Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to make DNS lookups go to only to Tier1 link in multi-WAN failover?

    Scheduled Pinned Locked Moved DHCP and DNS
    12 Posts 5 Posters 2.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J Offline
      jarlel
      last edited by

      Thanks, phil.davis.

      I already have the "Allow default gateway switching" enabled, but must try this with no gateway for the DNS-servers.

      I see now that this issue is mentioned in chapter 12 of the pfSense book:

      "In pfSense 2.0 and higher, it is now possible to direct traffic from the firewall itself into gateway groups using floating rules, allowing local services to take advantage of failover."

      Is this a better alternative? To direct DNS-requests into the gateway group with a floating rule? What then about direction, choice of interface and the "Quick" setting?

      1 Reply Last reply Reply Quote 0
      • J Offline
        jarlel
        last edited by

        I have now tried this with no gateway for the DNS-servers. pfSense still send DNS-requests out on the Tier2 WAN even if Tier1 is active/available.

        Maybe this is an alternative that works:

        "In pfSense 2.0 and higher, it is now possible to direct traffic from the firewall itself into gateway groups using floating rules, allowing local services to take advantage of failover."

        ?

        What then about direction for the traffic in the rule, choice of interface and the "Quick" setting?

        1 Reply Last reply Reply Quote 0
        • P Offline
          phil.davis
          last edited by

          Indeed it sounds good, but I would be guessing about the settings, and the book does not actually have an example of such a rule (that would be a good addition to the book!). I have a feeling this is on the forum somewhere, but can't see it right now. Do a bit of searching and post back when you find the right answer ;)

          As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
          If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

          1 Reply Last reply Reply Quote 0
          • luckman212L Offline
            luckman212 LAYER 8
            last edited by

            Does anyone have a good guide on how to configure a Floating Rule in 2.2.x such that specific traffic FROM the firewall ITSELF (e.g.  a DNS lookup or an outbound SMTP connection on port 25 for an email alert) can be directed to use a Gateway Group?  I have struggled playing with different settings but no matter what I do it isn't working, traffic is either blocked or gets routed via the default gateway.  Testing on 2.2.5.

            1 Reply Last reply Reply Quote 0
            • luckman212L Offline
              luckman212 LAYER 8
              last edited by

              I still can't get this to work.  I am tearing out my last hair.  Floating rule just seems to be ignored.

              Here's a netstat -rn after yanking the WAN1 plug…
              I note there is no default ipv4 gateway.
              But I do have a floating rule defined for "This firewall (self)" --> tcp/udp port 53 (dns) and tcp port 2525 (smtp server) ... yet that does not function.

              Screenshots attached as well

              
              Routing tables
              
              Internet:
              Destination        Gateway            Flags      Netif Expire
              4.2.2.2            74.66.0.1          UGHS       igb2
              24.29.99.36        74.66.0.1          UGHS       igb2
              74.66.0.0/21       link#3             U          igb2
              74.66.2.133        link#3             UHS         lo0
              127.0.0.1          link#7             UH          lo0
              192.168.20.0/24    link#1             U          igb0
              192.168.20.1       link#1             UHS         lo0
              
