Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Connect Another Firewall with its own LAN into Pfsense

    Scheduled Pinned Locked Moved General pfSense Questions
    8 Posts 5 Posters 415 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      greatbush
      last edited by

      Good day,
      There's a bunch of scenarios I like to get some clarification on.
      I have several public ip addresses.
      public ip: X.X.X.25/29
      usable ip: X.X.X.25-X.X.X.30

      My pfsense box has the public ip X.X.X.26 and an internal LAN of 172.x.x.1.
      I have another firewall, Firewall B, that has its own LAN network of 192.x.x.
      I want to preserve Firewall B LAN network.
      c3cba0eb-dd4a-40ed-8834-6fde8a4ec1e5-image.png

      My pfsense has an empty port(4).

      To set up the above scenario
      -> Connect an ethernet cable from Firewall B into the empty port on pfsense
      -> Pfsense -> Interface -> Add the interface (LAN2) -> Enable Interface
      -> IPV4 Address: 192.168.1.0 -> Save

      -> Pfsense -> Rules -> LAN2 -> create rules that will allow traffic from other subnet, vpn tunnel to access this.

      Scenario 2. If the above setup works then i am assuming a switch will work just fine.

      1. If i wanted to go the virtual ip route and give Firewall B its own public ip, after connecting Firewall B into Pfsense, will i have to configure the interface as a LAN interface (like above) and then just do port forwarding?

      Thank you

      S stephenw10S G 3 Replies Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @greatbush
        last edited by

        @greatbush All that sounds right except you lost me at The VPN comment.

        Can you just connect the other router to your ISP? If not yes you can port forward or 1:1 NAT.

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote 👍 helpful posts!

        G 1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator @greatbush
          last edited by

          @greatbush said in Connect Another Firewall with its own LAN into Pfsense:

          -> Pfsense -> Rules -> LAN2 -> create rules that will allow traffic from other subnet,

          'Firewall B' is probably actually a router with NAT capability. It may well outbound NAT the traffic from the subnet behind it. In that case pfSense would only see the traffic as coming from the LAN2 subnet and rules should be set to match that. But you may be able to disable the NAT in Firewall B.

          You might also be able to bridge LAN2 to WAN (or WAN2) so that Firewall B gets a public IP to use directly. That's quite a bit more complex though.

          G 1 Reply Last reply Reply Quote 0
          • G
            greatbush @SteveITS
            last edited by

            @SteveITS No. The, the most import reason being budgets.

            1 Reply Last reply Reply Quote 0
            • A
              AmandaBrown
              last edited by AmandaBrown

              You can bridge or route with 1:1 NAT to preserve networks.

              1 Reply Last reply Reply Quote 0
              • G
                Gblenn @greatbush
                last edited by

                @greatbush You could just connect a switch in front of your firewalls. So that your /29 network goes into the switch and then each firewall can get their own public IP directly.

                1 Reply Last reply Reply Quote 0
                • G
                  greatbush @stephenw10
                  last edited by

                  @stephenw10 Firewall B is an actual firewall like Meraki or Palo Alto

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Then it will probably be NATing by default. You'll need to disable it if you want pfSense to see traffic from the subnet behind it.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.