Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Multi LAN - Single Wan

    Scheduled Pinned Locked Moved Routing and Multi WAN
    15 Posts 3 Posters 9.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      That second line (the one for LAN2) should have a subnet of 90.0.1.0/24.

      And no, if 90.0.1.0/24 is only reachable by a router, then MAC addresses for that subnet will not show up in the ARP table.

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • N
        NeophyteHeaven
        last edited by

        opps..sorry..yep..its 90.0.1.0/24  :o my bad..

        is there any way i can get their mac address? what about proxy/lusca_cache.. will LAN 2 get cached too?

        running pfsense 1.2.3-RELEASE on Dell R300 (raid1), Lusca/LUSCA_HEAD r14560 patched by chudy r11

        1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          You'd need to add that subnet into an ACL for squid, I don't use the lusca version so I can't say what that might entail.

          No way to get their MAC unless everything was in one large subnet without an intermediate router.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • N
            NeophyteHeaven
            last edited by

            what about static routes? do i need to apply that also?
            here my current?

            Interface  Network  Gateway
            LAN 90.0.1.0/24 90.0.0.201

            running pfsense 1.2.3-RELEASE on Dell R300 (raid1), Lusca/LUSCA_HEAD r14560 patched by chudy r11

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              Not sure what you're asking about applying them to. NAT? Squid? You don't need to do anything to them for static routes

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • N
                NeophyteHeaven
                last edited by

                my squid seems didnt capture anythin via lightsquid..
                same goes for LAN2, still cant access anything on WAN (internet)

                not sure what i missed here..

                running pfsense 1.2.3-RELEASE on Dell R300 (raid1), Lusca/LUSCA_HEAD r14560 patched by chudy r11

                1 Reply Last reply Reply Quote 0
                • N
                  NeophyteHeaven
                  last edited by

                  SQUID seems didnt work for LAN2

                  running pfsense 1.2.3-RELEASE on Dell R300 (raid1), Lusca/LUSCA_HEAD r14560 patched by chudy r11

                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    Did you add the LAN2 subnet to squid's list of authorized networks/subnets?

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 0
                    • N
                      NeophyteHeaven
                      last edited by

                      @jimp:

                      Did you add the LAN2 subnet to squid's list of authorized networks/subnets?

                      yep..ive already add that into that…
                      90.0.1.0/24
                      still cant get LAN2 go through the net via LAN1 -> WAN

                      running pfsense 1.2.3-RELEASE on Dell R300 (raid1), Lusca/LUSCA_HEAD r14560 patched by chudy r11

                      1 Reply Last reply Reply Quote 0
                      • N
                        NeophyteHeaven
                        last edited by

                        updated with attached layout

                        running pfsense 1.2.3-RELEASE on Dell R300 (raid1), Lusca/LUSCA_HEAD r14560 patched by chudy r11

                        1 Reply Last reply Reply Quote 0
                        • G
                          GGM
                          last edited by

                          Same Problem with me.

                          I'm using pfsense 1.2.3 release.

                          I have LAN(10.10.254.0/24) ,virbr2_ES(10.10.4.0/24), virbr0_SS(10.10.2.0/24),1 WAN(dhcp 192.168.2.0/24).

                          NAT rules:

                          WAN   10.10.254.0/24 * * * * * NO Auto created rule for LAN
                          WAN   10.10.4.0/24 * * * * * NO rule for virbr2_ES
                          WAN   10.10.2.0/24 * * * * * NO rule for virbr0_SS

                          Firewall is friendly and blocks nothing.
                          DNS forwarder is active.

                          Mysterius things happens:
                          from LAN:

                          nslookup www.google.de
                          Server: 10.10.254.1
                          Address: 10.10.254.1#53

                          ** server can't find www.google.de: REFUSED

                          –-----and minutes later-------

                          nslookup www.google.de
                          Server: 192.168.2.100
                          Address: 192.168.2.100#53

                          Non-authoritative answer:
                          www.google.de canonical name = www.google.com.
                          www.google.com canonical name = www.l.google.com.
                          Name: www.l.google.com
                          Address: 74.125.79.104
                          Name: www.l.google.com
                          Address: 74.125.79.147
                          Name: www.l.google.com
                          Address: 74.125.79.99

                          the same on all "LANs", sometimes it works and sometimes not ??
                          DNS is not the only Problem.
                          When it works I could resolve names but from the opt interfaces virbr2_ES and virbr0_SS
                          sometimes i can ping in the internet(www.heise.de) and sometimes not.

                          Some Idears?

                          1 Reply Last reply Reply Quote 0
                          • N
                            NeophyteHeaven
                            last edited by

                            My Static Rules is
                            Interface : LAN
                            Destination network : 90.0.1.0/24
                            Gateway : 90.0.0.201

                            yet still i cant manage to get my LAN2 connect to the internet.

                            here my manual outbound.

                            ![Firewall NAT Outbound.jpg](/public/imported_attachments/1/Firewall NAT Outbound.jpg)
                            ![Firewall NAT Outbound.jpg_thumb](/public/imported_attachments/1/Firewall NAT Outbound.jpg_thumb)

                            running pfsense 1.2.3-RELEASE on Dell R300 (raid1), Lusca/LUSCA_HEAD r14560 patched by chudy r11

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.