Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suggestions for linking two pfsense setups

    Scheduled Pinned Locked Moved General pfSense Questions
    64 Posts 4 Posters 11.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      MakOwner @bingo600
      last edited by

      @bingo600

      I enabled the DHCP server on the 192.68.30.1 interface in LAN1.
      Connected a laptop to the netgear switch in LAN2.
      It grabbed the first available address.
      It can get to the pfsense in LAN1 but not LAN2 (which is directly connected to the same switch ...)
      From a desktop in LAN1 I can ping the laptop, ssh to it, but not the interface on the pfsense in LAN2.

      1 Reply Last reply Reply Quote 0
      • M
        MakOwner @bingo600
        last edited by

        @bingo600
        I have no idea what else to do.
        I have changed everything in this equation except pfsense -- however there a lot of moving parts. :/

        1 Reply Last reply Reply Quote 0
        • M
          MakOwner @bingo600
          last edited by MakOwner

          @bingo600

          I really can't believe this is not possible.

          pfsense aside, this should work, being a fairly straight forward static route to a different network.
          Does it being a set of 192.168 Class Bs cause pfsense heartache in particular?

          I unchecked these options on both .30 interfaces:
          3001cd71-43e5-423f-98d9-e2e206922d3f-image.png

          Maybe there are better options than .1 and .2 on those interfaces that would make routing easier?

          bingo600B 1 Reply Last reply Reply Quote 0
          • bingo600B
            bingo600 @MakOwner
            last edited by bingo600

            @MakOwner said in Suggestions for linking two pfsense setups:

            @bingo600

            I really can't believe this is not possible.

            pfsense aside, this should work, being a fairly straight forward static route to a different network.
            Does it being a set of 192.168 Class Bs cause pfsense heartache in particular?

            I unchecked these options on both .30 interfaces:
            3001cd71-43e5-423f-98d9-e2e206922d3f-image.png

            That was a nice find , and i overlooked those šŸ‘

            Maybe there are better options than .1 and .2 on those interfaces that would make routing easier?

            .1 and .2 should function as well as any other ip in the /24.

            It seems like the .2 interface has some issue , in the definition or connection to the Netgear switch.

            Both Netgears are working and are connected , since you can transport data (ping/ssh etc) from the PC in Netgear2 to the pfSense connected to Netgear1.

            Did you mention something about CAT7 , cable issues ?

            But the Site-to-Site cable must be working since the Netgears can transport data across sites.

            The issue must be between the (VM) pfSense , and the "local" Netgear.
            You say the PC works on one of the Netgear2 ports.
            Long shot ... swap the pfSense & PC ports on the Netgear.

            I would expect you can see MAC addresses on the Netgear switches. Can you see the pfSense1 MAC on both switches (i'd expect) , can you see the PC mac on both ? ....

            And now Can you see pfSense2 MAC on any ports , if not : There must be some cable or interface issue.

            @stephenw10
            I'm out of ideas here.
            Do you have any hints for debugging a L2 problem on a (VM based pfSense) - Seems like the issue is with the VM interface , and the switch it connects to. ... Pending the outcome of @MakOwner seeing the pfSense VM interface MAC in the switch it connects to.

            I have never touched a VM based pfSense

            @MakOwner , did you put "permit ipv4 any any" rules on both Netgear interfaces ?

            Could we be fighting Gateway monitor , in conjunction w. L2 issues ?

            /Bingo

            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

            pfSense+ 23.05.1 (ZFS)

            QOTOM-Q355G4 Quad Lan.
            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

            M 1 Reply Last reply Reply Quote 1
            • M
              MakOwner @bingo600
              last edited by

              **@bingo600 said in Suggestions for linking two pfsense setups:

              @MakOwner said in Suggestions for linking two pfsense setups:

              @bingo600

              Did you mention something about CAT7 , cable issues ?

              I have more CAT7 runs between the buildings than I needed just in case I had issues, and sure enough.. I did initially have some cable termination issues.
              I do have a solid 10GB link between the two netgear switches now.

              But the Site-to-Site cable must be working since the Netgears can transport data across sites.

              The issue must be between the (VM) pfSense , and the "local" Netgear.
              You say the PC works on one of the Netgear2 ports.
              Long shot ... swap the pfSense & PC ports on the Netgear.

              I have already swapped patch cables and ports on the netgear. I haven't swapped ports on the VM yet. I did do a complete power cycle on the ESXi server and a walk through of the networking configuration there just to ensure nothing could blocking. This hardware won't do passthrough of the Intel NICs though. And the VM is using e1000 emulation.

              I would expect you can see MAC addresses on the Netgear switches. Can you see the pfSense1 MAC on both switches (i'd expect) , can you see the PC mac on both ? ....

              Can't see anything beyond the interface on LAN2.

