Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Static route between 2 pfSense

    Scheduled Pinned Locked Moved Routing and Multi WAN
    23 Posts 6 Posters 6.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      MaxPF
      last edited by

      @Derelict:

      There should be no reason to NAT between those two networks.

      Do not set gateways on the transit interfaces themselves. They should just be enabled and have IP addresses and netmasks. You create a gateway in System > Routing but do not place it on the interfaces themselves.

      If there is outbound NAT for your transit interfaces, disable or delete those rules.

      Not exactly sure what you're talking about with the ESXi address. Routing doesn't care how the addresses are assigned. The ESXi host needs to allow traffic from the remote subnets and have 172.25.22.1 as its default gateway. Same with any VMs you place on the 172.25.22.0/24 vSwitch.

      I have a similar setup with a transit network between two pfsense and the only way hosts from a LAN behind pfSense 1 can get to hosts on the LAN behind pfSense 2 is if I assign the gateway in the transit interfaces.

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        Then you are doing it wrong.

        In the diagram above:

        On pfSense 1:

        Make an interface for TRANSIT with 10.0.0.1/29
        Make sure firewall rules on TRANSIT pass desirable traffic from TRANSIT Net and 192.168.5.0/24
        System > Routing Make a gateway TRANSIT_GW on TRANSIT for 10.0.0.2
        System > Routing Make a static route for 192.168.5.0/24 to TRANSIT_GW

        On pfSense 2:

        Make an interface for TRANSIT with 10.0.0.2/29
        Make sure firewall rules on TRANSIT pass desirable traffic from TRANSIT Net and 172.25.22.0/24
        System > Routing Make a gateway TRANSIT_GW on TRANSIT for 10.0.0.1
        System > Routing Make a static route for 172.25.22.0/24 to TRANSIT_GW

        And you're done.

        If that does not work there is, perhaps, some policy routing on the LAN interfaces that needs to be bypassed.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • M
          MaxPF
          last edited by

          @Derelict:

          Then you are doing it wrong.

          In the diagram above:

          On pfSense 1:

          Make an interface for TRANSIT with 10.0.0.1/29
          Make sure firewall rules on TRANSIT pass desirable traffic from TRANSIT Net and 192.168.5.0/24
          System > Routing Make a gateway TRANSIT_GW on TRANSIT for 10.0.0.2
          System > Routing Make a static route for 192.168.5.0/24 to TRANSIT_GW

          On pfSense 2:

          Make an interface for TRANSIT with 10.0.0.2/29
          Make sure firewall rules on TRANSIT pass desirable traffic from TRANSIT Net and 172.25.22.0/24
          System > Routing Make a gateway TRANSIT_GW on TRANSIT for 10.0.0.1
          System > Routing Make a static route for 172.25.22.0/24 to TRANSIT_GW

          And you're done.

          If that does not work there is, perhaps, some policy routing on the LAN interfaces that needs to be bypassed.

          Thanks for the reply. That's exactly the way I had it, but I'll doublecheck the FW rules just in case. I'm using a /30 network for the transit network with 10.10.10.1 and 10.10.10.2 on each end, but that should not make a difference.

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            /30 is, of course, just fine.

            Putting a gateway on an interface makes pfSense treat it as a WAN which is probably not what you want.

            That would enable reply-to on inbound states which might mask if there was a static route in only one direction.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • M
              MaxPF
              last edited by

              @Derelict:

              /30 is, of course, just fine.

              Putting a gateway on an interface makes pfSense treat it as a WAN which is probably not what you want.

              That would enable reply-to on inbound states which might mask if there was a static route in only one direction.

              You were 100% right! On pfSense 2 the static route to the LAN behind pfSense 1 had a typo ::) . Fixed that, removed the gateways from both the transit interfaces' settings and everything is working.

              Thanks!

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                Excellent!

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • G
                  gazoo
                  last edited by

                  I know this is super old, but I have a variation on this issue.

                  I have an internal IP that is hooked up to another system as well, however it is not PF Sense on that side. Also, routes have been learned via RIPv2 so I don't really know how to handle the Gateway static entries, as they are not static. Any advice?

                  I should also say, I can reach the RIP learned routes on all internal parts of the different router interfaces. The only problem is behind the other router, it cannot get beyond PF sense hence no Internet access. I did a traceroute from one of the end points on the RIP learned routes, and internet bound traffic dies upon reaching the PF Sense interface.

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    RIPv2? Really?

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • G
                      gazoo
                      last edited by

                      Well, not to go into too long of a story, this is an old TDMA iDirect satellite system in which they did some really stupid networking things like using RIPv2 and even proxy ARP. Not under my control.

                      I've attached a diagram. So behind the RHEL server, new subnets are created fairly frequently and in order to inform the world of their creation, they are updated via RIPv2 on the front end of the RHEL server. This is actually much more fairly involved thing involving some other moving parts, but I believe this is the relevant to PFsense portion.

                      So my issue is, once a new subnet is created, PF is picking it via RIP but for some reason hosts on the private subnets behind the RHEL can't get anywhere on the Internet; inside any of my private nets yes, it works fine. My workaround for now was to add a GW to PF indicating specific manually added static routes for the private nets that lay behind the GW (10.10.1.11) and the route to it. For example I've added the GW RHEL and then put routes behind it for example to 192.168.1.0/24. This works ok (although for some reason DNS is not passing, but one thing at time). Just want to see if it's possible to do this same thing via RIP. It doesn't seem to work the way it is now

                      routertroubleshoot.jpg
                      routertroubleshoot.jpg_thumb

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        You probably need to add outbound NAT for all of the private subnets on pfSense WAN.

                        Manually adding the static routes very likely enabled pfSense to know what networks were downstream so they were picked up by Automatic Outbound NAT.

                        Nothing like that is possible when pfSense doesn't have the routes in the configuration since they are dynamically-learned.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • G
                          gazoo
                          last edited by

                          Seems to have auto-added them. The static route addition seemed to probably cause the auto-generation. However, DNS isn't passing all the way down for some reason. The other subnets are on other interfaces that I didn't show on the picture.

                          outboundrules.JPG
                          outboundrules.JPG_thumb

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            Sorry. No idea what "DNS isn't passing down" means. Need to know where the DNS clients are, what their configured name servers are, and what is not working to be able to have a chance at helping.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • G
                              gazoo
                              last edited by

                              Sorry, the 192.168.1.0/24 subnet now passes traffic after I added the static route, but is not resolving DNS.

                              So, if you're a client on 192.168.1.0/24, no DNS resolution. I tried putting PF Sense as the DNS IP (10.10.1.1) and also directly to the DNS provider and no luck.

                              I'm still experimenting with this so I'll get back to you before I ask it again. I made a rule to tag DNS pass traffic on that interface to see if it's getting to PF via log checking. Will post when I see what's up.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.