Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense with 3 NICS

    Scheduled Pinned Locked Moved General pfSense Questions
    75 Posts 7 Posters 17.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bryan.paradis
      last edited by

      @Jamerson:

      Dear All,
      i have on my ESXI Pfsense 2.1 with 3 NICS
      1 WAN
      1 LAN
      1 LAN 2
      the issue is all is working beside the LAN2 when the users are connectiong to the LAN 2 and using it as gateway they can't browse to the internet
      i've checked the firewall rules they are file,
      P.S. users on the Lan are fine !
      can you please point me to the right direction ?

      Go to Interfaces -> Assign -> Bridges tab -> Create bridge of LAN1 and LAN2 unless you want them as seperate lans for some reason

      1 Reply Last reply Reply Quote 0
      • J
        Jamerson
        last edited by

        @bryan.paradis:

        @Jamerson:

        Dear All,
        i have on my ESXI Pfsense 2.1 with 3 NICS
        1 WAN
        1 LAN
        1 LAN 2
        the issue is all is working beside the LAN2 when the users are connectiong to the LAN 2 and using it as gateway they can't browse to the internet
        i've checked the firewall rules they are file,
        P.S. users on the Lan are fine !
        can you please point me to the right direction ?

        Go to Interfaces -> Assign -> Bridges tab -> Create bridge of LAN1 and LAN2 unless you want them as seperate lans for some reason

        hi Bryan,
        yes I want both of them to be separated,
        is this possible ?

        1 Reply Last reply Reply Quote 0
        • B
          bryan.paradis
          last edited by

          @Jamerson:

          @bryan.paradis:

          @Jamerson:

          Dear All,
          i have on my ESXI Pfsense 2.1 with 3 NICS
          1 WAN
          1 LAN
          1 LAN 2
          the issue is all is working beside the LAN2 when the users are connectiong to the LAN 2 and using it as gateway they can't browse to the internet
          i've checked the firewall rules they are file,
          P.S. users on the Lan are fine !
          can you please point me to the right direction ?

          Go to Interfaces -> Assign -> Bridges tab -> Create bridge of LAN1 and LAN2 unless you want them as seperate lans for some reason

          hi Bryan,
          yes I want both of them to be separated,
          is this possible ?

          What kind of separation? What is the goal?

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            What subnets are you using for LAN and LAN2?
            Do you see anything in the firewall logs when LAN2 users try to connect?

            Please give as many details as possible.

            Steve

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              What firewall rules do you think are fine?  Did you turn off automatic nat?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • J
                Jamerson
                last edited by

                Dear Bryan,
                the Goal is both not to reach each otherse, from each side there is a File server which is gonna be restricted. also LAN2 NIC will have different restriction than LAN1

                Stephen
                LAN 1 is 192.168.4.0/24
                LAN2 is 192.168.6.0/24

                John:
                Automatic NAT is on
                the firewall rules are exactly the same on both NICS, Allow all
                but LAN1 works and LAN2 no,

                the only different is LAN2 not attached to a Physique NIC and LAN1 it does so as it showen on the attached

                LAN2.jpg
                LAN2.jpg_thumb

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  I assume you add some VMs to vSwitch2 to tests LAN2?

                  You realise the firewall rule on LAN2 must have the source address as the LAN2 subnet or 'any'. It differs from the LAN default rule in that way.
                  Since you don't mention it I assume you're not seeing anything in the firewall logs.

                  Steve

                  1 Reply Last reply Reply Quote 0
                  • B
                    bryan.paradis
                    last edited by

                    @Jamerson:

                    Dear Bryan,
                    the Goal is both not to reach each otherse, from each side there is a File server which is gonna be restricted. also LAN2 NIC will have different restriction than LAN1

                    Stephen
                    LAN 1 is 192.168.4.0/24
                    LAN2 is 192.168.6.0/24

                    John:
                    Automatic NAT is on
                    the firewall rules are exactly the same on both NICS, Allow all
                    but LAN1 works and LAN2 no,

                    the only different is LAN2 not attached to a Physique NIC and LAN1 it does so as it showen on the attached

