<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Firewall - Fix The Exchange!</title>
	<atom:link href="https://www.fixtheexchange.com/tag/firewall/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.fixtheexchange.com</link>
	<description>Official Blog of Josh M. Bryant</description>
	<lastBuildDate>Fri, 05 Dec 2025 16:17:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Budget Laboratory: Part 1 &#8211; Multi-WAN Load Balancing with pfSense on VMWare Workstation</title>
		<link>https://www.fixtheexchange.com/2011/08/30/budget-laboratory-part-1-multi-wan-load-balancing-pfsense-vmware-workstation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=budget-laboratory-part-1-multi-wan-load-balancing-pfsense-vmware-workstation&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=budget-laboratory-part-1-multi-wan-load-balancing-pfsense-vmware-workstation</link>
		
		<dc:creator><![CDATA[Josh Bryant]]></dc:creator>
		<pubDate>Tue, 30 Aug 2011 19:45:40 +0000</pubDate>
				<category><![CDATA[Home Lab]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[pfSense]]></category>
		<category><![CDATA[VMWare]]></category>
		<guid isPermaLink="false">http://www.fixtheexchange.com/budget-laboratory-part-1-multi-wan-load-balancing-with-pfsense-on-vmware-workstation/</guid>

					<description><![CDATA[<p>Wait a minute, I thought this was an &#8220;Exchange blog&#8221;, why is your first article about networking with pfSense?! Well, in order to create high quality Exchange related content for this site, I&#8217;ve been building a lab. There has been some interest in how I&#8217;ve setup my lab, so I thought I&#8217;d show you. What [&#8230;]</p>
<p>The post <a href="https://www.fixtheexchange.com/2011/08/30/budget-laboratory-part-1-multi-wan-load-balancing-pfsense-vmware-workstation/">Budget Laboratory: Part 1 – Multi-WAN Load Balancing with pfSense on VMWare Workstation</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Wait a minute, I thought this was an &#8220;Exchange blog&#8221;, why is your first article about networking with <a href="http://www.pfsense.com">pfSense</a>?!</p>
<p>Well, in order to create high quality Exchange related content for this site, I&#8217;ve been building a lab. There has been some interest in how I&#8217;ve setup my lab, so I thought I&#8217;d show you. What better way to help people learn Exchange than by showing them how to create a powerful lab environment to run it in? Besides, having a good understanding of boundary systems is very useful when troubleshooting mail flow issues.</p>
<p>Part 1 of my &#8220;Budget Laboratory&#8221; series is actually optional, and the only part of the lab that will cost anything (assuming you already own the hardware). It will only cost anything if you plan on using your Lab for more than 30 days.</p>
<p>We&#8217;ll be building most of this lab using only a single computer. I recommend a quad core CPU with at least 8 GB of RAM, however you may be able to do it with less.</p>
<p>The information in this guide will be useful for much more than a home lab, you could also use this in a production environment for a small business, or even a large enterprise, if scaled and configured properly.</p>
<ul>You will need:</p>
<li>A computer with 3 RJ45 (network) ports and a 64bit Operating System (OS).*</li>
<li>At least two high speed internet connections.**</li>
<li><a href="http://www.vmware.com/products/workstation/overview.html">VMWare Workstation 7.</a> (30 day FREE trial, $100 after that.)</li>
<li><a href="http://files.pfsense.org/vmware/pfSense-1.2.3-VM.zip">pfSense 1.2.3 virtual appliance.</a> (FREE!)***</li>
<li>A Wireless Access Point, switch, or combined device.****</li>
</ul>
