Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Static IP Setup on WAN with DHCP on LAN/LAN2/LAN3/LAN4 on Netgate 6100

    Scheduled Pinned Locked Moved DHCP and DNS
    16 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      tonydutt @johnpoz
      last edited by

      @johnpoz

      I might need some more rudimentary guidance on the port setup. Specifically, I have set up LAN2 and LAN3 identical to LAN with the exception of the IP addresses.
      LAN2: static 192.168.2.1/24 with DHCP server range of 192.168.2.10 - 192.168.2.200
      LAN3: static 176.100.10.1/24 with DHCP server range of 176.100.10.10-176.100.10.200
      WAN is set to static IP with AT&T data. I need this to be static for VPN access.
      DHCP server is enabled on each with the same DNS servers - Blank in the DHCP server setup for each interface (but the general setup is 8.8.8.8. and 8.8.4.4).
      I copied the firewall rules from LAN1 to LAN2 and LAN3 and made sure the rules applied to LAN2/LAN3. Note - I did not create these rules - they are IPv4 and IPv6 DHCP allow rules. The only difference is LAN has anti-lockout rule and LAN2/LAN3 does not.
      I disabled IPv6 for now.

      When connected to LAN - I have full internet access

      When connected to LAN2 or LAN3 no internet access, although the connected machine will pull an IP address in the range I set up. The error seems to be associated with DNS resolution according to MS Network troubleshooter. I tried disable/enable the network adapter - no help. Because LAN connects to internet and LAN2/LAN3 does not, it seems like there is another setting that I am missing. Not sure what that might be.

      Is there another rule i need to set up or other setting?

      I am sure these are amateur level questions. I tried to watch some YouTube videos and the pfsense Wiki and nothing seems obvious.

      R johnpozJ 2 Replies Last reply Reply Quote 0
      • R
        rcoleman-netgate Netgate @tonydutt
        last edited by

        @tonydutt said in Static IP Setup on WAN with DHCP on LAN/LAN2/LAN3/LAN4 on Netgate 6100:

        LAN3: static 176.100.10.1/24 with DHCP server range of 176.100.10.10-176.100.10.200

        Is there a specific reason you chose this range? This is a public IP range that, while you can use it, means you cannot access any of the services on that network.

        @tonydutt said in Static IP Setup on WAN with DHCP on LAN/LAN2/LAN3/LAN4 on Netgate 6100:

        When connected to LAN2 or LAN3 no internet access, although the connected machine will pull an IP address in the range I set up

        Did you specify rules on the LAN2 and LAN3 Firewall Rules pages that allow traffic? If so please provide screenshots of the rules you created.

        Ryan
        Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
        Requesting firmware for your Netgate device? https://go.netgate.com
        Switching: Mikrotik, Netgear, Extreme
        Wireless: Aruba, Ubiquiti

        1 Reply Last reply Reply Quote 1
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @tonydutt
          last edited by johnpoz

          @tonydutt said in Static IP Setup on WAN with DHCP on LAN/LAN2/LAN3/LAN4 on Netgate 6100:

          LAN3: static 176.100.10.1/24

          Yeah as @rcoleman-netgate points out - that is not a IP range you should be using.. Use a network in rfc1918 address space.

          https://en.wikipedia.org/wiki/Private_network

          Is there another rule i need to set up or other setting?

          As already stated - yes you would have to create rule(s) to allow what you want.. As I mentioned just duplicate the default rule like on your lan, an any any rule - see the bottom of the example locked down rules that allows everything.. Do the same sort of rule on your new interfaces.

          That network is owned by

          inetnum:        176.100.0.0 - 176.100.31.255
          netname:        PAUTINA-UA
          country:        UA
          

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 1
          • T
            tonydutt
            last edited by

            That is good to know on 176.100. I will change that. LAN3 was just to see if LAN2 had issues. I think if I get LAN2 running LAN3/4 will be easy to setup.

            here are the LAN firewall rules:

            LAN.png

            Here are the LAN2 firewall rules (duplicated from LAN)
            LAN2.png

            Here is the LAN2 DHCP Server setup:
            LAN2 DHCP Server.png

            T 1 Reply Last reply Reply Quote 0
            • T
              tonydutt @tonydutt
              last edited by

              @tonydutt

              UPDATED LAN2 Firewall Rules:
              LAN2 - NEW.png

              The DNS issue persists with these rules set as they are.

