Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Dual wan and failover with dynamic ip address

    Scheduled Pinned Locked Moved Routing and Multi WAN
    40 Posts 10 Posters 18.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sbyoon
      last edited by

      I think I succeeded in it. I added "slbd_configure();" into rc.newwanip to reload slbd. I found rc.newwanip is executed when ip change occurs at optx as well.

      I tested it for several days and it works well for me. But I want it to be tested by other people who are in other various environment.

      If you wan to test it, you can download loadbalance.zip file from below link.

      http://www.monetcom.co.kr/download/loadbalance.zip

      And decompress the file and upload each decompressed file to pfsense. (command promtp -> upload)
      And then copy each file to below.

      /etc/inc/vslb.inc
      /usr/local/www/load_balancer_pool_edit.php
      /etc/inc/filter.inc
      /etc/rc.newwanip

      • If you are using embedded version, make sure that you should execute /etc/rc.conf_mount_rw before copying.

      Any feedback will be appreciated.

      And I'd like to make rc.newwanip to check whether outgoing loadbalancing is enabled or not before it execute "slbd_configure()". I tested it with adding "if ($config['load_balancer']['lbpool']['type'] == "gateway")" above "slbd_configure();" but it didn't work. Could anyone give me an advice for it?

      Thanks.

      lb-pool-edit.jpg
      lb-pool-edit.jpg_thumb
      lb-pool-edit.jpg_thumb

      1 Reply Last reply Reply Quote 0
      • H
        hoba
        last edited by

        Just a question: Do you have to enter the OPTx-name or the substitute of it like WAN2 (in case you called OPT1 WAN2)?

        1 Reply Last reply Reply Quote 0
        • S
          sbyoon
          last edited by

          You should use the interface name in interfaces -> assign. Pls see the attached image. In this case the interface name should be wan, opt1 or opt4.

          interfacename.jpg
          interfacename.jpg_thumb
          interfacename.jpg_thumb

          1 Reply Last reply Reply Quote 0
          • H
            hoba
            last edited by

            The substitutes of the interfacenames would be nicer but this is cool too  :)

            1 Reply Last reply Reply Quote 0
            • B
              billm
              last edited by

              @hoba:

              The substitutes of the interfacenames would be nicer but this is cool too  :)

              We can work around this of course if the code works :)

              –Bill

              pfSense core developer
              blog - http://www.ucsecurity.com/
              twitter - billmarquette

              1 Reply Last reply Reply Quote 0
              • S
                sbyoon
                last edited by

                I found my mistake on load_balancer_pool_edit.php. When click add pool, the interface name was undifined. Now I corrected it. Pls download the correct one again if you already download it.

                http://www.monetcom.co.kr/download/loadbalance.zip

                And I found that rc.newwanip is not correctly copied to pfsense. If you have this problem also, you can edit it just adding below code at the bottom of rc.newwanip.

                /* reload slbd */
                slbd_configure();
                log_error("Configuring slbd");

                1 Reply Last reply Reply Quote 0
                • G
                  GotzBoost
                  last edited by

                  Well I'd have to say this guy fixed all my issues with this little update, OMG this is awesome. Been working on getting load balancing to work with my cable modem and my DSL all day. Ran across this, implemented it, and wham, it's all working… Thank you sooooo much for this addition.

                  Well since he helped me so much, I thought I would add to it also. I modified the config interface to allow picking what interface you want to add to the pool from a list. And added the ability to pick the Gateway's address from a list also, among other options too. (See attached image)

                  A quick note though, one reason, on top of being dynamic, why I couldn't get the dang balancing to work all day was because my cable provider disabled ping to it's gateway.... As soon as I set it to my web hosting companies IP, it all come "online."

                  Just update the files appropriately in /usr/local/www
                  http://www.webhostingspot.com/pfSense.rar

                  Question, before I start messing around I'd thought I'd ask fisrt.
                  With all this load balancing working and all, how do I configure pfSense so that all SMTP traffic on my network goes out through the WAN interface only?

                  P.S. How the heck do I get my FTP outbound working now?

                  ![Load Balance Setup.JPG](/public/imported_attachments/1/Load Balance Setup.JPG)
                  ![Load Balance Setup.JPG_thumb](/public/imported_attachments/1/Load Balance Setup.JPG_thumb)
                  ![Load Balance Setup.JPG_thumb](/public/imported_attachments/1/Load Balance Setup.JPG_thumb)

                  1 Reply Last reply Reply Quote 0
                  • S
                    sai
                    last edited by

                    @GotzBoost:

                    Question, before I start messing around I'd thought I'd ask fisrt.
                    With all this load balancing working and all, how do I configure pfSense so that all SMTP traffic on my network goes out through the WAN interface only?

                    Thats policy based routing.
                    set up a rule allowing SMTP and in that rule specify the WAN interface as gateway. make sure that this rule is above the others.

                    1 Reply Last reply Reply Quote 0
                    • H
                      hoba
                      last edited by

                      @GotzBoost:

                      P.S. How the heck do I get my FTP outbound working now?

                      http://forum.pfsense.org/index.php/topic,2282.msg13472.html#msg13472

                      1 Reply Last reply Reply Quote 0
                      • G
                        GotzBoost
                        last edited by

                        @sai:

                        Thats policy based routing.
                        set up a rule allowing SMTP and in that rule specify the WAN interface as gateway. make sure that this rule is above the others.