              And now Can you see pfSense2 MAC on any ports , if not : There must be some cable or interface issue.

              @stephenw10
              I'm out of ideas here.
              Do you have any hints for debugging a L2 problem on a (VM based pfSense) - Seems like the issue is with the VM interface , and the switch it connects to. ... Pending the outcome of @MakOwner seeing the pfSense VM interface MAC in the switch it connects to.

              I have never touched a VM based pfSense

              @MakOwner , did you put "permit ipv4 any any" rules on both Netgear interfaces ?

              The default for Netgear is wide-open, any traffic. you have to work at it to make it more secure.

              Could we be fighting Gateway monitor , in conjunction w. L2 issues ?

              When defining the routes and gateways on both sides, the gateways are immediately marked offline. I tried setting the monitor off in LAN2 but that didn't seem to help.

              /Bingo

              I'll clone the VM and blow away all the interfaces except the LAN and WAN use a different physical interface today.

              bingo600B 1 Reply Last reply Reply Quote 0
              • bingo600B
                bingo600 @MakOwner
                last edited by

                @MakOwner

                I can't be of much help here , Layer2 issues have to be solved "onsite".

                We're so "close" ... But stil no Cigar

                Don't give up šŸ‘ šŸ‘

                /Bingo

                If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                pfSense+ 23.05.1 (ZFS)

                QOTOM-Q355G4 Quad Lan.
                CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                1 Reply Last reply Reply Quote 1
                • M
                  MakOwner
                  last edited by

                  I cleared all the switches of any confifguration.
                  everything is essentially acting like an unmanaged switch.
                  I shut down the pfsense in LAN2.
                  Installed an all new VM, only adding the WAN and LAN interface on installation.
                  I added the third interface after initial setup for the building interlink.
                  (Side note: adding the 4th interface is where things seem to break -- the wireless (last added) interface is no longer passing traffic. )
                  Before adding routes I checked the arp table on both ends.
                  Good entries for 30.1 and 30.2!

                  I can open pfsense on LAN1 from LAN2 (using the .1 interface).
                  I added the gateway and routes on LAN2 to match LAN1.

                  I can get to the pfsense on LAN1 from LAN2.
                  I can get to both Netgear switch mgmy interface from both ends.
                  Arp tables on both ends look good.

                  Can't get beyond the .30 interface to access anything on the LAN from the building in which I'm not directly sitting in.

                  bingo600B 1 Reply Last reply Reply Quote 0
                  • bingo600B
                    bingo600 @MakOwner
                    last edited by bingo600

                    @MakOwner

                    If the ARP (MAC) is good , and you can ping 192.168.30.1 and .2 from both sides , the Layer2 issue seems to be solved.

                    What does the gateway monitoring say (remember you prob have to allow ICMP to make the monitoring happy)

                    What does Diagnostic -> Routes show (both ends)

                    Do you see any blocks in the pfSense Log ?

                    Routing was described here
                    https://forum.netgate.com/post/945282

                    /Bingo

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    1 Reply Last reply Reply Quote 1
                    • M
                      MakOwner
                      last edited by

                      I'm seeing ICMP being dropped in the firewall logs for 192.168.30.1 on the .1 side:

                      Nov 15 14:43:35 	LAB 	Default deny rule IPv4 (1000000103) 	192.168.30.2		192.168.30.1		ICMP 
                      

                      I don't see any rules that would trigger this, and I have added these rules on both sides:

                      5ab60d91-7b3a-4d74-9261-60999118d98b-image.png

                      This is the rule set from LAN1 for .30.1 -- I can't access LAN2 from here to capture the rules but they are identical on the reverse end -- using the other interface of course.

                      1 Reply Last reply Reply Quote 0
                      • M
                        MakOwner
                        last edited by MakOwner

                        Hmm.. I have traffic crossing the link now, but I had to create a set of far too lax rules on both sides for the .30 interfaces.
                        LAN1 side:
                        ef5f0791-f458-4bc9-aa6b-daf6e1d35a0e-image.png

                        LAN2 side:
                        9106ee4a-cf84-4bb0-93e1-9fc50fb8954c-image.png

                        No collisions so far on DHCP.
                        Seems everyone is getting IPs assigned via the closest interface, which works well.
                        Not sure how stable this is and it leaves both ends wide open.

                        Not sure I undertsand why the two rules have traffic on one side but not the other -- see states column?

                        1 Reply Last reply Reply Quote 0
                        • bingo600B
                          bingo600
                          last edited by bingo600

                          @MakOwner

                          1 : Static Routing
                          You will have to tell a pfSense about every net (on the other side) you want reachable , including the wifi net.

