Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Help Designing Multi WAN

    Scheduled Pinned Locked Moved Routing and Multi WAN
    13 Posts 3 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rubber_duck13
      last edited by

      Hello,

      I would like to setup my pfSense box with dual WAN for failover for my house but need help figuring how how to setup the second WAN (Rural area, both ISP's are WISPs, mainly want for failover). I want to use a separate ISP that goes to our family business that is located a 1/2 mile away for the second WAN. I just bought 2 Ubiquiti Nanobeams to connect via P2P wireless.

      Here is the trick, I assume I could just setup the WAN2 connection as a DHCP connection from the family business network and it would work. The problem is, I would also like to be able to use the same P2P bridge to connect to the family business network for local use as well (troubleshooting, remote backups, etc, basically make it a separate subnet on my existing network).

      I would also like to have the Nanobeams on my network for configuration. I am having trouble wrapping my head around making all this work (in IT, but not a networking expert.

      The family business is running a Microtik Hap lite AC router running RouterOS (192.168.88.1 subnet).

      Picture:

      network.PNG

      Is this feasible.

      Thanks!

      R 1 Reply Last reply Reply Quote 0
      • R
        rcoleman-netgate Netgate @rubber_duck13
        last edited by

        @rubber_duck13
        Most of what you might want is in our recipes on the documentation.
        An example: https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-ospf.html

        Ryan
        Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
        Requesting firmware for your Netgate device? https://go.netgate.com
        Switching: Mikrotik, Netgear, Extreme
        Wireless: Aruba, Ubiquiti

        R 1 Reply Last reply Reply Quote 0
        • R
          rubber_duck13 @rcoleman-netgate
          last edited by

          @rcoleman-netgate Perfect, thanks for the link, I'll check it out and set it up.

          1 Reply Last reply Reply Quote 0
          • R
            rubber_duck13
            last edited by

            I finally got to getting the PtP setup up and running. I ended up adding an interface (SHOPBRIDGE) to pfSense on the same subnet as the remote (shop/family business) network (192.168.88.x). I can access the shop network from my house (LAN Network) and ping all devices.

            I did not end up doing the VPN setup that @rcoleman-netgate recommended. A gateway has been added on the shop bridge connection with the gateway being 192.168.88.1. However, when I disable my primary WAN interface, I am not getting internet on my LAN subnet. Is there something I am missing here and is this possible to use the SHOPBRIDGE interface to use the gateway to get internet on the rest of my network?

            The only things I have done was add the interface and create a gateway using that interface. Not sure the next steps.

            V 1 Reply Last reply Reply Quote 0
            • V
              viragomann @rubber_duck13
              last edited by

              @rubber_duck13
              The remote site must masquerade upstream traffic from your house aside from permitting it. I suspect, it doesn't.

              Alternatively you can masquerade the traffic on pfSense.
              Basically this should be done, if you state the gateway in the interface settings.

              R 1 Reply Last reply Reply Quote 0
              • R
                rubber_duck13 @viragomann
                last edited by

                @viragomann okay, not a network expert here, how do I do that?

                I have an interface, ShopBridge (em3), setup with DHCP for IPv4 Config and hostname set, nothing else.

                Under system routing gateways, I have the ShopBridge_DHCP with a gateway of the upstream shop router IP (set dynamically).

                The only other thing, I setup is I have a firewall rule to allow any any from the Shopbridge subnet.

                V 1 Reply Last reply Reply Quote 0
                • V
                  viragomann @rubber_duck13
                  last edited by

                  @rubber_duck13
                  So masquerading should be done automatically on pfSense.
                  Check Firewall > NAT > outbound and look if there are automatic rule created for this interface.

                  However, for taking over the default route to the other gateway, you will need to configure a gateway group:

                  System > Routing > Gateway Groups
                  Add a group, set WAN GW as Tier 1 and the ShopBridge GW as Tier 2.
                  Then go to the gateways tab and switch the default gateway to the new gateway group.

                  R 1 Reply Last reply Reply Quote 0
                  • R
                    rubber_duck13 @viragomann
                    last edited by rubber_duck13

                    @viragomann Here are the automatic rules that were created (WAN is my main internet, WAN_2 is another WAN I setup for a 4G backup that I have been playing with. It works, but is so slow where I am that I don't really use it, SHOPBRIDGE is the interface to the shop that I am trying to get working):

                    809e0584-f01a-4c59-9b22-c6189711c18a-image.png

                    I have not created a gateway group and tested it, I will set that up then test it when I have time at home.

                    V 1 Reply Last reply Reply Quote 0
                    • V
                      viragomann @rubber_duck13
                      last edited by

                      @rubber_duck13
                      So there are all needed rules present. Should work from this point.

                      With these Outbound NAT rules the remote site sees only your interface IP. So only this IP needs to be permitted to access the internet (or other resources) and be masqueraded on the upstream interface.

                      1 Reply Last reply Reply Quote 0
                      • R
                        rubber_duck13
                        last edited by rubber_duck13

                        @viragomann So talk to me like I don't know what I am talking about :)

                        On the Shop Mikrotik router, there is currently this:

                        AnyDesk_e3NensDDew.png

                        Do I need to add another one with Action of masquerade, Chain of desnat, dst address of the interface (192.168.88.17), src address of the gateway, and an out. interface of pppoe-out1?

                        V 1 Reply Last reply Reply Quote 0
                        • V
                          viragomann @rubber_duck13
                          last edited by

                          @rubber_duck13
                          This rule is just for the local network.
                          You need a rule like this, but for the source of the shop interface IP of pfSense.

                          R 1 Reply Last reply Reply Quote 0
                          • R
                            rubber_duck13 @viragomann
                            last edited by rubber_duck13

                            @viragomann Okay, I created the second rule in this list. Hope that is right, I am not able to test this all now, but hope to in the next couple days.

                            AnyDesk_SDGNUQODdk.png

                            1 Reply Last reply Reply Quote 0
                            • R
                              rubber_duck13
                              last edited by

                              I applied all the changes and tested and everything works! Thanks for all the help.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.