Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Routing a service to non-default WAN

    Scheduled Pinned Locked Moved Routing and Multi WAN
    42 Posts 4 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mik256
      last edited by

      Hello,
      I have WAN1 and WAN2. I am not using load balancing, fail over or anything like this. My task is simple: I want WAN1 to be used for all internet access except of selected outgoing traffic for which WAN2 needs to be used. The selected traffic is IPSec, but could be any other application. Some remote endpoints have dynamic public IPs so I can't use static routing.
      I tried with default gateway setup to WAN1 and without it - with static routes using WAN1 gw for 0.0.0.0/1 and 128.0.0.0/1 and policy routing in firewall rules. It is evident that static routing always wins over policy routing.
      How can I make an application goes through WAN2 and not take the default route?
      Thanks

      S 1 Reply Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @mik256
        last edited by

        @mik256 Is this for inbound or outbound? You can control outbound in pfSense, and that's normally policy routing. Why/how was that not working...?

        https://docs.netgate.com/pfsense/en/latest/multiwan/policy-route.html#configuring-firewall-rules-for-policy-routing

        You can control that by rule matching, as in, the source IP or the destination IP.

        Do the remote endpoints with dynamic IPs have a hostname you can use in an alias? And, one IP or is it a CDN with multiple IPs that rotate?

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote 👍 helpful posts!

        M 1 Reply Last reply Reply Quote 0
        • M
          mik256 @SteveITS
          last edited by

          @SteveITS
          Thanks for quick reply!
          It is outgoing what is causing issues. I have tried policy routing using IP, port, etc. all combinations. There's one remote endpoint with 1.2.3.4 dynamic from ISP Seems like static routes always win/precedes policy routing. If I use static route to 1.2.3.4 using WAN2GW, it works ok. If policy routing WANGW with default gw set to WAN1GW, it always uses WAN1GW for ike replies as well as testing with traceroute -p 500 -s WAN2IP.
          It is ridiculous, WAN2 is only interface for IPSec, ike initiations come to WAN2, but pfsense just always replies with WAN1.

          V 1 Reply Last reply Reply Quote 1
          • M
            mik256
            last edited by

            I have read every topic on forums regarding this issue. It seems you can not use policy routing for traffic comming from the firewall itself (like ipsec response). I don't feel like putting another pfsense box just to have a service wokring on non-default WAN. Is there really not a solution to that?

            1 Reply Last reply Reply Quote 0
            • V
              viragomann @mik256
              last edited by

              @mik256 said in Routing a service to non-default WAN:

              It is ridiculous, WAN2 is only interface for IPSec, ike initiations come to WAN2, but pfsense just always replies with WAN1

              This is only the case with wrong dual WAN configuration.

              Do you use a floating rule or interface group rule to permit IPSec access?
              You have to state a rule allowing it on the respective interface tab and ensure, that this rule is applied.

              Note, that floating and interface group rules have precedence over interface rules.

              M 1 Reply Last reply Reply Quote 0
              • M
                mik256 @viragomann
                last edited by

                @viragomann
                Are you saying that policy rules should work for handling the traffic from pfsense itself (like ipsec)?
                Becuase I tried almost everyting and also find a lot of posts here on the forum and elsewhere where the issue seem basically the same:
                https://forum.netgate.com/topic/8332/ipsec-on-opt1-wan2
                https://forum.netgate.com/topic/116745/policy-based-routing-for-traffic-from-pfsense-itself/4

                and here it is even you who states something telling me policy routing is not the way it could be done:
                https://forum.netgate.com/topic/180384/how-to-setup-an-interface-specific-default-gateway

                Thanks!

                V 1 Reply Last reply Reply Quote 0
                • V
                  viragomann @mik256
                  last edited by

                  @mik256
                  If I understood correctly, you're talking about response traffic to incoming requests.
                  This should not need any policy or static routing, but should rather be routed properly automatically.

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    mik256 @viragomann
                    last edited by

                    @viragomann
                    Yes, that would be logic, but tcpdump shows pfsense still uses WAN1 for replies to ipsec initiations comming from WAN2:(

                    V 1 Reply Last reply Reply Quote 0
                    • V
                      viragomann @mik256
                      last edited by

                      @mik256
                      Did you obey my above suggestions?

                      M 1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Which pfSense version are you running?

                        You cannot policy route traffic from the firewall itself as you said. But this should not be a policy routing issue. It may be a reply-to issue if the 2nd WAN is not being assigned with a gateway in the usual way.

