Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Router only, no internet on OPT1

    Scheduled Pinned Locked Moved General pfSense Questions
    40 Posts 6 Posters 7.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      pfsense knows by default how to route to any network connected to it that it has an interface in.  Your smoothwall doesn't know about the networks behind pfsense unless you tell it, or you are running some routing protocol between smoothwall and pfsense so they can share their routes.

      And if boxes behind pfsense are going to talk to devices on the wan side directly and not just the gateway for stuff outside smoothwall you can run into a asymmetrical route issue where pfsense oh I am directly connected to that network wills end the traffic direct to that IP..  That devices says hmm where is that IP, its not on my network - I need to send it to my gateway your smoothwall.  So that is asymmetrical and you have issues with stateful firewalls in that scenario.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • L
        luna_s
        last edited by

        So what's the fix ? I can add another NIC in the smoothwall box and bridge the interfaces but it kind've defeats what I'm trying to achieve - I'm trying to move away from bridging on smoothwall

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          The fix is to have the correct routing..  Why would you need another nic you could just vlan.  And who said anything about bridging?

          If you want to use another nic for your transit network - sure, or could just be a vlan.  Will ips behind pfsense be accessing ips on the wan of pfsense, or will clients just be going to the smoothwall?  But smoothwall needs to know how to get back to networks behind pfsense.

          example - see attached.

          So you have devices on 192.168.1.0/24 that want to go to the internet, lets say domainx.com at 1.2.3.4, he sends that traffic to pfsense, pfsense I don't any networks that holds that IP.. So send to my gateway (smoothwall at 192.168.0.1)  Traffic comes back to smoothwall.. Smooth says I need to send this to 192.168.1.x – he needs to know that he needs to send that to 192.168.0.2

          So on your smoothwall you need routes
          192.168.1.0/24 192.168.0.2
          192.168.2.0/24 192.168.0.2

          This works fine as long as you don't have box on 192.168.1.x talking to 192.168.0.x  This is where you run into possible asymmetrical route problem.

          lets say 192.168.1.14 wants to talk to 192.168.0.28, he again sends it to pfsense on his segment.  Pfsense says oh I have that 192.168.0.0/24 network directly attached so will just put that traffic on the wire to 192.168.0.28..  192.168.0.28 says oh 192.168.1.14 wants to talk to me - that is not on my network so send it to smoothwall.  Smooth once you put in the routes says oh send that to 192.168.0.2, if pfsense is firewalling this would be out of state traffic depending..  Either way it is an asymmetrical and normally something you want to avoid.

          How you fix asymmetrical is with a transit network - see  2nd attachment, on the right side.

          One thing for sure is you need smoothwall having routes to those networks behind pfsense - unless pfsense was natting this traffic.  If pfsense was natting then you would only see traffic from pfsense interface in that 192.168.0.0/24 network.

          You will also need to make sure any rules be it firewall or proxy on your smoothwall allow for traffic from these 2 new networks 192.168.1.0/24 and 192.168.2.0/24

          networksbehindpfsense.jpg
          networksbehindpfsense.jpg_thumb
          2nddrawing.png
          2nddrawing.png_thumb

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • L
            luna_s
            last edited by

            Thank you :) Things are clearer now - what I've done in the end and got it working was to add another nic to smoothwall gave it an IP on the lan range and pointed dynamic DNS to the DC - I now have authentication working

            Thanks again for your patience - can be quite frustrating to fix these things at times

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              " add another nic to smoothwall gave it an IP on the lan range"

              You did what?  You connected your smooth wall directly to the lan of pfsense?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • L
                luna_s
                last edited by

                No,

                Something like this, the Smoothwall is only connected to the DC with DNS (the extra NIC is on the same range), no routing or zone bridging which means now I can attach any other vendors filtering solution much more easily.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  So your DC has 2 interfaces as well and you have a wired connecting your smoothwall and your DC, and your dc is also connect to your pfsense lan?

                  "only connected to the DC with DNS"

                  Why would you need an extra nic for joining smoothwall to your AD or pointing to it for dns resolution?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • L
                    luna_s
                    last edited by

                    No, the NIC is joined to the domain via the domain switches, DNS is resolved on the smoothwall box using dynamic DNS,
                    This is the only way I've got Smoothwall to talk to the DC

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      dynamic dns does not resolve anything - dynamic dns registers a name in a domain.

                      You clearly got a mess there.. why do you have smoothwall between 2 pfsense setups.. Is smoothwall doing nat, and pfsense in front of it also doing nat?

                      No idea what a domain switch is??  Is that another segment?  Why do you have so many devices that can be firewalls?  If you like smoothwall why not just use it? And add the interfaces you require to have a leg in each segment or vlan it out, etc.