                        I'm assuming you are talking about a NAT rule and not a firewall rule. Adding this NAT rule is not going to mess up the auto generated load balancing rule? Am I supposed to select "Enable advanced outbound NAT" to add my own NAT rules? What exactly does "Enable advanced outbound NAT" mean and do? And if there was an auto generated NAT rule, where is it? Why doesn't it show up in the NAT rule list, it should? When need be, add auto generated NAT rules, for warn the admin though, and allow the admin to control the NAT rules. Don't control NAT rules, just help generate them.

                        Being Check Point FW1 NG certified, I'm very familiar with NAT and firewall rules. It's taking a bit of a learning curve to use pfSense, but not much. pfSense reminds me of CheckPoint a LOT! Personally, I think if you got this stable enough it could easily compete with a single instance CheckPoint setup.

                        Just need to add the capability of Application-level packet inspection, so that you can drop packets for a certain apps (like IM or P2P). And it would be neck and neck with CheckPoint.

                        1 Reply Last reply Reply Quote 0
                        • G
                          GotzBoost
                          last edited by

                          @hoba:

                          @GotzBoost:

                          P.S. How the heck do I get my FTP outbound working now?

                          http://forum.pfsense.org/index.php/topic,2282.msg13472.html#msg13472

                          Ok, I've verified that all my interfaces don't have "Disable the userland FTP-Proxy application" checked. And my firewall rules allow from LAN interface all outbound activity to any. Still no work.

                          P.S. What is the userland FTP-Proxy application? And why is it used? What's different from lets say SMTP connection and a FTP connection that is not allowing FTP?

                          1 Reply Last reply Reply Quote 0
                          • H
                            hoba
                            last edited by

                            Reread the post, you need to add an additional Rule at the top of your firewallrules. It's not only the ftp helper setting. For further information on the ftp helper please search the forum. This has been covered in deptch already several times.

                            1 Reply Last reply Reply Quote 0
                            • G
                              GotzBoost
                              last edited by

                              What about reply #22?

                              1 Reply Last reply Reply Quote 0
                              • H
                                hoba
                                last edited by

                                Firewallrules determine through which interface the traffic is leaving for policybased routing (gatewaysetting). Advanced outbound NAT let's you specify what happens with traffic that is leaving through an interface (if it should be natted or not or if you have multiple Virtual IPs to which of the IPs). If advanced outbound NAT is disable NAT will happen on all interfaces that have a gateway configured. It then will translate the traffic to the interface IP of the pfSense. If you enable advanced outbound NAT you have to set up your own rules. Everything not specified in the rules will just be routed without NAT. Enabling advanced outbound NAT will generate a NAT-rule for traffic going from LAN to WAN for your reference.

                                1 Reply Last reply Reply Quote 0
                                • D
                                  databeestje
                                  last edited by

                                  We may want the interface dialog to be a drop down of interfaces. Not sure if that works with the current javascript though.

                                  Looks like we want this in.

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    databeestje
                                    last edited by

                                    Hold on, didn't read the second page. Looks like we want to split the server side load balancing and outbound load balancing.

                                    I'll have a look at this tomorrow.

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      databeestje
                                      last edited by

                                      GotzBoost. I tried your page but it doesn't work yet. It does not appear to set the correct interface name via javascript into the poolbox.

                                      Are those 2 files in the pfsense.rar really the only edited files?

                                      1 Reply Last reply Reply Quote 0
                                      • G
                                        GotzBoost
                                        last edited by

                                        No, my files are an addition to sbyoon's modification. So apply his mod first, and then mine.

                                        1 Reply Last reply Reply Quote 0
                                        • D
                                          databeestje
                                          last edited by

                                          Well, it worked fine after refreshing everything. I think the javascript got cached. Because it worked for others the first time.

                                          I have up-to-date patches available on my site. http://iserv.nl/files/pfsense/slbd/

                                          The code is already committed into CVS. Releng_1 is under discussion.

                                          1 Reply Last reply Reply Quote 0
                                          • G
                                            GotzBoost
                                            last edited by

                                            What is Releng_1? At the moment the drop down for ping/gateway IP get's set to what ever the IP is at that point in time. It doesn't get updated when ever the WAN/OPTx gets a new IP. I was going to look at how sbyoon modified the code to update the IP upon a DHCP renew and make it allow to do the same for the ping/gateway IP.

                                            Even though it's preferrably to find a hard coded IP out in the space to ping, as in some gateways don't allow you to ping them. As it was in my case.

                                            Or here's another better idea, don't ping somthing to see if the net is up or down. Rather do a trace route with a max hop of ~3(let this be configurable), if it comes back with ~3 hops at least, then the interface is up. That will do one of two thing, make sure that you can actually get to the net and not just your ISP, and also cut down on unwanted/needed ping traffic.

                                            Case in point, Time Warner had a router go out >:( (for about 48 hours :o), I could get to any of TW sites, but not the net. So, half of my traffic that was going out my cable modem was failing and the other half that was going out my DSL was OK. If the trace route was in use, then my cable modem would have been automaticly set to down, and fail over to my DSL.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.