                          1. Firewall
                            If/when you "just" ping from one pfSense to the other pfSense , the pfSense is creating the traffic on the "nearest interface". This means a packet from ie. 192.168.30.1 would flow to 192.168.30.2 (or any other Lan).

                          Don't forget to permit 192.168.30.0/24 to some extent , at least ICMP (pings).
                          Or your gateway monitoring will "barf" at you.

                          ICMP is a protocol like TCP or UDP (select it there) , in a "friendly" environment i usually allow ICMP any any

                          You have to consider you now have 5 nets.
                          pfSense1 : Lan1 + Wifi1 + Connect
                          pfSense2: Lan2 + WiFi2 + Connect

                          Packets that crosses buildings will have to be permittet on the Connect interface , in the opposite building end , in order to be allowed (received).

                          Re: States & traffic
                          That is not unusual , think about how traffic flows , and how much of it.

                          /Bingo

                          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                          pfSense+ 23.05.1 (ZFS)

                          QOTOM-Q355G4 Quad Lan.
                          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                          1 Reply Last reply Reply Quote 1
                          • M
                            MakOwner
                            last edited by

                            The wifi nets are normally locked out of the LAN.
                            They get firewalled access t the internet but no traffic from wireless enters the LANs.
                            I had LAN1 open temporarily to use a wireless laptop for access to pfsense in LAN1, but that needs to be locked back down.

                            I expected the explicit "LAN to alternate network" and "alternate network to LAN" set of rules to work, whereas I had to just create a single rule that essentially allowed all traffic across the link, not just the traffic from the defined network from the opposite pfsense.

                            LAN1 rules on the interlink interface:
                            982d4610-6afa-4c57-b11d-d6c9d4d2aaf0-image.png

                            LAN2 rules on the interlink interface:
                            fa0ff6c6-e4cb-475c-ab92-aff696961a6b-image.png

                            Rules that didn't work -- I used net rules and specified the appropriate /24 of the LAN on the opposite pfsense -- one inbound, one outbound.
                            a1637bdf-c423-4070-b234-d6023be3bd2d-image.png

                            Adding the third rule (top on each LAN) opened things up.

                            I feel like there is probably a better way to do this?
                            I'll work on getting the LAGs and VLANs functioning across the switches first I suppose.

                            bingo600B 1 Reply Last reply Reply Quote 0
                            • bingo600B
                              bingo600 @MakOwner
                              last edited by bingo600

                              @MakOwner

                              Rerember pfSense default filters "Inbound" , meaning :
                              You can filter traffic from entering via an interface.
                              pfSense default permits NOTHING from entering via an interface (besides mgt on/via the LAN interface) so you WILL have to do permits on the interfaces to allow traffic , to enter the firewall.

                              That also goes for the "site to site" interlink interfaces (192.168.30.1 & 2).

                              The top rule on the Lan1 / Lan2 : ipv4 any any
                              Effectively sets the other two rules out of "play" , as the top rule would match anything , and no traffic would hit the below rules.

                              First match : Proccesses the packet.

                              If i were you i'd start with a :

                              Permit ICMP any any and a Permit IPV4 any any on both "Site to site" interfaces (effectively permit anything to pass between buildings) (if it has been allowed into the firewall. by the LAN/WAN rules)

                              That way the rules on the LAN rules could be made "as you are used to".

                              Then after you get the felling for the Lan rules , you could narrow down the site-to-site rules.

                              /Bingo

                              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                              pfSense+ 23.05.1 (ZFS)

                              QOTOM-Q355G4 Quad Lan.
                              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                              1 Reply Last reply Reply Quote 1
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                Need clarification here.

                                Have you actually added the VLAN2 interface to each pfSense to use as the transport link?

                                What have you named that interface? Is that LAB?

                                You can't put hosts in a transport subnet without creating an asymmetric route which is why your test with a laptop earlier failed.

                                Can we see a diagram showing exactly how this is connected? With interface names and IPs/subnet?

                                Steve

                                bingo600B 1 Reply Last reply Reply Quote 1
                                • bingo600B
                                  bingo600 @stephenw10
                                  last edited by bingo600

                                  @stephenw10

                                  AFAIK

                                  This ts the current setup
                                  https://forum.netgate.com/post/945569

                                  BUT every switch has default settings (All in VLAN1) the site-to-site L2 is also VLAN1 on the 10G-Netgear "building transport switches"

                                  All is transported (connected) via L3 (pfSense interfaces)

                                  No tagging on the pfSense , all is "Pure ethernet" going to the switches

                                  We got it "all up & running" , now only pfSense rules need to be made (adjusted)

                                  WiFi nets should not be static (site2site) routed , as they are "only allowed to go to the internet" on their respective site ... I hope i got that right

                                  The OP mentioned one ISSUE - If he adds a 4'th interface on the VM based pfSense , it will not forward any traffic. Only the first 3 IF's works.