<p>*If you don&#8217;t have 3 RJ45 ports available, I highly recommend adding Intel Pro 1000 NICs. You can use your on-board NIC for one of the connections. For my setup, I purchased 2 Intel Pro 1000 NICs for $30 each, and used the on-board RealTEK NIC off my motherboard for the 3rd. Why a 64bit OS? Because later on in this series I will show you how to run VMWare ESXi 4.1 inside of VMWare Workstation, and connect it to a virtual SAN. The host OS has to be 64bit for this to work. I&#8217;ll be using 64-bit Windows 7 for my examples. You can achieve the same results with your favorite 64bit Linux distribution as a host operating system.</p>
<p>**If you don&#8217;t have 2 high speed internet connections, you obviously won&#8217;t be able to setup Multi-WAN load balancing. However you can still setup a pfSense firewall inside of VMWare Workstation 7, and route all of your network traffic.</p>
<p>***I&#8217;ll be doing another guide for pfSense 2.0 when the final stable build is released for it.</p>
<p>****I&#8217;m using a LinkSys WRT330N, which is a combination Wireless Access Point, Router, and 4 port gigabit switch.</p>
<p><strong>Step 1: Connect the modems and switch to your computer.</strong></p>
<p><center><br />
<a title="Click for full size" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/field/image/lablan_0.png" rel="lightbox"><br />
<img fetchpriority="high" decoding="async" class=" size-full wp-image-68" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/lablan_0.png" alt="Multi-WAN Diagram" width="919" height="695" /></a></center>It should resemble the diagram above. For my setup, I have an old Motorola SB5101 cable modem that I&#8217;ve owned for years, and an SMCD3G leased modem from my cable company. This is purely for speed. If you were going to setup Multi-WAN load balancing in a production environment, you&#8217;d want to have two unique ISPs. Cable and DSL for example. That way you can have true fault tolerance and high availability. If the connection to one ISP is lost, traffic will still be routed through the other. There&#8217;s only one ISP that services the area I live in, so that&#8217;s why I have 2 connections to the same ISP. You could add additional connections to ISP(s) for even more speed or fault tolerance, just add more network ports to the computer hosting pfSense.</p>
<p>Each connection to your ISP should go to 1 port on the computer you&#8217;ll be setting pfSense up on. One connection goes to the switch for your LAN.</p>
<p>Note: If you are using something similar to the Linksys WRT330N that I have, you want to use one of the LAN switch ports on it for the connection to the pfSense firewall. DO NOT use the &#8220;INTERNET&#8221; (WAN/uplink) port, it won&#8217;t work. You also need to turn off the firewall, NAT, and DHCP server on this device, if it has those features. We&#8217;ll be using pfSense to do all of that now. You will need to change the default IP on this device as well. Usually it&#8217;s something like 192.168.1.1. We&#8217;ll be using x.x.x.1 as the gateway IP for our LAN. These devices usually aren&#8217;t smart enough to do VLANs, so if the address space doesn&#8217;t match what we configure in pfSense, things aren&#8217;t going to work. I changed mine to x.x.x.5. You can use any private address space you like for your LAN. Since mine is a small home lab, I&#8217;m using a single 24 bit subnet, so this guide will reflect that.</p>
<p><strong>Step 2: Configure the host.</strong></p>
<p>As I mentioned, I&#8217;m using 64bit Windows 7 as my host, so this example is from that. If you&#8217;re using a different host OS, you will need to do accomplish the same end result.</p>
<p>First, I recommend labeling your NICs. I gave mine names that matched what they are connected to. If I had 2 different ISPs, I would have given the WAN links the name of the ISP they are connected to, but since I don&#8217;t, I named them after the modem model number they are connected to instead.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/field/image/w7nic.png" rel="lightbox"><br />