                    Go to Esxi - firewall vm properties -> Add a third network card and place it on LAN2
                    Go to pFsense -> Interfaces -> Make sure the third interface is assigned and labeled
                    Go to pFsense -> Services -> DHCP Server -> Press the third interface tab -> Setup up DHCP
                    Go to pFsense -> Firewall -> Outbound -> Press "Add a new rule based on this one" For the "Auto created rule for LAN to WAN" and change the source to reflect your second LAN subnet

                    DudleydoggD 1 Reply Last reply Reply Quote 0
                    • J
                      Jamerson
                      last edited by

                      @bryan.paradis:

                      @Jamerson:

                      Dear Bryan,
                      the Goal is both not to reach each otherse, from each side there is a File server which is gonna be restricted. also LAN2 NIC will have different restriction than LAN1

                      Stephen
                      LAN 1 is 192.168.4.0/24
                      LAN2 is 192.168.6.0/24

                      John:
                      Automatic NAT is on
                      the firewall rules are exactly the same on both NICS, Allow all
                      but LAN1 works and LAN2 no,

                      the only different is LAN2 not attached to a Physique NIC and LAN1 it does so as it showen on the attached

                      Go to Esxi - firewall vm properties -> Add a third network card and place it on LAN2
                      Go to pFsense -> Interfaces -> Make sure the third interface is assigned and labeled
                      Go to pFsense -> Services -> DHCP Server -> Press the third interface tab -> Setup up DHCP
                      Go to pFsense -> Firewall -> Outbound -> Press "Add a new rule based on this one" For the "Auto created rule for LAN to WAN" and change the source to reflect your second LAN subnet

                      Bryan,
                      Go to pFsense -> Firewall -> Outbound -> Press "Add a new rule based on this one" For the "Auto created rule for LAN to WAN" and change the source to reflect your second LAN subnet
                      Do you mean create the same rule  as LAN1 ? or Edit the Rule ?
                      on the firewall in dont have OUTBOUND option.
                      do i need some plug in ?

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        It's in Firewall: NAT: Outbound:
                        However by default the outbound NAT mode is set to 'Automatic outbound NAT rule generation'. That will work fine for your dual LAN setup. There should be need to add manual outbound rules as long as it's still set to automatic.

                        Please post your LAN2 firewall rules, a screenshot if possible.

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • J
                          Jamerson
                          last edited by

                          @stephenw10:

                          It's in Firewall: NAT: Outbound:
                          However by default the outbound NAT mode is set to 'Automatic outbound NAT rule generation'. That will work fine for your dual LAN setup. There should be need to add manual outbound rules as long as it's still set to automatic.

                          Please post your LAN2 firewall rules, a screenshot if possible.

                          Steve

                          hi Stephen
                          there is only one rule to allow the whole traffic,
                          attached is the screenshot
                          how can i do this exactly ?

                          Go to pFsense -> Firewall -> Outbound -> Press "Add a new rule based on this one" For the "Auto created rule for LAN to WAN" and change the source to reflect your second LAN subnet
                          

                          on the Outband there is no Manual rules yet. just Automatically.
                          i've configured a user with 192.168.6.0/24 on the same NIC but can't ping 192.168.6.1 the router
                          firewall screenshot is of the client behind the LAN2 when try to browse.
                          Much appreciate it !

                          LAN2.jpg
                          LAN2.jpg_thumb
                          Firewall.jpg
                          Firewall.jpg_thumb

                          1 Reply Last reply Reply Quote 0
                          • B
                            bryan.paradis
                            last edited by

                            @stephenw10:

                            It's in Firewall: NAT: Outbound:
                            However by default the outbound NAT mode is set to 'Automatic outbound NAT rule generation'. That will work fine for your dual LAN setup. There should be need to add manual outbound rules as long as it's still set to automatic.

                            Please post your LAN2 firewall rules, a screenshot if possible.

                            Steve

                            Yeah that makes sense. It should make it automatically

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              Why would you have a block rfc1918 rule on your LAN interface? You do understand your lan2 would be private, and pfsense own IPs on that lan would be rfc1918 as well

                              LAN 1 is 192.168.4.0/24
                              LAN2 is 192.168.6.0/24

                              And how is anything suppose to get to lan2 when there is nothing in your vswitch for lan 2 - what interface in pfsense is connected to lan2?

