Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Internal IP to 2nd gateway

    Scheduled Pinned Locked Moved Routing and Multi WAN
    23 Posts 4 Posters 5.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GruensFroeschliG Offline
      GruensFroeschli
      last edited by

      Rules are processed from top to down.
      If a rule catches, the rest below is not considered.

      Simply move your exception rule above your other general rule and it should work.

      We do what we must, because we can.

      Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

      1 Reply Last reply Reply Quote 0
      • O Offline
        Oizopower
        last edited by

        @GruensFroeschli:

        Rules are processed from top to down.
        If a rule catches, the rest below is not considered.

        Simply move your exception rule above your other general rule and it should work.

        Thank you!, i changed the order and i will check tomorrow if it's working ok.

        1 Reply Last reply Reply Quote 0
        • C Offline
          craigduff
          last edited by

          Agreed that will work fine.

          Kind Regards,
          Craig

          1 Reply Last reply Reply Quote 0
          • O Offline
            Oizopower
            last edited by

            Sorry forgot to reply here, indeed changed the order and it seems to work perfectly!
            Thanks for the solution !

            1 Reply Last reply Reply Quote 0
            • J Offline
              josifbg
              last edited by

              OK This work fine with outbound traffic….

              How about the inbound traffic... What should b the rule then?

              1 Reply Last reply Reply Quote 0
              • C Offline
                craigduff
                last edited by

                What are you trying to archive? That doesnt make any sense?

                Kind Regards,
                Craig

                1 Reply Last reply Reply Quote 0
                • J Offline
                  josifbg
                  last edited by

                  What i want to acheve is to be able to select for each IP of my internal network specific WAN or Group of WANs (for loadbalancing or Failover)…here is example:

                  192.168.3.10 <-> WAN1
                  192.168.3.20 <-> WAN2

                  192.168.3.30 -> LoadBalancing WANGWGRP
                  192.168.3.30 <- WAN1

                  1 Reply Last reply Reply Quote 0
                  • C Offline
                    craigduff
                    last edited by

                    Right Watch this video…

                    http://www.youtube.com/watch?v=Usi195rK35I

                    Ignore the fact its related to Traffic shaping. The rules on the lan still apply. Just make sure you select gateway option and choose the gateway you want right at the bottom. Make sure they are in the correct order as well, or it wont work.... I hope this makes sense.

                    Kind Regards,
                    Craig

                    1 Reply Last reply Reply Quote 0
                    • J Offline
                      josifbg
                      last edited by

                      I hope this is what you are refering to?

                      1 Reply Last reply Reply Quote 0
                      • C Offline
                        craigduff
                        last edited by

                        Yea bang on.

                        Kind Regards,
                        Craig

                        1 Reply Last reply Reply Quote 0
                        • J Offline
                          josifbg
                          last edited by

                          With this configuration is working only for outbound traffic….

                          But when i port forward let`s say RDP to 192.168.3.55 and try to reach it using the WAN2.... nothings happand...

                          1 Reply Last reply Reply Quote 0
                          • C Offline
                            craigduff
                            last edited by

                            Oh i think this may help you. You need to enable Loop back in your configuation. ?

                            Go into Advanced

                            Firewall / Nat

                            (Untick the box)
                            Disable NAT Reflection for port forwards

                            Disables the automatic creation of additional NAT redirect rules for access to port forwards on your external IP addresses from within your internal networks. Note: Reflection for port forward entries is skipped for ranges larger than 500 ports.

                            Kind Regards,
                            Craig

                            1 Reply Last reply Reply Quote 0
                            • J Offline
                              josifbg
                              last edited by

                              Unfortunately this change didn`t help in my case :(

                              Let me show you in pictures my configuration:

                              According to this configuration all of my LAN IP`s 192.168.3.x are using LoadBalancing and working with no problems.
                              Except 192.168.3.55 which should use WAN2 as a the only GW for inbound and outbound… unfortunately only outbound traffic is going through WAN2

                              In addition i`ve a lot of Port forwards on my default GW (WAN1) to IPs on my LAN 192.168.3.x. All of them are above port 500 and work with no issues.

                              i`ve tried everything i can think of but no success so far :(

                              1 Reply Last reply Reply Quote 0
                              • C Offline
                                craigduff
                                last edited by

                                Sorry for the late reply. Few things to try… and ask..

                                Does RDP work internally... Can you get to the server inside the network with pfsense?

                                Also.. Any reason you have Outbound NAT to manual? Are you able to try automatic and try again for me?

                                Are you just adding rules? rather than going via nat? or you using 1 & 1 nat?

                                Kind Regards,
                                Craig

                                1 Reply Last reply Reply Quote 0
                                • J Offline
                                  josifbg
                                  last edited by

                                  @craigduff:

                                  Sorry for the late reply. Few things to try… and ask..

                                  Does RDP work internally... Can you get to the server inside the network with pfsense?

                                  Behind PFSense i`ve ESXi Server with couple of VMs few of them are Windows based.