                      Can you draw out your network with networks and your layer 2 switches.. I am taking it you have more than 1 switch.. A switch your calling a domain switch, and then another switch you have connected to pfsense lan and opt1 – is this the same switch, do you have it doing vlans?  You should run more than 1 network over the same physical wire.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • L
                        luna_s
                        last edited by

                        Okay,

                        What we have now is a network with layer 2 switches with vlans for wifi with a gateway of 192.168.5.253 which is the IP of the smoothwall UTMb
                        The smoothwall UTM does intervlan routing with zone bridging as well as radius and DHCP. We also use a raspberry pi to route MDns traffic

                        We plan on swapping out the Smoothwall for maybe a Lightspeed rocket or a IBoss filtering system (these are both inline) neither of these boxes can do routing nor radius etc.

                        Options are to replace Smoothwall with a layer 3 switch which goes to the lightspeed / Iboss then to a pfsense firewall. However we cannot afford a layer 3 switch so I came up with the genius idea of using a pfsense as a router - maybe this was a bad idea - might just be better off getting a HP 1920-8G

                        I'm having to try all this side by side on a live system as we have no hardware for a lab - making it harder than it should be

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          layer 3 switches don't have to be 1000's of dollars.  But you still would have the same routing problem..  Upstream routers always have to know how to get to downstream networks..  You can manually do it or run a routing protocol.

                          How many ports do you need on this L3 switch?  You can get a cisco sg300 10 port for example that will do L3 for less then 200$, what hardware you running pfsense on currently?

                          If your pfsense was to replace your smoothwall, why is the smoothwall still in the network?

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • L
                            luna_s
                            last edited by

                            I'm currently testing with an old desktop just to see if I can achieve this for as little as possible before investing

                            PFSense isn't replacing the smoothwall, I'm replacing the smoothwall with another filtering solution (think of smoothwall as dansguardian / squid which is what it basically is) - the other solutions are not UTM's so I need to sort out a firewall (again as cheap as I can)

                            routing –--> smoothwall -----> firewall

                            I may have to throw some cash at one of those ciscos (or the HP) instead

                            1 Reply Last reply Reply Quote 0
                            • DerelictD
                              Derelict LAYER 8 Netgate
                              last edited by

                              I would probably:

                              Internet <–-> pfSense <---> Content filter <---> L3 Switch <---> Local segments

                              Unless you need significant filtering between local segments - in which case the L3 switch would be another pfSense.

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              1 Reply Last reply Reply Quote 0
                              • L
                                luna_s
                                last edited by

                                Here's an image from the lightspeed manual, which is what I'm trying to achieve

                                I intend to use a pfsense box as the core switch, the management nic there is basically the extra nic I put in the smoothwall to enable management and AD authentication

                                1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator
                                  last edited by

                                  pfsense would not be my choice for a "core" switch..  Its a router, you will see much better speeds using a L3 switch..  Do you need to control access between these segments with firewall rules?  If not then L3 switch is the way to go..

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  1 Reply Last reply Reply Quote 0
                                  • L
                                    luna_s
                                    last edited by

                                    I know, I'm going to request one of those cisco switches you recommended, although with using PFSense I can install avahi and send MDns traffic around the lan and vlans and also setup a WIFI portal with radius so PFSense has some benefits over a layer 3

                                    In the meanwhile, I seem to have got everything working okay authentication is working and passing traffic via both non transparent and transparent proxy through the pfsense. It's been a learning curve but I've learnt quite a bit!

                                    1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator
                                      last edited by

                                      The sg300 line can do multicast routing, which would take care of your mdns stuff.

                                      As to a wifi portal – yeah you would normally do that on your actual wifi controller..  What are you using for wifi?  Pfsense makes a horrific access point.. Why would you not just get a 70$ ap from unifi run their free controller on a vm and there you go all the wifi portal shit you could want, vouchers, pay with cc, time limits, etc. etc..

                                      While I am big fan of getting by with what you have on a small budget when need too, and you can do some amazing things with really no money, etc.  In a work setup - its much better to spend a few dollars..  For example the unifi AP are 70$ or the pro versions are 200$  This is pretty small budget items for a company.. Shit I have the AC 300$ model in my house ;) I would think a company could afford 70 for stable wifi.

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      1 Reply Last reply Reply Quote 0
                                      • L
                                        luna_s
                                        last edited by

                                        We are running unifi, I've not played around with the portal too much but I need it to have stuff like import certs for HTTPS inspection policies on the portal screen.

                                        I still think you need to run avahi to route MDNS /bonjour , cisco have a document on it - I'm running AVAHI on a raspberry pi and its serving us well (inc. printer sharing via cups) so this can be moved to pfsense

                                        http://www.cisco.com/c/en/us/support/docs/wireless/aironet-1100-series-access-point/113443-cuwn-apple-bonjour-dg-00.html

                                        1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator
                                          last edited by

                                          You can customize the unifi portal to your hearts content so putting a link to a CA cert should not be a problem.  Or just using a trusted signed cert should remove that problem all together.

                                          You are correct mdns can be a pita, think the ttl is 1, etc.  I solved it even easier way by just putting my printer on the wlan segment ;)  Before that I had done it with cups, where my cups server just had an interface in the wlan segment as well.  Then I didn't have to worry about running cups.

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.