[solved] Policy based routing TCP:SA
-
Hi sorry i think my diagram was just confusing PF WANA is a pfsence with 10.8.0.11 on the lan connected to one public IP address on the wan and WANB has 10.8.0.15 on the lan side of the pfsence and another public IP connected to the wan they are seperate wan connections with there own public ips configured on them the reason they connect to one bubble was just the software i used to create the diagram it isnt designed for network diagrams.
was just trying to give an idea of the network i have set up and that they both go into the mystical cloud that is the internet rather than they are on the same network as such.just to be clear there are 4 pf sence vm's in that diagram WANA, WANB PF-WAN and NETA are all seperate PF sence boxs the diagram is how they are phisicaly connected. with wan ip on the left and lan ip on the right
hope that clears it up a bit
-
"just to be clear there are 4 pf sence vm's in that diagram WANA,"
No it doesn't not from that drawing.. Draw your network with your actual pfsenses and the networks that connect them to their clients.
Why would you not just connect your multiple wans to 1 pfsense, and then have your networks behind that? Why do you have 4, and they are downstream of each other - so are they natting? If they are not natting where is your transit networks, etc. etc.
-
Ok added some bits to the diagram im realy not sure what else i can do to it as this is show how they are physically connected i have label all the pfSence box's wan port ip are on the left of the name LAN IP are on the right.
although not showing here there are actualy 5 wan IPs i have to make available to the network didn't think pfSence realy worked with lots of WANs connected like that may be something i need to resolve although looking at esxi i cant assign that many NICs to one box.
where there is NETA pfsence on the right there is also a NETB, NETC, NETD etc network next to it the various PFSences are being used as firewalls to controll what traffic flows between what networks and also as a router to connect the networks together.
I havent show these networks as these are not involved and allot of network to draw in that arent actualy doing anything at the moment but this is the reason for the multiple levels of PSsence box's in this and the other 3 wan IPs are there but not being used nothing is routing to them only the 2 pub IP's i have listed are actualy turned on and routing but the rest will need to come online later.
-
So your 2 pfsense behind your 2 wan pfsense boxes, are they natting? So you have a triple nat for client at 10.3.0.2 to get to the internet?
I don't see how they could be since your rule that says 10.3.02 use wana would never work, since that pfsense would never see that IP, it would only see the pfsense wan IP of 192.168.1.5
Why can you not just use 1 pfsense box with your 2 wan connections, and then put whatever networks you want behind that 1 pfsense box?
-
all natting is turned off except on those that i arrowed saying nating here so the packet keeps its source ip of 10.3.0.2 righ up untill it leaves my network hence the rule should match and dont forget i can run a curl to one of those 'whats my ip' sites and it shows WANA's public ip with the rule turned off and WANB's public ip with the rule turned on so this stuff works i have proven that its just the return sync ack when the connection is incoming that doesnt follow the rule.
id love to simpify it to your design but as mentioned right know i am only using 2 public IPS while i get this working but once i have finished this project there will be 5 public IPs and 4 local networks and i cant assign enough NICS to a virtual machine to accomodate this setup i belive the limit if 4 one lan connected to a switch to connect all the lan subnets only leaves 3 NICS for wan connection so i am 2 short, i could concolidate all the WANS to 2 pfsence machines but i would still have the problem of trying to pushing traffic 1 way or another depending on its origin and if syn acks are ignoring the firewall rules i would hit the same issue i guess putting me back to square one.
-
"setup i belive the limit if 4 one lan connected to"
Where did you get that idea?
There is no such limit.. In esxi 6 I believe there is a 10 vnic limitation. But you could also just run vlans on top of those vnics.. In hyper-v I do believe there a max of 12 vnics per vm, etc.
When you say you 5 public IPs - are those IPs from 5 different isps or 5 IPs from the same ISP?
What is the physical limitation of physical nics, in an esxi host I believe its 24 pci-e nics.. What is the speed of these isp connections. You could do it with 1 phsyical nic and all different isp could be just vlans on that 1 physical nic if your not going to surpass the physical speed limit of the physical nic.
Same goes for your lan side networks. You can use a combinations of vnics and vlans on top of those vnics, etc..
-
the idea came from the fact that the max you can select when you set it up but i see you can add more after creating.
ok so i get provided a single gig ethernet connection to my box so bandwidth is already limited here, its a trunk link with my 5 IPS that all sitting inside one vlan i just connect that physical port to a virtual switch and then i connected the 5 pfsence wan ports to that virtual switch and assigned the ip's statically so to replace this setup i see i can setup vlans against the wan link and assign them IP's so i create 5 vlans and assign them the ip's i have … now next issues i have the problem these ips are all within the same /24 range and pfsence complains that the networks are overlapping also the gateways will be the same and i only seem to be able to assign this to one of the interfaces. any work around for this :-\
-
So you have a 1 gbps connection from your isp, that gives you 5 ips.
Ok then you have actually 1 wan connection in pfsense. Your other IPs would be VIPs on this wan connection.
You can then forward inbound traffic to these different vips into your networks behind pfsense. You can then do outbound natting for specific source IPs to your specific vips.
-
Spot on !
have reconfigured it all, now running everything from one pfsence, all the subnets are now on a single lan on seperate vlans and all ips on vips and can controll routing exaly how i need to.
Thank you !!!
-
Well yeah that would be the normal way to do it ;) I have no idea what you were attempting to do other than create a train wreck ;)
Glad you got it working, KISS is your friend when setting up networks…