                                  RDP is working internaly with no issues:

                                  Details: As you can see above 192.168.3.55 should be accessable via WAN2. In addition ive port forwarded RDP port to x.x.3.55 and no matter what i try to access: lets if i try to access x.x.3.55:3389 i can connect with no problems… if i try to access WAN2 IP:3389 i can access with no problems..., but from outside my network i don`t have access to WAN2 IP:3389 which again is port forwarded to x.x.3.55

                                  @craigduff:

                                  Also.. Any reason you have Outbound NAT to manual? Are you able to try automatic and try again for me?

                                  No specific reason for Manual over Automatic…Ive switched to Automatic = no changes. I still cant connect from outside.

                                  @craigduff:

                                  Are you just adding rules? rather than going via nat? or you using 1 & 1 nat?

                                  I`am not really sure i unerstand you question.

                                  1 Reply Last reply Reply Quote 0
                                  • C Offline
                                    craigduff
                                    last edited by

                                    ok can you confirm you are going into the firewall section clicking on NAT and then adding in a port forward? If you are doing this, the NAT rules automatically create a rule this is under firewall rules… does that appear?

                                    Before you look at all this... Have you done the basics? Reboot Pfsense? That can clean up tables and cache. Also what equipment do you have before the pfsense? or does the ISP just plug into pfsense?

                                    I found in one of my problems RDP not working, this was because i had a Zyxel ADSL router in front and that was the problem. I rebooted and everything started to work...

                                    Kind Regards,
                                    Craig

                                    1 Reply Last reply Reply Quote 0
                                    • J Offline
                                      josifbg
                                      last edited by

                                      @craigduff:

                                      ok can you confirm you are going into the firewall section clicking on NAT and then adding in a port forward?

                                      Precisely.

                                      @craigduff:

                                      If you are doing this, the NAT rules automatically create a rule this is under firewall rules… does that appear?

                                      No. not at all… Once the port forward is created, no additional rules are created under Firewall: Rules
                                      P.S. On WAN1 (Default GW) I`ve a lot of ports which are forwarded to different IPs on my LAN and non of them has additional rule automaticly created under Firewall:Rules and they are working just fine.

                                      @craigduff:

                                      Before you look at all this… Have you done the basics? Reboot Pfsense? That can clean up tables and cache.

                                      I`ve restarted the Pfsense just now and no effect.

                                      And after the restart I lost connection to the WebConfigurator…Ive restarted the WebConfigurator with no success on gaining access. 2nd reboot on the whole system didnt fix the new issue.
                                      I lost connection to the WebConfigurator even from the LAN... which is weird...

                                      This i call it a bad luck :)

                                      @craigduff:

                                      Also what equipment do you have before the pfsense? or does the ISP just plug into pfsense?

                                      ISP`s are connected directly to my Pfsense. No additional equipment/devices are before pfsense.

                                      @craigduff:

                                      I found in one of my problems RDP not working, this was because i had a Zyxel ADSL router in front and that was the problem. I rebooted and everything started to work…

                                      Well it`s not my case :)

                                      Iam really puzzled on this issue…

                                      1 Reply Last reply Reply Quote 0
                                      • C Offline
                                        craigduff
                                        last edited by

                                        Wow that is bad luck, its lucky you rebooted now and found there is an issue, rather than later on if you had a power cut etc. I cant say i really understand whats going on… If you have rebooted and its not coming back on, surely that is a dodgy build of pfsense? What hardware is it on? Have you thought about virtualising it within your ESX environment? this is what i do.

                                        When you create a rule on the nat page "port forward" Right at the bottom there is an option for Filter rule association. This is what adds the rules.

                                        Kind Regards,
                                        Craig

                                        1 Reply Last reply Reply Quote 0
                                        • J Offline
                                          josifbg
                                          last edited by

                                          @craigduff:

                                          Wow that is bad luck, its lucky you rebooted now and found there is an issue, rather than later on if you had a power cut etc. I cant say i really understand whats going on… If you have rebooted and its not coming back on, surely that is a dodgy build of pfsense? What hardware is it on? Have you thought about virtualising it within your ESX environment? this is what i do.

                                          When you create a rule on the nat page "port forward" Right at the bottom there is an option for Filter rule association. This is what adds the rules.

                                          The Pfsense has his own dedicated Hardware (server based) with 4 LAN Cards (2 for WAN and 2 for LAN)

                                          Ive thought about virtualising it on ESXi, but iam not really sure if this is ok in terms of SPoF or additional devices such as WIFI APs for example.

                                          Can you recommend which version to use in production as obviously the one i`am using has some issues….

                                          P.S. Ill reinstall PFsense and will reconfigure all from scratch hopfully its a bug in the release.

                                          1 Reply Last reply Reply Quote 0
                                          • C Offline
                                            craigduff
                                            last edited by

                                            To be hoenst 2.0.2 is the latest and i am using it on other customer equipment. And its alright, i was on 2.0.1 for ages, but from my understanding there were bug fixes fixed in 2.0.2

                                            Something else i thought of… Can you enable logging on the rule so it has a blue exclamation mark on it? And then try external access and see what the system firewall log says?

                                            I would recommend a reinstall if you have rebooted and it hasnt come back online. I assume you have done loads of restarts on it before and its fine, up until now?

                                            Kind Regards,
                                            Craig

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.