• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

2WAN-2LAN All Wans Have Identical Setup, Lans Identical Setup, ONLY 1 LAN WORKS

Scheduled Pinned Locked Moved Firewalling
3 Posts 2 Posters 343 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    seanj
    last edited by Sep 13, 2017, 4:51 PM

    Hi.

    SETUP:
      I have pfSense box set up with 2 WAN and 2 LAN interfaces.

    One node has 2 LAN connection each coming from different LAN interface:
        Lan1 is setup with 192.168.2.xx internal IPs
        Lan2 is setup with 192.168.3.xxx internal IPs

    NAT 1:1 binds public IP xx.xx.xx.165 to 192.168.2.50
      NAT 1:1 binds public IP xx.xx.xx.197 to 192.168.3.50

    Firewall rule allows ssh,http to both 192.168.2.50 and 192.168.3.50

    What works:
      Almost everything:  WAN1, WAN2 have connections ping and can access.

    Issue:
      I can ssh from psSense box to both 192.168.2.50 and 192.168.3.50  (confirms recipient box is up on both lans).
      but I can only ssh to 192.168.2.50 from outside word and CANNOT CONNECT TO second connection 192.168.3.50

    Attached are the NAT set up and Firewall Rules I have set. 
    EVEYTHING is good on LAN 1, but when LAN1 is disabled (or without disabling) I cannot access node  connected to LAN2 (it's the same node as LAN1 is connecting without issue)

    I confirmed I can connect to the node from LAN1 and LAN2 from pfSense box itself, but not from behind firewall
    pfsenseroutes.png
    pfsenseroutes.png_thumb
    pftop.png
    pftop.png_thumb

    1 Reply Last reply Reply Quote 0
    • D
      Derelict LAYER 8 Netgate
      last edited by Sep 13, 2017, 6:25 PM

      Check the firewall. etc on host 192.168.3.50.

      https://doc.pfsense.org/index.php/Port_Forward_Troubleshooting

      I don't think it's your issue but why not two firewall rules to the SSH systems? Dest any seems lazy and unspecific to me there.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • S
        seanj
        last edited by Sep 14, 2017, 6:02 AM

        Thank you for your reply.

        As you have mentioned, having any for ssh port wasn't the issue.  I have it at any to have ssh port open for all nodes.

        I almost pulled my hairs out!

        This is what I noticed and was the problem:

        Under Firewall/NAT  pfSense automatically generated Mapping rules. 
        All mapping rules were for internal IPs to link to default WAN.  (192.168.2.x -> WAN1 && 192.168.3.x -> WAN1)

        When I manually changed mapping for 192.168.3.x -> WAN2  it fixed it and it works now.

        1 Reply Last reply Reply Quote 0
        3 out of 3
        • First post
          3/3
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
          This community forum collects and processes your personal information.
          consent.not_received