Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Complex, working, config now needs to use CGNAT, UGH.

    Scheduled Pinned Locked Moved Routing and Multi WAN
    13 Posts 7 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Bob.DigB
      Bob.Dig LAYER 8 @chrisjx
      last edited by

      @chrisjx said in Complex, working, config now needs to use CGNAT, UGH.:

      I am looking for a systematic approach instead of a patchy, one-off approach.

      So all your text boils down to this. But Viragomann already named probably all of your options. Now you have to decide which route to take. Or maybe get a business-line without CGNAT...

      C 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @chrisjx
        last edited by

        @chrisjx Any reason you cant use Tailscale for this use case?

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        C 1 Reply Last reply Reply Quote 1
        • P
          pwood999 @chrisjx
          last edited by

          @chrisjx Maybe setup a Site to Site VPN to your main system, and use that for inbound access to the remote location.

          User traffic originating within the remote site can still go directly out the two remote WAN's, avoiding the VPN.

          C 1 Reply Last reply Reply Quote 0
          • C
            chrisjx @michmoor
            last edited by

            @michmoor said in Complex, working, config now needs to use CGNAT, UGH.:

            Any reason you cant use Tailscale for this use case?

            Thanks for the response, @michmoor.

            I just looked up tailscale and, after watching this video, it looks very interesting:
            https://www.youtube.com/watch?v=P-q-8R67OPY

            It looks like a tool that connects from me or a <= 3 team group for free. I am wondering how I host a nodejs/express photo site for friends and family without a need for them to set up tailscale configurations.

            I currently have an open VPN connection which I use to securely connect into my network from my laptop of my phone. In fact my current home network with pfsense and 2 fail-over WANs using DDNS works great.

            The challenge is for a similar setup in another location (a rural farm, perhaps a year or so out) where the incoming WAN connections will both be CGNAT.

            Tailscale seems to be a service that can be connected directly to pfsense (that's my goal) while other alternatives seem to be from internet directly to the each server that I'd like to expose behind the firewall.

            1 Reply Last reply Reply Quote 0
            • J
              johnwcahill @chrisjx
              last edited by

              @chrisjx

              Having to deal with CGNAT is going to be challenging for sure. You will need traffic initiated from INSIDE to the outside in order to punch a hole. Like many have said, there are options. You could use Cloudflare tunnel (free) to open up the web servers securely for instance, use Tailscale (runs native on pfsense) or Twingate in order to get back into your home network.

              As someone else stated, you could run a VPN (wireguard) from your pfsense to a Droplet and present the services from the Droplet aswell.

              I have the your problem with 1 of my 2 ISPs for my dual WAN, one is a passthrough IP and the other is CGNET. I simply handle it with both Twingate and Tailscale, if/when I need to expose services to F&F I'll be using Cloudflare.

              John

              C 1 Reply Last reply Reply Quote 0
              • C
                chrisjx @johnwcahill
                last edited by

                @johnwcahill said in Complex, working, config now needs to use CGNAT, UGH.:

                when I need to expose services to F&F I'll be using Cloudflare

                I tried cloudflare a while back to set up my DDNS and subdomain management but I wasn't smart enough to make it work. I deferred those services to digital ocean and it works great. When I get to the point of setting this up, I will give them another try.

                run a VPN (wireguard) from your pfsense to a Droplet and present the services from the Droplet as well.

                I get the theory on this approach but what is not clear is the end user experience. If my sister is at her computer browser does she access an https (letsencrypted) web page with my subdomain url and see the same as what I currently have - a subdomained URL, haproxy as endpoint for letsencrypt, redirected to http on the internal webserver? Is the URL directed to the IP of the Droplet? And is the path to the internal webserver more or less transparent to the end user?

                Also, where might the failover happen between the 2 CGNAT WAN connections if the entry point is on the droplet?

                I have 5 internal servers running as described above and while it took me a while to understand it, I love it's elegance. Most of the work is done within pfSense; the rest in Digital Ocean.

                I'm somewhat reluctant to start down a path where I have to configure connections directly to each server from an external tunnel and manage each server's letencrypt updates, etc. My life's too short for too much of that. ;)

                But, we do what we must do.

                Thanks for your response.

                J 1 Reply Last reply Reply Quote 0
                • C
                  chrisjx @Bob.Dig
                  last edited by

                  @bob-dig said in Complex, working, config now needs to use CGNAT, UGH.:

                  So all your text boils down to this

                  Good one. Apologies for the verbosity. And thank you for your concise response. ;)

                  Sadly in the rural area where I want this home/farm network there are no "lines"; only non-prioritized Starlink, Hughesnet (gag), Viasat, T-Mobile Home Network (prob. the best of the lot), and a few feeble fixed wireless providers. I'm agitating for fiber down my road, which is 3.5 miles away, but not holding my breath.

                  1 Reply Last reply Reply Quote 0
                  • C
                    chrisjx @pwood999
                    last edited by

                    @pwood999 said in Complex, working, config now needs to use CGNAT, UGH.:

                    Site to Site VPN to your main system, and use that for inbound access to the remote location

                    Thanks for the response. Is this the VPS solution others have described?

                    The idea, I think, is to set up wireguard (or openvpn) between a VPS and pfSense. The endpoint for users of my site is the IP/URL of the VPS, right?

                    I get the idea but it seems to relocate functions like WAN failover to the VPS instead of pfSense. I don't understand the plumbing on how this approach works.

                    Maybe I'm over thinking it and it's just a different way to do what DDNS does but for a non-ip CGNAT service.

                    1 Reply Last reply Reply Quote 0
                    • J
                      johnwcahill @chrisjx
                      last edited by

                      @chrisjx Undestand that, CF is a bit of a challenge for me too. Your other option using Tailscale is a new alpha or beta function called Funnel which is suppose to let you expose services to the Internet. I have not looked at it completely yet. Also, Tailscale today announced big changes to their Free plan - it is what I have been using - very powerful set of features.

                      John

                      1 Reply Last reply Reply Quote 0
                      • Dobby_D
                        Dobby_ @chrisjx
                        last edited by

                        @chrisjx

                        Maybe I'm over thinking it and it's just a different way to do what DDNS does but for a non-ip CGNAT service.

                        You need a so called jump host in the internet, free to reach from else where, that is connected to you home network.

                        Thats it, at a "Hoster" of your choice for some coin
                        per month and all is done.

                        #~. @Dobby

                        Turris Omnia - 4 Ports - 2 GB RAM / TurrisOS 7 Release (Btrfs)
                        PC Engines APU4D4 - 4 Ports - 4 GB RAM / pfSense CE 2.7.2 Release (ZFS)
                        PC Engines APU6B4 - 4 Ports - 4 GB RAM / pfSense+ (Plus) 24.03_1 Release (ZFS)

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.