Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Starlink Integration with Dual WANs

    Scheduled Pinned Locked Moved Routing and Multi WAN
    7 Posts 2 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jemadsen
      last edited by

      Greetings pfSense Community.
      Over the past two months, I moved pfSense to a VM after the MikroTik J1900 Router failed. I purchased a replacement, Protectli Vault 4 and began moving to the new FW. Starlink sent me my dish, so I decided to setup the new FW with dual WAN as shown in the diagram.
      The problem is that I cannot get pfSense to send the appropriate packets to any of the servers.
      d0453358-ff5c-4642-94bc-3d9cc75a7a41-image.png
      All servers that need a public IP address will use the CLWAN, DSL, and other computers would use the SLWAN, Starlink. The Web Server, Mail Server and PBX will use CLWAN.
      The rules are identical to the rules that are working on my VM FW.
      6cbbb6de-cb98-44fa-a372-0d9bfa9f700e-image.png

      And here are the two Gateways. I did not setup a Gateway Group.
      a4741759-5e11-49ae-a6e3-da9d6bc8d472-image.png
      tcpdump shows packets correctly routed to the FW but there is no out bound traffic to the LAN.

      All three servers use the CLWAN for outgoing traffic.

      I chose this approach because I do not intend to maintain the DSL link until I select another solution.

      I could not find any similar configuration or problem in Google.
      Any thoughts suggestions or reference material that may be of use.
      Thanks,
      Jens

      S 1 Reply Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @jemadsen
        last edited by

        @jemadsen So if your issue is inbound traffic, and the WAN gateways are private IPs, do you have NAT rules set up as well? The ISP router would need to forward those ports to the pfSense router, for pfSense to see them.

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote ๐Ÿ‘ helpful posts!

        J 1 Reply Last reply Reply Quote 0
        • J
          jemadsen @SteveITS
          last edited by

          @steveits
          Thanks for your response. Sure do.
          a689c8d4-8d13-46d4-ad35-5a91d285e25d-image.png

          S 1 Reply Last reply Reply Quote 0
          • S
            SteveITS Galactic Empire @jemadsen
            last edited by

            @jemadsen And also in the ISP router?

            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
            Upvote ๐Ÿ‘ helpful posts!

            J 1 Reply Last reply Reply Quote 0
            • J
              jemadsen @SteveITS
              last edited by

              @steveits The modem is currently setup with my pfSense VM and works fine. It is when I switch with the VM that I have problems. The only difference is the additional WAN.
              60b71734-b3b4-4624-a7df-4cec0993fc56-image.png

              S J 2 Replies Last reply Reply Quote 0
              • S
                SteveITS Galactic Empire @jemadsen
                last edited by

                @jemadsen Hmm. I have seen some routers (AT&T) which select port forwards by MAC address which is both useful and annoying.

                If you set up NAT reflection can you access it from the LAN?

                Did you run through https://docs.netgate.com/pfsense/en/latest/troubleshooting/nat-port-forwards.html ?

                If you do a Diagnostics/traceroute out from pfSense CLWAN does it make it out?

                Did you restore the VM config to the new hardware? (thinking, maybe, an incorrect subnet mask? there are places where it defaults to /32)

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote ๐Ÿ‘ helpful posts!

                1 Reply Last reply Reply Quote 0
                • J
                  jemadsen @jemadsen
                  last edited by

                  @jemadsen
                  Thank you Steve for the recommendations.
                  I will look into reflection and it sound like it will help.
                  I have been doing traceroutes, tcpdumps, netcats. I setup a dual setup, where the VM FW handles the mail, VoIP and Web traffic. The Proctectli handles the rest of the traffic thru Starlink.
                  I scanned some of the troubleshooting document and tried the recommendations.
                  I initially started with the VM configuration, but when it didn't work, I reset and manually configured the Proctectli. The VM was my learning environment with more "STUFF" to take into account to troubleshoot.
                  I have built up several pfSense FWs over the years and I know most of my mestakes, unfortunately, I am also good making new ones. ๐Ÿ˜Š
                  Having the VM FW to use as reference. I searched for some example similar to mine, but all were failover/load balancing.
                  I need to get my servers back online so I am using both FWs one that works for the CLWAN and the other for the SLWAN. It working now. Next I will build up a test setup on my VM Server and trouble with that.
                  I will continue to look for an example or recipe. It is my birthday this weekend. ๐ŸŽ‚

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.