Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Adding second network, 10.0.0.0

    Scheduled Pinned Locked Moved General pfSense Questions
    20 Posts 5 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JKnottJ
      JKnott @lewis
      last edited by

      @lewis

      Maybe you should think this through. For example, where would you run nmap from? Also, what would those cameras be connecting to? As mentioned, you want another NIC or VLAN.

      PfSense running on Qotom mini PC
      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
      UniFi AC-Lite access point

      I haven't lost my mind. It's around here...somewhere...

      1 Reply Last reply Reply Quote 0
      • L
        lewis
        last edited by

        Since adding the alias for example (as shown above), I'm now able to ping 10.0.0.1. This seems to be just what I'm looking for.

        Not sure what there is to think through and of course, is why I asked the question.

        I'm not looking for anything all that complicated, I don't need to route anything, I just need to ping devices that are on 10.x.x.x networks while the default network is 192.168.1.1.

        Isn't what I have now just what I am looking for?

        JKnottJ 1 Reply Last reply Reply Quote 0
        • JKnottJ
          JKnott @lewis
          last edited by

          @lewis said in Adding second network, 10.0.0.0:

          I'm not looking for anything all that complicated, I don't need to route anything, I just need to ping devices that are on 10.x.x.x networks while the default network is 192.168.1.1.

          Again from where? If only from pfSense, yeah that will work. If the other network, no it won't.

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          1 Reply Last reply Reply Quote 0
          • L
            lewis
            last edited by

            Not following.
            The firewall default LAN network is 192.168.0.0./16.
            Adding the alias has so far allowed me to ping the 10.0.0.1 IP from devices in the 192.168.x.x. network. Does this not mean I can ping any device on 10.x.x.x from the 192.168.x.x network now?

            JKnottJ 1 Reply Last reply Reply Quote 0
            • JKnottJ
              JKnott @lewis
              last edited by

              @lewis

              Did you actually ping something on one network from the other, except for from pfSense? The way IP works, that shouldn't be possible. When you try to connect with IP, the destination address is compared with the local address & subnet mask. If the destination is on the same network, then you can connect directly. If not, you have to go through a router. However, with both networks on the same interface, the router (pfSense) will send an ICMP redirect, advising to connect directly. But you can't, as describe above. The way around that is more aliases, so that a computer has addresses on both networks. You'll need an addresss on every device you want to be able to use either network.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              1 Reply Last reply Reply Quote 0
              • L
                lewis
                last edited by

                Yes, you are right. I pinged the firewall only, not a device on the LAN.
                I thought being able to ping the firewall meant I could now reach anything on the 10.x.x.x network.

                I recall it was very simple when I did this a long time ago. I simply added an alias or something, I believe I only needed to add one rule to allow the 192.168.x.x network to communicate with devices on the 10.x.x.x network.

                And, if I wanted more security, I could also set up separate rules instead of one single rule as above.

                1 Reply Last reply Reply Quote 0
                • L
                  lewis
                  last edited by

                  So, can someone direct me to a url/document that can help me with this? I had found one once but can't seem to find one now.
                  I basically just want to have 192.168.x.x. as the default network with 10.0.0.0/8 as a secondary network.

                  1 Reply Last reply Reply Quote 0
                  • H
                    heper @Rico
                    last edited by

                    @Rico said in Adding second network, 10.0.0.0:

                    There is no clean/proper way to run two networks at the same layer2.
                    Create VLANs or use more physical NICs.

                    -Rico

                    1 Reply Last reply Reply Quote 0
                    • L
                      lewis
                      last edited by

                      I'm not trying to argue but I had this working up until last year and it worked perfectly. I could either have one rule that allowed traffic to flow between the two networks or I could create separate rules to keep them separated. It was a one minute setup.

                      I was not using a vlan either. Maybe I'm not asking the question correctly which is why I'm not finding anything on Google either.

                      1 Reply Last reply Reply Quote 0
                      • H
                        heper
                        last edited by

                        you can't find anything on google, because it's not supported & in fact very bad practice to run multiple subnets on the same interface.

