Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Subnet problem?

    General pfSense Questions
    4
    23
    2.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      Fratopolis
      last edited by Fratopolis

      Short run down!

      We are currently using Fortinet. But with the costs of annual service I am looking into alternatives. I really like pfsense but I have been having the same problem now for a week.

      Running Microsoft DHCP services.
      example
      pfSense firewall on 10.35.10.234,255.255.255.0
      host computer on 10.35.60.85,255.255.255.0,10.35.60.254

      When host computer is on 10 network all is good. but on 60 traffic does not make its way back unless i put the 60 network interface directly on pfsense

      Basically traffic goes (out host)(out wan)(back in wan)but stops there

      I have been searching all over and I am stuck.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        huh? If you want pfsense to route between your 2 networks there then yes it would need an interface in both of the networks - or would need a transit connection to other router..

        If devices do not point to pfsense as gateway then yeah more than likely your going to run into asymmetrical problems.

        Draw up your network and what your wanting to do exactly and we can discuss. At a loss to what dhcp on MS has to do with the price of tea in china or routing traffic.. Unless your handing out the wrong gateway in your dhcp scopes?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        F 1 Reply Last reply Reply Quote 0
        • F
          Fratopolis @johnpoz
          last edited by Fratopolis

          @johnpoz
          I was just saying that pfSense is not handling dhcp

          last resort is "ip route 0.0.0.0 0.0.0.0 10.35.10.235" but then I have this in our cisco router to test with 1 client

          route-map pfSense permit 10
          match ip address 10
          set ip default next-hop 10.35.10.234

          interface Vlan60
          ip policy route-map pfSense

          access-list 10 permit 10.35.60.85

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            That doesn't help me visualize your network... Other than suggesting you have a downstream router on that 35.10 network. Which yeah if your clients point that is going to be asymmetrical.

            If you want to test on one client you would need a route on that HOST to say hey to get to 10.35.60 use the pfsense IP.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            F 1 Reply Last reply Reply Quote 0
            • F
              Fratopolis @johnpoz
              last edited by

              @johnpoz
              Hmmm, I've learned so much about networking trying to get this to work but I'm a Sys Admin not a Net admin. I'm not even sure I could help you help me :(

              I'll just keep plugging away and searching google

              thanks

              1 Reply Last reply Reply Quote 0
              • F
                Fratopolis
                last edited by

                Figured it out! On my Internal network in pfsense i changed it to a 10.0.0.0/8 mask.

                all is good in the world now!

                M 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by johnpoz

                  OH MY GAWD! NO!!!

                  That is NOT going to fix anything...

                  Do you NOT have a crayon and a napkin you can use to draw up your network..

                  So you just want all your devices on 1 flat network? How many devices do you have?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  F 1 Reply Last reply Reply Quote 0
                  • M
                    marvosa @Fratopolis
                    last edited by

                    @fratopolis said in Subnet problem?:

                    Figured it out! On my Internal network in pfsense i changed it to a 10.0.0.0/8 mask.

                    all is good in the world now!

                    Going to a 10.0.0.0/8 subnet is not a solution. Post a network map, so we know what we're dealing with.

                    1 Reply Last reply Reply Quote 0
                    • F
                      Fratopolis @johnpoz
                      last edited by Fratopolis

                      @johnpoz said in Subnet problem?:

                      OH MY GAWD! NO!!!

                      That is NOT going to fix anything...

                      Do you NOT have a crayon and a napkin you can use to draw up your network..

                      So you just want all your devices on 1 flat network? How many devices do you have?

                      Before I go all out and break out my crayons what is wrong with this.

                      Basically it is saying if traffic has a destination on 10.35.x.x 10.20.x.x 10.120.x.x etc it should be routed through the LAN interface so long as it passes the pfsense rules and suricata. Then our Cisco C6832-X-LE will route the traffic to the subnet it needs to go to. We have over 11000 Chromebooks, over 3000 Windows, just under 400 printers and bout 1000 phones.

                      It is not a flat network as pfSense is not handling routing, vlans, etc of any sort. Instead of creating an interface for each this just says if bound for 10.x.x.x route through Internal network.

