Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Multi WAN, TO VM NAS with seperate Firewall

    Scheduled Pinned Locked Moved Routing and Multi WAN
    31 Posts 2 Posters 2.7k Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V Offline
      viragomann
      last edited by

      ❓

      @jochenmehlich said in Multi WAN, TO VM NAS with seperate Firewall:

      Now I have the problem (2 servers are in the new network), that everytime only one server is responding

      On requests from the internet?

      Do you have multiple public IPs? If so, do get routed them to the primary IP? If no, have you assigned them to pfSense.

      What are the four NICs between vmbr0 and pfSense supposed to mean?

      1 Reply Last reply Reply Quote 0
      • J Offline
        jochenmehlich
        last edited by

        @viragomann
        yes every vm has its own public ip. The four NICs are because the hoster (hetzner) give me it with macs so that im getting it with dhcp, i dont know how else to do it.
        Do you have an idea how to do it in proxmox?

        1 Reply Last reply Reply Quote 0
        • V Offline
          viragomann
          last edited by

          So instead of giving static IP addresses to you, the ISP gives you MACs and you can pull the IPs from DHCP? Strange.
          Or is there still a possibility to assign the IPs manually?

          So obviously this is meant to spoof the MACs in the Proxmox VM settings.

          @jochenmehlich said in Multi WAN, TO VM NAS with seperate Firewall:

          my problem is, that i cant use the proxmox firewall - because it generates (why ever) random macs - which arent supported by my hoster

          What do you mean by that?
          The Proxmox VM MAC? You can enter here what ever you want.

          If you want to us pfSense for security reasons however, you can put it in the line in bridge mode.

          But if it will work with the four WAN NICs depends on the IPs you get. If they are within different subnets and have different gateways it should work though. However, if you have only one gateway, pfSense will respond to all requests from the same NIC (MAC).

          J 1 Reply Last reply Reply Quote 0
          • J Offline
            jochenmehlich @viragomann
            last edited by

            @viragomann said in Multi WAN, TO VM NAS with seperate Firewall:

            Or is there still a possibility to assign the IPs manually?

            Yes, I could give them the static things. One problem could be that one of the four ips has a other gateway (unluckly the pfsense ip).

            @viragomann said in Multi WAN, TO VM NAS with seperate Firewall:

            What do you mean by that?
            The Proxmox VM MAC? You can enter here what ever you want.

            Unfortunately not, they scan the MACs on the switch port, so I can only use the ones I got from the hoster. This just happened when I used the Proxmox firewall.

            @viragomann said in Multi WAN, TO VM NAS with seperate Firewall:

            But if it will work with the four WAN NICs depends on the IPs you get. If they are within different subnets and have different gateways it should work though. However, if you have only one gateway, pfSense will respond to all requests from the same NIC (MAC).

            Actually it is planned that the VMs are only reachable / send over their IP. Unfortunately I don't know how to use multiple IPs over one NIC

            V 1 Reply Last reply Reply Quote 0
            • V Offline
              viragomann @jochenmehlich
              last edited by

              @jochenmehlich said in Multi WAN, TO VM NAS with seperate Firewall:

              Unfortunately I don't know how to use multiple IPs over one NIC

              Firewall > Virtual IPs
              Here you can assign further IPs to one interface. Use type IP alias.

              However, if you get routed the additional IPs to you primary that isn't necessary. That's why I asked before.

              If you want each VM to be accessible and also go out with a unique IP set up a NAT 1:1 for each.

              1 Reply Last reply Reply Quote 0
              • J Offline
                jochenmehlich
                last edited by

                I configured it now so:
                Dashboard:
                cens_dashboard.png
                Nat 1:1:
                cens_nat.png
                and Virtual IPs:
                cens_virtual_ip.png

                put when i try to ping to one of the server, i dont get any response. What did I wrong?

                V 1 Reply Last reply Reply Quote 0
                • J Offline
                  jochenmehlich
                  last edited by

                  One Problem could be, that the Ip of the PfSense VM has a completly other gateway as the from the others VM. Would it be fixed, if I setup a second NIC?

