• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Help with Multiple WAN setup.

Scheduled Pinned Locked Moved Routing and Multi WAN
64 Posts 8 Posters 36.0k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • H
    hoba
    last edited by Mar 6, 2007, 12:40 PM

    You only need the portforwards if you provide services to the public (like hosting a webserver). It's optional.

    I don't understand the first part of your question though. Btw, I recommend using failoverpools instead of single gateways. This way you will be able to switch traffic over to another connection if a link goes down (at least when using policybased routing instead of loadbalancing).

    1 Reply Last reply Reply Quote 0
    • L
      leimrod
      last edited by Mar 6, 2007, 2:04 PM

      Ok I was getting too confused following the DHCP guide so I reset all my settings to factory defaults then followed this guide right to the end: http://pfsense.iserv.nl/tutorials/outgoing_loadbalancing/outgoing_loadbalancing.pdf

      Now, load balancing appears to be working. I've tested a few tracert's and for different URLs it points to different gateways. Also testing at http://dynamic.zoneedit.com/checkip.html shows different IPs every few refreshs

      I have a few questions. In work I regularly access HTTPs sites. How do I set up pfSense to allow HTTPs access? When I did the tracerts I noticed that if, say google.com, used Opt1 as its gateway, any subsequent tracert for google.com would also use the same gateway. I had to change the URL to see it trace on the second gateway. Is there a reason why pfSense would allocate different gateways to different URL's?

      Also hoba, could you elaborate what you meant by "I recommend using failoverpools instead of single gateways" I don't quiet understand how I would implement this?

      1 Reply Last reply Reply Quote 0
      • H
        hoba
        last edited by Mar 6, 2007, 2:19 PM

        Just create pass a firewallrule at LAN for protocol tcp, source any, destination any, port https, gateway <name of="" your="" failoverpool="">. This way all https will only go out one single gateway and stay there.

        Failoverpools are just like loadbalancingpools but they won't do doundrobin of every new connection to the next link in the pool. Instead they will always use only the most top in the list available link and failover to the next one in the list if one of the top links fail. You create the failoverpools and use them exactly the same way like the loadbalancing pools. It's just an option when you edit/create a pool.

        Already established states will remain at the same gateway as long as they don't time out or are closed. This means tracerouting to a specific IP will keep at the same gateway till the state gets closed or times out.</name>

        1 Reply Last reply Reply Quote 0
        • L
          leimrod
          last edited by Mar 6, 2007, 2:45 PM

          Ok I implemented what you said but it doesn't seem to be working for HTTPs. I can get access to HTTPS only when I bybass pfSense.

          I've attached some screenshots below of my firewall rules, NAT setup and loaf balancer rules.

          lan_fwrules.jpg
          lan_fwrules.jpg_thumb
          netopia_fwrules.jpg
          netopia_fwrules.jpg_thumb
          draytek_fwrules.jpg
          draytek_fwrules.jpg_thumb
          nat_rules.jpg
          nat_rules.jpg_thumb
          loadbalancer_rules.jpg
          loadbalancer_rules.jpg_thumb

          1 Reply Last reply Reply Quote 0
          • S
            sai
            last edited by Mar 6, 2007, 3:45 PM

            to get https to work you need a LAN rule:

            LAN
            source ip: LAN net
            source port: any
            dest ip: any
            dest port: HTTPS
            gateway: netfailoverdray

            This needs to be the first rule.

            Your lan fw rules: only the  first one will ever be used as it is the first and will match anything coming out of the LAN net. Second rule will never be matched because of this

            You do not need the two failover pools - just one will do. netfailoverdray or drayfailovernet.

            Check if your DNS works if one interface dies.

            1 Reply Last reply Reply Quote 0
            • L
              leimrod
              last edited by Mar 6, 2007, 3:58 PM Mar 6, 2007, 3:56 PM

              @sai:

              to get https to work you need a LAN rule:

              LAN
              source ip: LAN net
              source port: any
              dest ip: any
              dest port: HTTPS
              gateway: netfailoverdray

              This needs to be the first rule.

              Your lan fw rules: only the  first one will ever be used as it is the first and will match anything coming out of the LAN net. Second rule will never be matched because of this

              You do not need the two failover pools - just one will do. netfailoverdray or drayfailovernet.

