Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Replacing old router with a new instance of pfsense + BGP protocol to configure a dual link to the ISP

    Scheduled Pinned Locked Moved General pfSense Questions
    28 Posts 4 Posters 2.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mauro.tridici @Cool_Corona
      last edited by mauro.tridici

      @cool_corona sorry, but I'm still a newbie, I'm at beginning. Could you please explain where is my error and the right solution to my problem?

      Is It the first one I proposed (first screenshot) or the second one?

      In addition, how can I check that NAT is working as expected ( maybe using the pf sense packet capture)?

      Thank you.

      Cool_CoronaC 1 Reply Last reply Reply Quote 0
      • Cool_CoronaC
        Cool_Corona @mauro.tridici
        last edited by

        @mauro-tridici No I an a newbie too in BGP but I dont get the NAT in regards to the public /25 that imho is the one that gets routed from WAN to LAN

        1 Reply Last reply Reply Quote 0
        • M
          mauro.tridici
          last edited by

          @cool_corona ok, so let's see what @stephenw10 will say about that 😊

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            No, the 'do-not-nat' rules should be on WAN1 and WAN2 for the PUBLIC subnet. You do not want to NAT traffic from PUBLIC as it leaves WAN1 or WAN2.

            You can confirm that by runnig a pcap on WAN1 or WAN2 and you should see traffic from the PUBLIC subnet there.

            I assume that you are using 192.168.99.0/24 just as an example here? The real subnet is actually public?

            Steve

            M 1 Reply Last reply Reply Quote 1
            • M
              mauro.tridici @stephenw10
              last edited by mauro.tridici

              @stephenw10 thank you Steve, you helped me again :)
              Yes 192.168.99.0/24 is just an example and the real subnet is a public subnet.

              Setting outbound NAT as in the second screenshot I was able to make it working.
              Before it didn't work because I forgot to route the traffic from the ISP router to the public customer subnet (192.168.99.0/24).

              After adding, on each ISP upstream gateway, the following routes everything started working as expected:

              on primary ISP upstream gateway
              ip route 192.168.99.0 255.255.255.0 192.168.1.2

              on backup ISP upstream gateway
              ip route 192.168.99.0 255.255.255.0 192.168.2.2

              This is the final GNS3 schema

              Screenshot 2022-11-24 at 10.21.41.png

              1 Reply Last reply Reply Quote 0
              • Cool_CoronaC
                Cool_Corona
                last edited by

                Public is internet.... pc is on LAN.

                The /25 IP's are on WAN and not LAN. Unless you run a hotspot or internetcafe.

                Otherwise I dont get the setup...

                M 1 Reply Last reply Reply Quote 0
                • M
                  mauro.tridici @Cool_Corona
                  last edited by

                  In my particular case, pfsense is acting as a "customer border router".
                  It is connected to the WAN (ISP AS) using em0 and em1 ports with two redundant PTP links.
                  Watching the schema, 192.168.1.2/30 and 192.168.2.2/30 are the IPs for the PTP links.

                  ISP is routing the public subnet (192.168.99.0/24) to the pfsense router.
                  For this reason I need to disable NAT on pfsense.

                  In the real scenario, the "PC on public subnet" will be replaced by a physical firewall. So, at the end, you will see something like that:

                  ISP RC1 + ISP RC2 <-> PFSENSE ROUTER <-> FIREWALL <-> LANs

                  Cool_CoronaC 1 Reply Last reply Reply Quote 0
                  • Cool_CoronaC
                    Cool_Corona @mauro.tridici
                    last edited by

                    @mauro-tridici Cant pfsense act as both router and firewall for the clients?

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      mauro.tridici @Cool_Corona
                      last edited by

                      @cool_corona Sure, it can. But in our case, we prefer this kind of deployment.

                      1 Reply Last reply Reply Quote 1
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Yes, I would expect that to work.

                        1 Reply Last reply Reply Quote 0
                        • P Patch referenced this topic on
                        • P Patch referenced this topic on
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.