• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Help with Multiple WAN setup.

Scheduled Pinned Locked Moved Routing and Multi WAN
64 Posts 8 Posters 36.0k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • H
    hoba
    last edited by Mar 6, 2007, 2:19 PM

    Just create pass a firewallrule at LAN for protocol tcp, source any, destination any, port https, gateway <name of="" your="" failoverpool="">. This way all https will only go out one single gateway and stay there.

    Failoverpools are just like loadbalancingpools but they won't do doundrobin of every new connection to the next link in the pool. Instead they will always use only the most top in the list available link and failover to the next one in the list if one of the top links fail. You create the failoverpools and use them exactly the same way like the loadbalancing pools. It's just an option when you edit/create a pool.

    Already established states will remain at the same gateway as long as they don't time out or are closed. This means tracerouting to a specific IP will keep at the same gateway till the state gets closed or times out.</name>

    1 Reply Last reply Reply Quote 0
    • L
      leimrod
      last edited by Mar 6, 2007, 2:45 PM

      Ok I implemented what you said but it doesn't seem to be working for HTTPs. I can get access to HTTPS only when I bybass pfSense.

      I've attached some screenshots below of my firewall rules, NAT setup and loaf balancer rules.

      lan_fwrules.jpg
      lan_fwrules.jpg_thumb
      netopia_fwrules.jpg
      netopia_fwrules.jpg_thumb
      draytek_fwrules.jpg
      draytek_fwrules.jpg_thumb
      nat_rules.jpg
      nat_rules.jpg_thumb
      loadbalancer_rules.jpg
      loadbalancer_rules.jpg_thumb

      1 Reply Last reply Reply Quote 0
      • S
        sai
        last edited by Mar 6, 2007, 3:45 PM

        to get https to work you need a LAN rule:

        LAN
        source ip: LAN net
        source port: any
        dest ip: any
        dest port: HTTPS
        gateway: netfailoverdray

        This needs to be the first rule.

        Your lan fw rules: only the  first one will ever be used as it is the first and will match anything coming out of the LAN net. Second rule will never be matched because of this

        You do not need the two failover pools - just one will do. netfailoverdray or drayfailovernet.

        Check if your DNS works if one interface dies.

        1 Reply Last reply Reply Quote 0
        • L
          leimrod
          last edited by Mar 6, 2007, 3:58 PM Mar 6, 2007, 3:56 PM

          @sai:

          to get https to work you need a LAN rule:

          LAN
          source ip: LAN net
          source port: any
          dest ip: any
          dest port: HTTPS
          gateway: netfailoverdray

          This needs to be the first rule.

          Your lan fw rules: only the  first one will ever be used as it is the first and will match anything coming out of the LAN net. Second rule will never be matched because of this

          You do not need the two failover pools - just one will do. netfailoverdray or drayfailovernet.

          Check if your DNS works if one interface dies.

          Ok i've attached a screenshot of it set as the first rule, it is set exactly as you outlined. One question does this rule allow access for other HTTPS ports such as 22, 444, 3389 and 8443?

          Also, should I delete the first rule in lan_fwrules? The one set as

          Proto Source  Port Destination       Port             Gateway
          TCP   LAN net  *        *          443 (HTTPS)  NetFailoverDray

          I still can't get access to the HTTPS site though, it has a port extension of 8443. Also how would I go about testing the port is correctly allowing HTTPS connections?

          EDIT: Just wondering, do I need to do any sort of port forwarding in my NAT setup to allow HTTPS connections?

          https_fwrule.jpg
          https_fwrule.jpg_thumb

          1 Reply Last reply Reply Quote 0
          • J
            jeroen234
            last edited by Mar 6, 2007, 7:47 PM

            if you need port 8443 then you need to make a rule for that port
            https is only port 443
            port 22 btw is ssh not https

            1 Reply Last reply Reply Quote 0
            • L
              leimrod
              last edited by Mar 7, 2007, 10:29 AM

              Just as a note, should I be opening all my ports on my router and setting its firewall to off and using only pfSense as the firewall and port forwarder?