                      0_1545407771495_408db176-6e19-4b7e-904e-23ec171e1737-image.png

                      F M 2 Replies Last reply Reply Quote 0
                      • F
                        Fratopolis @Fratopolis
                        last edited by

                        our current Fortinet firewall is actually the same way

                        0_1545408378492_cf04d770-e07a-4b0a-baa6-6552f91ae6eb-image.png

                        0_1545408505687_9de4d894-9835-4f31-ba62-25a707ea279b-image.png

                        1 Reply Last reply Reply Quote 0
                        • M
                          marvosa @Fratopolis
                          last edited by

                          @fratopolis said in Subnet problem?:

                          @johnpoz said in Subnet problem?:

                          OH MY GAWD! NO!!!

                          That is NOT going to fix anything...

                          Do you NOT have a crayon and a napkin you can use to draw up your network..

                          So you just want all your devices on 1 flat network? How many devices do you have?

                          Before I go all out and break out my crayons what is wrong with this.

                          Basically it is saying if traffic has a destination on 10.35.x.x 10.20.x.x 10.120.x.x etc it should be routed through the LAN interface so long as it passes the pfsense rules and suricata. Then our Cisco C6832-X-LE will route the traffic to the subnet it needs to go to. We have over 11000 Chromebooks, over 3000 Windows, just under 400 printers and bout 1000 phones.

                          It is not a flat network as pfSense is not handling routing, vlans, etc of any sort. Instead of creating an interface for each this just says if bound for 10.x.x.x route through Internal network.

                          0_1545407771495_408db176-6e19-4b7e-904e-23ec171e1737-image.png

                          It's not that it won't work, it's just a bad design on multiple levels. I can almost guarantee the decision to assign the entire 10.0.0.0/8 to one interface will be revisited down the road.

                          F 1 Reply Last reply Reply Quote 0
                          • F
                            Fratopolis @marvosa
                            last edited by Fratopolis

                            @marvosa said in Subnet problem?:

                            @fratopolis said in Subnet problem?:

                            @johnpoz said in Subnet problem?:

                            OH MY GAWD! NO!!!

                            That is NOT going to fix anything...

                            Do you NOT have a crayon and a napkin you can use to draw up your network..

                            So you just want all your devices on 1 flat network? How many devices do you have?

                            Before I go all out and break out my crayons what is wrong with this.

                            Basically it is saying if traffic has a destination on 10.35.x.x 10.20.x.x 10.120.x.x etc it should be routed through the LAN interface so long as it passes the pfsense rules and suricata. Then our Cisco C6832-X-LE will route the traffic to the subnet it needs to go to. We have over 11000 Chromebooks, over 3000 Windows, just under 400 printers and bout 1000 phones.

                            It is not a flat network as pfSense is not handling routing, vlans, etc of any sort. Instead of creating an interface for each this just says if bound for 10.x.x.x route through Internal network.

                            0_1545407771495_408db176-6e19-4b7e-904e-23ec171e1737-image.png

                            It's not that it won't work, it's just a bad design on multiple levels. I can almost guarantee the decision to assign the entire 10.0.0.0/8 to one interface will be revisited down the road.

                            (22 different sites and multiple vlans at each site)
                            Well it is either doing it this way or around 100 network interfaces to add to pfsense and as you can see it was apparently how Fortinet was setup by the vendor. But all traffic is supposed to move internal anyway that does not get blocked so unless there is an actual reason why its not good then I think I'll stick with this way.

                            I am all about doing things a better way and listening to someone smarter but if the best reason to do something different is "it's just a bad design on multiple levels" without an actual reason then I do not know how I am supposed to respond.

                            I'll draw up a simple network map during my xmas break and post it here.

                            M 1 Reply Last reply Reply Quote 0
                            • M
                              marvosa @Fratopolis
                              last edited by marvosa

                              @fratopolis said in Subnet problem?:

                              (22 different sites and multiple vlans at each site)
                              Well it is either doing it this way or around 100 network interfaces to add to pfsense and as you can see it was apparently how Fortinet was setup by the vendor. But all traffic is supposed to move internal anyway that does not get blocked so unless there is an actual reason why its not good then I think I'll stick with this way.
                              I am all about doing things a better way and listening to someone smarter but if the best reason to do something different is "it's just a bad design on multiple levels" without an actual reason then I do not know how I am supposed to respond.
                              I'll draw up a simple network map during my xmas break and post it here.

