Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Putting my pfSense Home Lab on an Extender

    Scheduled Pinned Locked Moved General pfSense Questions
    19 Posts 3 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      The_Director
      last edited by

      Hey all!

      Not sure if this is the right place for this, so im ok if it gets moved.
      Got a question for ya; i recently moved my home lab out of my closet and into an extra room. I live in an old house, and rent so I cant run any real drops. So my (hypothesized) solution was to get an extender ( TP-Link AC1900 WiFi Extender (RE550)), connect it to my router, then connect the home lab router's WAN to the extender's LAN port. Here is the problem im facing:

      My core router's (Standard Asus) network is 192.168.1.xxx, the homelab that sits behind a pfSense router is 192.168.5.xxx. When this was all wire connected, it worked fine. Now though, though the extender, I cant access anything on the 192.168.5.xxx network. Traffic leaves the 192.168.5.xxx fine, and devices on that network can access the internet. To visualize it a bit:

      BEFORE:Core router (LAN network 192.168.1.xxx) >desk managed switch > PFsense router ( LAN network 192.168.5.xxx) > Lab - this worked fine.

      NOW:Core router (LAN network 192.168.1.xxx) > EXTENDER (does not manage DHCP, but has its own IP) > PFsense router ( LAN network 192.168.5.xxx) > Lab - this does not work.

      I have added rule after rule to the firewall, and have even tried disabling the pfSense firewall to see if traffic would flow, but no luck.

      Any suggestions/comments are appreciated!

      Link to my current non working network in question:
      https://drive.google.com/file/d/1pQVCRorK60i5KATqKGj1Dglc3sjf44Yh/view?usp=sharing

      Link to the question on Reddit

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        It looks like your 'WiFi Extender' is running in client mode and that good because extender mode on those things is just terrible. Usually spoofs all clients to the same MAC address which can cause all sorts of issues.

        I would guess that it's NATing traffic somehow still. Does the pfSense WAN correctly pull an IP address in the 192.168.1.X subnet?

        @the_director said in Putting my pfSense Home Lab on an Extender:

        Now though, though the extender, I cant access anything on the 192.168.5.xxx network.

        Where are you trying to access it from? How are trying? How does it fail, what error is shown?

        I assume you have a static route on the Core router to the pfSense WAN for 192.168.5.0/24?

        Steve

        T 1 Reply Last reply Reply Quote 0
        • T
          The_Director @stephenw10
          last edited by The_Director

          @stephenw10 Thanks for the reply!

          Correct, the extender pulls its own IP from the core router (the Asus), and yes the pfSense router WAN is pulling an IP from the Asus (192.168.1.xxx network) as well and I can see it as a client in the Asus GUI.

          Im trying to access the router gui and any device on the 192.168.5.0 network from a PC on the 192.168.1.0 network. No luck. I can access everything though from the 192.168.5.0 network, including the Asus GUI on the 192.168.1.0 network.

          I have tried with NAT on the pfSense router turned on and off, no difference. Correct, I have a static route set to the 192.168.5.0 network.

          After further digding, I can see traffic hitting the pfsense WAN, but the firewall is blocking 192.168.1.0 traffic in. Give a "Default deny rule IPv4 (1000000103)"

          Wireshark shows the following:

          2022-09-02_14h37_34.png

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            I meant the Extender might be NATing but that seems unlikely if you're seeing traffic from 192.168.1.X hit the pfSense WAN.

            What rules do you have on the pfSense WAN?

            What is 192.168.5.6? Is that internal host what you were trying to hit?

            Can you access the pfSense GUI using it's WAN IP in the 192.168.1.X subnet?

            What you have there is an absolutely classic asymmetric routing scenario. But that would have also been the case when it was wired so if it worked there it still should.

            I would still be suspicious of the Extender doing something funky with MAC addresses.

            T 1 Reply Last reply Reply Quote 0
            • T
              The_Director @stephenw10
              last edited by

              @stephenw10 I dont think that extender has the ability to NAT, its settings are pretty basic.

              One one rule on the pfSense at the moment:

              2022-09-02_15h24_32.png

              5.6 is an iDrac, but with the host powered on (192.168.5.12) I cant access it either.

              The rule above allows one host to access the pfSense GUI, I cant get to to allow any client from 192.168.1.0 to access it, only works with a single host/IP.

              When I check the MAC of the WAN interface and the MAC that the extender is picking up, they do match.

