Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Wireless with VLAN not allowing traffic

    Scheduled Pinned Locked Moved General pfSense Questions
    81 Posts 5 Posters 18.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JKnottJ
      JKnott @dridhas
      last edited by

      @dridhas

      You create additional SSIDs and connect them to the VLANs.

      PfSense running on Qotom mini PC
      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
      UniFi AC-Lite access point

      I haven't lost my mind. It's around here...somewhere...

      D 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @johnpoz
        last edited by

        @johnpoz

        I wonder if VLANs over WiFi are supported in the specs. The only significant difference is the content of the Ethertype/length field, though an AP could easily be designed to block VLANs. These days, WiFi links are often used to connect different sites and you'd want the WiFi to be transparent to everything, including VLANs. I guess I'll have to do some experiments some time.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        D 1 Reply Last reply Reply Quote 0
        • D
          dridhas @JKnott
          last edited by

          @jknott Yes, SSID for 5g and 2.4g were created on the WAP and the corresponding VLAN in pfsense

          1 Reply Last reply Reply Quote 0
          • D
            dridhas @JKnott
            last edited by

            @jknott after created the VLANs in pfsense with their own dhcp/dns server and tagging the ports where the WAP and the main LAN cable are, the devices get connected successfully, but some websites are not accessible, like duckduckgo, if i untag the ports, duckduckgo works normally.

            johnpozJ JKnottJ 2 Replies Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @dridhas
              last edited by

              @dridhas said in Wireless with VLAN not allowing traffic:

              if i untag the ports, duckduckgo works normally.

              Sorry it doesn't work that way! You must be filtering differently on this interface then.. A network being tagged or untagged has ZERO to do with if a website is allowed or not, or works or not, etc. It just doesn't - PERIOD!!

              Not sure what rabbit hole you have lead yourself down - but tagged or not tagged has nothing to do with it.. If website works on network A, but not network B - then you have something different with dns, or filtering or firewall rules - it has zero to do with if the network is tagged or untagged.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              D 1 Reply Last reply Reply Quote 0
              • D
                dridhas @johnpoz
                last edited by dridhas

                @johnpoz yeah, i mightve done something to mess up that particular vlan...

                after i nuked pfsense im planning on recreating one VLAN and test it and go from there.

                ideal layout would be to have a vlan for IoT devices, one for 2.4g and one for 5g wifi

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @dridhas
                  last edited by

                  @dridhas if something isn't working on vlan X or network Y.. Then troubleshoot that thing - not that its tagged or not tagged.

                  If there was something wrong with the tagging - then nothing would work.. There is no possible way the tag could effect some websites not working while others do - just not possible.

                  If you had your tagging messed up - then you wouldn't be on that network..

                  You flipping your client to network Y and works, but move it to network X and something doesn't work - then troubleshoot that something. Firewall rule, dns - something, zero to do with X being a tagged vlan or untagged network/vlan.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  D 1 Reply Last reply Reply Quote 0
                  • D
                    dridhas @johnpoz
                    last edited by

                    @johnpoz based on that comment:
                    ive seen these 2 options:
                    d38cd56a-3d8f-4b1b-a5a4-52bf1581987e-image.png
                    i have those enabled on the WAN interface, would they also need to be on the LAN + additional VLANs?
                    im unsure if i had them there before.

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @dridhas
                      last edited by

                      @dridhas said in Wireless with VLAN not allowing traffic:

                      would they also need to be on the LAN + additional VLANs?

                      What does it say right there on them ;)

                      blocks.jpg

                      Are you using public space on your lan and vlans? I have to assume your using rfc1918 space.. Which you feel you need to hide with your x.x.50.x ? Or did you pull public space out of thin air and and think you could use it on your local networks? That could cause you not to get to some websites, if the network overlaps with what their public IP.

                      Bogon would never be used internally..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      D 1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @dridhas
                        last edited by

                        @dridhas said in Wireless with VLAN not allowing traffic:

                        like duckduckgo, if i untag the ports, duckduckgo works normally

                        VLANs wouldn't do that. Your problem is elsewhere. The VLAN tags don't make it beyond pfsense, so the other end wouldn't know you're using them.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        D 1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          There's no mystery here. It works when you untag VLAN 50 at the switch because that just puts it in the LAN subnet.
                          When it's correctly tagged all clients using it are in the VLAN 50 subnet and use the DHCP you have have configured for that with whatever settings that has. That includes whatever DNS you are passing there.

                          Previously you said clients in VLAN 50 are not able to resolve those sites, which is clearly a DNS issue, but did you mean just unable to connect?