                              Several of us would be more than happy to offer opinions and best practice ideas, but to offer anything targeted, we need a better understanding of your network, which is why most people have left things mostly high level and vague. So, if you're looking for more helpful feedback, you'll need to share more details... e.g. posting a network map and providing more details on how things are connected.

                              To put things in perspective, at work we have 32,000+ people spread over ~200 sites... several of which include large hospitals and there isn't one segment of the network that is larger than a /22 (most are /24). Design was mentioned because it sounds like it's possible that your network could benefit from an improved design. When following best practices in design, I can't think of any scenario where an interface on a firewall would need to have an 8 bit mask.

                              1 Reply Last reply Reply Quote 0
                              • F
                                Fratopolis
                                last edited by Fratopolis

                                Ok I did it. If you need more on this god help me then lmao. There are many more vlans set up but we would need and entire wall to map it out completely. But this is the idea of it.

                                pfSense addon running are:
                                Squid Proxy Server
                                SquidGuard Proxy filter
                                DNS Resolver
                                softflowd
                                Suricata

                                0_1545431487416_cbb2b239-5e97-4b13-8b9b-b69c38524203-image.png

                                1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator
                                  last edited by

                                  So your 10.35.10 should be a TRANSIT network servers should not be on this network. Or just create a new transit network to connect pfsense to your cisco. Say 172.16.0.0/30 or /29

                                  So 10.37.1 is also a transit that connects your different sites cisco routers?

                                  So is the plan to get rid of the cisco as well, or just use pfsense as new edge router?

                                  So you have 18 routers in each site? That seems a bit excessive.. But without seeing the whole thing its hard to say how best to fix it.. Guess nobody ever heard of cisco 3 layer model? ;) Core, Distribution, Access?

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                  F 1 Reply Last reply Reply Quote 0
                                  • F
                                    Fratopolis @johnpoz
                                    last edited by Fratopolis

                                    @johnpoz
                                    LOL no 1 Router per site with many switches. I just didnt map the switches.

                                    Sorry forgot about this - Technically the transit that connects the routers at the sites is 10.254.1 and the transit within the sites switches is what I listed
                                    example these are all mostly Cisco C3850-24XS routers and C2960X-48FPD switches
                                    10.254.1.35 and at this site switches start at 10.35.1.10 with router being 10.35.1.254
                                    10.254.1.37 and at this site switches start at 10.37.1.10 with router being 10.37.1.254
                                    10.254.1.102 and at this site switches start at 10.102.1.10 with router being 10.102.1.254
                                    10.254.1.104 and at this site switches start at 10.104.1.10 with router being 10.104.1.254
                                    etc.

                                    i just access them by the switch transit on the router itself. Also if at any point you peeps think I'm without hope lol let me know. I can't learn any better than making mistakes myself lmao. My boss/friend calls me his biggest asset as well as his biggest liability for a reason.

                                    Also I am learning terminology as I go if you can't tell. Didnt even know what transit meant here until you used it a couple times and I figured out what you meant and wanted.

                                    **As I said, I am not a net admin (but having fun learning it).
                                    My sysadmin skills are no longer growing(I have come up with every idea under the sun and implemented it so I am moving on as they say)

                                    I have no formal edu here as I graduated with a BS in Business Admin but had a passion since I took my first computer apart the day I got it on xmas in '97. Needless to say mom wasn't happy her $2k present was ripped apart.**

                                    1 Reply Last reply Reply Quote 0
                                    • T
                                      tim.mcmanus
                                      last edited by

                                      Replace both Ciscos and the Fortinet with two pfSense boxes. Done!

                                      This network can be simplified, and by doing so, troubleshooting will be a LOT easier.

                                      Run pfSense in a basic, default mode FIRST to get your routing working properly. Once you've done that, add stuff. If you cannot get the routing to work and you install add-ons, it makes troubleshooting that much more difficult.

                                      F 1 Reply Last reply Reply Quote 0
                                      • F
                                        Fratopolis @tim.mcmanus
                                        last edited by

                                        @tim-mcmanus said in Subnet problem?:

                                        Replace both Ciscos and the Fortinet with two pfSense boxes. Done!

