Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Dual wan and failover with dynamic ip address

    Routing and Multi WAN
    10
    40
    18.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sai
      last edited by

      @GotzBoost:

      Question, before I start messing around I'd thought I'd ask fisrt.
      With all this load balancing working and all, how do I configure pfSense so that all SMTP traffic on my network goes out through the WAN interface only?

      Thats policy based routing.
      set up a rule allowing SMTP and in that rule specify the WAN interface as gateway. make sure that this rule is above the others.

      1 Reply Last reply Reply Quote 0
      • H
        hoba
        last edited by

        @GotzBoost:

        P.S. How the heck do I get my FTP outbound working now?

        http://forum.pfsense.org/index.php/topic,2282.msg13472.html#msg13472

        1 Reply Last reply Reply Quote 0
        • G
          GotzBoost
          last edited by

          @sai:

          Thats policy based routing.
          set up a rule allowing SMTP and in that rule specify the WAN interface as gateway. make sure that this rule is above the others.

          I'm assuming you are talking about a NAT rule and not a firewall rule. Adding this NAT rule is not going to mess up the auto generated load balancing rule? Am I supposed to select "Enable advanced outbound NAT" to add my own NAT rules? What exactly does "Enable advanced outbound NAT" mean and do? And if there was an auto generated NAT rule, where is it? Why doesn't it show up in the NAT rule list, it should? When need be, add auto generated NAT rules, for warn the admin though, and allow the admin to control the NAT rules. Don't control NAT rules, just help generate them.

          Being Check Point FW1 NG certified, I'm very familiar with NAT and firewall rules. It's taking a bit of a learning curve to use pfSense, but not much. pfSense reminds me of CheckPoint a LOT! Personally, I think if you got this stable enough it could easily compete with a single instance CheckPoint setup.

          Just need to add the capability of Application-level packet inspection, so that you can drop packets for a certain apps (like IM or P2P). And it would be neck and neck with CheckPoint.

          1 Reply Last reply Reply Quote 0
          • G
            GotzBoost
            last edited by

            @hoba:

            @GotzBoost:

            P.S. How the heck do I get my FTP outbound working now?

            http://forum.pfsense.org/index.php/topic,2282.msg13472.html#msg13472

            Ok, I've verified that all my interfaces don't have "Disable the userland FTP-Proxy application" checked. And my firewall rules allow from LAN interface all outbound activity to any. Still no work.

            P.S. What is the userland FTP-Proxy application? And why is it used? What's different from lets say SMTP connection and a FTP connection that is not allowing FTP?

            1 Reply Last reply Reply Quote 0
            • H
              hoba
              last edited by

              Reread the post, you need to add an additional Rule at the top of your firewallrules. It's not only the ftp helper setting. For further information on the ftp helper please search the forum. This has been covered in deptch already several times.

              1 Reply Last reply Reply Quote 0
              • G
                GotzBoost
                last edited by

                What about reply #22?

                1 Reply Last reply Reply Quote 0
                • H
                  hoba
                  last edited by

                  Firewallrules determine through which interface the traffic is leaving for policybased routing (gatewaysetting). Advanced outbound NAT let's you specify what happens with traffic that is leaving through an interface (if it should be natted or not or if you have multiple Virtual IPs to which of the IPs). If advanced outbound NAT is disable NAT will happen on all interfaces that have a gateway configured. It then will translate the traffic to the interface IP of the pfSense. If you enable advanced outbound NAT you have to set up your own rules. Everything not specified in the rules will just be routed without NAT. Enabling advanced outbound NAT will generate a NAT-rule for traffic going from LAN to WAN for your reference.

                  1 Reply Last reply Reply Quote 0
                  • D
                    databeestje
                    last edited by

                    We may want the interface dialog to be a drop down of interfaces. Not sure if that works with the current javascript though.

                    Looks like we want this in.

                    1 Reply Last reply Reply Quote 0
                    • D
                      databeestje
                      last edited by

                      Hold on, didn't read the second page. Looks like we want to split the server side load balancing and outbound load balancing.

                      I'll have a look at this tomorrow.

                      1 Reply Last reply Reply Quote 0
                      • D
                        databeestje
                        last edited by

                        GotzBoost. I tried your page but it doesn't work yet. It does not appear to set the correct interface name via javascript into the poolbox.