              When I set up any LAN rule for a port it doesn't seem to be working (i.e. I can't access HTTPS, FTP etc) What would be causing these ports to be blocked?

              1 Reply Last reply Reply Quote 0
              • L
                leimrod
                last edited by Mar 7, 2007, 4:04 PM

                Is there any guides in pfSense on what the most common ports are and how I should go about opening them for external and internal access

                1 Reply Last reply Reply Quote 0
                • H
                  hoba
                  last edited by Mar 7, 2007, 4:20 PM

                  Leimrod, I think you have some basic misunderstanding atm how the firewall of pfSense works. I'll try to sum it up a bit:

                  Firewallrules will always be applied to incoming traffic at an interface. This means if you allow access from lan to any that connections that have been initiated from lan will create a state that accepts trafic for the reverse connection of this traffic as well. No need to open something up at wan for this. You only need to open up ports and forward ports at WAN if you offer services to the public like hosting a webserver for example.

                  Now to your https problem: the default port for https is 443 (like noted in the webgui as well when selecting https). As your https destination uses a different port (8443) just duplicate the rule that you already have for https and change the destination port to 8443 to take care of this "special setting" as well.

                  It looks like you use some gatewayrouters in front of you. The easiest way to set them up and forget about them is to set the pfSense WAN IP and pfSense OPT-WAN IP as DMZ hosts in these routers (might also be called expedited host or similiar). This way they will just forard any traffic to the pfSense and you don't have to touch them anymore if you need to create rules and forwards for incoming traffic.

                  1 Reply Last reply Reply Quote 0
                  • L
                    leimrod
                    last edited by Mar 7, 2007, 5:50 PM

                    Would it accomplish the same thing if I set up an alias in firewall and set it to ports 22, 443, 444, 3389, 8443? That way as I want to add ports I could just add them to the alias instead of creating a seperate rule for each port?

                    1 Reply Last reply Reply Quote 0
                    • H
                      hoba
                      last edited by Mar 7, 2007, 5:58 PM

                      This will work fine. Just use a portsalias. That's the mainreason behind the alias system, to reduce the amount of rules and make them more readable and allow easier editing.

                      1 Reply Last reply Reply Quote 0
                      • L
                        leimrod
                        last edited by Mar 7, 2007, 6:10 PM

                        Would this work for getting access to external FTP servers also? If I just add port 21 into that alias should I get FTP access also?

                        1 Reply Last reply Reply Quote 0
                        • H
                          hoba
                          last edited by Mar 7, 2007, 6:17 PM

                          ftp is different and special as this protocol simply sucks. It needs an ftphelper through NAT and is not multiwan capable. ftp connections will run on the original WAN always. On top you have to add a rule at firewall>rules, lan tab on top of all your rules: "pass protocol any, source any, destination 127.0.0.1, gateway default" to exclude the traffic through the proxy from balancing.

                          1 Reply Last reply Reply Quote 0
                          • L
                            leimrod
                            last edited by Mar 8, 2007, 11:22 AM Mar 8, 2007, 10:47 AM

                            this is really getting frustrating now. I can't see any reason why FTP isn't working. I set up the LAN rule as you said, and i've enabled the FTP helper under "interfaces>WAN>FTP helper"

                            When you say set the destination to 127.0.0.1, should that be of type "network" and CIDR /24? Also you didn't mention, but where should I be opening the FTP port in this rule, at the source or the destination, or do I not need to?

                            I also have rules set up in in Firewall>NAT>Port forward and set it to autocreate rules in firewall>Rules>WAN, i've attached screenshots of these.

                            EDIT: I did a quick check in my "diagnostics>show states" and when I try to make an ftp connection i'm getting these errors

                            tcp 127.0.0.1:8021 <- 80.79.129.2:21 <- 192.165.0.30:2077 CLOSED:SYN_SENT 
                            tcp 127.0.0.1:8021 <- 80.79.129.2:21 <- 192.165.0.30:2078 CLOSED:SYN_SENT 
                            tcp 127.0.0.1:8021 <- 80.79.129.8:21 <- 192.165.0.30:2079 CLOSED:SYN_SENT

                            Do you have any idea what could be causing this?