              Thanks for all the help. I am really appreciative.

              R 1 Reply Last reply Reply Quote 0
              • R
                rcoleman-netgate Netgate @tonydutt
                last edited by

                @tonydutt Ok so now... Status > System Logs and click on the Firewall tab.

                Is any of your traffic showing up as blocked there?

                Ryan
                Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                Requesting firmware for your Netgate device? https://go.netgate.com
                Switching: Mikrotik, Netgear, Extreme
                Wireless: Aruba, Ubiquiti

                T 1 Reply Last reply Reply Quote 0
                • T
                  tonydutt @rcoleman-netgate
                  last edited by

                  @rcoleman-netgate
                  Yes, there is a long list of denied access. Looks like the majority are from LAN2 and LAN3.

                  Of note - there are no rules on the WAN other than block BOGON. So all inbound connections will be blocked is what the message says. Are there some WAN setups I need for outbound connections? The challenge I am having is LAN access internet but LAN2 does not with the same WAN.

                  R T 2 Replies Last reply Reply Quote 0
                  • R
                    rcoleman-netgate Netgate @tonydutt
                    last edited by

                    @tonydutt said in Static IP Setup on WAN with DHCP on LAN/LAN2/LAN3/LAN4 on Netgate 6100:

                    Yes, there is a long list of denied access. Looks like the majority are from LAN2 and LAN3.

                    OK... and why is that? What are they? Copy a screen cap into the channel showing them and we can help you troubleshoot it some.

                    Ryan
                    Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                    Requesting firmware for your Netgate device? https://go.netgate.com
                    Switching: Mikrotik, Netgear, Extreme
                    Wireless: Aruba, Ubiquiti

                    1 Reply Last reply Reply Quote 0
                    • T
                      tonydutt @tonydutt
                      last edited by

                      @tonydutt
                      I think I solved it. Enable DNS Forwarding Mode under: Services/DNSResolver/General Settings

                      5a7f87cd-8e31-4d50-bb69-09b465c2cb55-image.png

                      Curious - if there is any issue with this setting?

                      Thanks.

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @tonydutt
                        last edited by

                        @tonydutt you shouldn't need to enable forwarding mode, how was lan working without forwarding mode? Was your lan clients pointing to something else for dns other than pfsense?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        T 1 Reply Last reply Reply Quote 0
                        • T
                          tonydutt @johnpoz
                          last edited by

                          @johnpoz
                          I will check and see if that will work. I have a Windows Server installation doing updates right now, so cant try it just yet. But, thanks for getting back to me. Outside of that one setting, I have gotten most of the system up and running. Now it is down to getting all of the functionality I want. I am really happy with the Netgate purchase so far.

                          I would like to take you up on your other off to help me get the right settings in NETGATE. I might start a new thread in a different area if that is best.

                          Basic architecture:
                          Negate 6100 connected to Cisco 8 port managed business switch with 1 trunk line (right now) with teh following downstream:

                          • Dell R640 - Windows Server 2019 Active Directory VM and File Server VM. Both installations are virtualized on HyperV Server and managed from my computer. 4 NICs.
                          • Dell R630 - Ubuntu Server with immutable backup from File Server via VEEAM. 4 NICs.
                          • Synology NAS - Secondary Backup from file server.
                          • Wifi - Ubiquiti Amplifi
                          • Local Computer - on LAN downstream of Netgate not WiFi.
                          • Local Printer
                          • Remote employees VPN into AD to access file server. Only files - no VMs.
                          • i have multiple unmanaged switches available.

                          My goals:

                          1. Dell R630 Ubuntu never sees the internet. Only internal communications from R640 fileserver VEEAM for daily backups.
                          2. Dell R640 access the internet for VPN, Windows Updates, Antivirus updates.
                          3. Keep both iDRACs for Dell servers isolated from internet and only accessible internally for management purposes - which should be minimal.
                          4. Synology NAS has access to internet - only for Synology services.
                          5. Minimize VLAN/PVLANs.
                          6. Use L2TP/IPSec for VPN service for ease of remote worker deployments.

                          If you have any thoughts on setting these up properly, I would be grateful. I have sketched it out, but, have not figured out all of the inner workings.

                          Thanks very much!!

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.