Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLANs and Routing - Help

    Scheduled Pinned Locked Moved Routing and Multi WAN
    18 Posts 3 Posters 4.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      If you were using NAT, the router at 10.10.10.1 would need to know how to get to 10.10.10.15, which would be a connected network so it would have a route.

      Since you're not, you have to create static routes (or run OSPF or something) that tells 10.10.10.1 to send traffic for the other networks to 10.10.10.15.

      If 10.10.10.1 was pfSense I would:

      Create a gateway for 10.10.10.15 on interface LAN
      Create a static route sending 192.168.20.0/24 out that gateway on interface LAN
      Create a static route sending 192.168.30.0/24 out that gateway on interface LAN

      You then need firewall rules on WAN of 10.10.10.15 passing traffic from wherever you want to 192.168.20.0/24 and 192.168.30.0/24.

      These need to be as open or restrictive as you need.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • L
        LordCadbury
        last edited by

        @Derelict:

        If you were using NAT, the router at 10.10.10.1 would need to know how to get to 10.10.10.15, which would be a connected network so it would have a route.

        Since you're not, you have to create static routes (or run OSPF or something) that tells 10.10.10.1 to send traffic for the other networks to 10.10.10.15.

        If 10.10.10.1 was pfSense I would:

        Create a gateway for 10.10.10.15 on interface LAN
        Create a static route sending 192.168.20.0/24 out that gateway on interface LAN
        Create a static route sending 192.168.30.0/24 out that gateway on interface LAN

        You then need firewall rules on WAN of 10.10.10.15 passing traffic from wherever you want to 192.168.20.0/24 and 192.168.30.0/24.

        These need to be as open or restrictive as you need.

        Thanks for your response.

        My WAN interface (10.10.10.15) has a gateway of 10.10.10.1 which is an ADSL router.

        I had planned on leaving the default LAN subnet/interface for management, is there a way to route traffic from VLAN20 or VLAN30 without it hitting the LAN interface?

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          That was all an example on what to do on 10.10.10.1 if it was pfSense.  Since it hasn't been made clear it is pfSense.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • L
            LordCadbury
            last edited by

            I don't understand why the wan connection (10.10.10.15  in PfSense) cant act as a standard internet gateway for any clients that sit behind it, why does 10.10.10.1 need to be able to contact anything on the LAN/VLAN(s)?

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              Because whatever is on 10.10.10.1 does not have a route to:

              Re0 > LAN, 192.168.1.1
              Re0_vlan20, 192.168.20.1
              Re0_vlan20, 192.168.30.1

              Typically people NAT so all connections appear to 10.10.10.1 as coming from 10.10.10.15, which 10.10.10.1 DOES have a route to on a connected interface.

              Again, how does 10.10.10.1 know to send traffic for 192.168.20.1 to 10.10.10.15 for further routing?

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • L
                LordCadbury
                last edited by

                The 10.10.10.0 Network is just the adsl router and Pfsesne WAN interface. Do I have to worry about the route from 10.10.10.1 back to Lan,vlan20 and vlan 30 because NAT is disabled in the Pfsense?

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  Yes.  You have a device 10.10.10.1 trying to send traffic to 192.168.20.0/24.  It needs a route.  This isn't a pfSense thing.  It's an IP thing.  You need to enable automatic NAT.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • L
                    LordCadbury
                    last edited by

                    I've enabled Automatic outbound NAT rule generation, no rules were generated and PC30 (192.168.30.15) still cannot ping 8.8.8.8, am I missing something here?

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      Yes.  Two subnets on one segment is not the way to do things.  If you INSIST on doing that, you'll have to switch back to manual, NOT delete all the NAT rules, and duplicate the rules for 192.168.20 to 192.168.30.  I can't for the life of me figure out why you would want to do that.  If you want a 30 subnet, create VLAN 30 and put those hosts there.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • L
                        LordCadbury
                        last edited by

                        There is a typo in my original post which I will connect now, I do indeed have a vlan30 for 192.168.30.x subnet.

                        My apologies.

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          Changing back to automatic should create the correct rules.  If not, I guess back to manual and duplicate the rules for 192.168.20.0/24 for 192.168.30.0/24.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • L
                            LordCadbury
                            last edited by

                            Thanks for persevering with this!

                            I was testing this in a lab that I thought was identical to my live setup, as it turns out the switch had some misconfiguration on it.

                            All working now, thanks!

                            1 Reply Last reply Reply Quote 0
                            • L
                              LordCadbury
                              last edited by

                              Something I have now noticed is that the web interface sometimes takes a long time to respond/load. Would anyone know if this is something to do with the multiple virtual interfaces?

                              1 Reply Last reply Reply Quote 0
                              • DerelictD
                                Derelict LAYER 8 Netgate
                                last edited by

                                No.  It's not anything due to having multiple virtual interfaces in and of itself.  They look just like regular interfaces to pfSense.

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • P
                                  phil.davis
                                  last edited by

                                  Are you using Firefox?
                                  If so, there were changes in a recent Firefox release that messed up the way it processes old certificates that you had made exceptions for (like the first time you go to pfSense webGUI.
                                  Posts like this explain how to clean up Firefox: https://forum.pfsense.org/index.php?topic=82828.msg458036#msg458036

                                  As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                  If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.