              If I go a tracert from a client on the 192.168.5.0 to the router, it hits the pfSense router, then the Asus 192.168.1.1

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Do you have port forwards for that traffic on the pfSense WAN?

                If not, and it was working before, it must be all routed. So that would mean no NAT on pfSense and a static route in the Asus router to the 192.168.5.X subnet?
                Most SOHO routers have no static route capability so....

                The fact you are seeing traffic hitting the pfSense WAN for 192.168.5.6 implies either it is routed or that you have a port forward (or 1:1 NAT) and that may be preventing you reach the pfSense gui.

                T 1 Reply Last reply Reply Quote 0
                • T
                  The_Director @stephenw10
                  last edited by The_Director

                  Sorry @stephenw10 I was away on vacation.

                  The Asus router did have a static route to route 192.168.5.0 network traffic to the pfSense router (192.168.1.2).

                  Then the pfSense router had rules to allow 192.168.1.0 network traffic though.

                  I have tried to disable NAT on the pfsense router, but this made no difference.

                  R 1 Reply Last reply Reply Quote 0
                  • R
                    RobH 0 @The_Director
                    last edited by

                    @the_director Maybe you could use Powerline or MoCA adapters instead of that extender?

                    T 1 Reply Last reply Reply Quote 0
                    • T
                      The_Director @RobH 0
                      last edited by

                      @robh-0 Powerline was actually my first choice, but the bedrooms are not on the same circuit. One room is on one breaker, and another room is one a different breaker

                      R 1 Reply Last reply Reply Quote 0
                      • R
                        RobH 0 @The_Director
                        last edited by

                        @the_director Actually it is OK if they are on separate breakers, they just have to be in the same phase in the panel. In other words, they need to be on the same vertical row.

                        T 1 Reply Last reply Reply Quote 1
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Ok, if you have a static route and no NAT then you need a firewall rule on the pfSense WAN to allow traffic from 192.168.1.X to 192.168.5.X. Otherwise it will just be blocked there.

                          Also make sure the pfSense WAN does not have 'block private networks' set since that traffic is from a private subnet

                          Steve

                          T 1 Reply Last reply Reply Quote 0
                          • T
                            The_Director @RobH 0
                            last edited by

                            @robh-0 Really! Ok then I may need to give this a try!

                            1 Reply Last reply Reply Quote 0
                            • T
                              The_Director @stephenw10
                              last edited by

                              Thanks @stephenw10! Haven't had much time to play around with this (some unfortunate life events have been underway), but should get some thing this week! Ill test out all your suggestions and update the thread.

                              1 Reply Last reply Reply Quote 1
                              • T
                                The_Director
                                last edited by

                                So I got a little time tonight to play around with it, but unfortunately still getting blocked. Below are some screenshots.

                                Even though I (believe) I set the firewall to all anything though, its still blocking it, which makes no sense to me.

                                The pfSense firewall rules:
                                2022-09-28_20h07_25.png

                                The pfSsense firewall logs:

                                2022-09-28_20h08_06.png

                                Current NAT settings:
                                2022-09-28_20h09_49.png

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Hmm, that certainly seems like it should pass with that allow all rule on WAN.

                                  Do you see any alerts in the GUI?

                                  Go to Status > Filter Reload and reload the filter with the button there. Make sure it loads cleanly without any errors.

                                  Steve

                                  T 2 Replies Last reply Reply Quote 1
                                  • T
                                    The_Director @stephenw10
                                    last edited by

                                    @stephenw10 will do when I get home from work this evening

                                    1 Reply Last reply Reply Quote 0
                                    • T
                                      The_Director @stephenw10
                                      last edited by

                                      @stephenw10 This is what I get from the Filter Reload:
                                      2022-10-18_15h50_20.png

                                      1 Reply Last reply Reply Quote 0
                                      • stephenw10S
                                        stephenw10 Netgate Administrator
                                        last edited by

                                        Looks fine. And you are still seeing blocked traffic in the firewall log on WAN like that?

                                        T 1 Reply Last reply Reply Quote 0
                                        • T
                                          The_Director @stephenw10
                                          last edited by

                                          @stephenw10 So if I try to access 192.168.5.6 (an iDrac that sits behind the pfSense box) I get "192.168.5.6 took too long to respond." but I dont see the firewall logging anything like it did before (see below). The 5.6 address is perfectly accessable by a laptop sitting behind the pfSense box, and the laptop can access the external web just fine.

                                          2022-10-18_16h18_17.png

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.