<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Pfsense Multiple Layers]]></title><description><![CDATA[<p dir="auto">Hi all.</p>
<p dir="auto">I have been using pfsense for a number of years successfully and have now come up against a problem that I cant seem to find the answer to.</p>
<p dir="auto">I have 2 pfSense routers both of which are in a Xen Virtual Server</p>
<p dir="auto">The first has our external facing IP and is used to connect the multiple buildings across the site. It has an address range of 172.16.0.1 /24 which buildings connect to.</p>
<p dir="auto">The second router is for the main office and is connected via a virtual network within the Xen Server. It has a WAN address of 172.16.0.9 and LAN in the range of 192.168.9.1 /24</p>
<p dir="auto">I can access the internet on all the devices on the 192.168.9 network however I cant access the 172.16.0.1 router from this network to manage it.</p>
<p dir="auto">Can anyone please help? Thanks in advance!</p>
]]></description><link>https://forum.netgate.com/topic/140630/pfsense-multiple-layers</link><generator>RSS for Node</generator><lastBuildDate>Tue, 10 Mar 2026 21:30:20 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/140630.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 15 Feb 2019 14:46:38 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Pfsense Multiple Layers on Fri, 15 Feb 2019 15:53:18 GMT]]></title><description><![CDATA[<p dir="auto">That should not apply in this situation as 172.16.0.1 is the internal IP of the outer firewall so, presumably, does not have a gateway and hence also wouldn't have those rules.<br />
It doesn't apply to the inner firewall as that is outbound traffic from a device on the 192.168.9.X subnet which is always allowed.</p>
<p dir="auto">I assume you are NATing the outbound traffic in the inner firewall, the default configuration?</p>
<p dir="auto">I would run a packet capture first on the WAN interface of the inner firewall. Filter by host IP 172.16.0.1 and try to access the outer firewall from a client on the 192.168.9.X subnet.</p>
<p dir="auto">If you see traffic there try the same thing on the outer firewall LAN interface.</p>
<p dir="auto">Either the outer firewall is blocking that traffic deliberately or it has some touting problem that means it cannot reply. For example perhaps that traffic is not being NAT'd for some reason so it has no route back to 192.168.9.X. The packet cap should show what's happening.</p>
<p dir="auto">Steve</p>
]]></description><link>https://forum.netgate.com/post/824224</link><guid isPermaLink="true">https://forum.netgate.com/post/824224</guid><dc:creator><![CDATA[stephenw10]]></dc:creator><pubDate>Fri, 15 Feb 2019 15:53:18 GMT</pubDate></item><item><title><![CDATA[Reply to Pfsense Multiple Layers on Fri, 15 Feb 2019 14:50:12 GMT]]></title><description><![CDATA[<p dir="auto">For management access at WAN with RFC1918 address you first need to uncheck<br />
Interfaces -&gt; WAN<br />
<strong>Block private networks and loopback addresses</strong><br />
and setup your Rules for the management ports under Firewall -&gt; Rules -&gt; WAN</p>
<p dir="auto">-Rico</p>
]]></description><link>https://forum.netgate.com/post/824217</link><guid isPermaLink="true">https://forum.netgate.com/post/824217</guid><dc:creator><![CDATA[Rico]]></dc:creator><pubDate>Fri, 15 Feb 2019 14:50:12 GMT</pubDate></item></channel></rss>