• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Configuring multiple static ip adresses on only one NIC

Scheduled Pinned Locked Moved Routing and Multi WAN
33 Posts 3 Posters 4.5k Views 3 Watching
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A Offline
    antionline @KOM
    last edited by Apr 30, 2021, 10:47 AM

    @kom Yes I already have 5 vlans, all seperated and blocking each other LAN to LAN.

    1 Reply Last reply Reply Quote 0
    • A Offline
      antionline @KOM
      last edited by Apr 30, 2021, 10:49 AM

      @kom YES default gateway IP remains, using outbond connections as virtual ip doesn't effect the main WAN nic connection ip. I think I have to but nevest model of pfsense which has more than 1 WAN input port.

      1 Reply Last reply Reply Quote 0
      • A Offline
        antionline @KOM
        last edited by antionline Apr 30, 2021, 10:53 AM Apr 30, 2021, 10:52 AM

        @kom
        My configuration is small business.

        1.2.3.4 -> MAIN WAN ip
        Additive ip blocks below
        50.50.50.1
        50.50.50.2
        50.50.50.3
        50.50.504

        All of the 5 static ip has the same gateway ip -> 1.2.3.3 provided from my ISP

        1 Reply Last reply Reply Quote 0
        • A Offline
          antionline
          last edited by antionline Apr 30, 2021, 11:06 AM Apr 30, 2021, 10:57 AM

          @steveits Hi steve,

          You can think like we have 2 seperate buildings. 1 building has the data center , 2 building is office.

          I am trying to access internet over 1 nic WAN port with several ip blocks.

          My datacenter should have a different ip adress from my office ip.

          Still not figured it out yet.

          I keep trying several combinations..

          K 1 Reply Last reply Apr 30, 2021, 12:36 PM Reply Quote 0
          • K Offline
            KOM @antionline
            last edited by KOM Apr 30, 2021, 2:56 PM Apr 30, 2021, 12:36 PM

            @antionline Don't forget that you need a firewall rule on each vlan interface that directs the traffic to the gateway you want. The default Allow All to Any rules use the default gateway. Also bear in mind that I have never done this myself and might be talking out of my ass.

            Edit: Looks like ass it is. You can't add VIPs as gateways and most of what I said was nonsense. I'm curious enough to spin this up and try it. I'll let you know what I find.

            Edit2: OK that wasn't too hard. Create your VIPs for each extra IP address you own. Go to Firewall - NAT - Outbound. Change your mode to Hybrid and then Save.

            In my lab, I have the following:
            WAN: 10.10.3.1/16
            LAN: 192.168.2.1/24
            OPT1: 192.168.3.1/24
            VIPs: 10.10.3.2, 10.10.3.3, 10.10.3.4
            Client1: 192.168.2.11
            Client2: 192.168.3.11

            In my case, when I ping out from Client 1 or 2, the target shows the traffic coming from 10.10.3.1 which is my pfSense WAN address.

            Add an outbound NAT rule:

            onat.jpg

            The top rule shows that my Client2 at 192.168.3.11 is going to have its outbound traffic NAT'd to be coming from 10.10.3.3 instead of my WAN's address 10.10.3.1. Make sure you use a /32 mask if it's just one host you're NATing.

            10:41:09.792137 IP 10.10.3.3 > 10.10.4.1: ICMP echo request, id 14027, seq 1, length 64
            10:41:09.792175 IP 10.10.4.1 > 10.10.3.3: ICMP echo reply, id 14027, seq 1, length 64
            10:41:10.794770 IP 10.10.3.3 > 10.10.4.1: ICMP echo request, id 14027, seq 2, length 64
            10:41:10.794791 IP 10.10.4.1 > 10.10.3.3: ICMP echo reply, id 14027, seq 2, length 64
            10:41:11.798430 IP 10.10.3.3 > 10.10.4.1: ICMP echo request, id 14027, seq 3, length 64
            10:41:11.798460 IP 10.10.4.1 > 10.10.3.3: ICMP echo reply, id 14027, seq 3, length 64
            10:41:12.802155 IP 10.10.3.3 > 10.10.4.1: ICMP echo request, id 14027, seq 4, length 64
            10:41:12.802183 IP 10.10.4.1 > 10.10.3.3: ICMP echo reply, id 14027, seq 4, length 64
            
            A 1 Reply Last reply May 1, 2021, 9:03 PM Reply Quote 1
            • A Offline
              antionline @KOM
              last edited by antionline May 1, 2021, 9:09 PM May 1, 2021, 9:03 PM

              @kom You know this job. this works very well. I can ping remotely via another public static ip immediately. seems very good solution. well done.

