Putting my pfSense Home Lab on an Extender
-
Hey all!
Not sure if this is the right place for this, so im ok if it gets moved.
Got a question for ya; i recently moved my home lab out of my closet and into an extra room. I live in an old house, and rent so I cant run any real drops. So my (hypothesized) solution was to get an extender ( TP-Link AC1900 WiFi Extender (RE550)), connect it to my router, then connect the home lab router's WAN to the extender's LAN port. Here is the problem im facing:My core router's (Standard Asus) network is 192.168.1.xxx, the homelab that sits behind a pfSense router is 192.168.5.xxx. When this was all wire connected, it worked fine. Now though, though the extender, I cant access anything on the 192.168.5.xxx network. Traffic leaves the 192.168.5.xxx fine, and devices on that network can access the internet. To visualize it a bit:
BEFORE:Core router (LAN network 192.168.1.xxx) >desk managed switch > PFsense router ( LAN network 192.168.5.xxx) > Lab - this worked fine.
NOW:Core router (LAN network 192.168.1.xxx) > EXTENDER (does not manage DHCP, but has its own IP) > PFsense router ( LAN network 192.168.5.xxx) > Lab - this does not work.
I have added rule after rule to the firewall, and have even tried disabling the pfSense firewall to see if traffic would flow, but no luck.
Any suggestions/comments are appreciated!
Link to my current non working network in question:
https://drive.google.com/file/d/1pQVCRorK60i5KATqKGj1Dglc3sjf44Yh/view?usp=sharingLink to the question on Reddit
-
It looks like your 'WiFi Extender' is running in client mode and that good because extender mode on those things is just terrible. Usually spoofs all clients to the same MAC address which can cause all sorts of issues.
I would guess that it's NATing traffic somehow still. Does the pfSense WAN correctly pull an IP address in the 192.168.1.X subnet?
@the_director said in Putting my pfSense Home Lab on an Extender:
Now though, though the extender, I cant access anything on the 192.168.5.xxx network.
Where are you trying to access it from? How are trying? How does it fail, what error is shown?
I assume you have a static route on the Core router to the pfSense WAN for 192.168.5.0/24?
Steve
-
@stephenw10 Thanks for the reply!
Correct, the extender pulls its own IP from the core router (the Asus), and yes the pfSense router WAN is pulling an IP from the Asus (192.168.1.xxx network) as well and I can see it as a client in the Asus GUI.
Im trying to access the router gui and any device on the 192.168.5.0 network from a PC on the 192.168.1.0 network. No luck. I can access everything though from the 192.168.5.0 network, including the Asus GUI on the 192.168.1.0 network.
I have tried with NAT on the pfSense router turned on and off, no difference. Correct, I have a static route set to the 192.168.5.0 network.
After further digding, I can see traffic hitting the pfsense WAN, but the firewall is blocking 192.168.1.0 traffic in. Give a "Default deny rule IPv4 (1000000103)"
Wireshark shows the following:
-
I meant the Extender might be NATing but that seems unlikely if you're seeing traffic from 192.168.1.X hit the pfSense WAN.
What rules do you have on the pfSense WAN?
What is 192.168.5.6? Is that internal host what you were trying to hit?
Can you access the pfSense GUI using it's WAN IP in the 192.168.1.X subnet?
What you have there is an absolutely classic asymmetric routing scenario. But that would have also been the case when it was wired so if it worked there it still should.
I would still be suspicious of the Extender doing something funky with MAC addresses.
-
@stephenw10 I dont think that extender has the ability to NAT, its settings are pretty basic.
One one rule on the pfSense at the moment:
5.6 is an iDrac, but with the host powered on (192.168.5.12) I cant access it either.
The rule above allows one host to access the pfSense GUI, I cant get to to allow any client from 192.168.1.0 to access it, only works with a single host/IP.
When I check the MAC of the WAN interface and the MAC that the extender is picking up, they do match.
If I go a tracert from a client on the 192.168.5.0 to the router, it hits the pfSense router, then the Asus 192.168.1.1
-
Do you have port forwards for that traffic on the pfSense WAN?
If not, and it was working before, it must be all routed. So that would mean no NAT on pfSense and a static route in the Asus router to the 192.168.5.X subnet?
Most SOHO routers have no static route capability so....The fact you are seeing traffic hitting the pfSense WAN for 192.168.5.6 implies either it is routed or that you have a port forward (or 1:1 NAT) and that may be preventing you reach the pfSense gui.
-
Sorry @stephenw10 I was away on vacation.
The Asus router did have a static route to route 192.168.5.0 network traffic to the pfSense router (192.168.1.2).
Then the pfSense router had rules to allow 192.168.1.0 network traffic though.
I have tried to disable NAT on the pfsense router, but this made no difference.
-
@the_director Maybe you could use Powerline or MoCA adapters instead of that extender?
-
@robh-0 Powerline was actually my first choice, but the bedrooms are not on the same circuit. One room is on one breaker, and another room is one a different breaker
-
@the_director Actually it is OK if they are on separate breakers, they just have to be in the same phase in the panel. In other words, they need to be on the same vertical row.
-
Ok, if you have a static route and no NAT then you need a firewall rule on the pfSense WAN to allow traffic from 192.168.1.X to 192.168.5.X. Otherwise it will just be blocked there.
Also make sure the pfSense WAN does not have 'block private networks' set since that traffic is from a private subnet
Steve
-
@robh-0 Really! Ok then I may need to give this a try!
-
Thanks @stephenw10! Haven't had much time to play around with this (some unfortunate life events have been underway), but should get some thing this week! Ill test out all your suggestions and update the thread.
-
So I got a little time tonight to play around with it, but unfortunately still getting blocked. Below are some screenshots.
Even though I (believe) I set the firewall to all anything though, its still blocking it, which makes no sense to me.
The pfSense firewall rules:
The pfSsense firewall logs:
Current NAT settings:
-
Hmm, that certainly seems like it should pass with that allow all rule on WAN.
Do you see any alerts in the GUI?
Go to Status > Filter Reload and reload the filter with the button there. Make sure it loads cleanly without any errors.
Steve
-
@stephenw10 will do when I get home from work this evening
-
@stephenw10 This is what I get from the Filter Reload:
-
Looks fine. And you are still seeing blocked traffic in the firewall log on WAN like that?
-
@stephenw10 So if I try to access 192.168.5.6 (an iDrac that sits behind the pfSense box) I get "192.168.5.6 took too long to respond." but I dont see the firewall logging anything like it did before (see below). The 5.6 address is perfectly accessable by a laptop sitting behind the pfSense box, and the laptop can access the external web just fine.