              Check if your DNS works if one interface dies.

              Ok i've attached a screenshot of it set as the first rule, it is set exactly as you outlined. One question does this rule allow access for other HTTPS ports such as 22, 444, 3389 and 8443?

              Also, should I delete the first rule in lan_fwrules? The one set as

              Proto Source  Port Destination       Port             Gateway
              TCP   LAN net  *        *          443 (HTTPS)  NetFailoverDray

              I still can't get access to the HTTPS site though, it has a port extension of 8443. Also how would I go about testing the port is correctly allowing HTTPS connections?

              EDIT: Just wondering, do I need to do any sort of port forwarding in my NAT setup to allow HTTPS connections?

              https_fwrule.jpg
              https_fwrule.jpg_thumb

              1 Reply Last reply Reply Quote 0
              • J
                jeroen234
                last edited by Mar 6, 2007, 7:47 PM

                if you need port 8443 then you need to make a rule for that port
                https is only port 443
                port 22 btw is ssh not https

                1 Reply Last reply Reply Quote 0
                • L
                  leimrod
                  last edited by Mar 7, 2007, 10:29 AM

                  Just as a note, should I be opening all my ports on my router and setting its firewall to off and using only pfSense as the firewall and port forwarder?

                  When I set up any LAN rule for a port it doesn't seem to be working (i.e. I can't access HTTPS, FTP etc) What would be causing these ports to be blocked?

                  1 Reply Last reply Reply Quote 0
                  • L
                    leimrod
                    last edited by Mar 7, 2007, 4:04 PM

                    Is there any guides in pfSense on what the most common ports are and how I should go about opening them for external and internal access

                    1 Reply Last reply Reply Quote 0
                    • H
                      hoba
                      last edited by Mar 7, 2007, 4:20 PM

                      Leimrod, I think you have some basic misunderstanding atm how the firewall of pfSense works. I'll try to sum it up a bit:

                      Firewallrules will always be applied to incoming traffic at an interface. This means if you allow access from lan to any that connections that have been initiated from lan will create a state that accepts trafic for the reverse connection of this traffic as well. No need to open something up at wan for this. You only need to open up ports and forward ports at WAN if you offer services to the public like hosting a webserver for example.

                      Now to your https problem: the default port for https is 443 (like noted in the webgui as well when selecting https). As your https destination uses a different port (8443) just duplicate the rule that you already have for https and change the destination port to 8443 to take care of this "special setting" as well.

                      It looks like you use some gatewayrouters in front of you. The easiest way to set them up and forget about them is to set the pfSense WAN IP and pfSense OPT-WAN IP as DMZ hosts in these routers (might also be called expedited host or similiar). This way they will just forard any traffic to the pfSense and you don't have to touch them anymore if you need to create rules and forwards for incoming traffic.

                      1 Reply Last reply Reply Quote 0
                      • L
                        leimrod
                        last edited by Mar 7, 2007, 5:50 PM

                        Would it accomplish the same thing if I set up an alias in firewall and set it to ports 22, 443, 444, 3389, 8443? That way as I want to add ports I could just add them to the alias instead of creating a seperate rule for each port?

                        1 Reply Last reply Reply Quote 0
                        • H
                          hoba
                          last edited by Mar 7, 2007, 5:58 PM

                          This will work fine. Just use a portsalias. That's the mainreason behind the alias system, to reduce the amount of rules and make them more readable and allow easier editing.

                          1 Reply Last reply Reply Quote 0
                          • L
                            leimrod
                            last edited by Mar 7, 2007, 6:10 PM

                            Would this work for getting access to external FTP servers also? If I just add port 21 into that alias should I get FTP access also?

                            1 Reply Last reply Reply Quote 0
                            • H
                              hoba
                              last edited by Mar 7, 2007, 6:17 PM

                              ftp is different and special as this protocol simply sucks. It needs an ftphelper through NAT and is not multiwan capable. ftp connections will run on the original WAN always. On top you have to add a rule at firewall>rules, lan tab on top of all your rules: "pass protocol any, source any, destination 127.0.0.1, gateway default" to exclude the traffic through the proxy from balancing.

