Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    WAN /26 into 2x DMZ /27 and multiple LANs using vlan.

    Scheduled Pinned Locked Moved Routing and Multi WAN
    17 Posts 5 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      desrux
      last edited by

      @Derelict:

      They need to give you a small interface network, like a /29 or /30, and route the /26 to you on that.

      So I can get my ISP to make a /29 'transit network / link net'. So I guess I declare to the ISP which ip within my /26 that acts as the gateway/router for the /26? And then that gateway/router is assigned the ISP gateway of the /29 correct?

      This gateway/router is in this case the pfsense firewall. But in practical terms how do I split/use my /26 so I get a firewalled DMZ with public ips and a non-firewalled DMZ with public ips using pfsense?

      I have 4 interface on the pfsense firewall. Ideally I would use 1 for WAN, 1 for LAN, 1 for firewalled DMZ and 1 for non-firewalled DMZ. (Potentially also using vlans to isolate public ips from each other on the DMZs).

      Best regards

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        Actually you (or your ISP) declare which IP address on the /29 the /26 is routed to.

        Once you have the /26 routed to you you can do whatever you want with the addresses.

        Just split it into two /27s and use those as the interface addresses for the DMZ networks and disable NAT for them.

        Example (in Cisco-ish Speak):

        Their Side:

        Interface (transit) network:

        interface ethernet 0/0
          ip address 198.51.100.1 255.255.255.248

        Routed /26 Subnet:

        ip route 192.0.2.0 255.255.255.192 198.51.100.2

        Your side:

        Interface (transit) network:

        interface WAN
          ip address 198.51.100.2 255.255.255.248

        DMZ Networks

        /27

        interface DMZ
          ip address 192.0.2.1 255.255.255.224

        /27

        interface DMZ1
          ip address 192.0.2.33 255.255.255.224

        ip route 0.0.0.0 0.0.0.0 198.51.100.1

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        D 1 Reply Last reply Reply Quote 0
        • D
          desrux2 @Derelict
          last edited by

          @Derelict Thanks for your recommendation. I can only agree that it is much more clean and easy to configure with a link/transit network.

          (Due to some ISP issues with a new fiber it took forever to proceed with the case.)

          Followed the guide here: https://docs.netgate.com/pfsense/en/latest/book/routing/routing-public-ip-addresses.html
          all great expect for the outbound NAT instructions. I had to change to "Manual Outbound NAT rule generation (AON - Advanced Outbound NAT)" and delete the auto generated rules. It was not enough to use the hybrid with NO NAT options.

          Link net/transit net /29 (WAN)
          Inside net /28 split into two /27 (DMZ1 and DMZ2)
          RFC1918 /16 (LAN)

          BR

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            @desrux2 said in WAN /26 into 2x DMZ /27 and multiple LANs using vlan.:

            It was not enough to use the hybrid with NO NAT options.

            That is enough. You should have posted what you had when it wasn't working because there was probably a mistake made.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            D 2 Replies Last reply Reply Quote 0
            • D
              desrux2 @Derelict
              last edited by desrux2

              @Derelict said in WAN /26 into 2x DMZ /27 and multiple LANs using vlan.:

              @desrux2 said in WAN /26 into 2x DMZ /27 and multiple LANs using vlan.:

              It was not enough to use the hybrid with NO NAT options.

              That is enough. You should have posted what you had when it wasn't working because there was probably a mistake made.

              Sure thing.

              Not working:
              4D127110-328D-4A5A-B79B-FA27EF4D3D4B.jpeg
              B4009A9C-5DAD-416E-956B-A07B28D02878.jpeg

              Working (I would assume I can also remove the NO NAT):
              5DE1F0DC-75CE-4820-9A0E-BB8841EC5EDB.jpeg
              E84B35C4-01F6-4FEC-961F-6FE741B49E9A.jpeg

              1 Reply Last reply Reply Quote 0
              • D
                desrux2 @Derelict
                last edited by desrux2

                @Derelict
                Found the issue. The NO NAT settings had somehow lost the interface assignment. It would look correct in the settings but not until clicking save (without changing anything) would the WAN show up in the menu.

                4DB697D7-9079-4E0E-A2A5-67A8AFC2F296.jpeg

                I wonder if this happens if the firewall has experienced at some point loosing said interface during boot?

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  I don't know. I have never seen that. booting after losing an assigned interface should trigger interface reassignment.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • JeGrJ
                    JeGr LAYER 8 Moderator
                    last edited by

                    I'd not go with "no NAT" rules but instead switch to manually configuring NAT, delete the automatic copied entries that aren't needed (those on the IFs with public IPs) and be done :)

                    Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                    If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                    D 1 Reply Last reply Reply Quote 1
                    • D
                      desrux2 @JeGr
                      last edited by

                      @JeGr Agreed!

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        In an HA environment where all NAT needs a custom rule I would agree.

                        I like the NO NAT rules in this case. The routed subnet is unlikely to change, leaving Automatic NAT in place.

                        Personal preference, of course.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.