Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Configuration advice

    Scheduled Pinned Locked Moved Routing and Multi WAN
    27 Posts 2 Posters 6.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M Offline
      Mike_swe
      last edited by

      I think i understand =).

      In the gateway section, i have only created one gateway which is bound to the 192.168.10.0 interface. It points to 192.168.10.2. Should i also create a second gateway with the same ip address as my first but bound towards the 192.168.11.0 interface?

      In the gateway section i also have my default wan connection, just for your information.

      1 Reply Last reply Reply Quote 0
      • M Offline
        Mike_swe
        last edited by

        Now i have also found an other problem. From the net that actual works towards my remote site, ive tried accessing a terminal server. It connects all fine but i get disconnected every 10 seconds. Ive tested to set my client to the second gateway directly and the problem disappears. So something happens when the traffic passes my pfsense box. The ping packeges works alright but the rdp packages gets broken. Can i somehow find a log or something showing me whats happening?

        /Mike

        1 Reply Last reply Reply Quote 0
        • M Offline
          Mike_swe
          last edited by

          An update again =)

          Ive managed to solve the above error with the following changes after some googling =). Under the rules for my static route ive changed advanced -state -no state.

          I feel lost here. What exactly does this mean?

          /Mike

          1 Reply Last reply Reply Quote 0
          • M Offline
            Mike_swe
            last edited by

            Ive done some more reading up in this issue and now i understand the no state option and why it works now. Since traffic goes directly from hosts on the 192.168.100.0 net towards hosts on 192.168.10.0 net the routing is assymetric.

            But the main issue still remains.

            I am unable to ping 192.168.10.1 from 192.168.100.0. I can ping every host but not the pfsense interface. The right rule are in place at the interface. When i try a ping from 192.168.100.0 net towards 192.168.11.0 i get TTL Expired.

            When i try a tracert from 192.168.100.0 net towards 192.168.11.0 net i get a routing loop that keeps on looping at my second gateway which is 192.168.10.2.

            When i remove the rules at my interface for 192.168.100.0 the pings just timeout instead and the tracert stops looping.

            Is this a non resolveable issue which i cant solve with pfsense and my setup? I dont know what to try next.

            1 Reply Last reply Reply Quote 0
            • P Offline
              podilarius
              last edited by

              okay, on the pfsense box there should be a route setup for 192.168.100.0/22 that has 192.168.10.2 as a gateway.
              The default LAN rule should allow host in 192.168.10.0/24 to get to 192.168.100.0/22. If 192.168.100.0/22 is also relying on pfsense to handle its internet, then you are going to have to create an allow rule inbound on the LAN to accept traffic and also a NAT rule to transform the source. If not, then you must have a rule at the remote location's default gateway that states that if you are going to 192.168.10,11,12,13,14,15.0/24, that you must go to 192.168.100.2/32 or the gateway's IP on the other side of the MPLS. It sounds like you might have that already. There is also a setting in advanced config that disables firewall rule checking is the source and destination are on the same interface.
              You will have to have a route on the remote sites IPSEC for the return traffic to the 192.168.100.0/22 back to 192.168.10.2/32.

              On the site to site connection, is there a firewall rule in place? Is the default gateway on the 192.168.100.0/22 network setup to allow traffic to 192.168.10,11,12,13,14,15.0/24 networks?

              1 Reply Last reply Reply Quote 0
              • M Offline
                Mike_swe
                last edited by

                Thanks for the help  :)

                Routesetup for 192.168.100.0/22 with gateway 192.168.10.2 = Its in place
                Default Lan rule to allow host towards 192.168.100.0/22 = check
                PFsense should not handle internet for the 192.168.100.0/22 but i want to be able to ping my pfsense box so ive also created a inbound rule towards my lan interface for 192.168.100.0/22
                The MPLS from 192.168.100.0/22 has a routing for 192.168.11-12-13-14-15.0/24 towards 192.168.10.1
                I have tried the settings in advanced regarding static routing filter but i makes no differense.
                The site to site connection has no firewalls in place.

