Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Static IP Setup on WAN with DHCP on LAN/LAN2/LAN3/LAN4 on Netgate 6100

    Scheduled Pinned Locked Moved DHCP and DNS
    16 Posts 3 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      tonydutt
      last edited by

      Hey thanks for the fast response. I am not a networking expert or even novice, so apologies if my terminology is off. I am just a small business guy trying to set up a a new network.
      Let me elaborate… If I have an unmanaged switch connected to LAN3 - the 6100 would assign IP address in the pool assigned to all devices connected to the unmanaged switch. Is this situation where DHCP is used? It seems like my big box routers did it that way.

      I am looking to use the LAN ports of netgate to setup my small business environment. I am looking to set up 3 networks:

      1. managed Cisco Switch that I plan to establish a VLANs for server isolation and iDRAC isolation (LAN port being the trunk line from the Cisco)
      2. separate network for WiFi (LAN2)
      3. Cameras network.

      Maybe the better question is, can someone point me in the right direction for setting up the firewall rules to allow the minimal access and subsequent setup of the router. I really have no idea to how to set these up and I could use a good guide.

      Thanks!

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @tonydutt
        last edited by johnpoz

        @tonydutt yes the 6100 would be the dhcp server and hand out IPs to clients - but you would have to set an IP on the pfsense interface.. This would be static say say 192.168.2.1/24 you would then enable its dhcp server and it would hand out IPs say 192.168.2.2-254 and point clients to 192.168.2.1 as their gateway and for dns..

        But you have to set the IP on the interface, and enable it to be dhcp server.

        You would also then need to set rules on this interface to allow internet..

        I would suggest getting devices working first, with an any any rule like defaults on lan. We can then go into locking down what you want.. For example this would be a set of rules that are locked down and only allow internet access.

        locked.jpg

        Once you have your different networks actually working, we can go through how to setup the rules to how you want to set them up. The above set of rules would not allow this network to talk to any of your other networks.. Only ping pfsense IP (for troubleshooting that you have connectivity) and use pfsense as dns and ntp.. And not be able to access pfsense web gui. But anything else on the internet would be allowed.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        T 1 Reply Last reply Reply Quote 1
        • T
          tonydutt
          last edited by

          Awesome!! I will work on getting these working and report back when I do.

          :):)

          1 Reply Last reply Reply Quote 0
          • T
            tonydutt @johnpoz
            last edited by

            @johnpoz

            I might need some more rudimentary guidance on the port setup. Specifically, I have set up LAN2 and LAN3 identical to LAN with the exception of the IP addresses.
            LAN2: static 192.168.2.1/24 with DHCP server range of 192.168.2.10 - 192.168.2.200
            LAN3: static 176.100.10.1/24 with DHCP server range of 176.100.10.10-176.100.10.200
            WAN is set to static IP with AT&T data. I need this to be static for VPN access.
            DHCP server is enabled on each with the same DNS servers - Blank in the DHCP server setup for each interface (but the general setup is 8.8.8.8. and 8.8.4.4).
            I copied the firewall rules from LAN1 to LAN2 and LAN3 and made sure the rules applied to LAN2/LAN3. Note - I did not create these rules - they are IPv4 and IPv6 DHCP allow rules. The only difference is LAN has anti-lockout rule and LAN2/LAN3 does not.
            I disabled IPv6 for now.

            When connected to LAN - I have full internet access

            When connected to LAN2 or LAN3 no internet access, although the connected machine will pull an IP address in the range I set up. The error seems to be associated with DNS resolution according to MS Network troubleshooter. I tried disable/enable the network adapter - no help. Because LAN connects to internet and LAN2/LAN3 does not, it seems like there is another setting that I am missing. Not sure what that might be.

            Is there another rule i need to set up or other setting?

            I am sure these are amateur level questions. I tried to watch some YouTube videos and the pfsense Wiki and nothing seems obvious.

            R johnpozJ 2 Replies Last reply Reply Quote 0
            • R
              rcoleman-netgate Netgate @tonydutt
              last edited by

              @tonydutt said in Static IP Setup on WAN with DHCP on LAN/LAN2/LAN3/LAN4 on Netgate 6100:

              LAN3: static 176.100.10.1/24 with DHCP server range of 176.100.10.10-176.100.10.200

              Is there a specific reason you chose this range? This is a public IP range that, while you can use it, means you cannot access any of the services on that network.

              @tonydutt said in Static IP Setup on WAN with DHCP on LAN/LAN2/LAN3/LAN4 on Netgate 6100:

              When connected to LAN2 or LAN3 no internet access, although the connected machine will pull an IP address in the range I set up

              Did you specify rules on the LAN2 and LAN3 Firewall Rules pages that allow traffic? If so please provide screenshots of the rules you created.

              Ryan
              Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
              Requesting firmware for your Netgate device? https://go.netgate.com
              Switching: Mikrotik, Netgear, Extreme
              Wireless: Aruba, Ubiquiti

              1 Reply Last reply Reply Quote 1
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @tonydutt
                last edited by johnpoz

                @tonydutt said in Static IP Setup on WAN with DHCP on LAN/LAN2/LAN3/LAN4 on Netgate 6100:

                LAN3: static 176.100.10.1/24

                Yeah as @rcoleman-netgate points out - that is not a IP range you should be using.. Use a network in rfc1918 address space.

                https://en.wikipedia.org/wiki/Private_network

                Is there another rule i need to set up or other setting?