<img decoding="async" class=" size-full wp-image-69" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/w7nic.png" alt="" width="1164" height="298" /></a></center>Next we need to disable TCP/IP on the WAN links. Bring up the properties for each NIC that is connected to your ISP(s).</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/field/image/nicproperties.png" rel="lightbox"><br />
<img decoding="async" class=" size-full wp-image-70" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/nicproperties.png" alt="" width="377" height="474" /></a></center>Make sure both &#8220;Internet Protocol Version 6 (TCP/IPv6)&#8221; and &#8220;Internet Protocol Version 4 (TCP/IPv4)&#8221;</p>
<p>The last thing we need to do in this step, is change the binding order of the NICs. In Windows 7 you hit &#8220;Alt+N&#8221; to bring up the hidden menu in your Network Connections, then select &#8220;Advanced Settings&#8221;. Move your LAN NIC to the top of the list.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/field/image/advanced.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-71" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/advanced.png" alt="" width="414" height="461" /></a></center>TIP: You can disable TCP/IP on the WAN NICs from the &#8220;Advanced Settings&#8221;, just select the NIC and uncheck all check boxes for it.</p>
<p>This is done to make sure traffic from the host OS gets routed through the pfSense firewall. If you do not do this, both the host OS, and the pfSense VM will try to pick up an IP address from your ISP(s). Your host will end up connecting to the internet through one of these NICs and not be able to take advantage of the load balancing.</p>
<p>You need to leave TCP/IP <strong>enabled</strong> on your LAN NIC.</p>
<p><strong>Step 3: Configure VMWare Workstation 7</strong></p>
<p>If you haven&#8217;t already installed VMWare Workstation 7, do it now before continuing.</p>
<p>Here we need to configure the NICs for use by our virtual machines. Click &#8220;Edit&#8221; then &#8220;Virtual Network Editor&#8221;.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/field/image/vne.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-72" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/vne.png" alt="" width="604" height="509" /></a></center>As you can see, I have VMnet0 bridged to one of my Intel Pro 1000 NICs, VMnet2 bridged to the other, and VMnet3 bridged to my motherboards on-board Realtek NIC. VMWare Workstation 7 doesn&#8217;t use the labels that we assigned in the host, but you can easily tell which is which. If you look in at the screen shot where I labeled my NICs in Step 2, you can see that VMnet 0 is my connection to the SB5101 modem, VMnet2 is the connection to the SMC modem, and VMnet3 is the connection to the LAN.</p>
<p><strong>Step 4: Configure the pfSense virtual machine settings</strong></p>
<p>Open up the pfSense virtual appliance in VMWare Worksation 7, but do NOT power it on. Bring up the Virtual Machine Settings by clicking &#8220;Edit virtual machine settings&#8221; or hitting &#8220;CTRL+D&#8221;.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/field/image/vmsettings.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-73" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/vmsettings.png" alt="" width="669" height="587" /></a></center>Make sure you have 3 devices of the type &#8220;Network Adapter&#8221;, 1 for each NIC we configured in Step 3. Select each &#8220;Network Adapter&#8221;, make sure &#8220;Connected&#8221; and &#8220;Connect at power on&#8221; are both checked. Set the &#8220;Network connection&#8221; to &#8220;Custom: Specific virtual network&#8221;, and select one of the VMnet# that you configured in Step 3 for each &#8220;Network Adapter&#8221;.</p>
<p><strong>Step 5: Configure pfSense from the console.</strong></p>
