How can I achieve this with my current setup?
-
I frankly cannot see why printer should ping anything, in or outside LAN. Maybe you should make clear what is the issue here.
-
I frankly cannot see why printer should ping anything, in or outside LAN. Maybe you should make clear what is the issue here.
I cannot print over the internet or access its web interface over the internet, I think I've stated that multiple times.
-
I got it! ;D It's working now. I removed it from pfSense DHCP mappings, assigned it manually in printer. Don't know why it works now though.
-
I'm a little late to the game on this thread but it looks like you've gone ahead with a 1:1 nat setup for this. Alternatively you could have configured pfSense as a "transparent firewall" by setting up a bridge interface, disabling NAT, and configuring the public IPs directly on the "X amount of Comptuers".
This would have made pfSense work essentially like a QoS 'cable' linking the WAN connection into your switch. You also retain packet filtering functionality, and you don't have to configure any virtual IPs in the process.
For 1:1 NAT you don't need VIPs either if you're mapping them to devices behind the FW. This is also the best way to go if you want to have a private internal IP range that you route through pfSense for sharing an external IP with multiple internal devices.
I only chimed in because it appears that you want to use a pfSense VM on an existing server to run QoS for a bunch of stuff that is dedicated to WAN2 while leaving the orange and purple stuff set up as is using the other wifi router and WAN1.
-
I never was clear on your clients where. Assigning the IP statically often fixes thing when you would think DHCP should have worked but didn't. I'm glad it worked.
-
I'm a little late to the game on this thread but it looks like you've gone ahead with a 1:1 nat setup for this. Alternatively you could have configured pfSense as a "transparent firewall" by setting up a bridge interface, disabling NAT, and configuring the public IPs directly on the "X amount of Comptuers".
This would have made pfSense work essentially like a QoS 'cable' linking the WAN connection into your switch. You also retain packet filtering functionality, and you don't have to configure any virtual IPs in the process.
For 1:1 NAT you don't need VIPs either if you're mapping them to devices behind the FW. This is also the best way to go if you want to have a private internal IP range that you route through pfSense for sharing an external IP with multiple internal devices.
I only chimed in because it appears that you want to use a pfSense VM on an existing server to run QoS for a bunch of stuff that is dedicated to WAN2 while leaving the orange and purple stuff set up as is using the other wifi router and WAN1.
I just deleted all the Virtual IP's and you were right! I was going for your setup in the beginning, setting up each IP at every computer, but turns out it's much easier for me with DHCP mappings and NAT 1:1.
Yes, for the moment I solved purple and red part, I'll have to read on about how Radius and Captive Portal work in pfSense for a DD-WRT router authentication.
-
Hmm, interesting.
What are you mapping the internal machines to if you have removed the virtual IPs?
I am failing to see how this could work, I welcome a further explanation.Steve
-
Hmm, interesting.
What are you mapping the internal machines to if you have removed the virtual IPs?
I am failing to see how this could work, I welcome a further explanation.Steve
I'm not sure, I just removed the VIP's and tested for a few minutes and they worked, but I got a huge problem right now :'(
My ISP took out my service by error (have to wait about 1-3 days), and I plugged my old ISP (the one I was using before without pfSense), it was a new setup of pfSense, I set it up with NAT 1:1 and VIP's just like how it was working before, but with different public IP's, everything worked fine for ~4 hours, then a few computers got disconnected (some playing League of Legends) some were fine, until every computer got disconnected.
I can ping any site or IP in pfSense console, but nothing in the LAN clients.
-
For me, I use VIPs if I get my IPs by bridging and I use additional Virtual WAN ports if I'm getting IPs by DHCP.
But the transparent firewall thing just screwed me when I tried it with zero NAT. -
Ah yes! I was forgetting it was vitual. Yes adding extra WAN interfaces makes sense. Probably easier to setup too. However I'm not sure that's what Orientalsniper did, it seemed like he just deleted the VIPs. :-\
This new problem sounds like it could be a DHCP issue. As the leases expire the machines are not renewing correctly?
Steve
-
What's your suggestion to fix this DHCP lease issue?
-
What's your suggestion to fix this DHCP lease issue?
I am afraid it's extremely difficult to work with constantly moving target. By this time, probably almost everyone lost the picture about what is the current problem yet again. You already posted multiple times that it works and all of a sudden it does not again.
-
What's your suggestion to fix this DHCP lease issue?
I am afraid it's extremely difficult to work with constantly moving target. By this time, probably almost everyone lost the picture about what is the current problem yet again. You already posted multiple times that it works and all of a sudden it does not again.
Nooo, this is a different setup, I'm gonna create new thread to make it less confusing.
-
Nooo, this is a different setup, I'm gonna create new thread to make it less confusing.
Yes, please…
-
Stephen10 - I was forced to add the additional virtual WANs because I really would rather have use VIPs but had no idea how to get them to work because the ISP was binding to MACs and when I tried the VIP route they wouldn't give me an IP. Stingy guys….