                  J 1 Reply Last reply Reply Quote 0
                  • J Offline
                    jochenmehlich @jochenmehlich
                    last edited by

                    Falls du willst, können wir gerne auch auf Deutsch schreiben.

                    V 1 Reply Last reply Reply Quote 0
                    • V Offline
                      viragomann @jochenmehlich
                      last edited by

                      @jochenmehlich said in Multi WAN, TO VM NAS with seperate Firewall:

                      Falls du willst, können wir gerne auch auf Deutsch schreiben.

                      Vom Interesse des Forum her sollte am Ende jedenfalls hier eine Lösung deponiert werden, sofern es eine gibt.

                      1 Reply Last reply Reply Quote 0
                      • V Offline
                        viragomann @jochenmehlich
                        last edited by viragomann

                        @jochenmehlich said in Multi WAN, TO VM NAS with seperate Firewall:

                        One Problem could be, that the Ip of the PfSense VM has a completly other gateway as the from the others VM. Would it be fixed, if I setup a second NIC?

                        You've set the virtual IPs with a /32 mask. Consider that the gateway must be within the subnet of the IPs, cause if you access one pfSense sends responses back with that source IP.

                        So you got a second gateway from the provider for use with the additional IP as I understand? Have you already added this to pfSense?
                        However, if it can work with the gateway outside the subnet depends on the GW configuration.

                        1 Reply Last reply Reply Quote 0
                        • J Offline
                          jochenmehlich
                          last edited by jochenmehlich

                          The main Reason why I'm setting this up, is because i want to have for each vm a seperate firewall.

                          I hope it is not so critical to post now the public IPs, because it's very hard to check if every ip is censored. So i have following IPs.

                          Projectserver
                          IP: 144.76.93.247
                          Gateway: 144.76.93.225
                          Netmask: 255.255.255.224
                          Broadcast: 144.76.93.255

                          Publicserver
                          IP: 144.76.93.245
                          Gateway: 144.76.93.225
                          Netmask: 255.255.255.224
                          Broadcast: 144.76.93.255

                          Safeserver:
                          IP: 144.76.93.234
                          Gateway: 144.76.93.225
                          Netmask: 255.255.255.224
                          Broadcast: 144.76.93.255

                          PfSense:
                          IP: 136.243.196.130
                          Gateway: 136.243.196.129
                          Netmask: 255.255.255.248
                          Broadcast: 136.243.196.135

                          So I have

                          • a WAN-Interface (136.243.196.130)
                          • a LAN-Interface (172.16.0.1)
                          • a OPT1-Interface (144.76.93.247)

                          All Traffic from the VMs and for the VMs should go through opt1.
                          It's static with the gateway with the CDIR 27.

                          Alias-IP
                          virtual_ip.png

                          Nat 1:1
                          nat_1-1.png

                          Firewalls:
                          firewall_wan.png
                          firewall_opt1.png
                          firewall_lan.png

                          Floating is empty.

                          What did I wrong? Because i can reach the projectserver but not the safeserver.

                          V 1 Reply Last reply Reply Quote 0
                          • V Offline
                            viragomann @jochenmehlich
                            last edited by

                            @jochenmehlich
                            It's not really recommended to post the real public IPs here. The info that all except pfSense are in the same subnet with a separate gateway would be sufficient.

                            Why did you set a destination in the 1:1 NAT for the Safeserver? The own public IP makes no sense at all.
                            However, that won't be the problem, I think.

                            Your firewall rules page shows the interfaces "Safeserver" and "Publicserver". Are the VMs really connected to separate interfaces on pfSense? That cannot work, at least not with the server IPs shown in the NAT rules.

                            J 1 Reply Last reply Reply Quote 0
                            • J Offline
                              jochenmehlich @viragomann
                              last edited by

                              @viragomann

                              It's not really recommended to post the real public IPs here

                              Ok, thanks for the information

                              Why did you set a destination in the 1:1 NAT for the Safeserver?