<p>Now it&#8217;s time to boot your pfSense VM. When it boots, you should see a screen like this:</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/field/image/pfsenseboot.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-74" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/pfsenseboot.png" alt="" width="720" height="400" /></a></center>Your interfaces may not be assigned, mine weren&#8217;t, and pfSense was unable to automatically detect them. If this happens, it may take a little trial and error to get them assigned correctly. Press 1 then hit enter to assign them. Your WAN links should pick up an IP address from either your ISP, or your cable modem, if they use DHCP. If you get it wrong the first time, you can usually tell which one is the correct LAN interface by looking for the interface that does not pick up an IP address at the top of the screen. If you see &#8220;0.0.0.0&#8221;, that is most likely your LAN interface, write down the interface number, and run the assignment again. If you own a static IP address, you will need to configure it later. The LAN interface assignment is what is important here, once you have the correct interface assigned for the LAN, the rest of the configuration will be done through the web management console.</p>
<p>You can change the LAN IP by hitting 2, or use the default, it&#8217;s up to you.</p>
<p><strong>Step 6: Configure pfSense from the web interface.</strong></p>
<p>Open a web browser and go to <a href="http://192.168.1.1">http://192.168.1.1</a> (or whatever you changed the LAN IP to.). The default username is &#8220;admin&#8221; and the default password is &#8220;pfsense&#8221; (don&#8217;t forget to change these!). You&#8217;ll be greeted with a configuration wizard, click &#8220;Next&#8221;.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/field/image/pfsensew1.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-75" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/pfsensew1.png" alt="" width="735" height="425" /></a></center>Enter your information, I used my ISPs DNS. Click &#8220;Next&#8221;<br />
The time zone settings will come up, select your time zone and click &#8220;Next&#8221;.<br />
Now you will asked to configure the WAN interface. If you have a static IP from your ISP, here is where you&#8217;ll configure it, UNLESS that is handled by your modem. If your modem gets the static IP assignment from your ISP, you will want to leave this as DHCP so it will pick up a private address from your modem.<br />
The next page lets you change the LAN IP, if you did that in Step 5, or just want to use the default, you can just click &#8220;Next&#8221; and move on.<br />
Finally we&#8217;ll set the WebGUI password. After you change it, you&#8217;ll have to log back on.</p>
<p>Next we need to configure the second WAN interface. Click &#8220;Interfaces&#8221; then &#8220;OPT1&#8221;.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/field/image/opt1.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-76" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/opt1.png" alt="" width="1059" height="1057" /></a></center>Make sure &#8220;Enable Optional 1 interface&#8221; is checked. You can change the name here, I labeled mine &#8220;WAN2&#8221;. If you have a static IP for your other ISP connection, you&#8217;ll want to configure it here. If you only own 1 static IP, you should probably leave this set as DHCP. Again, if your modem handles your public IP, you should probably leave this as DHCP.</p>
<p>Next we will create a Load Balancer Pool. Click on &#8220;Services&#8221; then &#8220;Load Balancer&#8221;. When the page loads, click the <img loading="lazy" decoding="async" class=" size-full wp-image-77" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/icon_plus.gif" alt="" width="17" height="17" /> icon to create a new pool.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/field/image/loadbalancer.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-78" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/loadbalancer.png" alt="" width="848" height="741" /></a></center>Give the pool a name, I called mine &#8220;LoadBalancer&#8221;. Make sure the type is set to &#8220;Gateway&#8221;, and Behavior is set to &#8220;Load Balancing&#8221;.<br />
