Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Routing between two pfsense firewalls connected by fiber

    Scheduled Pinned Locked Moved Routing and Multi WAN
    14 Posts 4 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Jeroen
      last edited by

      On both sites i allow:

      vpn net to lan1 net
      lan1 net to vpn net
      lan1 to 192.168.10.0 network (and the 1.0/2.0/11.0)
      192.168.10.0 network (and the 1.0/2.0/11.0) to lan1 (lan2 etc)

      i have rules allowing vpn to lanx and lanx to lany etc on any protocol.

      logs show nothing.
      I have the lan1 to 192.168.x.0/24 network set to logging.
      just when i ping, nothing (not blocked or passed) shows in the log.
      i do use the ping util in pfsense to ping the other site.

      so what i basicly allow is:

      Site A: eth1 (lan1) to eth5 (tunnel) to Site B: eth5 (tunnel) to eth1 (lan1 remote network).
      i also allow eth1 (lan1) to eth1 (lan1 remote network) in a rule.

      1 Reply Last reply Reply Quote 0
      • H
        heper
        last edited by

        i believe your static routes are flawed…. i would think your gateway, is the host pfsense on the other end.

        try this:
        site-a

        eth5 = vpn (interface ip 192.168.50.2)

        gateway 192.168.50.2 as route to Site B
        static route to 192.168.10.0/24 using gateway 192.168.50.2
        statis route to 192.168.11.0/24 using gateway 192.168.50.2

        change "192.168.50.2' –> '192.168.50.1'

        site-b:

        eth5 = vpn (interface ip 192.168.50.1)

        gateway 192.168.50.1 as route to Site A
        static route to 192.168.0.0/24 using gateway 192.168.50.1
        statis route to 192.168.1.0/24 using gateway 192.168.50.1

        change "192.168.50.1' –> '192.168.50.2'

        hope it helps

        mvg
        jeroen

        1 Reply Last reply Reply Quote 0
        • J
          Jeroen
          last edited by

          i tried to change the ip's for the gateways, still no luck.

          i did notice just yet (by testing the change to the gateway ips) that if i use the diagnostic ping from pfsense and i choose destination 192.168.10.1 and set the source to lan1 net.
          I get the following reply:

          PING 192.168.10.1 (192.168.10.1) from 192.168.1.254: 56 data bytes

          it looks like it's using the 192.168.1.254 as gateway for the 192.168.10.0 network instead of the 192.168.50.2 (or is this correct and am i seeing thing wrong :))
          When i select the vpn tunnel net as source i can't ping the 192.168.10.1 addres either, but is show the correct gateway: PING 192.168.10.1 (192.168.10.1) from 192.168.50.2: 56 data bytes

          it seems i can also ping the 192.168.50.1 from the 192.168.50.2 (and the other way around)
          I can't ping the 50.x adresses from any other interface on the other site.

          Is the routing not using the right gateway here?

          1 Reply Last reply Reply Quote 0
          • H
            heper
            last edited by

            did you flush states after changing the static routes ?

            are you combining gateway with static routes for some reason ?
            what i was trying to ask, is if you are using policy-routing in your firewall-rules, that contradict the "natural flow' of your static routes?  ;)

            1 Reply Last reply Reply Quote 0
            • J
              Jeroen
              last edited by

              i did reset states.

              There is one default gateway (wan side)
              Then there is a gateway for the route.

              on site A, lan1 there is a rule:

              protocal = any
              source = lan1 net
              destination = 192.168.10.0/24 network

              At the bottom the gateway for this rule is the extra gateway (192.168.50.2 for site A)

              So at Site A there is a second gateway called ToSiteB and the gateway adres is 192.168.50.2
              There is a route network 192.168.10.0/24 using gateway ToSiteB (192.168.50.2) on interface eth5 (the tunnel nic)

              At Site B there is a second gateway called ToSiteA and the gateway adres is 192.168.50.1
              There is a route network 192.168.1.0/24 using gateway ToSiteA (192.168.50.1) on interface eth5 (the tunnel nic).

              obviously there is something wrong or missing (or the tunnel isn't working like it should although i can ping eth5 ip's from either site).
              to me right now all config and rules seem fine though :)

              1 Reply Last reply Reply Quote 0
              • H
                heper
                last edited by

                as i tried to explain in the previous post:

                (site-A: 192.168.50.2)–---------------------------------------------------------------------(site-B:192.168.50.1)
                            |                                                                                                                                        |
                  LAN 192.168.1.x                                                                                                              LAN 192.168.10.x
                  LAN 192.168.2.x                                                                                                              LAN 192.168.11.x

                on site-A:
                modify/create the gateway for the fiber interface from 192.168.50.2  TO  192.168.50.1

                on site-B
                modify/create the gateway for the fiber interface from 192.168.50.1  TO  192.168.50.5

                also remove any policy-routing the firewall rules (the gateway-selection at the advanced section)

                1 Reply Last reply Reply Quote 0
                • G
                  georgeman
                  last edited by

                  Be careful with the firewall rules, the allow rules should be on the interfaces that serve as a link.

                  For troubleshooting purposes I suggest to place an allow all rule on those interfaces

                  If it ain't broke, you haven't tampered enough with it

                  1 Reply Last reply Reply Quote 0
                  • J
                    Jeroen
                    last edited by

                    @Heper

                    I've changed that and now i can ping the interface (eg 192.168.10.1) on the other pfsense.
                    I can't however ping any client in that lan (eg 192.168.10.10).

                    1 Reply Last reply Reply Quote 0
                    • H
                      heper
                      last edited by

                      so to summerize:

                      client_LAN-A:
                      -ping to 192.168.50.1 = OK
                      -ping to 192.168.10.1 = OK
                      -ping to 192.168.11.1 = OK
                      -ping to 192.168.10.10 = Not OK
                      -ping to 192.168.11.10 = Not OK

                      client_LAN-B:
                      -ping to 192.168.50.2 = OK
                      -ping to 192.168.1.1 = OK
                      -ping to 192.168.2.1 = OK
                      -ping to 192.168.1.10 = Not OK
                      -ping to 192.168.2.10 = Not OK

                      Is this the current situation?

                      -Is there firewalling-software running on the clients?
                      -Do the clients have pfSense set as their default gateway in their network settings?
                      -Try running a "packet capture" on one of your LAN interfaces (specify a lan_client as host-address). Try to figure out what is happening to the pings.

                      I'm guessing the pings arrive at the destination, but the reply gets lost somewhere.

                      1 Reply Last reply Reply Quote 0
                      • G
                        georgeman
                        last edited by

                        @heper:

                        -Is there firewalling-software running on the clients?

                        I bet this is the issue. By default, the Windows firewall allows ICMP only from within its own subnet

                        If it ain't broke, you haven't tampered enough with it

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.