• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Is this possible? 1 Internet connection, 2 networks, 2 gateways (default and VPN)

Scheduled Pinned Locked Moved General pfSense Questions
25 Posts 4 Posters 2.6k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R
    rottonpeech
    last edited by rottonpeech Mar 22, 2020, 7:24 AM Mar 22, 2020, 7:17 AM

    To be clear, I've been reading a LOT of posts that I thought would have the answer, but somewhere along the line, it's never quite what I need, so I'll explain as best as I can.

    I have 1 internet connection, we will call WAN. This is the default gateway called GW1.
    I have 1 network we will call LAN (10.0.0.0/24)
    I have 1 network we will call SEC (192.168.0.0/24)
    And the twist, I have 1 VPN Client acting as a gateway called GW2.

    The goals, however simple in my mind, is to have:
    1: LAN use GW1 for all things internet.
    2: SEC use GW2 for all things internet.
    3: allow LAN and SEC to communicate with eachother.

    For whatever reason, I have not been able to get this to work. I've completely blown my Pfsense to bits three times forcing me to completely rebuild it once before I wised up and saved a known good backup with just goal 1 in place, however I had both 1 and 3 working at some point, I have not gotten back to there yet.

    Any help anyone can lend on getting all three would be greatly appreciated.

    1 Reply Last reply Reply Quote 0
    • F
      Fredouye
      last edited by Mar 22, 2020, 8:04 AM

      Hi

      this is what I'm using at home (in fact, points 1. + 2. and only point 3. partially, I want network connections to be initiated by my "trusted" LAN only). I'll post screenshots later today.

      1 Reply Last reply Reply Quote 0
      • J
        JKnott
        last edited by Mar 22, 2020, 10:45 AM

        You say 2 gateways. What are they connected to? If the ISP, you'll need one that provides 2 addresses (mine does). As for connecting from one LAN to the other, that should be doable, as it's just plain routing over the Internet. In fact, I do that here when I use the 2nd IP for testing. In this case the 2 gateways are no different than 2 customers.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        1 Reply Last reply Reply Quote 0
        • B
          Bob.Dig LAYER 8
          last edited by Bob.Dig Mar 22, 2020, 11:32 AM Mar 22, 2020, 11:15 AM

          To me it sounds rather simple with IPv4, it is just a normal setup with a VPN-Client on pfSense and some easy policy routing.

          Just "copy" the Default allow LAN to any rule to "SEC" if it not already exist there and then change the gateway under advanced to the VPN-Client, done.

          J B 2 Replies Last reply Mar 22, 2020, 1:00 PM Reply Quote 0
          • J
            JKnott @Bob.Dig
            last edited by Mar 22, 2020, 1:00 PM

            @Bob-Dig

            Then again, if he has 2 pfSense systems, then just run an Ethernet connection between the 2. If it's on it's own interface, then you can use the firewall rules to control what's allowed.

            A little more info on what he needs would be useful.

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            B 2 Replies Last reply Mar 22, 2020, 1:02 PM Reply Quote 0
            • B
              Bob.Dig LAYER 8 @JKnott
              last edited by Mar 22, 2020, 1:02 PM

              This post is deleted!
              1 Reply Last reply Reply Quote 0
              • B
                Bob.Dig LAYER 8 @JKnott
                last edited by Mar 22, 2020, 1:04 PM

                @JKnott said in Is this possible? 1 Internet connection, 2 networks, 2 gateways (default and VPN):

                @Bob-Dig

                Then again, if he has 2 pfSense systems,

                I don't think he has. He just has WAN and the "virtual" gateway which is the VPN-CLient.

                J 1 Reply Last reply Mar 22, 2020, 1:29 PM Reply Quote 0
                • J
                  JKnott @Bob.Dig
                  last edited by Mar 22, 2020, 1:29 PM

                  @Bob-Dig

                  I don't see he mentioned virtual machines. As I said, we need more info. Otherwise we're just guessing and my crystal ball is busted.

                  PfSense running on Qotom mini PC
                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                  UniFi AC-Lite access point

                  I haven't lost my mind. It's around here...somewhere...

                  B 1 Reply Last reply Mar 22, 2020, 2:56 PM Reply Quote 0
                  • B
                    Bob.Dig LAYER 8 @JKnott
                    last edited by Bob.Dig Mar 22, 2020, 3:02 PM Mar 22, 2020, 2:56 PM

                    @JKnott said in Is this possible? 1 Internet connection, 2 networks, 2 gateways (default and VPN):

                    @Bob-Dig

                    I don't see he mentioned virtual machines.

                    I didn't. I bet he just meant Gateways in the Sense what is showing under: System Routing Gateways
                    One box, WAN and the VPN Client as the two gateways (exits).

                    J 1 Reply Last reply Mar 22, 2020, 3:06 PM Reply Quote 0
                    • J
                      JKnott @Bob.Dig
                      last edited by Mar 22, 2020, 3:06 PM

                      @Bob-Dig

                      I prefer not to assume. In that case, he'll need a virtual Ethernet cable. 😉

                      PfSense running on Qotom mini PC
                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                      UniFi AC-Lite access point

                      I haven't lost my mind. It's around here...somewhere...

                      1 Reply Last reply Reply Quote 0
                      • R
                        rottonpeech
                        last edited by Mar 22, 2020, 9:33 PM

                        Thank you all for your responses!