Add both WAN IP&#8217;s to the pool. I use the gateway for each WAN interface as the monitor IP.<br />
Click &#8220;Save&#8221; when you are done.<br />
Create a second pool for Failover, just set the type to &#8220;failover&#8221; for this one.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/pfsensepools.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-79" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/pfsensepools.png" alt="" width="845" height="581" /></a></center>You should have 2 pools as shown above when you&#8217;re done.</p>
<p>We&#8217;re almost done, the last thing we need to do, is setup some firewall rules. Click &#8220;Firewall&#8221; then &#8220;Rules&#8221;. When the page loads, select the &#8220;LAN&#8221; tab.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/pfsensefwrules_0.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-80" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/pfsensefwrules_0.png" alt="" width="847" height="817" /></a></center>We don&#8217;t want all traffic to be load balanced. You can&#8217;t load balance SSL and other encrypted traffic, those types of connections need to use the same IP every time. pfSense processes rules from the top down. You&#8217;ll notice the load balancer rule is at the bottom. Anything we don&#8217;t want load balanced needs to be in a rule ABOVE it. I&#8217;ll show you how to create a rule to NOT load balance a protocol, using HTTPS as an example. First click the <img loading="lazy" decoding="async" class=" size-full wp-image-77" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/icon_plus.gif" alt="" width="17" height="17" /> icon to create a new rule.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/pfsensefwrule1_0.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-81" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/pfsensefwrule1_0.png" alt="" width="940" height="1133" /></a></center>Your settings should match the screen shot above. Using the failover gateway we configured will ensure these protocols still work with minimal interruption if one of our WAN links goes down.</p>
<p>Now lets tell it to load balance everything else, you probably already had a &#8220;Default LAN -&gt; Any&#8221; rule, just click the <img loading="lazy" decoding="async" class=" size-full wp-image-82" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/icon_e.gif" alt="" width="17" height="17" /> icon to edit it.</p>
<p><center><br />
<a title="" href="http://www.fixtheexchange.com/sites/fixtheexchange.com/files/pfsensefwrule2.png" rel="lightbox"><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-83" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/pfsensefwrule2.png" alt="" width="940" height="1133" /></a></center>Your rule should look like the screen shot above. Save it, then apply the changes.</p>
<p>That&#8217;s it! All of your network traffic should now be flowing through the pfSense virtual machine. To verify that the load balancing is working, go to a site like <a href="http://www.whatismyip.com">www.whatismyip.com</a>, and refresh the page a couple times. The IP shown should change back and forth between the external IPs of your WAN links every time the page loads.</p>
<p>If you want to test the speed out, you can use a site like <a href="http://www.speedtest.net">www.speedtest.net</a>, however these results can be a little inaccurate due to the &#8220;Speed Boost&#8221; that a lot of ISPs use these days. I have a 12Mbps down and 2Mbps up package from my ISP, and these are the results I get after setting up the load balancing:</p>
<p><center></p>
<p><img decoding="async" src="http://www.speedtest.net/result/1458546904.png" /><br />
<img decoding="async" src="http://www.speedtest.net/result/1458551761.png" /><br />
<img decoding="async" src="http://www.speedtest.net/result/1458552679.png" /></center>If you want to test the fail over, simply unplug one of your WAN links and try surfing the web. You should still be able to even with one link down. Plug it back in, and it should automatically start load balancing again.</p>