                            nat_rule_ftp.jpg
                            nat_rule_ftp.jpg_thumb
                            firewall_rule_ftp.jpg
                            firewall_rule_ftp.jpg_thumb

                            1 Reply Last reply Reply Quote 0
                            • H
                              hoba
                              last edited by Mar 8, 2007, 1:31 PM

                              ftphelper has to be enabled at interfaces>lan (it is by default) and not on interfaces>wan (this is only needed if you provide ftp services to the public). The rule to destination 127.0.0.1 (single host or alias) has to be created on top of the lan firewallrules.

                              1 Reply Last reply Reply Quote 0
                              • L
                                leimrod
                                last edited by Mar 8, 2007, 1:44 PM

                                hoba, I have to thank you for your help with this.

                                I changed the rule to "single host or alias", do I need to change the port range anywhere to FTP? I've also attached a screenshot of my "Interfaces>LAN" tab to show that the ftphelper is enabled (its enabled when there ISNT a tick in the box right?)

                                So just so i'm clear, for FTP to work with load balancing. I need this LAN rule, FTP enabled at the LAN interface and also a rule in my NAT>Port forward for FTP, with "Auto-add a firewall rule" enabled. Is this correct?

                                I found this recent mail thread which seems to say that FTP does not work at all for load balancing in pfSense, has this since been changed?

                                fwrules_ftp1.jpg
                                fwrules_ftp1.jpg_thumb
                                interfaces_LAN_FTP.jpg
                                interfaces_LAN_FTP.jpg_thumb

                                1 Reply Last reply Reply Quote 0
                                • H
                                  hoba
                                  last edited by Mar 8, 2007, 2:04 PM

                                  Your screenshots look ok now. Does it work? If not please upgrade to the latest snapshot. there was some ftp logic changed one day ago.

                                  The mail just states that it can't make use of loadbalancing but it will work on multiwansetups using only WAN for ftp-ing.

                                  1 Reply Last reply Reply Quote 0
                                  • L
                                    leimrod
                                    last edited by Mar 8, 2007, 3:35 PM

                                    Ok that REALLY scared me. I updated to the latest firmware update and I lost all access to the internet, when I checked on the pfSense main page it was telling me it was using version 1.0.1 from the 29th October 2006. Lucky for me i'd kept a copy of the 28th February update, when I updated back to the original again I got internet access back.

                                    I think there might be something wrong with the latest snapshot, it appears to be one of the original 1.0.1 releases rather than an update.

                                    Also, and this is very weird, before I updated I couldn't get FTP access at all, now that i'm back using the same version as before I now have FTP access??? Nothing has changed, I just updated to the same version i've been using all along,

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      sullrich
                                      last edited by Mar 8, 2007, 3:45 PM

                                      You have to redo any load balancing queues after updating as the format has changed.

                                      1 Reply Last reply Reply Quote 0
                                      • L
                                        leimrod
                                        last edited by Mar 8, 2007, 4:04 PM Mar 8, 2007, 3:50 PM

                                        @sullrich:

                                        You have to redo any load balancing queues after updating as the format has changed.

                                        What do you mean? All my load balancing and firewall rules are still in place and the load balancing is still working, the "status>RRD Graphs" show that the traffic is still going out over both connections

                                        EDIT: Also my HTTPs is working now as well? Very weird. Btw I have no rules set up in Firewall>NAT (neither portforward, 1:1 or outbound) for FTP or HTTPs is this normal? Also another thing i'm noticing, when i'm downloading just one torrent it is using BOTH WAN connections? I know this is happening because my download speed is over 6Mb/s, which is greater than either of the WAN connections on their own. I thought this wasn't possible?

                                        1 Reply Last reply Reply Quote 0
                                        • H
                                          hoba
                                          last edited by Mar 8, 2007, 8:04 PM

                                          I have some homework for you. Search the forum and the available docs. This thread has already 5 pages and you are asking still questions that have already been covered in this thread or the docs that have been posted. No offense but the answers are all there already.

                                          1 Reply Last reply Reply Quote 0
                                          61 out of 64
                                          • First post
                                            61/64
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received