• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

MPLS Routing

Scheduled Pinned Locked Moved Routing and Multi WAN
20 Posts 3 Posters 1.9k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R
    rustydusty1717
    last edited by rustydusty1717 Feb 28, 2023, 9:27 PM Feb 28, 2023, 9:25 PM

    Hello,

    Just looking to best practices with routing LAN traffic over an MPLS network that has been setup on a 2nd WAN interface (OPT1) using an SG-3100 appliance. The MPLS is up and I can ping across it to the other site however now need to create routes across to it.

    LAN my side: 192.168.5.0/24
    MPLS My Side: 192.168.92.0/24
    MPLS Other Side: 192.168.93.0/24
    LAN other side: 192.168.60.0/24

    1 Reply Last reply Reply Quote 0
    • M
      michmoor LAYER 8 Rebel Alliance
      last edited by Feb 28, 2023, 9:48 PM

      B@rustydusty1717 assuming this isn’t a L3VPN set up but instead you have a vpls type service where it appears you have a single trunk link connecting both sites then you will have the option of either using static routing or FRR…depends on your design goals. What do you want to do?

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      R 1 Reply Last reply Feb 28, 2023, 9:56 PM Reply Quote 0
      • R
        rustydusty1717 @michmoor
        last edited by Feb 28, 2023, 9:56 PM

        @michmoor Well we currently have an IPsec tunnel in place to access systems on the other network. Due to high latency, we got this MPLS/VPLS service.

        Ideally from the LAN on my side I would like everything on the 192.168.60.0/24 side to be 'routable' as we already have Windows DNS records to do lookups to everything on the other side of the current IPsec tunnel.

        M 1 Reply Last reply Feb 28, 2023, 11:47 PM Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @rustydusty1717
          last edited by Feb 28, 2023, 11:47 PM

          @rustydusty1717 it seems dynamic routing may be what you need considering you have an IPsec and MPLS path. So I would go with FRR

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          R 1 Reply Last reply Feb 28, 2023, 11:50 PM Reply Quote 0
          • R
            rustydusty1717 @michmoor
            last edited by Feb 28, 2023, 11:50 PM

            @michmoor we obviously don't need the IPsec tunnel once I can get the routes established. Does that change anything?

            R 1 Reply Last reply Mar 1, 2023, 3:38 PM Reply Quote 0
            • R
              rustydusty1717 @rustydusty1717
              last edited by Mar 1, 2023, 3:38 PM

              @rustydusty1717 I was hoping to disable the IPsec after hours and test routing things over the MPLS. Once I can verify everything functions the IPsec won't be needed anymore.

              M 1 Reply Last reply Mar 2, 2023, 11:13 AM Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @rustydusty1717
                last edited by Mar 2, 2023, 11:13 AM

                @rustydusty1717 if you disable IPsec how will you connect to the remote side? I assume you have some sort of cutover plan.
                In any event, if there is only one path then static routing will be all you need

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                R 1 Reply Last reply Mar 2, 2023, 4:04 PM Reply Quote 0
                • R
                  rustydusty1717 @michmoor
                  last edited by Mar 2, 2023, 4:04 PM

                  @michmoor whats the best way to setup the static routes? Haven't had to do them before in pfsense.

                  M 1 Reply Last reply Mar 2, 2023, 4:24 PM Reply Quote 0
                  • M
                    michmoor LAYER 8 Rebel Alliance @rustydusty1717
                    last edited by Mar 2, 2023, 4:24 PM

                    @rustydusty1717
                    https://docs.netgate.com/pfsense/en/latest/routing/static.html#static-routes

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    1 Reply Last reply Reply Quote 0
                    • R
                      rustydusty1717
                      last edited by Mar 14, 2023, 7:39 PM

                      So I've added 192.168.60.0/24 (LAN on other side) to the static routes, disabled the IPSec tunnel and not able to reach across the MPLS. Do I also need to add static routes for the MPLS networks on both sides as well?

                      M 1 Reply Last reply Mar 14, 2023, 8:12 PM Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @rustydusty1717
                        last edited by Mar 14, 2023, 8:12 PM

                        @rustydusty1717 So you created a gateway as well? Can you ping across the MPLS - from pfsense to pfsense?

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        R 1 Reply Last reply Mar 14, 2023, 8:24 PM Reply Quote 0
                        • R
                          rustydusty1717 @michmoor
                          last edited by Mar 14, 2023, 8:24 PM

                          @michmoor correct I have my WAN gateway and then OPT as the 2nd gateway for the MPLS. I can ping the MPLS on the other end. Just can't reach anything on the LAN on other side. Wondering if my static routes are wrong or if I need to do anything with outbound NAT.