<p>If I pull the plug on one of my WAN links and run a speed test, this is the result:</p>
<p><center></p>
<p><img decoding="async" src="http://www.speedtest.net/result/1459474167.png" /><br />
<img decoding="async" src="http://www.speedtest.net/result/1459476911.png" /><br />
<img decoding="async" src="http://www.speedtest.net/result/1459482519.png" /></center>As you can see there&#8217;s quite a difference in bandwidth with the load balancing.</p>
<p>Just for fun I took a look at what World of Warcraft thought my &#8220;effective bandwidth&#8221; was&#8230;</p>
<p><center><br />
<img loading="lazy" decoding="async" class=" size-full wp-image-84" title="" src="http://www.fixtheexchange.com/wp-content/uploads/2011/08/wowbandwidth.png" alt="" width="253" height="475" /></center>176Mbps, don&#8217;t I wish!</p>
<p>I hope you&#8217;ve enjoyed this guide, stay tuned for Part 2 of my &#8220;Budget Laboratory&#8221; series, where I&#8217;ll show you how to setup a virtual SAN using freeNAS and VMWare Workstation 7.</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.fixtheexchange.com/wp-content/uploads/2025/12/4000px_transparent-scaled.png" width="100"  height="100" alt="" itemprop="image"></div><div class="saboxplugin-authorname"><a href="https://www.fixtheexchange.com/author/josh/" class="vcard author" rel="author"><span class="fn">Josh Bryant</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Cybersecurity Product Leader and internationally recognized Speaker at several Information Security conferences and events with over 26 years of experience as a proven leader in Cybersecurity, Product Management, Threat Hunting, Incident Response, IT Management, IT Architecture, IT Operations, IT Engineering, and Messaging Systems, on a global scale, across a diverse set of industries in both the Public and Private sectors.</p>
</div></div><div class="saboxplugin-web "><a href="http://192.168.2.21:30040" target="_self" >192.168.2.21:30040</a></div><div class="clearfix"></div><div class="saboxplugin-socials sabox-colored"><a title="Linkedin" target="_self" href="https://www.linkedin.com/in/josh-m-bryant/" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-linkedin" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.8 250.7c0 7.6-0.4 15.2-1 22.6-0.2 2.2-0.4 4.4-0.7 6.6-0.1 0.6-0.1 1.1-0.2 1.7-0.3 2.6-0.7 5.2-1.1 7.7-0.4 2.3-0.8 4.7-1.2 7 0 0.3-0.1 0.6-0.2 0.9-0.2 1-0.4 1.9-0.5 2.9-0.2 0.8-0.4 1.6-0.5 2.5-0.1 0.3-0.1 0.5-0.2 0.8-0.7 3.3-1.5 6.5-2.3 9.7-0.6 2.3-1.2 4.5-1.9 6.8-1.5 5.3-3.2 10.5-5 15.6-26.7 73.9-87.3 131.6-163.2 154.2-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3h-0.2c-0.2 0-0.3 0.1-0.5 0.1l-3 0.6c-1.8 0.3-3.6 0.6-5.4 0.9-0.2 0-0.3 0.1-0.5 0.1-0.9 0.1-1.9 0.3-2.8 0.4-5.5 0.8-11.1 1.3-16.7 1.7-0.8 0.1-1.6 0.1-2.4 0.1-5 0.3-10.1 0.4-15.2 0.4-137.7 0-249.3-111.6-249.3-249.3s111.6-249.4 249.3-249.4 249.3 111.7 249.3 249.4z" fill="#0077b5" /><path class="st1" d="m485 335.5c-26.7 73.9-87.3 131.6-163.2 154.2-3 0.9-6.1 1.8-9.2 2.6-1.5 0.4-3 0.8-4.5 1.1-3.6 0.9-7.2 1.6-10.9 2.3h-0.2l-148.3-148.1 35.3-142.9-32-37.6 38.1-38.7 68 68.4h11.9l9.5 9.3 70.5-3.9 135 133.3z" /><path class="st2" d="m195.6 347.6h-46.9v-150.8h46.9v150.8zm-23.5-171.4c-15 0-27.1-12.4-27.1-27.4s12.2-27.1 27.1-27.1c15 0 27.1 12.2 27.1 27.1s-12.1 27.4-27.1 27.4zm198.9 171.4h-46.8v-73.4c0-17.5-0.4-39.9-24.4-39.9-24.4 0-28.1 19-28.1 38.7v74.7h-46.8v-150.9h44.9v20.6h0.7c6.3-11.9 21.5-24.4 44.3-24.4 47.4 0 56.1 31.2 56.1 71.8l0.1 82.8z" /></svg></span></a><a title="Twitter" target="_self" href="https://x.com/FixTheExchange" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-twitter" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 148 148">