                        Are those 2 files in the pfsense.rar really the only edited files?

                        1 Reply Last reply Reply Quote 0
                        • G
                          GotzBoost
                          last edited by

                          No, my files are an addition to sbyoon's modification. So apply his mod first, and then mine.

                          1 Reply Last reply Reply Quote 0
                          • D
                            databeestje
                            last edited by

                            Well, it worked fine after refreshing everything. I think the javascript got cached. Because it worked for others the first time.

                            I have up-to-date patches available on my site. http://iserv.nl/files/pfsense/slbd/

                            The code is already committed into CVS. Releng_1 is under discussion.

                            1 Reply Last reply Reply Quote 0
                            • G
                              GotzBoost
                              last edited by

                              What is Releng_1? At the moment the drop down for ping/gateway IP get's set to what ever the IP is at that point in time. It doesn't get updated when ever the WAN/OPTx gets a new IP. I was going to look at how sbyoon modified the code to update the IP upon a DHCP renew and make it allow to do the same for the ping/gateway IP.

                              Even though it's preferrably to find a hard coded IP out in the space to ping, as in some gateways don't allow you to ping them. As it was in my case.

                              Or here's another better idea, don't ping somthing to see if the net is up or down. Rather do a trace route with a max hop of ~3(let this be configurable), if it comes back with ~3 hops at least, then the interface is up. That will do one of two thing, make sure that you can actually get to the net and not just your ISP, and also cut down on unwanted/needed ping traffic.

                              Case in point, Time Warner had a router go out >:( (for about 48 hours :o), I could get to any of TW sites, but not the net. So, half of my traffic that was going out my cable modem was failing and the other half that was going out my DSL was OK. If the trace route was in use, then my cable modem would have been automaticly set to down, and fail over to my DSL.

                              1 Reply Last reply Reply Quote 0
                              • D
                                databeestje
                                last edited by

                                That's a slbd issue and currently not feasible to implement. The slbd checks need to be fast and light, and traceroute is neither. Furthermore I have seen far more routers block traceroute then I have them seen ping.

                                I'll have to look at the gateway ping implementation. Although I think that is handled by the rc.newwanip code and the filter.inc fixes syboon already applied.

                                For all intents and purposes, a router should never block ICMP traffic is that is integral to the operation of the tcp/ip protocol.

                                We are currently testing multi interface dhcp with the new dhcp clients but at this point in time it is not working just yet.

                                1 Reply Last reply Reply Quote 0
                                • G
                                  GotzBoost
                                  last edited by

                                  Ok, let me rephrase that. The router blocked ICMP traffic to itself, not all ICMP traffic going through it. And yes they do this quite often for security precautions. In some of the CCNA classes I've been in they've even tought that as a rule of thumb. "The only thing a public router needs to do is route, don't let it waste's it's time on anything else. And the last thing you want is a router that crashed from a flaw overlooked in some TCP stack from a ping."

                                  Security: Rule of thumb, block everything, then only open what's needed.

                                  What are you testing with multi interface dhcp? I have it now, with this fix, and it's working perfectly.

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    databeestje
                                    last edited by

                                    multi dhcp specifically in the later snapshots > 20-12-2006.

                                    1.0.1 should work fine in that respect.

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      databeestje
                                      last edited by

                                      I have put the modified version of the files on my site so other people can easily test them.
                                      http://iserv.nl/files/pfsense/slbd/

                                      those correspond to the files.
                                      /etc/rc.newwanip
                                      /etc/inc/filter.inc
                                      /etc/inc/vslb.inc
                                      /usr/local/www/pool.js
                                      /usr/local/www/load_balancer_pool_edit.php (use load_balancer_pool_edit2.txt )

                                      Cheers

                                      1 Reply Last reply Reply Quote 0
                                      • G
                                        GotzBoost
                                        last edited by

                                        Is there anything diff about them then what is already up? Or just a combination of all the patches stuck together?

                                        1 Reply Last reply Reply Quote 0
                                        • D
                                          databeestje
                                          last edited by

                                          A combination thereof but, uptodate with current snapshots.

                                          1 Reply Last reply Reply Quote 0
                                          • D
                                            databeestje
                                            last edited by

                                            It's been merged into RELENG_1 and should show up in a snapshot soon. Whenever soon is.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.