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                Yep that's your problem.
                                Go to Interfaces: LAN1: and uncheck 'block private networks' and 'block bogon networks'.
                                Bogons may not be necessary but there's no need to block them on LAN.

                                Steve

                                1 Reply Last reply Reply Quote 0
                                • B
                                  bryan.paradis
                                  last edited by

                                  @johnpoz:

                                  Why would you have a block rfc1918 rule on your LAN interface? You do understand your lan2 would be private, and pfsense own IPs on that lan would be rfc1918 as well

                                  LAN 1 is 192.168.4.0/24
                                  LAN2 is 192.168.6.0/24

                                  And how is anything suppose to get to lan2 when there is nothing in your vswitch for lan 2 - what interface in pfsense is connected to lan2?

                                  @stephenw10:

                                  Yep that's your problem.
                                  Go to Interfaces: LAN1: and uncheck 'block private networks' and 'block bogon networks'.
                                  Bogons may not be necessary but there's no need to block them on LAN.

                                  Steve

                                  What is the default on those when configuring a new interface ?

                                  1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator
                                    last edited by

                                    OFF, it only defaults to be on WAN interface.

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      bryan.paradis
                                      last edited by

                                      @johnpoz:

                                      OFF, it only defaults to be on WAN interface.

                                      This is what I had thought so I assume he must have changed options or maybe reversed his iunterfaces at some point and had to reassign?

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        Jamerson
                                        last edited by

                                        Why would you have a block rfc1918 rule on your LAN interface? You do understand your lan2 would be private, and pfsense own IPs on that lan would be rfc1918 as well
                                        
                                        LAN 1 is 192.168.4.0/24
                                        LAN2 is 192.168.6.0/24
                                        
                                        And how is anything suppose to get to lan2 when there is nothing in your vswitch for lan 2 - what interface in pfsense is connected to lan2?
                                        

                                        hi  Bryan,
                                        i am using all my 3 NICS to use Teaming so all traffic will go thought the WAN.

                                         Yep that's your problem.
                                        Go to Interfaces: LAN1: and uncheck 'block private networks' and 'block bogon networks'.
                                        Bogons may not be necessary but there's no need to block them on LAN.
                                        
                                        Steve 
                                        

                                        those rules were added automatically when i created the rules.
                                        you mean i need to uncheck all private Network between the LANS ?

                                        is it possible to have all traffic go out and in thought the WAN wihtout assign a physique NIC on the Vswitch ?

                                        creating a Vlan with one Physique NIC could fix the issue ?

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Uncheck the two boxes on the interface setup page.
                                          It doesn't matter that all the traffic is going to the WAN. The source is the LAN subnet which is a private network. If you look at your firewall rules for that interface you'll see that the 'block private networks' rules is at the top of the list so it matches the incoming packets first and the 'allow all rules' are never reached. The 'block private networks' check box is only there for WAN interfaces where you would not expect traffic arriving with an RFC1918 source address unless it's been spoofed.

                                          Steve

                                          1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator
                                            last edited by

                                            "those rules were added automatically when i created the rules."

                                            No I highly doubt that, nnless you created a WAN interface, by putting a gateway on it?

                                            "i am using all my 3 NICS to use Teaming so all traffic will go thought the WAN."

                                            What – no you are not.. I suggest you look up the term "teaming" as it has to do with network interfaces - you are not doing that ;)

                                            "is it possible to have all traffic go out and in thought the WAN wihtout assign a physique NIC on the Vswitch ?"

                                            Sure - if your Other vm's have an interface in that vswitch - see example below on my dmz vswitch.  There is an interface connected to my pfsense VM, and then the other vms that need to use this interface on pfsense are tied to that same vswitch.  It does not need to be tied to the physical network.  But it can access the physical network through pfsense that has its other lan and wlan in my case tied to physical networks.  See attachment 2

                                            nophysical.png
                                            nophysical.png_thumb
                                            physical.png
                                            physical.png_thumb

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.