Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Two gateways, two subnets, one internet, subnet connectivity issue

    Scheduled Pinned Locked Moved General pfSense Questions
    66 Posts 4 Posters 13.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      Live4soccer7
      last edited by

      So the port forward doesn't really seem like the best way to go about it then.

      I'm not really familiar with the site-site tunnel at all or IPSEC.

      Seems like trying to change the WAN on the pfsense box to a LAN connection and attempt the following:

      You have a design issue that needs to be addressed.  If you're connecting two sites via a direct connection, you want to connect the sites via LAN interfaces (not WAN).  So, if you were going to keep both edge devices where they are, I would:
      Add a 3rd NIC to PFsense on LAN 2 and assign it a static IP in the 192.168.1.1/24 range (e.g. 192.168.1.254)
      @ LAN 2, patch your wireless bridge to the 3rd NIC
      @ LAN 2, add an any/any rule to the 3rd NIC interface
      @ LAN 1, add an any/any rule to the LAN interface (you can refine it later if needed)
      @ LAN 1, add a static route to 192.168.5.0/24 with a gateway of 192.168.1.254
      @ LAN 2, PFsense already knows how to get to 192.168.1.0/24 because of the locally connected interface, so no static route needed here
      And you're done.

      1 Reply Last reply Reply Quote 0
      • L
        Live4soccer7
        last edited by

        Good question, I suppose if you remove the gateway from the "WAN" interface and just rename it… it would then become a LAN interface... sure.

        I'm not seeing where I can remove the gateway on the WAN interface.

        1 Reply Last reply Reply Quote 0
        • M
          marvosa
          last edited by

          So the port forward doesn't really seem like the best way to go about it then.

          Correct.  Because you have to create a port forward for every different connection you want to make

          I'm not really familiar with the site-site tunnel at all or IPSEC.

          I would actually use OpenVPN here, the setup is easier, but either way, there's no reason to add the encryption overhead if it isn't necessary.

          Seems like trying to change the WAN on the pfsense box to a LAN connection and attempt the following:

          From a design perspective, this is your best option, yes.  In an ideal world, you would configure a separate interface on DDWRT and create an isolated transit network, but that's another conversation and I'm not familiar with creating and assigning interfaces on DDWRT.

          I'm not seeing where I can remove the gateway on the WAN interface.

          In the "General Configuration" section, Change the IPv4 Configuration Type to "static" and then in the "Static IPv4 Configuration" section, leave the IPv4 Upstream gateway option as "None"

          1 Reply Last reply Reply Quote 0
          • L
            Live4soccer7
            last edited by

            Thanks, reading over your post now. Someone posted up a picture of a hand written setup. I was looking over that when I refreshed and it was taken down.

            1 Reply Last reply Reply Quote 0
            • M
              marvosa
              last edited by

              @Live4soccer7:

              Thanks, reading over your post now. Someone posted up a picture of a hand written setup. I was looking over that when I refreshed and it was taken down.

              Yes, he had the right idea about creating a transit network on separate interfaces on both sides, but some of the networking was incorrect and it wouldn't have worked.

              1 Reply Last reply Reply Quote 0
              • L
                Live4soccer7
                last edited by

                @ LAN 2, add an any/any rule to the 3rd NIC interface

                For this, you are referring to the firewall rules, correct? If I named newly resigned WAN to NIC3 since that's what you were referring to adding and to lessen confusion between the LANS then would the rule be like this:

                This rule is being created ON LAN2 (pfsense)

                Interface: NIC3
                TCP/IP: IPv4
                Protocol: TCP
                Source: any
                Destination: any
                Destination Port Range: Leave blank or?

                1 Reply Last reply Reply Quote 0
                • L
                  Live4soccer7
                  last edited by

                  I've created the static route on LAN1.

                  Destination: 192.168.5.0
                  Subnet MASK: 255.255.255.0
                  Gateway: 192.168.1.254

                  Then when I go to change the WAN to static and assign it an IP of 192.168.1.254, I get the following error in pfsense: This IPv4 address conflicts with a Static Route.

                  edit: by the way, thank you very much for your assistance. It is greatly appreciated. Same goes to everyone else.

                  1 Reply Last reply Reply Quote 0
                  • J
                    jamesonp
                    last edited by

                    I kind of figured you might run into that error.  I'm thinking something like this might work:

                    http://i.imgur.com/95ouWv4.jpg

                    I accidentally deleted my post with it originally.

                    1 Reply Last reply Reply Quote 0
                    • L
                      Live4soccer7
                      last edited by

                      The local and remote site are backwards in respect to the hardware being used (pfsense vs ddwrt).

                      Are you suggesting to still hook the wireless bridge up on the remote site to a WAN port or to a LAN port?

                      1 Reply Last reply Reply Quote 0
                      • J
                        jamesonp
                        last edited by

                        I have not used DDWRT in a long time so I'm unfamiliar with the options.  Do you have the ability to create an OPT type port on the DDWRT side?

                        1 Reply Last reply Reply Quote 0
                        • L
                          Live4soccer7
                          last edited by

                          I can unbridge one of the physical ports and I believe assign it a new IP.