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          mik256 @stephenw10
                          last edited by

                          @stephenw10
                          Thanks! So many people keep telling I have not set policy routing properly, finally someone confirmed this is not the way.
                          My wan2 is interface with ip 192.168.40.3 and gw set to 192.168.40.1 (this is another router with port forwarding). Wan1 is default gw. I have tried using gw groups etc with no success. What could be wrong with the wan2 setup?

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Is the gateway actually defined on the interface? That's what configures it as a WAN with reply-to and route-to on rules.

                            Also I assume IPSec connections are failing because clients see traffic from the wrong IP?

                            M stephenw10S 2 Replies Last reply Reply Quote 0
                            • M
                              mik256 @stephenw10
                              last edited by

                              @stephenw10
                              I am on pfsense 2.7.2-release.
                              Yes ipsec failing because replies are sent from wrong WAN. If I make a static route to the remote ipsec endpoint, ipsec connects immediately and everything works.

                              This is my WAN2 interface, it has gateway associated:
                              28a26ed9-2abf-41fc-8176-58edda0edb82-image.png

                              this is my P1:
                              a85d3c58-c7bd-48ae-aec0-6b2e7461e972-image.png

                              Pls help! Thanks

                              1 Reply Last reply Reply Quote 0
                              • M
                                mik256 @viragomann
                                last edited by

                                @viragomann said in Routing a service to non-default WAN:

                                @mik256
                                Did you obey my above suggestions?
                                Of course I did. I ended with every imaginable policy rule just to make sure I did not omit anything.. No luck:
                                1fb881d7-9972-4d5a-89e0-66d21a31e616-image.png
                                5884e45e-1558-429c-9ac3-1af48957da52-image.png
                                0320732a-c52b-4f10-8f68-1b27a61858f8-image.png
                                b7171788-741a-4dbc-984f-25e275235f61-image.png

                                V 1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Looks OK.
                                  Try to connect to it and check the states. See what's actually being opened there.

                                  Make sure wherever you're connecting from is not in the routing table as a static route.

                                  You can also check the ruleset in /tmp/rules.debug to make sure it has the reply-to tags on the rule.

                                  1 Reply Last reply Reply Quote 0
                                  • V
                                    viragomann @mik256
                                    last edited by viragomann

                                    @mik256 said in Routing a service to non-default WAN:

                                    @mik256

                                    Did you obey my above suggestions?

                                    Of course I did. I ended with every imaginable policy rule just to make sure I did not omit anything.. No luck:

                                    But the suggestion was to not use floating rules or interface group rules for incoming connections!

                                    This disables reply-to.

                                    M 1 Reply Last reply Reply Quote 1
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Oh, and you should not have a gateway on those inbound rules on PE3. That's invalid and can do weird stuff.

                                      You shouldn't actually need any rules to pass the IPSec traffic. It's passed bu automatically added rules unless you have disabled them.

                                      M 1 Reply Last reply Reply Quote 0
                                      • M
                                        mik256 @stephenw10
                                        last edited by

                                        @stephenw10
                                        no reply to besides the one that i set up to reach pfsense over ssh from home
                                        cat /tmp/rules.debug | grep 193
                                        pass in quick on $WAN reply-to ( hn1 'WAN1GW' ) inet proto tcp from '193.x.x.x to 'WAN1' port 22 ridentifier 1728499701 flags S/SA keep state label "USER_RULE: ssh home" label "id:1728499701"

                                        inbound rules on PE3 cleared (I knew it was bad, bud was too desperate to try everyting lol)

                                        1 Reply Last reply Reply Quote 0
                                        • M
                                          mik256 @viragomann
                                          last edited by

                                          @viragomann said in Routing a service to non-default WAN:

                                          But the suggestion was to not use floating rules or interface group rules for incoming connections!

                                          This disables reply-to.

                                          Would you please explain? I deleted all policy rules from all interfaces and just left those floating rules. They have direction out and PE3GW. That should target outgoing connection.. or not?
                                          There is likely something intefering with reply-to, but I just couldn't see what. I see on tcpdump, that packets are being sent back to the initiator with correct IP (of PE3), but on the interface of WAN1.

                                          V 1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            Any rules that can apply to more than one interface cannot use reply-to tags because it cannot know which interface to reply on.

                                            That means any rules applied to interface groups or any floating rules. So if you have either of those and they are passing the IPSec traffic it would break reply-to.

                                            M 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.