Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    1 WAN and 2 LANS

    Scheduled Pinned Locked Moved Routing and Multi WAN
    23 Posts 2 Posters 8.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GruensFroeschliG
      GruensFroeschli
      last edited by

      Did you create appropriate rules on each interface?
      Do you have a firewall on the device you're pinging?

      You could take a look at the firewall log to see if something gets blocked.

      We do what we must, because we can.

      Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

      1 Reply Last reply Reply Quote 0
      • S
        sfreitag
        last edited by

        Alright, so I can ping the 1st and 2nd LAN's now, which is a huge step.  It was caused from not having the rules setup correctly.  Now the only problem that I am having is that I can not get out to the internet on the 2nd LAN.  It has to be a rule, but I can not seem to figure out what is going on.  Any advice?

        1 Reply Last reply Reply Quote 0
        • GruensFroeschliG
          GruensFroeschli
          last edited by

          Post screenshots of your rules.

          We do what we must, because we can.

          Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

          1 Reply Last reply Reply Quote 0
          • S
            sfreitag
            last edited by

            Here is the first screenshot

            firewall1.JPG
            firewall1.JPG_thumb

            1 Reply Last reply Reply Quote 0
            • S
              sfreitag
              last edited by

              Second…

              firewall2.JPG
              firewall2.JPG_thumb

              1 Reply Last reply Reply Quote 0
              • S
                sfreitag
                last edited by

                Third…

                firewall3.JPG
                firewall3.JPG_thumb

                1 Reply Last reply Reply Quote 0
                • S
                  sfreitag
                  last edited by

                  and last but not least….fourth...

                  firewall4.JPG
                  firewall4.JPG_thumb

                  1 Reply Last reply Reply Quote 0
                  • GruensFroeschliG
                    GruensFroeschli
                    last edited by

                    You have a lot of rules which dont do anything.

                    Firewall rules are applied on the interface on which traffic comes in.
                    In a top to down manner.

                    LAN: Only the first rule is doing anything.
                    You will never see traffic from the LAN2 subnet on the LAN interface.

                    LAN: The same here. You will never see traffic from the LAN interface on the LAN2 interface. Also the first rule includes the third rule (protocol: any, includes protocol: icmp)

                    IPSEC: The same here: Your second rule is a "allow everything" rule.
                    The third rule never catches. If the first rule wouldnt be there, it wouldnt make a difference, since the second rule would allow it.

                    According to these screenshots you should be able to get out to the internet from the LAN2.
                    Did you enable Advanced outbound NAT?

                    We do what we must, because we can.

                    Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                    1 Reply Last reply Reply Quote 0
                    • S
                      sfreitag
                      last edited by

                      No it is set to automatic right now.

                      1 Reply Last reply Reply Quote 0
                      • GruensFroeschliG
                        GruensFroeschli
                        last edited by

                        Do the devices on your LAN2 have the pfSense as default gateway?
                        If you try to access the internet: do you see anything in the firewall log being blocked on OPT1?

                        Can clients on LAN2 resolve names?

                        We do what we must, because we can.

                        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                        1 Reply Last reply Reply Quote 0
                        • S
                          sfreitag
                          last edited by

                          Yes, the devices are pointed to LAN2's gateway address.  I am receiving a ton of blocks on LAN2, but I can not seem to find an easy way to export them besides a screenshot to place them on here.

                          1 Reply Last reply Reply Quote 0
                          • S
                            sfreitag
                            last edited by

                            Alright, so I still can not get to the internet.  The layout of the network is like so:

                            Router –> WAN Port
                            192.168.0.XXX network -->  LAN Port
                            192.168.10.XXX network -->  LAN2 Port
                            LAN Port --> 192.168.0.XXX Switch
                            LAN2 Port --> 192.168.10.XXX Switch
                            Each switch has a cable going to the domain controller with 2 NIC's, so one is configured on the .0 network and one on the .10 network.

                            The switches are configured with their own gateway, but I can ping internally everywhere.  I just can not get out on the .10 network.  The .0 network is still running fine.

                            1 Reply Last reply Reply Quote 0
                            • S
                              sfreitag
                              last edited by

                              Here is how I have the LAN2 setup, does anyone see this as not the correct way to set this up?

                              firewall5.JPG
                              firewall5.JPG_thumb

                              1 Reply Last reply Reply Quote 0
                              • GruensFroeschliG
                                GruensFroeschli
                                last edited by

                                You have your LAN2 bridged with LAN.
                                Essentially you made LAN2 = LAN.
                                Disable the bridge and it should work.

                                We do what we must, because we can.

                                Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                                1 Reply Last reply Reply Quote 0
                                • S
                                  sfreitag
                                  last edited by

                                  Thank you so much….that worked.  That was changed the other day when we were at the very beginning stage of setting it up by someone else and I had not even looked at that again.  Sorry for so many questions and I appreciate your help very much!

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    sfreitag
                                    last edited by

                                    I have one more small problem that has been discovered today.  I can not access anything through the VPN to the .10 network.  I can get to the firewall through IE  on the .10 network without any problem, but can not get to anything after that.  Everything looks as if it is wide open once you are on the network.  This is an example of a firewall log entry:
                                    Nov 18 14:46:36 LAN2 192.168.10.30:3389 192.168.0.20:8701 TCP

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      sfreitag
                                      last edited by

                                      Alright, so this is still going on.  I have rebooted the firewall, and that has resolved some other issues.  The only thing that I still can not do once connected to the VPN, which is routing and remote access on the .0 network, is RDP or anything else to anything on the .10 network.  I can ping everything though, which is odd.  I am confused because if I VPN to any of our other sites, I can connect to anything without any problems.  Therefore it has to be something within the firewall or Routing and Remote Access on the server, but for some reason I lean toward the firewall due to the firewall logs.

                                      1 Reply Last reply Reply Quote 0
                                      • GruensFroeschliG
                                        GruensFroeschli
                                        last edited by

                                        Hmmm.
                                        If you click on the icon on the left side in the firewall log, you can see which rule blocked.
                                        Did you change your firewall rules since you posted the screenshots?
                                        According to your screenshot such a block
                                          Nov 18 14:46:36    LAN2    192.168.10.30:3389    192.168.0.20:8701    TCP
                                        should not happen.

                                        We do what we must, because we can.

                                        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          sfreitag
                                          last edited by

                                          Alright, so I am still having a small issue with the firewall, and I have spent time with Microsoft on the phone thinking that it is a routing and remote access issue, but they refuse that it can be the problem.  If I VPN into this location, which houses the .0 and .10 network, it gives me a .0 address, but I am not able to get to anything on the .10 network.  If I am in the office and not VPN'd in, I can touch anything.  If I VPN into another site, I can get to anything.  I can ping things on the .10 network though if I VPN into the network and get a .0 IP, but nothing else.  Attached are the most current screenshots.  I understand that some are irrelevant, but this was before my time and I will clean it up in the long run.  I just need this to work.

                                          ipsec.JPG
                                          ipsec.JPG_thumb
                                          lan2.JPG
                                          lan2.JPG_thumb
                                          lan.JPG
                                          lan.JPG_thumb
                                          wan.JPG
                                          wan.JPG_thumb

                                          1 Reply Last reply Reply Quote 0
                                          • GruensFroeschliG
                                            GruensFroeschli
                                            last edited by

                                            What kind of VPN are you using?
                                            I'm kinda confused since you say you get IPs from both subnets?
                                            Is that a bridged VPN setup?
                                            Are you still using a bridge?

                                            We do what we must, because we can.

                                            Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.