              Ok Now I have another problem, one of my server is "windows server 2019". When I change the outbond NAT of my servers public Ip changes.(works ok). But on the other hand I have virtualization under this server which is centos 7 installed via hyperv.

              servers client ip is 192.168.0.51
              centos virtualization client ip is 192.168.0.41

              When I "dig +short myip.opendns.com @resolver1.opendns.com" to get the centos public ip it returns 10.10.10.1 which is "Auto created rule for ISAKMP - localhost to WAN" by pfsense-> pfblockerNG.

              How can I make my centos virtualization's public static ip to real ip adress instead of pfsense auto ruleset controlled one(10.10.10.1)?

              K 1 Reply Last reply May 2, 2021, 4:40 PM Reply Quote 0
              • K Offline
                KOM @antionline
                last edited by May 2, 2021, 4:40 PM

                @antionline External DNS for your domain is controlled by you I assume, so you can assign any IP address you want to myip.opendns.com. Nothing to do with pfSense.

                A 1 Reply Last reply May 7, 2021, 7:27 PM Reply Quote 1
                • A Offline
                  antionline @KOM
                  last edited by antionline May 7, 2021, 7:28 PM May 7, 2021, 7:27 PM

                  @kom
                  I add bypass script under DNS Resolver-> General Settings->Custom Options at the below of the page.

                  Added this;
                  server:
                  access-control-view: 192.168.0.41/32 bypass
                  access-control-view: 192.168.0.0/16 dnsbl
                  do-tcp: yes
                  minimal-responses: yes
                  prefetch: yes
                  qname-minimisation: yes
                  rrset-roundrobin: yes
                  view:
                  name: "bypass"
                  view-first: yes
                  view:
                  name: "dnsbl"
                  view-first: yes
                  include: /var/unbound/pfb_dnsbl.*conf

                  Than I $ dig +short myip.opendns.com @resolver1.opendns.com -> returned and resolved normal public ip instead of PFBLOCKERNG VIP 10.10.10.1..

                  K 1 Reply Last reply May 7, 2021, 7:41 PM Reply Quote 0
                  • K Offline
                    KOM @antionline
                    last edited by May 7, 2021, 7:41 PM

                    @antionline Could you not have just added a host override to point your domain to your internal IP address?

                    A 1 Reply Last reply May 7, 2021, 7:47 PM Reply Quote 1
                    • A Offline
                      antionline @KOM
                      last edited by May 7, 2021, 7:47 PM

                      @kom I could find bypass methodby scripting, I don't know how to override method.

                      K 1 Reply Last reply May 7, 2021, 7:52 PM Reply Quote 0
                      • K Offline
                        KOM @antionline
                        last edited by May 7, 2021, 7:52 PM

                        @antionline Services - DNS Resolver. Scroll down to the bottom, Host Overrides.

                        A 1 Reply Last reply May 7, 2021, 8:01 PM Reply Quote 1
                        • A Offline
                          antionline @KOM
                          last edited by May 7, 2021, 8:01 PM

                          @kom I added my host override section. it is the same thing with my bypass script.

                          Can both bypasses PfblockerNG?

                          K 1 Reply Last reply May 7, 2021, 8:05 PM Reply Quote 0
                          • K Offline
                            KOM @antionline
                            last edited by KOM May 7, 2021, 8:29 PM May 7, 2021, 8:05 PM

                            @antionline Yes by adding some extra custom config to Resolver, but I don't remember the exact syntax. I had to do it once for my wife who was playing a mobile game that would slow down if it couldn't talk to its ad servers so I had to figure out a way around it. I no longer need it so I deleted the config months ago.

                            Edit: Found it in an older backup config.xml. The address to bypass pfB was 192.168.88.110.

                            server:
                                access-control-view: 192.168.88.110/32 bypass
                                access-control-view: 192.168.88.0/24 dnsbl
                            view:
                                name: "bypass"
                                view-first: yes
                            view:
                                name: "dnsbl"
                                view-first: yes
                            
                            server:include: /var/unbound/pfb_dnsbl.*conf
                            
                            1 Reply Last reply Reply Quote 1
                            33 out of 33
                            • First post
                              33/33
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                              This community forum collects and processes your personal information.
                              consent.not_received