192.168.2.34 &gt; 192.168.2.5 &gt; 192.168.2.2 &gt; fiber A &gt; fiber B &gt; 192.168.2.1 &gt; 192.168.1.1 &gt; Internet.</p>

<p>What I need to make this look like is:</p>

<p>192.168.2.34 &gt; 192.168.2.1 &gt;Internet</p>

<p>or</p>

<p>Wired Vlan1<br />
Wireless Vlan2 &gt; Cloud Gateway &gt; CG WAN port &gt; Internet</p>

<p>In reading on the ubiquity site they state that I am seeing a double NAT issue and need to create a bridge on the firewall for Port E3 on Firebox to appear as a direct connect to Internet to avoid double NAT.</p>

<p>Any ideas?</p>
]]>
        </description>
    </item>
    <item>
        <title>Clients fail to obtain IPv6 address from Delegated Prefix</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4284/clients-fail-to-obtain-ipv6-address-from-delegated-prefix</link>
        <pubDate>Fri, 25 Apr 2025 14:02:03 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>pacificadmin</dc:creator>
        <guid isPermaLink="false">4284@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>M370 running v12.11.2</p>

<p>External interface<br /><img src="https://us.v-cdn.net/6029905/uploads/editor/dx/yu4v0zjsrk9w.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/dx/yu4v0zjsrk9w.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/dx/yu4v0zjsrk9w.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/dx/yu4v0zjsrk9w.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/dx/yu4v0zjsrk9w.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/dx/yu4v0zjsrk9w.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/dx/yu4v0zjsrk9w.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/dx/yu4v0zjsrk9w.png" sizes="100vw" /></p>

<p>Trusted interface<br /><img src="https://us.v-cdn.net/6029905/uploads/editor/9m/4ubwfnscmi0i.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/9m/4ubwfnscmi0i.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/9m/4ubwfnscmi0i.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/9m/4ubwfnscmi0i.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/9m/4ubwfnscmi0i.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/9m/4ubwfnscmi0i.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/9m/4ubwfnscmi0i.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/9m/4ubwfnscmi0i.png" sizes="100vw" /></p>

<p>Front Panel info<br /><img src="https://us.v-cdn.net/6029905/uploads/editor/ni/cscanimwm7gd.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/ni/cscanimwm7gd.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/ni/cscanimwm7gd.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/ni/cscanimwm7gd.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/ni/cscanimwm7gd.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/ni/cscanimwm7gd.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/ni/cscanimwm7gd.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/ni/cscanimwm7gd.png" sizes="100vw" /></p>

<p>This config should allow clients to configure a IPv6 address via SLAAC but it's not working. No clients are getting an IPv6 address on the 2600:1700:47d1:163f::/64 network. A packet trace shows that Router Advertisement packets are being sent from the Firebox.</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/pb/nfk4nat79r54.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/pb/nfk4nat79r54.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/pb/nfk4nat79r54.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/pb/nfk4nat79r54.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/pb/nfk4nat79r54.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/pb/nfk4nat79r54.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/pb/nfk4nat79r54.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/pb/nfk4nat79r54.png" sizes="100vw" /></p>

<p>However I notice that there is no Prefix Information included. Should that be there in this case?</p>

<p>Here's a screenshot from an unrelated blog post showing a RA packet that includes prefix information.</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/7p/ubjv3i9j2up3.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/7p/ubjv3i9j2up3.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/7p/ubjv3i9j2up3.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/7p/ubjv3i9j2up3.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/7p/ubjv3i9j2up3.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/7p/ubjv3i9j2up3.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/7p/ubjv3i9j2up3.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/7p/ubjv3i9j2up3.png" sizes="100vw" /></p>

<p>If that should be in the RA packet sent from the Firebox, why would it be missing?</p>
]]>
        </description>
    </item>
    <item>
        <title>External Access Through VLAN Port on FIrebox</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4278/external-access-through-vlan-port-on-firebox</link>
        <pubDate>Tue, 22 Apr 2025 16:18:22 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>PABDA</dc:creator>
        <guid isPermaLink="false">4278@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi All,<br />
Hoping you guys can shed some light on this.</p>

<p>OBJECTIVE:<br />
===========.<br />
Need external access to internal resources.  Such as, email, helpdesk, core apps.</p>

<p>CONFIG SCENARIO:<br />
==================.<br />
FIREWALL: internal port is configured as dedicated internet VLAN and paired with the layer 3 switch as same.<br />
     - No other VLANs on firewall, <br />
     - no other ports connected to internet.<br />
     - Firewall has several static routes to each vlan subnet on the switch over the dedicated internet vlan.  These are pingable from the firewall PING tool.</p>

<p>SWITCH:<br />
   - default port (of last resort) points to the vlan port on firewall.<br />
   - all vlans have interfaces with default routes pointing to the internet vlan IP on the switch.</p>

<p>All outbound traffic on any vlan can access the internet.</p>

<p>ISSUE:  Prior to using VLANs, all external resources that were published were working.  Now, not a single internal resource is working when attempting to access externally.</p>

<p>Thinking it is a basic config that I have overlooked. (Am I allowed to publish resources through the vlan interface on the firewall?)</p>

<p>Hoping someone can point out my error.</p>

<p>Cheers</p>
]]>
        </description>
    </item>
    <item>
        <title>SD-WAN for applications</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4264/sd-wan-for-applications</link>
        <pubDate>Fri, 04 Apr 2025 14:27:05 +0000</pubDate>
        <category>Firebox - Networking, Multi-Wan, VLAN, NAT, SD-WAN</category>
        <dc:creator>KwevinC</dc:creator>
        <guid isPermaLink="false">4264@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hey everyone. I was wondering, is there a way to configure SD-WAN to do the following? I basically have an infrastructure that has Multi-WAN configured with two external interfces. What I'd like to do is make it so that when users use certain applications like zoom, anydesk, meet, wetransfer which usually use up quite a lot of bandwidth to use a dedicated external interface. Eg.: Are you using outlook? Ok for that traffic ur gonna use the main external interface. Are you using zoom? Okay since I recognise the software I'm gonna use this other (secondary) interface for this type of traffic so that you don't end up eating my entire main interface bandwidth. I hope that what I'm asking makes sense, don't hesitate to ask questions I'm completely open. <img src="https://us.v-cdn.net/6029905/uploads/editor/wh/jbvybqjrm464.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/wh/jbvybqjrm464.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/wh/jbvybqjrm464.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/wh/jbvybqjrm464.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/wh/jbvybqjrm464.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/wh/jbvybqjrm464.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/wh/jbvybqjrm464.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/wh/jbvybqjrm464.png" sizes="100vw" /></p>
]]>
        </description>
    </item>
   </channel>
</rss>