                          M 1 Reply Last reply Mar 14, 2023, 8:27 PM Reply Quote 0
                          • M
                            michmoor LAYER 8 Rebel Alliance @rustydusty1717
                            last edited by Mar 14, 2023, 8:27 PM

                            @rustydusty1717
                            Do you have firewall rules that state that your LAN can reach the network 192.168.60.0/24? What do those rules look like

                            Are you gateways UP?
                            Can you ping from your pfsense ? So log in to your pfsense via ssh. From the CLI initate a ping. so ping 192.168.60.1 [if thats an address on the other side[

                            Firewall: NetGate,Palo Alto-VM,Juniper SRX
                            Routing: Juniper, Arista, Cisco
                            Switching: Juniper, Arista, Cisco
                            Wireless: Unifi, Aruba IAP
                            JNCIP,CCNP Enterprise

                            R 1 Reply Last reply Mar 14, 2023, 8:33 PM Reply Quote 0
                            • R
                              rustydusty1717 @michmoor
                              last edited by Mar 14, 2023, 8:33 PM

                              @michmoor can ping the MPLS gateway on the other end however not the firewall or LAN on other end. It's not a pfsense/netgate unfortunately.

                              M 1 Reply Last reply Mar 14, 2023, 8:37 PM Reply Quote 0
                              • M
                                michmoor LAYER 8 Rebel Alliance @rustydusty1717
                                last edited by Mar 14, 2023, 8:37 PM

                                @rustydusty1717 Does the MPLS side have a route back?

                                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                Routing: Juniper, Arista, Cisco
                                Switching: Juniper, Arista, Cisco
                                Wireless: Unifi, Aruba IAP
                                JNCIP,CCNP Enterprise

                                R 1 Reply Last reply Mar 14, 2023, 8:42 PM Reply Quote 0
                                • R
                                  rustydusty1717 @michmoor
                                  last edited by Mar 14, 2023, 8:42 PM

                                  @michmoor yes it does. Should outbound NAT be turned off?

                                  M 1 Reply Last reply Mar 14, 2023, 9:06 PM Reply Quote 0
                                  • M
                                    michmoor LAYER 8 Rebel Alliance @rustydusty1717
                                    last edited by Mar 14, 2023, 9:06 PM

                                    @rustydusty1717 Whatever you are NATting to, the other side must know how to get back to that IP.
                                    If this is a site 2 site link generally NAT wouldnt be needed but depends on your design.

                                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                    Routing: Juniper, Arista, Cisco
                                    Switching: Juniper, Arista, Cisco
                                    Wireless: Unifi, Aruba IAP
                                    JNCIP,CCNP Enterprise

                                    R 1 Reply Last reply Mar 30, 2023, 10:56 PM Reply Quote 0
                                    • R
                                      rustydusty1717 @michmoor
                                      last edited by Mar 30, 2023, 10:56 PM

                                      @michmoor said in MPLS Routing:

                                      If this is a site 2 site link generally NAT wouldn't be needed but depends on your design.

                                      So we are able to now reach each LAN on both sides but any remote site (OpenVPN site to site) can't reach the LAN MPLS on other side.

                                      What's weird is using the old IPsec instead of MPLS it all works fine. The OpenVPN site to site's already have the LAN of the other side of the MPLS. Besides doing static routing at my primary site for the LAN on other side of MPLS it should all work, no?

                                      Doing tracert from a remote site on my side hits the OpenVPN assigned tunnel network then fails. Revert back tp IPsec and routing works perfect.

                                      R 1 Reply Last reply Apr 3, 2023, 5:11 PM Reply Quote 0
                                      • R
                                        rustydusty1717 @rustydusty1717
                                        last edited by Apr 3, 2023, 5:11 PM

                                        @rustydusty1717 anyone have any ideas? Would a diagram help?

                                        DerelictD 1 Reply Last reply Apr 9, 2023, 12:46 AM Reply Quote 0
                                        • DerelictD
                                          Derelict LAYER 8 Netgate @rustydusty1717
                                          last edited by Derelict Apr 9, 2023, 12:47 AM Apr 9, 2023, 12:46 AM

                                          @rustydusty1717 Accurate, comprehensive, numbered diagrams always help.

                                          Chattanooga, Tennessee, USA
                                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received