              Internet6:
              Destination                       Gateway                       Flags      Netif Expire
              default                           fe80::217:10ff:fe88:498d%igb2 UGS        igb2
              ::1                               link#7                        UH          lo0
              2604:2000:400:4::/64              link#3                        U          igb2
              2604:2000:c00:4::/64              link#3                        U          igb2
              2604:2000:1404:b0::/64            link#1                        U          igb0
              2604:2000:1404:b0:208:a2ff:fe09:9bd1 link#1                        UHS         lo0
              2604:2000:ffc0:4::/64             link#3                        U          igb2
              2604:2000:ffc0:4:1005:cbc0:8afb:fba0 link#3                        UHS         lo0
              fe80::%igb0/64                    link#1                        U          igb0
              fe80::1:1%igb0                    link#1                        UHS         lo0
              fe80::%igb1/64                    link#2                        U          igb1
              fe80::211:22ff:fe33:4455%igb1     link#2                        UHS         lo0
              fe80::%igb2/64                    link#3                        U          igb2
              fe80::208:a2ff:fe09:9bd3%igb2     link#3                        UHS         lo0
              fe80::%lo0/64                     link#7                        U           lo0
              fe80::1%lo0                       link#7                        UHS         lo0
              ff01::%igb0/32                    2604:2000:1404:b0:208:a2ff:fe09:9bd1 U          igb0
              ff01::%igb1/32                    fe80::211:22ff:fe33:4455%igb1 U          igb1
              ff01::%igb2/32                    fe80::208:a2ff:fe09:9bd3%igb2 U          igb2
              ff01::%lo0/32                     ::1                           U           lo0
              ff02::%igb0/32                    2604:2000:1404:b0:208:a2ff:fe09:9bd1 U          igb0
              ff02::%igb1/32                    fe80::211:22ff:fe33:4455%igb1 U          igb1
              ff02::%igb2/32                    fe80::208:a2ff:fe09:9bd3%igb2 U          igb2
              ff02::%lo0/32                     ::1                           U           lo0
              
              

              floating rule (couldn't fit the whole thing on my screen, but the "HA_route" gateway is selected for this under advanced)

              alias for port 53/2525

              system-general

              gateway group

              1 Reply Last reply Reply Quote 0
              • luckman212L Offline
                luckman212 LAYER 8
                last edited by

                According to JimP (redmine #5476) getting this to work involves some fiddling with Outbound NAT. That isn't one of my strong areas. Has anyone got a working config they would be willing to share (with screenshots) of a Floating rules config that routes specific traffic originating from the Firewall (self) via a Gateway Group?

                1 Reply Last reply Reply Quote 0
                • luckman212L Offline
                  luckman212 LAYER 8
                  last edited by

                  In Jim Pingle's last pfSense Hangout on Multi-WAN with 2.3, I am pretty sure he just outright states that it is not possible to use policy-based routing for traffic originating from the firewall itself.  So I am posting a followup question/idea :

                  Would it work to install & bind the Postfix package to the "LAN" IP, and then enter this IP as the SMTP server under System > Advanced? Would the mail alerts then be subjected to NAT and thus be able to make use of Policy routes?  Maybe I will try…

                  edit: nevermind.  I see at https://redmine.pfsense.org/issues/5374 that this package is basically dead in the water as of 2.3  :(

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ Offline
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    This thread is really OLD… But if your using a forwarder, why would you not just create normal routes to use a specific interface first.  Why would you want/need to do this in a firewall rule?

                    With forwarder or smtp I would think you are using a specific or list of specific IPs.  If you create specific route for the IP you want to go to that sends it out wan1 why would it not use that, if wan1 was down wouldn't it just use whatever default route it has to try and get there because now the interface the specific route is on is down.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

                    1 Reply Last reply Reply Quote 0
                    • luckman212L Offline
                      luckman212 LAYER 8
                      last edited by

                      The problem I'm trying to solve is

                      1. allow firewall to send out smtp alerts when either wan1 or wan2 goes down
                      2. firewall has multiple "local" gateways that are not internet-facing, so I can't use the "enable default gateway switching" option
                      1 Reply Last reply Reply Quote 0
                      • K Offline
                        kassu
                        last edited by

                        @jarlel:

                        I have a setup with several LANs and two WANs. The WANs are set up with failover were WAN1 is Tier1 and WAN2 is Tier2.
                        I don't want any traffic to go over WAN2 before WAN1 goes down.

                        This looks similar to what I've described at https://forum.pfsense.org/index.php?topic=126017
                        Did you find a solution for DNS using active tier only?

                        If not, would you be able to test if this works for you?
                        https://github.com/pfsense/pfsense/pull/3592

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.