1
General Discussion / Re: Best Practice: OPNsense multiple LAN as double NAT behind ISP router
« on: September 10, 2024, 02:45:00 pm »
Thank you for your quick response.
The ISP router is a FritzBox, with port forwarding configured to direct traffic to OPNsense.
The OPNsense router has four individual interfaces, each connected to completely separate networks (so no VLANs)
I assumed that setting the OPNsense as the default gateway for the 10.10.x.0/24 networks would be enough, since it has routes to all networks and knows the FritzBox as the internet gateway.
For VPN access, I’m using WireGuard, which is currently configured as a separate interface, with a rule allowing access to all networks and the internet.
But strangely i don't can access the server 10.10.10.5 even when i can access the webinterface of OPNsense at 10.10.10.1
However, I’m having difficulty configuring the firewall rules correctly to provide internet access to the servers on each network and also keep them seperated. HAProxy seems to be working fine, as I can access the VPN without issues.
You cannot have 192.168.178.0/24 as the inter-router LAN and 192.168.0.1 / 192.168.0.102 as the endpoint IPs.Sry 192.168.0./24 was my old network, i corrected my post
The ISP router is a FritzBox, with port forwarding configured to direct traffic to OPNsense.
The OPNsense router has four individual interfaces, each connected to completely separate networks (so no VLANs)
I assumed that setting the OPNsense as the default gateway for the 10.10.x.0/24 networks would be enough, since it has routes to all networks and knows the FritzBox as the internet gateway.
For VPN access, I’m using WireGuard, which is currently configured as a separate interface, with a rule allowing access to all networks and the internet.
But strangely i don't can access the server 10.10.10.5 even when i can access the webinterface of OPNsense at 10.10.10.1
However, I’m having difficulty configuring the firewall rules correctly to provide internet access to the servers on each network and also keep them seperated. HAProxy seems to be working fine, as I can access the VPN without issues.