                          I agree, if you used a public subnet for VLAN 50 that could conflict with the real public IPs and cause this.

                          Steve

                          1 Reply Last reply Reply Quote 0
                          • D
                            dridhas @johnpoz
                            last edited by

                            @johnpoz no, im not using a public ip, i got lazy to type the whole ip, but it is 192.168.50.x for VLAN 50

                            1 Reply Last reply Reply Quote 0
                            • D
                              dridhas @JKnott
                              last edited by

                              @jknott im starting to believe that there is a DNS configuration error or a DNS conflict.

                              on the VLAN in pfsense i used 208.67.222.222 and 1.1.1.1 which are the same for the DNS Server settings under System > General Setup:
                              521c4e51-5ab8-4234-8dee-a2b8a11a5efc-image.png

                              not sure if that could possible conflict.

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @dridhas
                                last edited by

                                @dridhas said in Wireless with VLAN not allowing traffic:

                                not sure if that could possible conflict.

                                Bad idea to use 2 different dns that can respond differently - 222.222 does filtering, while 1.1.1.1 does not..

                                If your going to have clients or forward to dns, you need to make sure they will always answer in the same way. One that filters and one that doesn't is not good idea - unless you are 100% sure they filter the exact same stuff. Since you can never be sure when more than 1 NS is provided to use, you have no idea which 1 will actually be used for any specific query.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                JKnottJ 1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by stephenw10

                                  Yeah, try just not specifying any DNS servers in the DHCP config for VLAN 50. Clients will use the interface IP and hence Unbound in pfSense by default.

                                  What do you have set for DNS in the LAN DHCP settings?

                                  The servers you have defined in General Setup are probably not being used unless you have set the resolver to forwarding mode.
                                  But if you have you also have 'DNS Server Overide' set so your ISPs DNS servers might be in use.

                                  Steve

                                  D 1 Reply Last reply Reply Quote 0
                                  • D
                                    dridhas @stephenw10
                                    last edited by

                                    @stephenw10 this is what i have on the DNS Server for VLAN 90 (i created a new one) and on LAN aeee0c24-7045-4dce-a0fe-7e2f8670275f-image.png

                                    and this is what i just did on the WAP:
                                    54a7df41-24aa-4322-82dd-d64ca1b60462-image.png

                                    and on the switch:
                                    b1693342-106d-49e9-8647-2d3dd020155d-image.png

                                    This way, the device can connect to VLAN 90 and it gets the correct ip address as i can see it on the DHCP Leases with the correct IP:
                                    f572f836-496a-4575-a307-6e26940f6e36-image.png
                                    0e309bcc-471e-4d6a-8095-aa9a085481df-image.png

                                    now, i cant get out to the internet on that VLAN... hehehe

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @dridhas
                                      last edited by johnpoz

                                      @dridhas And what firewall rules did you put on this interface? is Unbound listening on that interface? When you create a new interface/vlan unlike lan, there will be no rules. So no until you create rule(s) to allow stuff nobody on that network is going anywhere.

                                      Are you using automatic outbound nat, etc. Seen many a user following some "guide" on the internet for some vpn service switch their outbound rules to manual.. Which then no adding a new network/vlan is not going to work until outbound nat has been created for this new network, etc.

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      D 1 Reply Last reply Reply Quote 0
                                      • D
                                        dridhas @johnpoz
                                        last edited by

                                        @johnpoz this is what im seeing on the firewall logs:
                                        162e8513-bbe4-450a-87df-ac9e525eb4a7-image.png
                                        b05e4046-732a-4776-90bf-5d8dff3e9e16-image.png

                                        this is the Firewall rule for that particular VLAN:
                                        1847c6f5-a620-4f10-9a31-4f062633113d-image.png

                                        im trying to find that rule somewhere.

                                        johnpozJ 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @dridhas
                                          last edited by johnpoz

                                          @dridhas and how would Lan Net be source of your wirelesstest net?? The source would be wirelesstest net

                                          The default deny is on every interface (hidden) - if traffic is not allowed by a rule, then it would always be denied by the default rule.

                                          192.168.90 is not Lan Net, so that rule would not match, and traffic would be blocked by the default deny.

                                          Looks like you copied the default rule over - but did not change the source to the appropriate network for this interface.

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          D 1 Reply Last reply Reply Quote 0
                                          • D
                                            dridhas @johnpoz
                                            last edited by

                                            @johnpoz yes, you are correct, i copied the rule over to the new VLAN.

                                            after the change the traffic is flowing, but then again some sites are unreachable like duckduckgo among others.

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.