Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Routing different subnets from multiple sources

    Scheduled Pinned Locked Moved Routing and Multi WAN
    6 Posts 2 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C Offline
      commgdog
      last edited by

      Hello all:

      I have a unique situation involving a lot of weird nonsense contracts which leaves me with two firewalls.

      I have my primary router/firewall as a pfSense machine and a secondary router/firewall as a SonicWALL TZ210.

      The only thing that is behind the sonic wall is a single server, where as the rest of my network (Wifi, workstations, etc) is done through pfsense.

      Each firewall has its own WAN IP.

      The server behind the SonicWALL has a LAN IP of 10.196.54.132 in the network 10.196.54.128/26

      My workstations are behind the pfSense machine with various IP's within the network 10.1.10.0/24

      Both networks leave their respective firewalls and head out to a switch on a VLAN (Both in the same VLAN) and eventually end up at workstations.

      Here is what I am looking for:

      I need to have the workstations on the 10.1.10.0/24 network be able to see the server on the 10.196.54.128/26 network.

      I tried setting up an IPsec tunnel to connect the firewalls, but the latency of the tunnel was causing software issues with the proprietary software behind the SonicWALL.

      Here is a map of the physical layout

      WAN -> pfSense (10.1.10.0/24) –------->  Switch (VLAN 10 ON BOTH) --> Workstation (10.1.10.103)
              |                                                        |    |
              -> SonicWall (10.196.54.128/26) –----|    |--->  Server (10.196.54.132)

      Somehow the workstation needs to be able to see the server.

      1 Reply Last reply Reply Quote 0
      • C Offline
        commgdog
        last edited by

        I have found the solution to my problem.

        I added a virtual IP alias within pfSense with an IP address that matches my gateway in the sonic wall (with /26 mask bit).

        I then added the proper firewall rules on the pfSense and SonicWALL box.

        Finally, I added proper outbound NAT rules on pfSense.

        NAT Rule 1: Source - 10.1.1.0/24, NAT Address - WAN NAT Rule 2: Source - 10.196.54.128/26, NAT Address - 10.196.54.129 (Virtual IP Alias)

        Rebooted both devices for good measure, and it worked!

        What's funny is that I did this exact thing initially, but for some reason it did not work (maybe I wasn't patient enough?). Tried it again 8 hours later and it worked. Networking can be interesting some time.  :)

        1 Reply Last reply Reply Quote 0
        • C Offline
          commgdog
          last edited by

          I think I got ahead of my self with this one.

          Although my solution (somewhat) works, since I set the Virtual IP to the same IP as the SonicWALL gateway, I get a collision of some kind with the IP's which causes all sorts of networking issues. I changed the Virtual IP to one up in the range (10.196.54.130) which is an unused IP, but now my pfSense network (10.1.10.0/24) can't see my SonicWALL network (10.196.54.128/26), where as it worked fine with the gateway IP.

          When I browse to the Virtual IP of 10.196.54.130 from my pfSense network, I get the login page for pfSense.

          I'm somewhat lost on a solution to this one.

          1 Reply Last reply Reply Quote 0
          • DerelictD Offline
            Derelict LAYER 8 Netgate
            last edited by

            Both networks leave their respective firewalls and head out to a switch on a VLAN (Both in the same VLAN) and eventually end up at workstations.

            Unsound network design leads to unsound results.  Having two IP networks on one network segment usually leads to sadness and despair.

            This is simply going to be a problematic routing situation because of the two gateways.  The solution I would suggest is to take an interface on each router and connect the two routers in a point-to-point fashion.  You can then set one default gateway on each network segment and tell the two routers to route the LANs between them, firewalling only specific traffic if you need to.  Do you have another interface in each router?  You could use a third VLAN (You should have two already) if you don't (and the SonicWALL does that - it's been a while for me).

            This is assuming you really can't put everything behind pfSense and ditch the SonicWALL or vice versa and a VPN really isn't an option.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • C Offline
              commgdog
              last edited by

              @Derelict:

              Both networks leave their respective firewalls and head out to a switch on a VLAN (Both in the same VLAN) and eventually end up at workstations.

              Unsound network design leads to unsound results.  Having two IP networks on one network segment usually leads to sadness and despair.

              This is simply going to be a problematic routing situation because of the two gateways.  The solution I would suggest is to take an interface on each router and connect the two routers in a point-to-point fashion.  You can then set one default gateway on each network segment and tell the two routers to route the LANs between them, firewalling only specific traffic if you need to.  Do you have another interface in each router?  You could use a third VLAN (You should have two already) if you don't (and the SonicWALL does that - it's been a while for me).

              This is assuming you really can't put everything behind pfSense and ditch the SonicWALL or vice versa and a VPN really isn't an option.

              I took your advice to separate them out in vlans and use an interface on each machine to link them, but it has caused a new issue.

              Network 1 - pfSense 10.0.10.0/24

              Network 2 - SonicWALL 10.196.54.128/26

              On the pfSense side, I have added an interface with a static IP of 10.196.54.130 (unused IP on the network). I made a new gateway on the pfSense box attached to that interface with a gateway IP of 10.196.54.129 (The same gateway as the SonicWALL network).

              On the SonicWALL side, I have added an interface with a static IP of 10.1.10.2 (unused IP on the network). I made a new gateway on the SonicWALL box attached to that interface with a gateway IP of 10.1.10.1 (The same gateway as the pfSense Network).

              I then added firewall rules to allow all traffic between each.

              At this point it works, somewhat. From the 10.1.10.0/24 network, I can ping machines on the 10.196.54.158 network, I can browse windows shares on that network, etc. All seems to work.

              On the other side (The 10.196.54.128/26 network) I can ping machines on the 10.1.10.0.24 network, but I cannot browse windows shares, I was able to add a network printer on the machine with an IP of 10.196.54.158 (Printer IP: 10.1.10.201), but it will not print.

              My thoughts where the firewall rules, but I have it set to allow all from all on both sides.

              Any thoughts on to why I am able to ping, but I cannot do anything else?

              Firewall logs on pfsense seem to show that traffic is being blocked, my guess is that it has to do with asymmetric routing? I enabled the option to bypass firewall rules from the same interface, but it doesn't seem to work.

              1 Reply Last reply Reply Quote 0
              • DerelictD Offline
                Derelict LAYER 8 Netgate
                last edited by

                The link between the two should be a new subnet on a new interface/vlan interface, not something out of one of the existing ones.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.