  <path d="M 63.907 0.948 C 37.893 3.663 14.65 20.788 4.083 45.024 C -2.727 60.67 -3.86 78.686 0.975 95.272 C 6.947 115.953 22.396 133.424 42.387 142.162 C 58.034 148.972 76.05 150.106 92.636 145.27 C 117.461 138.113 137.009 117.731 143.424 92.408 C 153.443 52.724 128.862 12.148 89.079 2.675 C 80.342 0.602 72.646 0.058 63.907 0.948 Z M 64.893 46.801 C 71.21 55.192 76.544 62.103 76.741 62.103 C 76.938 62.103 83.504 55.192 91.252 46.801 L 105.419 31.5 L 113.463 31.5 L 111.735 33.328 C 110.749 34.361 104.332 41.322 97.47 48.775 C 90.61 56.229 83.898 63.483 82.563 64.817 L 80.194 67.334 L 98.705 91.965 C 108.874 105.538 117.215 116.789 117.215 116.99 C 117.215 117.238 111.145 117.383 103.787 117.383 L 90.314 117.334 L 77.777 100.553 C 69.14 88.954 65.092 83.965 64.697 84.265 C 64.401 84.512 57.39 92.065 49.1 101.046 L 34.045 117.383 L 30.242 117.383 C 28.122 117.383 26.395 117.283 26.395 117.138 C 26.395 116.99 34.243 108.398 43.816 98.084 C 53.345 87.768 61.243 79.131 61.339 78.984 C 61.391 78.784 53.542 68.074 43.918 55.192 C 34.293 42.359 26.395 31.747 26.395 31.646 C 26.395 31.55 32.465 31.5 39.919 31.5 L 53.442 31.5 L 64.893 46.801 Z M 64.893 46.801" />
  <path d="M 38.588 38.114 C 38.784 38.459 51.22 55.142 66.128 75.082 L 93.276 111.411 L 99.344 111.461 C 103.098 111.461 105.368 111.263 105.267 110.966 C 105.222 110.721 92.832 94.04 77.827 73.949 L 50.48 37.423 L 44.361 37.423 C 39.279 37.423 38.242 37.524 38.589 38.114 L 38.588 38.114 Z M 38.588 38.114" />
</svg></span></a><a title="Github" target="_self" href="https://github.com/FixTheExchange" rel="nofollow noopener" class="saboxplugin-icon-color"><svg class="sab-github" viewBox="0 0 500 500.7" xml:space="preserve" xmlns="http://www.w3.org/2000/svg"><path class="st0" d="m499.8 250.7c0 9.9-0.6 19.7-1.7 29.2-0.1 0.6-0.1 1.1-0.2 1.7-0.3 2.6-0.7 5.2-1.1 7.7-0.4 2.3-0.8 4.7-1.2 7-0.2 1.3-0.5 2.5-0.7 3.8-0.2 1.1-0.5 2.2-0.7 3.3-1.2 5.6-2.6 11-4.2 16.5-23.4 81.3-87.1 145.6-168.2 169.8-4.5 1.3-9.1 2.6-13.7 3.7-6.5 1.6-13.2 2.8-20 3.9-0.2 0-0.3 0.1-0.5 0.1-0.9 0.1-1.9 0.3-2.8 0.4-5.5 0.8-11.1 1.3-16.7 1.7-0.8 0.1-1.6 0.1-2.4 0.1-5 0.3-10.1 0.4-15.2 0.4-137.7 0-249.3-111.6-249.3-249.3s111.6-249.4 249.3-249.4 249.3 111.7 249.3 249.4z" fill="#4078c0" /><path class="st1" d="m495.6 296.3c-0.2 1.3-0.5 2.5-0.7 3.8-0.2 1.1-0.5 2.2-0.7 3.3-1.2 5.6-2.6 11-4.2 16.5-23.4 81.3-87.1 145.6-168.2 169.8-4.5 1.3-9.1 2.6-13.7 3.7-6.5 1.6-13.2 2.8-20 3.9l-140.4-141.1-14.9-35.9-7.8-71 32.6-89.2 79.9-17.7 111.5 7.2 146.6 146.7z" /><path class="st2" d="m204 339c0 1.2-1.3 2.1-3 2.1-1.9 0.2-3.3-0.8-3.3-2.1 0-1.2 1.3-2.1 3-2.1 1.8-0.1 3.3 0.8 3.3 2.1zm-18.1-2.6c-0.4 1.2 0.8 2.5 2.5 2.8 1.5 0.6 3.3 0 3.6-1.2s-0.8-2.5-2.5-3c-1.5-0.3-3.2 0.3-3.6 1.4zm25.7-1c-1.7 0.4-2.8 1.5-2.7 2.8 0.2 1.2 1.7 1.9 3.4 1.5s2.8-1.5 2.7-2.7c-0.2-1-1.7-1.7-3.4-1.6zm38.2-222.8c-80.6 0-142.3 61.2-142.3 141.9 0 64.5 40.6 119.7 98.5 139.1 7.4 1.3 10.1-3.3 10.1-7 0-3.6-0.2-23.5-0.2-35.7 0 0-40.7 8.7-49.2-17.3 0 0-6.6-16.9-16.2-21.3 0 0-13.3-9.1 0.9-9 0 0 14.5 1.2 22.4 15 12.7 22.4 34.1 16 42.4 12.2 1.3-9.3 5.1-15.8 9.3-19.6-32.5-3.6-65.3-8.3-65.3-64.2 0-16 4.4-24 13.7-34.2-1.5-3.8-6.5-19.4 1.5-39.5 12.2-3.8 40.1 15.7 40.1 15.7 11.6-3.3 24.1-4.9 36.5-4.9s24.9 1.7 36.5 4.9c0 0 28-19.5 40.1-15.7 8 20.2 3 35.7 1.5 39.5 9.3 10.3 15 18.3 15 34.2 0 56.1-34.2 60.6-66.7 64.2 5.3 4.6 9.9 13.3 9.9 27 0 19.6-0.2 43.8-0.2 48.6 0 3.8 2.7 8.4 10.1 7 58.1-19.3 97.6-74.5 97.6-139 0.1-80.6-65.3-141.9-146-141.9zm-85.8 200.6c-0.8 0.6-0.6 1.9 0.4 3 0.9 0.9 2.3 1.3 3 0.6 0.8-0.6 0.6-1.9-0.4-3-0.9-1-2.2-1.4-3-0.6zm-6.3-4.7c-0.4 0.8 0.2 1.7 1.3 2.3 0.9 0.6 2.1 0.4 2.5-0.4s-0.2-1.7-1.3-2.3c-1.1-0.4-2-0.2-2.5 0.4zm18.9 20.7c-0.9 0.8-0.6 2.5 0.8 3.6 1.3 1.3 3 1.5 3.8 0.6 0.8-0.8 0.4-2.5-0.8-3.6-1.3-1.4-3.1-1.6-3.8-0.6zm-6.6-8.6c-0.9 0.6-0.9 2.1 0 3.4s2.5 1.9 3.3 1.3c0.9-0.8 0.9-2.3 0-3.6s-2.4-1.8-3.3-1.1z" /></svg></span></a></div></div></div><p>The post <a href="https://www.fixtheexchange.com/2011/08/30/budget-laboratory-part-1-multi-wan-load-balancing-pfsense-vmware-workstation/">Budget Laboratory: Part 1 – Multi-WAN Load Balancing with pfSense on VMWare Workstation</a> first appeared on <a href="https://www.fixtheexchange.com">Fix The Exchange!</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
