Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN won't communicate with LAN

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    58 Posts 5 Posters 12.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      DjJoakim @bingo600
      last edited by

      @bingo600 Hey!
      Thanks for you'r questions and for taking the time to help me.
      First and all, i am very new to this - so everything dosen't make sense for now, and i have a friend that is trying to help me, so he has done some of the rules.

      1. I am just trying every possible way to make it work, so even if it seems strange, i open up to every possible way for the networks to communicate.

      2. Same here as the above, i am trying to open up every possible senario to make the networks communicate.

      3. The PoolVPN is something my friend helped me set up, as for now - the VLAN don't work since they cant communicate, so everything on my network runs on LAN (192.168.1.x) and to make those devices not access internet except they go through the vpn client, he did that PoolVPN thing. The reason it's a gear wheel is becouse he added some tag, to make the network block if the devices somehow don't go through vpn client, here is the settings for PoolVPN and the meaing of that "gear wheel"
        How can i enable logging?

      cog.png

      And here is what's behind "PoolVPN"

      pool.png

      Thanks

      bingo600B 2 Replies Last reply Reply Quote 0
      • bingo600B
        bingo600 @DjJoakim
        last edited by

        @djjoakim

        Enable logging on rules by editing it (pencil) , and click this one.

        e410cbd1-a0d1-4bc6-b30e-4d768175947d-image.png

        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

        pfSense+ 23.05.1 (ZFS)

        QOTOM-Q355G4 Quad Lan.
        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

        D 1 Reply Last reply Reply Quote 1
        • D
          DjJoakim @bingo600
          last edited by

          @bingo600 Thank you, will do.

          1 Reply Last reply Reply Quote 0
          • bingo600B
            bingo600 @DjJoakim
            last edited by bingo600

            @djjoakim

            Let's take LAN

            437b0845-17cb-4a4d-91fd-813706c3aa2d-image.png

            Disable the Top rule by clicking the "No parking icon" , it wont delete the rule just disable it.
            03acf454-b374-4eda-bd4b-bfc69850f1c0-image.png

            You can enable it again by clicking the "ok" icon that will be shown instead of the "no parking".

            What happens here after first rule is disabled....
            Is that ANY ip in either of the VPNxx lists will be "Policy routed" aka "Forced out of" the gateway the rule points to. The "Deny rule below" is tagging the packet , prob. so that : If the VPN Gateway (above) goes down , the tagged package is not allowed to exit via normal wan.

            If the IP is NOT in those VPN lists the package is allowed to go "anywere" including to wifi or exit via wan.

            This means that ANY IP in those lists will not be able to go to wifi , as they match the "Exit via VPN policy" before they hit the bottom allow lan to anywhere rule.

            Do you (from a wifi unit) test or ping a device on Lan that is not on the POOL lists ??
            Else you will never get an ansver.

            If what you wanted was to allow anything on lan to be able to talk to units on wifi (all local RFC1918 IP's) , and still have those in the pool exit via vpn's.

            You should reenable the top rule , but change it's source to Lan net .

            You will hopefully never see a source ip of Fast Lan , on your Lan.
            So that rule won't do much good on lan ... aka never match.

            /Bingo

            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

            pfSense+ 23.05.1 (ZFS)

            QOTOM-Q355G4 Quad Lan.
            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

            D 1 Reply Last reply Reply Quote 0
            • D
              DjJoakim @bingo600
              last edited by DjJoakim

              @bingo600 Thank you for taking the time, the thing is - the PoolVPN only exist for now since my VLAN don't work as they should. And yes, the devices are now on LAN network, 192.168.1.x, so just like you said, all those that are in the PoolVPN is allowed except they don't go though the wrong wan exit, and then they are banned - that works fine, but that's not what i am after.
              The devices that now are in PoolVPN and PoolVPNEJ is going to the Vlan. The devices in PoolVPN is going to VLAN30 = 172.18.0.1 (FAST) and the devices on PoolVPNEJ is going to VLAN40 = 172.19.0.1 (EJFAST)

              So they should not be botherd by the PoolVPN rule since they don't belong in that Aliases. So the question still remains, why does the devices on FAST access internet but i can't access them from my LAN network..

              Thanks

              bingo600B 1 Reply Last reply Reply Quote 0
              • bingo600B
                bingo600 @DjJoakim
                last edited by bingo600

                @djjoakim said in VLAN won't communicate with LAN:
                in that Aliases. So the question still remains, why does the devices on FAST access internet but i can't access them from my LAN network..