                                        This network can be simplified, and by doing so, troubleshooting will be a LOT easier.

                                        Run pfSense in a basic, default mode FIRST to get your routing working properly. Once you've done that, add stuff. If you cannot get the routing to work and you install add-ons, it makes troubleshooting that much more difficult.

                                        Sorry, there are not just two Cisco routers, but many many more than that, and this is a production environment so replacing them would mean bukku overtime during off hours which I can guarantee will not be approved. That sort of undertaking would have to be during summertime being I work for a school district.

                                        1 Reply Last reply Reply Quote 0
                                        • M
                                          marvosa
                                          last edited by marvosa

                                          Based on your drawing, my guess is at least one, if not multiple, things were happening in the beginning:

                                          • There was no return route on PFsense for the 10.35.60.0/24 network

                                          • The router at site 1 was not routing traffic properly to PFsense. You would need to configure PBR on the router at site 1, but considering traffic is flowing now, this appears to be done and working.

                                          • If there was a return route on PFsense, it may be pointed to the wrong IP.

                                          • There was no outbound NAT configured for traffic sourced from 10.35.60.0/24

                                          PFsense will only NAT traffic from interfaces that it knows about, so when you had your LAN interface configured as 10.35.10.234/24, it was only NATing traffic sourced from 10.35.10.0/24 and nothing else. In order to get to the internet from your test host, you would've had to switch to Hybrid Outbound NAT mode and manually configure an Outbound NAT mapping for 10.35.60.0/24.

                                          So, as soon as you gave your LAN interface a /8 mask, two things happened:

                                          • PFsense auto-generated an outbound NAT for traffic sourced from 10.0.0.0/8, which obviously includes IP's from the 10.35.60.0/24 network.

                                          • A route for 10.0.0.0/8 was added to the routing table, so now PFsense knows where to send return traffic

                                          Your current setup will continue to work as is, but IMO there may be a cleaner approach. I would configure an unused, much smaller subnet as your transit network between PFsense and your Cisco router @ site 1 and then run OSPF as a routing protocol throughout the entire network. You could then get as granular as necessary with your NATing and firewall rules by creating aliases for allowing and/or denying internet access for certain subnets. Personally, I'd do all the same stuff even if you keep your Fortinet. Doing so will avoid possible routing issues down the road from things like site-to-site tunnels where the remote end has subnets in the 10.0.0.0/8 IP space.

                                          @johnpoz said in Subnet problem?:

                                          If devices do not point to pfsense as gateway then yeah more than likely your going to run into asymmetrical problems.

                                          Not necessarily, It depends on the design. In this instance, his endpoints will be using the IP of each subinterface on the router or the SVI of an L3 switch stack as the default gateway.

                                          @tim-mcmanus said in Subnet problem?:

                                          Replace both Ciscos and the Fortinet with two pfSense boxes. Done!
                                          This network can be simplified, and by doing so, troubleshooting will be a LOT easier.

                                          I agree with the K.I.S.S. principle, however, replacing the edge router (and others) at each site with PFsense would not simplify his network. All sites are connected via private circuits with internal addressing, so outside of special use cases, there is no need for a firewall at each site. Yes, PFsense can be configured as a router only, but IMO why add the complexity? His high-level drawing is fairly common among org's with multiple sites that are routed thru a main branch for internet. Not to mention, PFsense itself was not actually the issue, so IMO adding more PFsense boxes would not have helped him troubleshoot any more than he already had for this particular problem.

                                          @Fratopolis Thank you for posting the map. Things became much clearer after seeing it.

                                          1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator
                                            last edited by johnpoz

                                            @marvosa said in Subnet problem?:

                                            Not necessarily, It depends on the design. In this instance, his endpoints will be using the IP of each subinterface on the router or the SVI of an L3 switch stack as the default gateway.

                                            Yeah if there is a transit network connecting the L3 then no you wouldn't be asymmetrical.. But if he is going to try and leverage that 35.10 as a transit then yeah its asymmetrical.

                                            Ya don't put hosts on a transit... Not sure how that network came to be.. But sorry while /8 might be a work around.. Its not the correct way to fix those problems.. He needs actual transit to connect pfsense to the downstream.

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                            M 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.