                          Can I load pfsense on this DDWRT router? or is there a better option. It is a WRT320N (V1) router.

                          1 Reply Last reply Reply Quote 0
                          • J
                            jamesonp
                            last edited by

                            Yea that's probably what you're looking for.

                            I still think an IPSEC tunnel between the sites where the phase two protocol set to AH is your best option.  That way you avoid the NAT issue and port forwarding issues.

                            I'm pretty sure DDWRT supports IPSEC but I couldn't tell you how to set it up.  Optimally, it'd be best if you could put a pfSense device on the remote site.  All you'd need is a spare PC with two NIC ports.

                            1 Reply Last reply Reply Quote 0
                            • L
                              Live4soccer7
                              last edited by

                              That'd be nice. I'm fresh out of NIC ports and extra PCs. I've utilized just about every piece of hardware I have owned over the last 15 years in the current networks on both sides.

                              I am unfamiliar with IPSEC. I want to run OpenVPN with a VPN service on the pfsense side. Can I do the IPSEC and have the OpenVPN/VPN service simultaneously?

                              1 Reply Last reply Reply Quote 0
                              • J
                                jamesonp
                                last edited by

                                I don't see why you couldn't.  There's no overlapping ports.

                                You'd just have to make sure the pfSense box is strong enough to do the encryption/decryption for both IPSEC and OpenVPN at the same time.  Though if you setup the IPSEC phase two entries with just AH, the CPU impact would be far less.

                                1 Reply Last reply Reply Quote 0
                                • L
                                  Live4soccer7
                                  last edited by

                                  Seems like there should be a simpler solution than IPSEC for LAN communication. I'm just baffled, I figured connecting two subnets would have been much simpler.

                                  1 Reply Last reply Reply Quote 0
                                  • J
                                    jamesonp
                                    last edited by

                                    It really is simple.  You don't have to use IPSEC, I was only suggesting it because I thought that would be the easiest solution in this case.

                                    In reality, the only difficult part of this is the DDWRT setup because I'm unfamiliar with it.

                                    If you could figure out how to not use the WAN port (to avoid NAT) on the DDWRT side, you'd just set it up like how I have in the picture and then add the rules to deny/allow the types of traffic you want pass between the two networks.

                                    Edit:

                                    This might be even better: http://www.dd-wrt.com/phpBB2/viewtopic.php?t=78029

                                    1 Reply Last reply Reply Quote 0
                                    • L
                                      Live4soccer7
                                      last edited by

                                      Thanks, I'm reading the link now.

                                      The WAN port from the PFsense machine is connected to the LAN on the DDWRT. Just in case there was confusion. I do have a third router with DDRWT on it as well if that router could simply handle the routing between the two subnets, but it seems like that would be redundant.

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        marvosa
                                        last edited by

                                        @jamesonp:

                                        I kind of figured you might run into that error.  I'm thinking something like this might work:

                                        http://i.imgur.com/95ouWv4.jpg

                                        I accidentally deleted my post with it originally.

                                        jamesonp, the design is sound, but the interfaces on the transit network have to be on the same network.  i.e. the OPT interfaces would need to be 172.16.0.1/30 and 172.16.0.2/30 then adjust the static routes accordingly.

                                        Then when I go to change the WAN to static and assign it an IP of 192.168.1.254, I get the following error in pfsense: This IPv4 address conflicts with a Static Route.

                                        I'm guessing you forgot to remove your old route sending 192.168.1.0/24 to 192.168.1.1?  That would be the reason for the conflict.

                                        Also, after doing some more research, if you use my suggestion, the inter-connectivity between the sites would work, but we would still need to use policy routing to get LAN 2 to the internet.  Which is fine, but it's an extra step.  In your specific case, all we really needed to do from the beginning is disable outbound NAT (Firewall -> NAT -> Outbound -> check Disable Outbound NAT) which turns PFsense into a routing only firewall and put an any/any rule on the interface connected to the bridge.

                                        Another option is to disable both NAT and the firewall which turns PFsense into a routing only platform:
                                        System -> Advanced -> Firewall & NAT -> check Disable all packet filtering

                                        I apologize for missing these steps.  This could've been a much shorter thread :)

                                        1 Reply Last reply Reply Quote 0
                                        • L
                                          Live4soccer7
                                          last edited by

                                          Thanks, I'll give it a shot today. Possibly this morning if I can find time before work. I'll post back.

                                          1 Reply Last reply Reply Quote 0
                                          • L
                                            Live4soccer7
                                            last edited by

                                            I tried the following as it seemed like the simplest test.

                                            Another option is to disable both NAT and the firewall which turns PFsense into a routing only platform:
                                            System -> Advanced -> Firewall & NAT -> check Disable all packet filtering

                                            I have now deleted an firewall rules that I've created and same went for routing tables on the pfSense box. When I did the above, I lost internet connectivity AND access to the router on the other side of the wireless bridge. I still have a route on the DDWRT router to the pfsense gateway and 192.168.5.0 subnet. What am I missing as that seems like it should do the trick. I still had local access to the 192.168.5.0 clients though, that was good.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.