                Now you are changing the goal ....
                You mentioned Lan to WiFi ... Does that work.

                I think you need to describe what it is you want to end up with , not strange "quirks" you have made because , you couldn't get it to work.

                Edit: And what does go to 172.18.0.1 mean ???
                Should they get policy routed to 172.18.0.1 ?
                Should they "just" be allowed to communicate with 172.18.0.1 or ??

                Back in my IBM Mainframe days IBM's APAR Team would the pressed the (in)Famous - More Documentation is required ... button , in a situation like this

                If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                pfSense+ 23.05.1 (ZFS)

                QOTOM-Q355G4 Quad Lan.
                CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                D 1 Reply Last reply Reply Quote 0
                • D
                  DjJoakim @bingo600
                  last edited by

                  @bingo600 No, i am not changing the goal - this is exacly what i was trying to explain in my main post, i only used the WIFI example for johnpoz response, since the wifi wasn't forced out of any gateway. (Since he said the problem was becouse of that on FAST interface)
                  Anyway, i am sorry for the confusion - not having english as my first language sometimes makes everything 10x harder aswell. I will try and explain exacly what's my plan is:
                  (Ignore all that PoolVPN for now, since that's "quirks")

                  I have 3 VLAN networks.
                  VLAN30 (FAST) 172.18.0.1
                  VLAN40 (EJFAST) 172.19.0.1
                  VLAN60 (WIFI) 10.0.0.1

                  And then there is my LAN network 192.168.1.1

                  So all devices placed under VLAN30 and VLAN40 must be forced through different VPN Clients, they can not leak into my orignal WAN.
                  Everything so far seems to work, all devices i place under VLAN30 can access internet fine, but i can't access them thought my PC that's placed in LAN.
                  (Some devices that will be in VLAN30 have webui witch i need to access from my PC, that's why i need to access some of the IP adresses)

                  Now, when i have changed some of the settings (see pic below) i can ping my PC (192.168.1.103) from one device on FAST (172.18.0.124), but i can't ping 172.18.0.124 from my pc (192.168.1.103).
                  So somehow, i managed to get it working one way, but not the other way back.. And i can't figure out what i have done wrong.

                  ping.png

                  Thanks

                  bingo600B 1 Reply Last reply Reply Quote 0
                  • bingo600B
                    bingo600 @DjJoakim
                    last edited by bingo600

                    @djjoakim

                    The config you showed above , ought to work for LAN <--> FAST.
                    Have you tried to reboot the firewall , or "Clear the states" ?

                    f63cfd89-9e9d-4798-bc67-79bb20b9f1f0-image.png

                    And it seems you haven't enabled loggong on all the "deny" lines , that can be super helpfull during debugging an issue like this.

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    D 1 Reply Last reply Reply Quote 1
                    • D
                      DjJoakim @bingo600
                      last edited by DjJoakim

                      @bingo600 Yes i just did that, and still dosen't work..
                      I have also tried to make the same rules for WIFI, just to be sure there was nothing wrong with the device on FAST that i tried to ping, but the problem remains - i can ping LAN but i can't ping the VLAN..
                      Edit: Hmmm.. Now i can access FAST from WIFI (VLAN60), but i can't reach WIFI from FAST, So, in this equation the problem is on the other way.
                      LAN - FAST Can't ping
                      FAST - LAN Can ping
                      FAST - WIFI Can't ping
                      WIFI - FAST Can ping

                      Sorry, i have now enabled the logging for those.

                      strang.png

                      Thanks

                      bingo600B 1 Reply Last reply Reply Quote 0
                      • bingo600B
                        bingo600 @DjJoakim
                        last edited by

                        @djjoakim

                        What can you ping from Lan (your 192.168.1.103)

                        Can you ping 192.168.1.1
                        Can you ping 10.0.0.1
                        Can you ping 172.18.0.1

                        How does your RFC1918 definition look

                        /Bingo

                        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                        pfSense+ 23.05.1 (ZFS)

                        QOTOM-Q355G4 Quad Lan.
                        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                        D 1 Reply Last reply Reply Quote 0
                        • D
                          DjJoakim @bingo600
                          last edited by

                          @bingo600 Hmm, strange.
                          I did an edit on my last post, i tried to "reduce" the issue so i tried the same thing on my other vlan, WIFI. And when i did that, the problem is on the other way. From WIFI i can reach FAST, but from FAST i can't reach WIFI, something is really strange here.