                Could this be related to my outbound nat rules? I use manual outbound nat and here, i havent made any configuration for this. Since it is a static route a thought that the packets didnt pass that way.

                The returnroute for my ipsec towards 192.168.100.0/22 is a second phase2 entry for that subnet towards my pfsense box. I then thought my existing static route in pfsense towards 192.168.10.2 would do the trick?

                1 Reply Last reply Reply Quote 0
                • P Offline
                  podilarius
                  last edited by

                  The MPLS from 192.168.100.0/22 has a routing for 192.168.11-12-13-14-15.0/24 towards 192.168.10.1

                  Does the MPLS have an IP address in both subnet one for each side? If so, then the firewall or default gateway at the remote site needs to use the corresponding 192.168.100. <whateveripattheremoteside>as the route to 192.168.10-15.0/24. The MPLS can then route 192.168.11-15.0/24 to 192.168.10.1/24.
                  pfsense would then have a route for 192.168.100.0/22 to 192.168.10.2/24 gateway.
                  You probably want to enable the "Bypass firewall rules for traffic on the same interface" option in the advanced config.
                  This should take care of your main network and any vlan on pfsense.
                  The remote sites are a little more tricky, but they have no chance of working if the pfsense vlan is not working. Once you have 10,11/24 networks working properly, then move on to remote sites 12-15/24. I would think they would only need a route as 100/22 to 10.1/24. Just like you would have setup for the 11.0/24 network.</whateveripattheremoteside>

                  1 Reply Last reply Reply Quote 0
                  • M Offline
                    Mike_swe
                    last edited by

                    Thanks again.

                    The MPLS have an ip on each side. The remote site has 192.168.100.1. For what i can tell here the routing seems ok since iam able to ping a host on the 192.168.10.0/24 net from my remote site and from my local site i can ping a host on the remote site of the mpls.

                    When iam running a tracert towars my vlan 192.168.11.0/24 from 192.168.100.0 i can see that the routing is in place in the mpls gateways but when it reaches my pfsense box it gets looped back towards 192.168.10.2 instead of going to my vlan host.

                    When i try to ping a host on the 192.168.100.0/22 net from my pfsense box i also get timeout. It feels like this could also be the reason for not be able to ping the pfsense inteface ip from my 192.168.100.0/22 net. Something must be wrong with my routing setup in my pfsense box.

                    It seems like the checkbox in advanced for the static route filtering doesnt do the trick.

                    1 Reply Last reply Reply Quote 0
                    • P Offline
                      podilarius
                      last edited by

                      Could you paste your routing table from pfsense?

                      1 Reply Last reply Reply Quote 0
                      • M Offline
                        Mike_swe
                        last edited by

                        default 87.96.188.1 UGS 0 408828554 1500 bce1
                        127.0.0.1 link#5 UH 0 1745058 16384 lo0
                        192.168.10.0/24 link#7 U 0 4131193 1500 bce0_vlan40
                        192.168.10.254 link#7 UHS 0 0 16384 lo0
                        192.168.11.0/24 link#8 U 0 370222006 1500 bce0_vlan30
                        192.168.11.254 link#8 UHS 0 0 16384 lo0
                        192.168.100.0/22 192.168.10.2 UGS 0 6 1500 bce0_vlan40

                        For the moment i have removed the ipsec connections towards my remote offices just for test purpose so now i only have my 2 vlans and my static route towards my mpls

                        1 Reply Last reply Reply Quote 0
                        • P Offline
                          podilarius
                          last edited by

                          What I find interesting is that you have this:
                          192.168.10.254  link#7  UHS  0  0  16384  lo0

                          I wonder if that is a function of VLAN, but it seems quite odd.

                          When you traceroute from 11.0/24 computer to 100.0/22, what does the route look like?

                          1 Reply Last reply Reply Quote 0
                          • M Offline
                            Mike_swe
                            last edited by

                            Sorry for the delay.

