I'll follow your recommendations OPN -> replaces ISP router and VM for testing.
Thanks for your help.
Thanks for your help.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: meyergru on June 03, 2025, 10:45:02 AMIf you have a separate ONT available that can be used from OpnSense, why use the ISP router at all? What I am saying is: Why should you use two OpnSense boxes, when one suffices?
All of the discussed problems arise form the fact that you did not use OpnSense as your (only) router in the first place.
Quote from: EricPerl on June 02, 2025, 10:37:04 PMWith NAT on OPN, the ISP-router LAN is flat (all traffic coming for hosts in that subnet).
The main downside is that you lose visibility into the OPN LAN hosts. That's a feature at the edge router!
If you disable NAT on OPN, you end up propagating traffic with sources in OPN LAN into the ISP-router LAN.
You need to route that traffic back there:
* Internal-GW pointing to OPN WAN IP.
* static route OPN-LAN -> Internal-GW
You might be able to take care of that if your ISP router allows you to specify static routes.
Quote from: EricPerl on June 02, 2025, 07:19:40 PMAlso, I suspect outbound traffic to the current DNS router is bouncing off of the ISP router, unless reply-to has been disabled (FW advanced settings).
If you disable NAT on OPN, even if it's just for the ISP router LAN only, you'll have to route reply traffic back to OPN WAN, which is essentially choice a.
You might as well disable NAT completely at that point... Most of the work involved ends up being on the edge router (ISP router).
Quote from: meyergru on June 02, 2025, 05:26:21 PMObviously, you have a router-behind-router scenacrio, as indicated by your "WAN" having a non-routeable RFC1918 IP.
With these scenarios, you have but two choices to make them work:
a. You can set up a route on your ISP router to your internal LAN network. This is often infeasible.
b. You can set up your OpnSense to NAT outbound requests on its WAN interface. It seems you went that route.
Thus, all outbound connections will pass NAT, this includes requests for 192.168.1.0/24, because this is your WAN network. Presumably, your ISP router has 192.168.1.1 and your OpnSense has 192.168.1.5.
You could either help that by excluding 192.168.1.0/24 from NAT or, more transparently, by using 192.168.2.1 as your internal DNS server. I usually do it like that, anyway. Or, preferably, avoid router-behind-router scenarios altogether, if at all possible.