                          To answer you'r question, from my PC (LAN) i can only ping 192.168.1.1, it dosen't respond on anything else. (While on my WIFI, i can ping 172.18.0.1, 172.19.0.1, 192.168.1.1, and the same on FAST)
                          Sorry, i am not trying to confuse the situation by starting to talk about the WIFI vlan, i just think it's strange that the problem is on the other way around there.

                          Anyways, here is my RFC1918

                          RFC.png

                          D bingo600B 2 Replies Last reply Reply Quote 0
                          • D
                            DjJoakim @DjJoakim
                            last edited by DjJoakim

                            Hmm okey, well - forget about that WIFI connection, i used my brain and figured out that it probably had something with windows firewall to do, said and done - when i turn off the firewall on that WIFI device, i can reach it from FAST - so clearly it was something wrong at that side.
                            So, since everything works with the firewall settings in that VLAN, it seems like there is something really wrong with my LAN, and maybe not PFsense fault...

                            1 Reply Last reply Reply Quote 0
                            • bingo600B
                              bingo600 @DjJoakim
                              last edited by bingo600

                              @djjoakim

                              That RFC1918 rule is outright "Sick" .....

                              RFC1918 should be defined like this.

                              db8e178f-45e9-4b06-9ded-8b21d275c158-image.png

                              Dammm šŸ¤•

                              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                              pfSense+ 23.05.1 (ZFS)

                              QOTOM-Q355G4 Quad Lan.
                              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                              D 2 Replies Last reply Reply Quote 1
                              • D
                                DjJoakim @bingo600
                                last edited by

                                @bingo600 I followed this "guide" https://docs.netgate.com/pfsense/en/latest/multiwan/policy-route.html#bypassing-policy-routing
                                Isn't it how i should do it? šŸ˜“

                                bingo600B 1 Reply Last reply Reply Quote 0
                                • D
                                  DjJoakim @bingo600
                                  last edited by

                                  @bingo600 Ooops.. Well, fixed now 😌

                                  1 Reply Last reply Reply Quote 0
                                  • bingo600B
                                    bingo600 @DjJoakim
                                    last edited by bingo600

                                    @djjoakim

                                    @djjoakim said in VLAN won't communicate with LAN:

                                    @bingo600 I followed this "guide" https://docs.netgate.com/pfsense/en/latest/multiwan/policy-route.html#bypassing-policy-routing
                                    Isn't it how i should do it? šŸ˜“

                                    Yes but do as they write

                                    1e365ef8-90ba-4529-b768-97eb2d39db65-image.png

                                    Can i see your RFC1819 rule now please

                                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                    pfSense+ 23.05.1 (ZFS)

                                    QOTOM-Q355G4 Quad Lan.
                                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                    D 1 Reply Last reply Reply Quote 1
                                    • D
                                      DjJoakim @bingo600
                                      last edited by

                                      @bingo600 Yeah sorry, i am new to this.. one step at a time šŸ¤•

                                      wwwww.png

                                      bingo600B 1 Reply Last reply Reply Quote 0
                                      • bingo600B
                                        bingo600 @DjJoakim
                                        last edited by

                                        @djjoakim

                                        Would work ...

                                        But please don't call it RFC1918

                                        Call it LOCAL_LANS or something

                                        RFC1918 is

                                        eab4cefd-fbb2-449b-a019-ded9828ff129-image.png

                                        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                        pfSense+ 23.05.1 (ZFS)

                                        QOTOM-Q355G4 Quad Lan.
                                        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                        D 1 Reply Last reply Reply Quote 0
                                        • D
                                          DjJoakim @bingo600
                                          last edited by

                                          @bingo600 Yep, changed it... I saw RFC1918 was on the "WAN" rule, so i didn't wan't to confuse it, so now it's called Local_lan.

                                          bingo600B 2 Replies Last reply Reply Quote 0
                                          • bingo600B
                                            bingo600 @DjJoakim
                                            last edited by

                                            @djjoakim

                                            The guy making this RFC1918 Alias should be ....... 😠

                                            I'm 90% sure that every "professional" in here would expect a RFC1918 alias to contain :

                                            65369e94-f7c3-4f98-93bd-1103e4cde87b-image.png

                                            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                            pfSense+ 23.05.1 (ZFS)

                                            QOTOM-Q355G4 Quad Lan.
                                            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                            1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.