                              1 Reply Last reply Reply Quote 0
                              • L
                                leimrod
                                last edited by Mar 8, 2007, 11:22 AM Mar 8, 2007, 10:47 AM

                                this is really getting frustrating now. I can't see any reason why FTP isn't working. I set up the LAN rule as you said, and i've enabled the FTP helper under "interfaces>WAN>FTP helper"

                                When you say set the destination to 127.0.0.1, should that be of type "network" and CIDR /24? Also you didn't mention, but where should I be opening the FTP port in this rule, at the source or the destination, or do I not need to?

                                I also have rules set up in in Firewall>NAT>Port forward and set it to autocreate rules in firewall>Rules>WAN, i've attached screenshots of these.

                                EDIT: I did a quick check in my "diagnostics>show states" and when I try to make an ftp connection i'm getting these errors

                                tcp 127.0.0.1:8021 <- 80.79.129.2:21 <- 192.165.0.30:2077 CLOSED:SYN_SENT 
                                tcp 127.0.0.1:8021 <- 80.79.129.2:21 <- 192.165.0.30:2078 CLOSED:SYN_SENT 
                                tcp 127.0.0.1:8021 <- 80.79.129.8:21 <- 192.165.0.30:2079 CLOSED:SYN_SENT

                                Do you have any idea what could be causing this?

                                nat_rule_ftp.jpg
                                nat_rule_ftp.jpg_thumb
                                firewall_rule_ftp.jpg
                                firewall_rule_ftp.jpg_thumb

                                1 Reply Last reply Reply Quote 0
                                • H
                                  hoba
                                  last edited by Mar 8, 2007, 1:31 PM

                                  ftphelper has to be enabled at interfaces>lan (it is by default) and not on interfaces>wan (this is only needed if you provide ftp services to the public). The rule to destination 127.0.0.1 (single host or alias) has to be created on top of the lan firewallrules.

                                  1 Reply Last reply Reply Quote 0
                                  • L
                                    leimrod
                                    last edited by Mar 8, 2007, 1:44 PM

                                    hoba, I have to thank you for your help with this.

                                    I changed the rule to "single host or alias", do I need to change the port range anywhere to FTP? I've also attached a screenshot of my "Interfaces>LAN" tab to show that the ftphelper is enabled (its enabled when there ISNT a tick in the box right?)

                                    So just so i'm clear, for FTP to work with load balancing. I need this LAN rule, FTP enabled at the LAN interface and also a rule in my NAT>Port forward for FTP, with "Auto-add a firewall rule" enabled. Is this correct?

                                    I found this recent mail thread which seems to say that FTP does not work at all for load balancing in pfSense, has this since been changed?

                                    fwrules_ftp1.jpg
                                    fwrules_ftp1.jpg_thumb
                                    interfaces_LAN_FTP.jpg
                                    interfaces_LAN_FTP.jpg_thumb

                                    1 Reply Last reply Reply Quote 0
                                    • H
                                      hoba
                                      last edited by Mar 8, 2007, 2:04 PM

                                      Your screenshots look ok now. Does it work? If not please upgrade to the latest snapshot. there was some ftp logic changed one day ago.

                                      The mail just states that it can't make use of loadbalancing but it will work on multiwansetups using only WAN for ftp-ing.

                                      1 Reply Last reply Reply Quote 0
                                      • L
                                        leimrod
                                        last edited by Mar 8, 2007, 3:35 PM

                                        Ok that REALLY scared me. I updated to the latest firmware update and I lost all access to the internet, when I checked on the pfSense main page it was telling me it was using version 1.0.1 from the 29th October 2006. Lucky for me i'd kept a copy of the 28th February update, when I updated back to the original again I got internet access back.

                                        I think there might be something wrong with the latest snapshot, it appears to be one of the original 1.0.1 releases rather than an update.

                                        Also, and this is very weird, before I updated I couldn't get FTP access at all, now that i'm back using the same version as before I now have FTP access??? Nothing has changed, I just updated to the same version i've been using all along,

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          sullrich
                                          last edited by Mar 8, 2007, 3:45 PM

                                          You have to redo any load balancing queues after updating as the format has changed.

                                          1 Reply Last reply Reply Quote 0
                                          59 out of 64
                                          • First post
                                            59/64
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received