Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    2 LB WANs and 2 LANs. Hosts on LAN1 can ping hosts on LAN2, but not vice versa

    Scheduled Pinned Locked Moved Routing and Multi WAN
    9 Posts 3 Posters 544 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pclausen
      last edited by pclausen

      Hey guys, I've been trying to figure out why I'm unable to pings hosts between both LANs given the simple rules I have setup.

      First, here's a simple diagram of my network:

      alt text

      The seedbox can ping the 10.0.1.1 gateway on the main LAN just fine, as well as any hosts on it.

      Hosts on the main LAN can ping the 10.0.3.1 gateway the seedbox in on, but they can't ping the seedbox itself.

      Here are all my interfaces:

      alt text

      My 2 WAN gateways:

      alt text

      And my gateway group containing my two WANs:

      alt text

      My LAN rules:

      alt text

      And my seedbox network rules:

      alt text

      Note that in both cases, the Gateway is my MultiWAN group. Could that be the issue?

      Both LANs are allowing all traffic from that source to go anywhere, so I'm not seeing what is blocking pings from the main LAN from reaching the /30 subnet with the seedbox on it.

      The seedbox is a Windows machine and yes, I did change the firewall config to allow it to respond to pings from any ip address, not just ones in it's own subnet.

      Any ideas?

      C 1 Reply Last reply Reply Quote 0
      • C
        Cmdrd @pclausen
        last edited by

        @pclausen What happens when you remove the MultiWAN gateway from all of the firewall rules? You should not need to explicitly define that unless you are doing policy based routing.

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          ^ Exactly, And if you do want to allow network/vlan X to get to network/vlan Y - then you need to allow that before you shove traffic out a gateway.

          There is no reason to shove traffic out a specific gateway like that - unless you have need to policy route it out a specific gateway..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • P
            pclausen
            last edited by pclausen

            Appreciate the feedback. Removing the MultiWan gateway from all my firewall rules does indeed resolve the issue. I can now ping it from any host in my main LAN, and I can establish a RDP session to the server.

            However, it also means that I loose my WAN load balancing. When I run speed test now, I'm only getting half the speed I was before since all traffic goes through WAN1. If I run 2 speed tests concurrently to different servers, they both still only use WAN1.

            Prior to removing the MultiWan as the gateway on my firewall rules, running just a single instance of speed test would perfectly balance the load across both WAN1 and WAN2 and max out the available bandwidth of both.

            So I changed back to setting the MultiWan as the gateway on my LAN interfaces, but added a new up at the top of the list to allow traffic between LANs using the default gateway as follows:

            alt text

            And:

            alt text

            Now both WANs are being fully utilized during speed test (and of course other activities), AND I can get to hosts on my various local sub-nets.

            Is there's a simpler way to achieve WAN load-balancing without changing away from the default gateway, I'd be interested in knowing, but adding the direct LAN to LAN rules at the top of each interface does the trick.

            @Cmdrd and @johnpoz I really appreciate the help!

            C 1 Reply Last reply Reply Quote 0
            • C
              Cmdrd @pclausen
              last edited by Cmdrd

              @pclausen A simpler approach would be to create an Alias group (Firewalls -> Aliases) that includes all of the subnets for your local networks. Then in the rule where you're specifying the MultiWan, set the destination to "Invert Match" and use "Single host or alias" as the destination and in the field beside that enter the name of the alias group you created for your internal networks.

              1 Reply Last reply Reply Quote 0
              • P
                pclausen
                last edited by

                @Cmdrd I must not be quite following. So I created this Alias group:

                alt text

                And I changed these two rules containing the MultiWan gateway as follows:

                alt text

                And:

                alt text

                I then disabled the rule at the top of each list that I created last night to allow allow traffic between LANs using the default gateway.

                But now I'm no longer able to ping the seedbox from the LAN subnet.

                I should note that I had a RDP session going to my seedbox while doing this that remained working, but I guess perhaps since that was an active session already, changing rules "on the fly" does not result in such sessions being dropped?

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by johnpoz

                  @pclausen said in 2 LB WANs and 2 LANs. Hosts on LAN1 can ping hosts on LAN2, but not vice versa:

                  rules "on the fly" does not result in such sessions being dropped?

                  Active states are not killed on firewall rule changes no.. You would have to kill any active states, or they would have to time out on their own for the new rules to be evaluated for the new sessions.

                  But you should not have to force traffic out a gateway for load balancing to work.. What do you have setup in you gateways for default?

                  https://docs.netgate.com/pfsense/en/latest/book/multiwan/load-balancing-and-failover.html

                  Post your gateway listing under routing. You prob single gateway being used for default

                  group.jpg

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  1 Reply Last reply Reply Quote 0
                  • P
                    pclausen
                    last edited by

                    @johnpoz Thanks for confirming active states are not killed on firewall rule changes. Makes sense.

                    So here are my current gateway group and gateway settings:

                    alt text

                    alt text

                    And the LAN firewall rule (circled in red) that makes load-balancing work:

                    alt text

                    Thanks for the link to the official documentation on WAN load balancing. I noticed that they state the following at the start:

                    "The group itself does not cause any action to be taken, but when the group is used later, such as in policy routing firewall rules, it defines how the items utilizing the group will behave."

                    Does that not imply that the gateway group needs to be used in firewall rules (like I am) to become effective?

                    I also noticed they recommend setting up 3 groups as follows in a dual WAN load-balance scenario:

                    alt text

                    I have found that with just one group defined as shown above, I can disconnect either WAN interface and all traffic automatically starts routing through the remaining active WAN interface, so I'm not sure what the advantage would be to have 3 gateway groups?

                    Could it be that the reason my traffic is routed out the active WAN is the LAN firewall rule that includes the MultiWAN gateway?

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by johnpoz

                      @pclausen said in 2 LB WANs and 2 LANs. Hosts on LAN1 can ping hosts on LAN2, but not vice versa:

                      so I'm not sure what the advantage would be to have 3 gateway groups?

                      For policy routing..

                      If your group is set as the default in the gateway section, you should not have to policy route it by placing gateway on the rule. But you could then policy route other traffic you wanted to use a specific gateway and not load balance, etc.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.