                        you either use a separate network card or you use vlans.

                        whatever it was you had working up until last year, it probably wasn't what you think it was.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by johnpoz

                          As others have said this is just borked.. Running multiple layer 3 networks on the same layer 2 network is just WRONG!! Can it be done - yeah, but it provides no security, no isolation.. its just utterly freaking pointless from every point of view..

                          If you want to isolate devices onto different networks for security... Then do it physically with different nics in pfsense, and different switches and APs... Or go the vlan route... Get a switch and APs that actually support vlans.

                          A 40$ 8 port gig switch can do vlans... If you don't want to spend money on wireless AP that do them or your current wifi router can not run 3rd party like ddwrt that will allow vlans - then you could use some 20$ wifi router as AP and connect it to a specific vlan on your switch..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 0
                          • L
                            lewis
                            last edited by lewis

                            I understand why it's not a good idea but as I said, it's not to route traffic, it's just to scan devices I work on that come in with fixed IPs and the only way to find them is to nmap a range.

                            All my switches can do VLANs and other tricks but I'm not looking for anything like that. Not looking to set up separate networks. I'm not looking to isolate anything, I do want all three on the same interface, there is no security issue in this case.

                            JKnottJ johnpozJ 2 Replies Last reply Reply Quote 0
                            • JKnottJ
                              JKnott @lewis
                              last edited by

                              @lewis

                              As has been mentioned, you can't get from one network to the other, without going through pfSense or other router. But a router won't do that when both networks are on the same interface. You could install nmap on pfSense and then use it to check those devices, provided you put an alias on the pfSense LAN port.

                              PfSense running on Qotom mini PC
                              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                              UniFi AC-Lite access point

                              I haven't lost my mind. It's around here...somewhere...

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @lewis
                                last edited by

                                @lewis said in Adding second network, 10.0.0.0:

                                it's just to scan devices I work on that come in with fixed IPs

                                What devices - so you can not log into these devices.. No console or screen.. And you don't know what their IP is to say telnet/ssh to them.. But you have the login creds?

                                Why would think you should do this from your firewall?

                                Set the IP on your PC your working from.. Scan whatever you want... I would do such things on an isolated vlan anyway.. I wouldn't be plugging random shit into my normal lan..

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                L 1 Reply Last reply Reply Quote 0
                                • L
                                  lewis @johnpoz
                                  last edited by lewis

                                  @johnpoz said in Adding second network, 10.0.0.0:

                                  @lewis said in Adding second network, 10.0.0.0:

                                  it's just to scan devices I work on that come in with fixed IPs

                                  What devices - so you can not log into these devices.. No console or screen.. And you don't know what their IP is to say telnet/ssh to them.. But you have the login creds?

                                  Why would think you should do this from your firewall?

                                  Set the IP on your PC your working from.. Scan whatever you want... I would do such things on an isolated vlan anyway.. I wouldn't be plugging random shit into my normal lan..

                                  The random 'shit' are IoT devices that I need to recover. I know where they come from, I know there are no security risks, just that someone lost access to it by setting up a static IP and it cannot be reset. When arp -s IP MAC doesn't work, the only thing left is to scan the IP ranges. Nothing will be routing on those networks, it's only to find IPs that might be using one of these.

                                  I keep telling you, this is not a security issue, I'm not trying to isolate anything, I had a simple config on the pfsense some time back that gave me exactly this. It allowed me to set up two additional networks on the default 192.168.x.x. The two additional networks were 10.0.0.0/8 and 172.16.0.0/16.

                                  Anyhow, if no one here know what it was I might have had, no need to continue this thread. I just thought it was something simple and well known.

                                  1 Reply Last reply Reply Quote 0
                                  • L
                                    lewis
                                    last edited by

                                    I think I'll just add a couple more interfaces and do it that way. I got to thinking about how I might be able to use the separate lans anyhow.

                                    Thanks to all for the input.

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.