{"id":17670,"date":"2019-10-11T15:00:07","date_gmt":"2019-10-11T15:00:07","guid":{"rendered":"https:\/\/www.firewallhardware.it\/pfsense-2-4-configurazione-wifi-una-guida-illustrata\/"},"modified":"2022-02-16T08:35:19","modified_gmt":"2022-02-16T08:35:19","slug":"pfsense-2-4-x-wifi-configuration-an-illustrated-guide","status":"publish","type":"post","link":"https:\/\/blog.miniserver.it\/en\/pfsense\/pfsense-2-4-x-wifi-configuration-an-illustrated-guide\/","title":{"rendered":"pfSense\u00ae 2.4.x: WIFI configuration an illustrated guide"},"content":{"rendered":"<p>[vc_row][vc_column_text css=&#8221;.vc_custom_1571037318967{margin-top: 75px !important;}&#8221;]<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">Objective of this article<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]In this article we explain how to configure a WIFI interface on pfSense\u00ae 2.4.xJTVCYWRyb3RhdGUlMjBiYW5uZXIlM0QlMjIzJTIyJTVE<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">Software used<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]pfSense\u00ae 2.4.X<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">Hardware used<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]The hardware used for the tests consisted of 4GB 16GB RAM and 4 Sk 10\/100\/1000 network: <a href=\"https:\/\/www.miniserver.it\/firewall\/entry-level\/firewall-entry-level-4-nic-apu4-based-2gb-ram\" target=\"_blank\" rel=\"noopener noreferrer\">Entry Level Firewall 4 NIC APU4 based 4GB RAM + WIFI<\/a> but can easily be applied to higher level hardware like this one : AUTM5 Aluminum + WIFI Firewall Appliance<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">Download ready-to-use Wifi configurations<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]To facilitate the configuration and testing of <strong>wifi configurations<\/strong>, we have prepared a series of configuration files ready for use. Once loaded on your device <strong>pfSense or OPNsense<\/strong> can save time and facilitate tests.<br \/>\nConfigurations are available for the following hardware:<\/p>\n<ul>\n<li>Firewall compatible: <a title=\"Wifi APU\" href=\"https:\/\/blog.miniserver.it\/en\/apu2-3nic\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wifi APU<\/a> &#8211; pfSense and OPNsense version;<\/li>\n<li>Firewall compatible: <a title=\"Compact Small UTM 3 Wifi\" href=\"https:\/\/blog.miniserver.it\/en\/compact-small-utm-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">Compact Small UTM 3 Wifi<\/a> &#8211; pfSense and OPNsense version;<\/li>\n<li>Firewall compatible: <a title=\"Small UTM 3 Wifi\" href=\"https:\/\/blog.miniserver.it\/en\/small-utm3\/\" target=\"_blank\" rel=\"noopener noreferrer\">Small UTM 3 Wifi<\/a> &#8211; pfSense and OPNsense version.Wifi configurations for pfSense and OPNsense firewalls.<\/li>\n<\/ul>\n<p>[vc_btn title=&#8221;Click on the following link to download the configuration files&#8221; style=&#8221;custom&#8221; custom_background=&#8221;#00a0df&#8221; custom_text=&#8221;#ffffff&#8221; i_icon_fontawesome=&#8221;fas fa-chevron-circle-right&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fwww.firewallhardware.it%2Fopt%2FpfSenseOPNsense%2Fconfigurations-wifi-firewall-pfsense-opnsense%2F|title:Wifi%20configurations%20for%20pfSense%20and%20OPNsense%20firewalls|target:%20_blank|&#8221; css=&#8221;.vc_custom_1593693822663{margin-top: -15px !important;}&#8221;]<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">Introduction<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]There are many tutorials on the Internet for wireless configuration of pfSense\u00ae, but most of them don&#8217;t seem to work and the rest is for previous versions of pfSense\u00ae.<\/p>\n<p>Prerequisites:<\/p>\n<ul>\n<li>Have a wireless card supported by pfSense\u00ae (eg <a href=\"https:\/\/www.miniserver.it\/wifiModuleASUTM.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">WLE200NX<\/a>)<\/li>\n<li>Make sure the card is properly mounted in the mPCIe slot and that the antenna cables are securely connected<\/li>\n<li>The card is detected by pfSense\u00ae<\/li>\n<\/ul>\n<p>Now, step by step instructions.<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">How to configure a WIFI card in bridge with the LAN in pfsense<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]If on <strong>pfsense<\/strong> you have a WIFI card and you want that, who connects to this wifi, is part of the LAN network (so it will take the DHCP of the LAN, will have a LAN address, etc.), it will be necessary to create a bridge between the LAN and WIFI as described in this guide.