SV: [pfSense Support] triple wan to triple lan

2008-04-25 Thread Anders Dahl
Hi Chris or anyone who will help me...

I have followed the instructions and have partly succeded.

This is my setup:
fxp1 = Lan (this is used for management only)
fxp0 holds the following:
vlan0 = Lan_1
vlan1 = Lan_2
vlan2 = Lan_3
vlan3 = Wan
vlan4 = Wan_2
vlan5 = Wan_3

All these interfaces are connected to one physical port on a switch. Here it
is supplied with the xDSL- and Lan-connections.

I have made 1 rule for every LAN that will allow all traffic to leave
through its dedicated WAN (gateway).

I have tried with different rules to prevent Lan_1 users from leaving
through Wan_2 and Wan_3, and the same for Lan_2 and Lan_3, but nothing seems
to work.

If I for instance make these rules on the Lan_1 interface:
Lan_1 - any destination -through- Wan_2 [BLOCK]
Lan_1 - any destination -through- Wan_3 [BLOCK]
Lan_1 - any destination -through- Wan [ALLOW]

Then no traffic gets through. I completely loose contact with the router,
allthough I can still get an ip through dhcp.

What rules will I have to make to strictly separate the three networks?

Kind regards Anders 

-Oprindelig meddelelse-
Fra: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] På vegne af Chris
Buechler
Sendt: 17. april 2008 08:07
Til: support@pfsense.com
Emne: Re: [pfSense Support] triple wan to triple lan

On Thu, Apr 17, 2008 at 2:03 AM, Anders Dahl [EMAIL PROTECTED] wrote:

 I have one machine and 3 xdsl-connections. I want each of them being a
 gateway for it's own LAN. Shouldn't that be possible!?

Sure.


  I have succesfully created multiple WANs with one LAN, and thougt that it
 would be just about the same setup, but of cause with different manual
 outbound nat and firewall rules.
  But I can't make it work.


Don't use manual outbound NAT, the automatically generated rules are
fine no matter how many WANs you have. Disable it, it's much simpler
that way.

Then just define the appropriate WAN as the gateway in the firewall
rules on each LAN interface.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Failover problem

2008-04-25 Thread Bill Marquette
On Fri, Apr 25, 2008 at 12:36 AM, Martin Kruse Jensen [EMAIL PROTECTED] wrote:

  I still need to set the default lan - any rule to use the loadbalancetowan
 gateway right?

correct

  In http://pastebin.com/f36121457 i didn't
  but in http://pastebin.com/f10483182 i did change it

yep, looks like we aren't installing the reply-to logic on WAN for
some reason (probably cause nobody had a setup where machines on wan2
tried to connect to services on wan).  Can you file a bug on
cvstrac.pfsense.com for this, please?  Thanks

--Bill



  Martin

  Bill Marquette skrev:

  On Thu, Apr 24, 2008 at 4:22 AM, Martin Kruse Jensen [EMAIL PROTECTED] 
 wrote:


  The /tmp/rules.debug can be found at http://pastebin.com/m39a0c097

  Before getting /tmp/rules.debug i did the following:
  - Created failover gateway in Services - Load-balancer (loadbalancetowan)
  - Set the default lan - any rules gateway to loadbalancetowan
  - Set the firewall rules (created by nat) to use the gateway
 loadbalancetowan on both WAN's




 Yeah, don't do that. You need a NAT (rdr/port forward in this case)
 and filter rule per WAN, but don't change the gateway else you end up
 with non-sensical rules like:
 pass in quick on $wan route-to { ( vr0 10.33.56.1 ) } proto tcp from
 any to main port = 80 keep state label USER_RULE: NAT 
 and
 pass in quick on $StofaOPT1 route-to { ( vr0 10.33.56.1 ) } proto tcp
 from any to { 192.168.1.3 } port = 80 keep state label USER_RULE:
 NAT Stofatest

 which points the next hop INBOUND for this traffic to vr0 (which is
 your WAN in this case). ie. the traffic goes back outbound...bad.

 I still see no reply-to's in the ruleset, so I'm suspecting that we
 have an issue when dealing with rules on the default gateway, but fix
 those rules to use the default gateway and give us the output of
 rules.debug again if you are still having issues. Thanks

 --Bill

 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]

 For additional commands, e-mail: [EMAIL PROTECTED]




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] FreeRadius Package external mySQl database support

2008-04-25 Thread Adam Lowman
I was wondering is there anyway to use the pfSense FreeRadius package 
with an external mySQL database without having the configuration 
overwritten. This option might be helpful in the configuration GUI as 
well as supporting some of the other databases FreeRadius supports.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] CP Issue

2008-04-25 Thread Tim Dickson
Setting up the Rule to put traffic to the interface address out the default
gateway did not work

Setting the gateway to JUST the second WAN (non-loadbalance) failed

Setting the gateway to DEFAULT worked...  (With Squid running)

Any more ideas? I'd love to keep Load-Balancing!
(or is this another area where local services must always use the default
route?)
Thanks!
-Tim

PS... sorry about the html, the thread was plaintext until I responded to
your email which was html so it carried over, and I forgot to reset :(

-Original Message-
From: Scott Ullrich [mailto:[EMAIL PROTECTED] 
Sent: Thursday, April 24, 2008 10:46 AM
To: support@pfsense.com
Subject: Re: [pfSense Support] CP Issue

On 4/24/08, Tim Dickson [EMAIL PROTECTED] wrote:




 (I'll be back on site tomorrow and will test)

 So it would be on the GUEST LAN:



 Proto: TCP

 Source: GuestLan

 Destination: Interface Address ports 8000 and 8001

 Gateway: Default



 Or are you saying SOURCE should be the Interface address and port?



 I'll test his tomorrow and post back

 thanks!

Set the source to any, the interface would be the captive portal
interface.   Gateway default.   Looks good.

Scott
PS: please do not send html emails to public lists.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]