                        Let see if i can get to them all...

                        @JKnott , @Bob-Dig is correct. Only one Ethernet cable to the internet modem. The second "gateway" is a virtual gateway created by the VPNClient.

                        I have tried to setup firewall rules in the SEC interface with source SEC/any destination any/any use VPN gateway (GW2) but alas, this seems to fail the test when i connect to that network and tracert, I see my traffic goes over the default GW1 instead.

                        As for "machines" on that network, most are VMs and or Dockers. Only one physical device that I have connected becides the PFsense machine.

                        Long and short of it, I want my VMs and Dockers on the SEC network to route all traffic to the VPN tunnel. The main network uses manages inbound SSL traffic as well as other internal outbound traffic.

                        1 Reply Last reply Reply Quote 0
                        • B
                          Bob.Dig LAYER 8 @Bob.Dig
                          last edited by Bob.Dig Mar 23, 2020, 7:32 AM Mar 23, 2020, 7:28 AM

                          @Bob-Dig said in Is this possible? 1 Internet connection, 2 networks, 2 gateways (default and VPN):

                          Just "copy" the Default allow LAN to any rule to "SEC" if it not already exist there and then change the gateway under advanced to the VPN-Client, done.

                          This is everything you need to do, if the vpn-Client was setup correctly in the first place.

                          If it was not or is not connected, then traffic would go automatically out to WAN. For this to stop you have to tag that traffic and then block it with a special floating-rule.

                          R 1 Reply Last reply Mar 23, 2020, 8:42 AM Reply Quote 0
                          • R
                            rottonpeech @Bob.Dig
                            last edited by Mar 23, 2020, 8:42 AM

                            @Bob-Dig said in Is this possible? 1 Internet connection, 2 networks, 2 gateways (default and VPN):

                            If it was not or is not connected, then traffic would go automatically out to WAN. For this to stop you have to tag that traffic and then block it with a special floating-rule.

                            Sorry, if im kinda newbish, but how would i go about this?

                            B 1 Reply Last reply Mar 23, 2020, 8:47 AM Reply Quote 0
                            • B
                              Bob.Dig LAYER 8 @rottonpeech
                              last edited by Mar 23, 2020, 8:47 AM

                              @rottonpeech said in Is this possible? 1 Internet connection, 2 networks, 2 gateways (default and VPN):

                              Sorry, if im kinda newbish, but how would i go about this?

                              You won't. You would first setup a working VPN-Client.

                              1 Reply Last reply Reply Quote 0
                              • R
                                rottonpeech
                                last edited by Mar 23, 2020, 10:57 AM

                                yes. i figured out what you meant, and i also found a few other things that did some magic (like not making a change, but re-saving and committing all my interfaces)

                                Now I see that all the interfaces are up, and the Client is up... but still cannot route across the VPN client.

                                Here is a pic if it helps at all
                                40a18c16-44ff-45e9-9161-f56e3f604297-image.png

                                P.S. i also have a open VPN site-to-site that is working, where i am hosting the server side. ![alt text](image url)

                                1 Reply Last reply Reply Quote 0
                                • B
                                  Bob.Dig LAYER 8
                                  last edited by Bob.Dig Mar 23, 2020, 11:01 AM Mar 23, 2020, 10:59 AM

                                  Please show what you got under
                                  FirewallNATOutbound

                                  Maybe you should do a much simpler setup in the beginning for testing with WAN, LAN, VPN-Client only.

                                  1 Reply Last reply Reply Quote 0
                                  • R
                                    rottonpeech
                                    last edited by Mar 23, 2020, 11:01 AM

                                    here are a few other screens
                                    f00fe276-47d6-40f4-8520-62c26b2434c8-image.png
                                    fc26c530-b5de-4047-a8b0-68da7cdcb6e8-image.png
                                    1844ae8f-e1d6-4c77-b197-a81ae2301bd3-image.png
                                    bb0fb70f-3592-4a71-a334-d31f3924ca9e-image.png

                                    B 1 Reply Last reply Mar 23, 2020, 11:05 AM Reply Quote 0
                                    • B
                                      Bob.Dig LAYER 8 @rottonpeech
                                      last edited by Bob.Dig Mar 23, 2020, 11:09 AM Mar 23, 2020, 11:05 AM

                                      @rottonpeech Firewall NATO utbound still missing.

                                      R 1 Reply Last reply Mar 23, 2020, 11:09 AM Reply Quote 0
                                      • R
                                        rottonpeech
                                        last edited by Mar 23, 2020, 11:07 AM

                                        missed a few
                                        a83bbf32-b841-489c-b083-2425d0571ead-image.png
                                        8d0b1a49-7569-42f3-ba34-7eea0eddb85f-image.png
                                        0819e71f-eb4a-468e-bc76-17e680fad363-image.png
                                        751fb078-7122-4099-92e1-e4e6a3b8fa3e-image.png

                                        ok, i think thats about all of them

                                        1 Reply Last reply Reply Quote 0
                                        • R
                                          rottonpeech @Bob.Dig
                                          last edited by Mar 23, 2020, 11:09 AM

                                          @Bob-Dig - Sorry, here it is

                                          a2b301e8-8c9d-4d6f-b75b-24b3a65a4716-image.png

                                          B 1 Reply Last reply Mar 23, 2020, 11:10 AM Reply Quote 0
                                          5 out of 25
                                          • First post
                                            5/25
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received