                              I think it would fix my problem.

                              The own public IP makes no sense at all.

                              How could I fix it, that every vm has it own public ip?

                              Your firewall rules page shows the interfaces "Safeserver" and "Publicserver". Are the VMs really connected to separate interfaces on pfSense?

                              No, they are not connected, that are the old interfaces (from beginning, but not plugged in (link down via ProxMox)

                              That cannot work, at least not with the server IPs shown in the NAT rules.

                              How can I do it?

                              V 1 Reply Last reply Reply Quote 0
                              • V Offline
                                viragomann @jochenmehlich
                                last edited by

                                @jochenmehlich said in Multi WAN, TO VM NAS with seperate Firewall:

                                Why did you set a destination in the 1:1 NAT for the Safeserver?

                                I think it would fix my problem.

                                The destination should be any if there are no special reasons for to set specific one.

                                @jochenmehlich said in Multi WAN, TO VM NAS with seperate Firewall:

                                How could I fix it, that every vm has it own public ip?

                                The rest of the 1:1 NAT rule is fine. One external IP to one internal.

                                @jochenmehlich said in Multi WAN, TO VM NAS with seperate Firewall:

                                No, they are not connected, that are the old interfaces (from beginning, but not plugged in (link down via ProxMox)

                                That cannot work, at least not with the server IPs shown in the NAT rules.

                                How can I do it?

                                Ok, if the server are both on LAN within the same subnet there is no problem.

                                Test the access again with the corrected NAT rule.

                                J 1 Reply Last reply Reply Quote 0
                                • J Offline
                                  jochenmehlich @viragomann
                                  last edited by

                                  @viragomann said in Multi WAN, TO VM NAS with seperate Firewall:

                                  The destination should be any if there are no special reasons for to set specific one.

                                  nat_2.png

                                  @viragomann said in Multi WAN, TO VM NAS with seperate Firewall:

                                  The rest of the 1:1 NAT rule is fine. One external IP to one internal.

                                  Okay :D

                                  @viragomann said in Multi WAN, TO VM NAS with seperate Firewall:

                                  Ok, if the server are both on LAN within the same subnet there is no problem.

                                  They should be.

                                  1 Reply Last reply Reply Quote 0
                                  • J Offline
                                    jochenmehlich
                                    last edited by jochenmehlich

                                    its not working. the vms can go out.
                                    only project is reachable.

                                    here is the virtual-ip configuration
                                    virtual_ip1.png

                                    and the interface
                                    interface.png

                                    Did i something wrong? Or should I ask my hoster, if any feature is missing?

                                    1 Reply Last reply Reply Quote 0
                                    • V Offline
                                      viragomann
                                      last edited by

                                      Are you sure, the safeserver is responding to the access from the internet?

                                      To investigate use the packet capture tool from the Diagnostic menu on pfSense.
                                      Take a capture on LAN interface while trying to access the Safeserver from outside.
                                      If you see nothing take a capture on OPT1 to check if the packets arrives pfSense.

                                      1 Reply Last reply Reply Quote 0
                                      • J Offline
                                        jochenmehlich
                                        last edited by

                                        In OPT1 its showing the ping request

                                        00:07:12.007358 IP 5.100.XXX.XXX > 144.76.93.234: ICMP echo request, id 6, seq 4, length 
                                        

                                        but there is nothing in lan

                                        1 Reply Last reply Reply Quote 0
                                        • J Offline
                                          jochenmehlich
                                          last edited by

                                          so i thing, something with the redirection is broke. (maybe the nat 1:1)?

                                          1 Reply Last reply Reply Quote 0
                                          • V Offline
                                            viragomann
                                            last edited by

                                            You have not allowed ping on OPT1. Your rules only allow http and https. So you cannot see a ping on LAN, cause pfSense blocks it.
                                            So either test with http or allow ping.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.