<strong>First we create a fictitious interface: <\/strong><br \/>\nSelect <strong>Interface-&gt; Assignment<\/strong>[vc_single_image image=&#8221;18616&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]Click on the PPPs tab then &#8220;<strong>Add<\/strong>&#8220;[vc_single_image image=&#8221;18618&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]Configure as below, then save[vc_single_image image=&#8221;18620&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">Configure the WIFI interface<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]Select <strong>Interface-&gt; assignement<\/strong> and then tab &#8220;<strong>wireless<\/strong>&#8221;<\/p>\n<p>Click on &#8220;<strong>add<\/strong>&#8221; configure as below and save. The card: &#8220;ath0 (Atheros 9280)&#8221; will change based on the sk wifi you have installed[vc_single_image image=&#8221;18622&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]Select <strong>Interface-&gt;assignement<\/strong>, then from &#8220;avaible network ports&#8221; select the wifi port (i.e. ath0_wlan0 &#8230;) then add. The result will be similar to the figure below (instead of &#8220;wifi&#8221; you will probably have &#8220;OPT1&#8221;). Click on the interface just created (&#8220;OPT1&#8243;)[vc_single_image image=&#8221;18624&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]Configure the WIFI interface with your SSID, preshared key, etc. An example below:[vc_single_image image=&#8221;18626&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;][vc_single_image image=&#8221;18628&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">NIC Preparation<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]From <strong>Interface-&gt;assignment<\/strong>, add the newly created &#8220;PPP&#8221; temporary port, selecting it from &#8220;Avaible network ports:&#8221; and then clicking on add. As in the figure[vc_single_image image=&#8221;18630&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]Now click on the newly created tab (in the OPT2 example)[vc_single_image image=&#8221;18632&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]Configure it, activate it and choose a name[vc_single_image image=&#8221;18634&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">Create il bridge<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]From <strong>Interface-&gt;Assignement<\/strong> then from the TAB \u201cBridges\u201d, create a new bridge as shown, then save[vc_single_image image=&#8221;18636&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">Final assignment of the NICs<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]<\/p>\n<ul>\n<li>The following operation is delicate;<\/li>\n<li>The interface assigned to the LAN must be assigned to LAN_Port (i.e. igb1).<\/li>\n<\/ul>\n<p>The LAN interface will be assigned to the bridge just created.<\/p>\n<p>These two operations must be carried out in strict sequence. Only when both assignments have been made, saved and applied. The result will be similar to the figure below.[vc_single_image image=&#8221;18638&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]<\/p>\n<h3 style=\"color: #00a0df; font-size: 20px; text-align: left;\">Create firewall rules<\/h3>\n<p>[vc_separator css=&#8221;.vc_custom_1557407376721{margin-top: -20px !important;}&#8221;]In addition to the rules on the LAN interface, remember to create a rule on WIFI and LAN_PORT to allow traffic. See example on the LAN_PORT interface (create identical rule on WIFI)[vc_single_image image=&#8221;18640&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]The result will be the following[vc_single_image image=&#8221;18642&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many tutorials all over the internet for pfSense wireless configuration, but most of them don&#8217;t seem to work work and the rest is for the previous pfSense versions.<\/p>\n","protected":false},"author":11,"featured_media":25244,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[124],"tags":[199,265,138],"class_list":["post-17670","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pfsense","tag-firewall-en","tag-firewall-en-2","tag-pfsense-en"],"_links":{"self":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts\/17670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/comments?post=17670"}],"version-history":[{"count":19,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts\/17670\/revisions"}],"predecessor-version":[{"id":17675,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/posts\/17670\/revisions\/17675"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/media\/25244"}],"wp:attachment":[{"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/media?parent=17670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/categories?post=17670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.miniserver.it\/en\/wp-json\/wp\/v2\/tags?post=17670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}