                            When i traceroute from 192.168.11.5 towards 192.168.100.23 it looks like this:

                            traceroute to 192.168.100.23 (192.168.100.23), 30 hops max, 60 byte packets
                            1  192.168.10.2 (192.168.10.2)  8.746 ms  8.737 ms  8.731 ms
                            2  * * *
                            3  * * *
                            4  * * *
                            5  * * *
                            6  * * *
                            7  * * *
                            8  * * *
                            9  * * *
                            10  * * *
                            11  * * *
                            12  * * *
                            13  * * *
                            14  * * *
                            15  * * *
                            16  * * *
                            17  * * *
                            18  * * *
                            19  * * *
                            20  * * *
                            21  * * *
                            22  * * *
                            23  * * *
                            24  * * *
                            25  * * *
                            26  * * *
                            27  * * *
                            28  * * *
                            29  * * *
                            30  * * *

                            1 Reply Last reply Reply Quote 0
                            • P Offline
                              podilarius
                              last edited by

                              Do you have the routing on 11.5 pointing directly to 10.2? If so, please remove that route and try again.

                              1 Reply Last reply Reply Quote 0
                              • M Offline
                                Mike_swe
                                last edited by

                                No, i do not have that route.

                                I only have a default route of that machine which points to 192.168.11.1 which is the default gateway of that vlan.

                                1 Reply Last reply Reply Quote 0
                                • P Offline
                                  podilarius
                                  last edited by

                                  What are the rules on that VLAN interface?

                                  1 Reply Last reply Reply Quote 0
                                  • M Offline
                                    Mike_swe
                                    last edited by

                                    On the 192.168.11.0 Vlan ive got

                                    Proto any From 192.168.11.0/24 Destination 192.168.100.0/22 Gateway 192.168.10.2
                                    Proto any From * Destination * Gateway *

                                    1 Reply Last reply Reply Quote 0
                                    • P Offline
                                      podilarius
                                      last edited by

                                      yeah, you want to remove that first rule. There is no need for policy routing.

                                      1 Reply Last reply Reply Quote 0
                                      • M Offline
                                        Mike_swe
                                        last edited by

                                        Hello again.

                                        Ive removed the policy routing line and now the tracert looks different but i cant find the jump towards 192.168.10.2

                                        root@srv10:~# traceroute 192.168.100.23
                                        traceroute to 192.168.100.23 (192.168.100.23), 30 hops max, 60 byte packets
                                        1  pfsense.domain.local (192.168.11.1)  0.135 ms  0.123 ms  0.157 ms
                                        2  * * *
                                        3  * * *
                                        4  * * *
                                        5  * * *
                                        6  * * *
                                        7  * * *
                                        8  * * *
                                        9  * * *
                                        10  * * *
                                        11  * * *
                                        12  * * *
                                        13  * * *
                                        14  * * *
                                        15  * * *
                                        16  * * *
                                        17  * * *
                                        18  * * *
                                        19  * * *
                                        20  * * *
                                        21  * * *
                                        22  * * *
                                        23  * * *
                                        24  * * *
                                        25  * * *
                                        26  * * *
                                        27  * * *
                                        28  * * *
                                        29  * * *
                                        30  * * *

                                        1 Reply Last reply Reply Quote 0
                                        • P Offline
                                          podilarius
                                          last edited by

                                          The jump to 192.168.10.2 should be in the routing/gateway submenu. (System -> Routing).
                                          There should be a gateway set on VLAN that contains 192.168.10.2 (bce_vlan40 by the look of it). Then a route setup using that gateway.
                                          Looking back over the thread, I see mention of a route in place, but it looks like it may have been part of the rule and not a actual route statement.

                                          Hope that helps.

                                          1 Reply Last reply Reply Quote 0
                                          • M Offline
                                            Mike_swe
                                            last edited by

                                            I feel like an idiot now.  :-[

                                            We had a power interuption today and i had to bring down the firewall for a few minutes. After the reboot everything works completly as expected.  :)  I have been working with servers and computers for to many years to remember and i know that a reboot is always a good way to eliminate errors. In this case i never thought of it.  :-[

                                            Thanks for the help and support podilarius.

                                            /Mike

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.