                As already stated - yes you would have to create rule(s) to allow what you want.. As I mentioned just duplicate the default rule like on your lan, an any any rule - see the bottom of the example locked down rules that allows everything.. Do the same sort of rule on your new interfaces.

                That network is owned by

                inetnum:        176.100.0.0 - 176.100.31.255
                netname:        PAUTINA-UA
                country:        UA
                

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 1
                • T
                  tonydutt
                  last edited by

                  That is good to know on 176.100. I will change that. LAN3 was just to see if LAN2 had issues. I think if I get LAN2 running LAN3/4 will be easy to setup.

                  here are the LAN firewall rules:

                  LAN.png

                  Here are the LAN2 firewall rules (duplicated from LAN)
                  LAN2.png

                  Here is the LAN2 DHCP Server setup:
                  LAN2 DHCP Server.png

                  T 1 Reply Last reply Reply Quote 0
                  • T
                    tonydutt @tonydutt
                    last edited by

                    @tonydutt

                    UPDATED LAN2 Firewall Rules:
                    LAN2 - NEW.png

                    The DNS issue persists with these rules set as they are.

                    Thanks for all the help. I am really appreciative.

                    R 1 Reply Last reply Reply Quote 0
                    • R
                      rcoleman-netgate Netgate @tonydutt
                      last edited by

                      @tonydutt Ok so now... Status > System Logs and click on the Firewall tab.

                      Is any of your traffic showing up as blocked there?

                      Ryan
                      Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                      Requesting firmware for your Netgate device? https://go.netgate.com
                      Switching: Mikrotik, Netgear, Extreme
                      Wireless: Aruba, Ubiquiti

                      T 1 Reply Last reply Reply Quote 0
                      • T
                        tonydutt @rcoleman-netgate
                        last edited by

                        @rcoleman-netgate
                        Yes, there is a long list of denied access. Looks like the majority are from LAN2 and LAN3.

                        Of note - there are no rules on the WAN other than block BOGON. So all inbound connections will be blocked is what the message says. Are there some WAN setups I need for outbound connections? The challenge I am having is LAN access internet but LAN2 does not with the same WAN.

                        R T 2 Replies Last reply Reply Quote 0
                        • R
                          rcoleman-netgate Netgate @tonydutt
                          last edited by

                          @tonydutt said in Static IP Setup on WAN with DHCP on LAN/LAN2/LAN3/LAN4 on Netgate 6100:

                          Yes, there is a long list of denied access. Looks like the majority are from LAN2 and LAN3.

                          OK... and why is that? What are they? Copy a screen cap into the channel showing them and we can help you troubleshoot it some.

                          Ryan
                          Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                          Requesting firmware for your Netgate device? https://go.netgate.com
                          Switching: Mikrotik, Netgear, Extreme
                          Wireless: Aruba, Ubiquiti

                          1 Reply Last reply Reply Quote 0
                          • T
                            tonydutt @tonydutt
                            last edited by

                            @tonydutt
                            I think I solved it. Enable DNS Forwarding Mode under: Services/DNSResolver/General Settings

                            5a7f87cd-8e31-4d50-bb69-09b465c2cb55-image.png

                            Curious - if there is any issue with this setting?

                            Thanks.

                            johnpozJ 1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @tonydutt
                              last edited by

                              @tonydutt you shouldn't need to enable forwarding mode, how was lan working without forwarding mode? Was your lan clients pointing to something else for dns other than pfsense?

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                              T 1 Reply Last reply Reply Quote 0
                              • T
                                tonydutt @johnpoz
                                last edited by

                                @johnpoz
                                I will check and see if that will work. I have a Windows Server installation doing updates right now, so cant try it just yet. But, thanks for getting back to me. Outside of that one setting, I have gotten most of the system up and running. Now it is down to getting all of the functionality I want. I am really happy with the Netgate purchase so far.

                                I would like to take you up on your other off to help me get the right settings in NETGATE. I might start a new thread in a different area if that is best.

                                Basic architecture:
                                Negate 6100 connected to Cisco 8 port managed business switch with 1 trunk line (right now) with teh following downstream:

                                • Dell R640 - Windows Server 2019 Active Directory VM and File Server VM. Both installations are virtualized on HyperV Server and managed from my computer. 4 NICs.
                                • Dell R630 - Ubuntu Server with immutable backup from File Server via VEEAM. 4 NICs.
                                • Synology NAS - Secondary Backup from file server.
                                • Wifi - Ubiquiti Amplifi
                                • Local Computer - on LAN downstream of Netgate not WiFi.
                                • Local Printer
                                • Remote employees VPN into AD to access file server. Only files - no VMs.
                                • i have multiple unmanaged switches available.

                                My goals:

                                1. Dell R630 Ubuntu never sees the internet. Only internal communications from R640 fileserver VEEAM for daily backups.
                                2. Dell R640 access the internet for VPN, Windows Updates, Antivirus updates.
                                3. Keep both iDRACs for Dell servers isolated from internet and only accessible internally for management purposes - which should be minimal.
                                4. Synology NAS has access to internet - only for Synology services.
                                5. Minimize VLAN/PVLANs.
                                6. Use L2TP/IPSec for VPN service for ease of remote worker deployments.

                                If you have any thoughts on setting these up properly, I would be grateful. I have sketched it out, but, have not figured out all of the inner workings.

                                Thanks very much!!

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.