Getting PFSense to See Internal Network
-
Again, what are you actually trying to connect to on the inside subnet?
You could have a separate interface in pfSense that connects to the switch directly and only carries inbound traffic. You would have to outbound NAT it in pfSense to prevent asymmetry.
Steve
-
@stephenw10 said in Getting PFSense to See Internal Network:
Again, what are you actually trying to connect to on the inside subnet?
You could have a separate interface in pfSense that connects to the switch directly and only carries inbound traffic. You would have to outbound NAT it in pfSense to prevent asymmetry.
Steve
Well I have a Plex Server I want to allow access to someone in my family. I have put in port forwarding from the device through the Google Wifi, through the PFSense, and the ISP's gateway. When the person tries to access it I can see the request come in on the PFSense but for the internal IP and it denies it. I am assuming since it cannot see the 192.168.32.0 net it dumps it. I have tried a rule to allow but it keeps denying it. I am at a loss right now on getting it through.
-
If you are seeing traffic with a destination in the 192.168.32.x subnet hitting something on a pfSense interface then you have one of those port forwards setup wrong. Probably the one in pfSense since it's actually arriving there.
Adding a port forward will normally automatically add a firewall rule on WAN to pass that so I assume you either changed that or chose not to have it added.
Port forwards happen before the firewall so if your port forward is configured to use the 192.168.30.x destination and you have removed (or just added) the rule you will see that blocked on WAN.
However that's wrong anyway because the pfSense forward should be to the Google WIFI node IP, 10.2. The forward in Google WIFI should be to the 192.168.32.X IP.Can we see a screenshot of the forward and WAN rules?
What are you running Plex on? You can probably tunnel to pfSense from there and get past the WIFI as I initially suggested.
Steve
-
@stephenw10 I am running the Plex on a 14Tb UnRAID rack mount system. It is a docker on the UnRAID platform. This issue is getting connection to in from the outside. Dynamic DNS is a bit hokey at best.
-
Why don't you split the WiFi Lan and "Switch Lan" into two lans, each with a pfSense interface.
Make (keep) a Lan/Vlan just having the WiFi stuff (192.168.32.0/24)
Make a new one 192.168.33.0/24 , where you put all your non wifi attached stuff.
You could be quite permissive on the pfSense wifi interface , as it is also a trusted zone.
Allow ip src 192.168.10.2 dest 192.168.33.0/24Traffic from Wifi to "Switch" should not be an issue (well it would be natted to the google outside) , prob. but not a problem.
Traffic initiated from "Switch" to Wifi would be troublesome (portforward needed) , but do you really have any need for that ?
If done like that , then you'll get kind of two separate segments in your house.
But at least one of them will be "normal"./Bingo
-
Well I'm pretty sure you could setup a tunnel from Unraid to pfSense. Even if that's a, probably unnecessary, VPN tunnel. Then have Plex listen on the tunnel subnet too. You could then port forward to it in pfSense as though it's directly connected.
But if you can port forward in Google WFI you just need to get all three port forwards setup correctly.
Or, yes, move the Unraid box to a different interface on pfSense dircetly.
Steve
-
Thank you all for some great ideas. Unfortunately I can't VLAN with Google Wifi networks (yep it blows), the switch can but the wifis can't figure it out. I theory it should work with port forwarding and punching through the PFSense but I am missing something that is not allowing the push from the firewall to the local network behind the first Google Wifi. I am interested in the second line idea and may try that. I appreciate all the advice and help.
-
Your google wifi is also doing nat.. If you want something from outside to get to something on the google network, you would have to do 2 port forwards.
1 at edge, and then again at your downstream nat router.
Here is the thing - if you want to run a big boy network.. Your not going to do it with soho stuff designed for home users.
Get APs that support vlans. Get switch(es) that do vlans if you want.. Your only going to cause yourself grief trying to do enterprise grade networking with home user stuff..
-
It's ugly (triple NAT!) but you can port-forward in Google WIFI: https://support.google.com/wifi/answer/6274503?hl=en-GB
This will work if you have all three port forwards setup correctly.
The fact you were seeing blocked traffic in pfSense shows at least one port forward is wrong. See my comments above.
Steve
-
This post is deleted!