                                  I think we fought that issue earlier , and yep ... That (4'th) IF would not respond to ARP, or show up in the "MAC table" on the switches.

                                  I still think the OP runs w. just 3 IF's on the VM pfSense (No WiFi IF)

                                  /Bingo

                                  If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                  pfSense+ 23.05.1 (ZFS)

                                  QOTOM-Q355G4 Quad Lan.
                                  CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                  LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                  M 1 Reply Last reply Reply Quote 0
                                  • M
                                    MakOwner @bingo600
                                    last edited by MakOwner

                                    @bingo600

                                    This is what it looks like:

                                    53b45d74-fb38-4f39-a66e-8347a4c03a5d-image.png

                                    The interface on pfsense on the left for the link is "Lab - 192.168.30.1"
                                    The interface on pfsense on the right for the link is "Office - 192.168.30.2"

                                    In LAN1 I'm using 4 interfaces and the wireless works -- it's running 2.4.4-p3.
                                    In LAN2 it -was running latest 2.4.5 but that's where the 4th interface wouldn't work, so I punted and reinstalled again this time to 2.4.4 and updated to -p3.
                                    I swapped around interfaces in the several re-installs and the NIC appears to be working fine...

                                    It's a VM so I'll snapshot it and try the upgrade to 2.4.5, but really as badly as unbound crashes on 2.4.5. I think I want to go see what security fixes are in there beforehand.

                                    Everything right now is in the default VLAN.
                                    I'm using two identical NetGear GS110EMX switches for the 10GB link, and (really old) Dell Powerconnect switches on each end. 5224 on the office end and a 2748 on the Lab end.

                                    I had suspected at first possibly the NetGears and Dells weren't really exchanging VLAN/LAG info properly, but based on their interfaces it looks like they are picking up the port configuration on the fly if I configure the Netgear..

                                    But as I said, for right now, it's all open and default.

                                    The wireless networks can't access but the internet -- I have confirmed that on the office side, later today I have to go check the access point for the Lab and ensure everything is right there.

                                    bingo600B 1 Reply Last reply Reply Quote 1
                                    • bingo600B
                                      bingo600 @MakOwner
                                      last edited by

                                      @MakOwner said in Suggestions for linking two pfsense setups:

                                      It's a VM so I'll snapshot it and try the upgrade to 2.4.5, but really as badly as unbound crashes on 2.4.5. I think I want to go see what security fixes are in there beforehand.

                                      You could use the Service watchdog for that
                                      I see (saw) the occationally unbound crash , on previous 2.4.4's , and had service watchdog restart it automatically.

                                      I had suspected at first possibly the NetGears and Dells weren't really exchanging VLAN/LAG info properly, but based on their interfaces it looks like they are picking up the port configuration on the fly if I configure the Netgear..

                                      I do not hope the NetGears respond to anything (VLAN/LAG) on the DELL's right now , as they are L3 separated.

                                      /Bingo

                                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                      pfSense+ 23.05.1 (ZFS)

                                      QOTOM-Q355G4 Quad Lan.
                                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                      M 1 Reply Last reply Reply Quote 1
                                      • M
                                        MakOwner @bingo600
                                        last edited by

                                        @bingo600 said in Suggestions for linking two pfsense setups:

                                        I do not hope the NetGears respond to anything (VLAN/LAG) on the DELL's right now , as they are L3 separated.

                                        /Bingo

                                        Yea, me too! 😜
                                        They are both doing what they should be doing at this point -- just being dumb switches.

                                        I do have a Dell 6248 that I can't get to reset so I can't get into the CLI or the web interface.
                                        Whole other issue.

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Ah I see, no VLANs just direct intrefaces. Well that removes that potential issue.

                                          So "LAN1" is the Office side pfSense and "LAN2" is the Lab side pfSense?

                                          And link interfaces are named according to where the connect to, so the opposite of where they actually are?

                                          I think the problem here is that you are using system aliases like LAN net and they are invalid on the side you're applying them.

                                          You have rules using LAN net as a source and destination but that can only be right on one of those rules.

                                          On LAN1 you need rules on the link interface for:
                                          192.168.20.0/24 to LAN net any protocol
                                          LAB net to LAB address icmp (to allow gateway monitoring)

                                          On LAN2 you need rules on the link interface for:
                                          192.168.10.0/24 to LAN net any protocol
                                          OFFICE net to OFFICE address icmp

                                          Steve

                                          1 Reply Last reply Reply Quote 1
                                          • M
                                            MakOwner
                                            last edited by

                                            I did exactly that -- but it didn't work so I added the second rule that reverses that logic -- and it still didn't work.
                                            Adding the any to any rule made it work.
                                            I didn't try reversing rules before going to the any to any rule though ....

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.