Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN won't communicate with LAN

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    58 Posts 5 Posters 12.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bingo600B
      bingo600 @DjJoakim
      last edited by

      @djjoakim

      Enable logging on rules by editing it (pencil) , and click this one.

      e410cbd1-a0d1-4bc6-b30e-4d768175947d-image.png

      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

      pfSense+ 23.05.1 (ZFS)

      QOTOM-Q355G4 Quad Lan.
      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

      D 1 Reply Last reply Reply Quote 1
      • D
        DjJoakim @bingo600
        last edited by

        @bingo600 Thank you, will do.

        1 Reply Last reply Reply Quote 0
        • bingo600B
          bingo600 @DjJoakim
          last edited by bingo600

          @djjoakim

          Let's take LAN

          437b0845-17cb-4a4d-91fd-813706c3aa2d-image.png

          Disable the Top rule by clicking the "No parking icon" , it wont delete the rule just disable it.
          03acf454-b374-4eda-bd4b-bfc69850f1c0-image.png

          You can enable it again by clicking the "ok" icon that will be shown instead of the "no parking".

          What happens here after first rule is disabled....
          Is that ANY ip in either of the VPNxx lists will be "Policy routed" aka "Forced out of" the gateway the rule points to. The "Deny rule below" is tagging the packet , prob. so that : If the VPN Gateway (above) goes down , the tagged package is not allowed to exit via normal wan.

          If the IP is NOT in those VPN lists the package is allowed to go "anywere" including to wifi or exit via wan.

          This means that ANY IP in those lists will not be able to go to wifi , as they match the "Exit via VPN policy" before they hit the bottom allow lan to anywhere rule.

          Do you (from a wifi unit) test or ping a device on Lan that is not on the POOL lists ??
          Else you will never get an ansver.

          If what you wanted was to allow anything on lan to be able to talk to units on wifi (all local RFC1918 IP's) , and still have those in the pool exit via vpn's.

          You should reenable the top rule , but change it's source to Lan net .

          You will hopefully never see a source ip of Fast Lan , on your Lan.
          So that rule won't do much good on lan ... aka never match.

          /Bingo

          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

          pfSense+ 23.05.1 (ZFS)

          QOTOM-Q355G4 Quad Lan.
          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

          D 1 Reply Last reply Reply Quote 0
          • D
            DjJoakim @bingo600
            last edited by DjJoakim

            @bingo600 Thank you for taking the time, the thing is - the PoolVPN only exist for now since my VLAN don't work as they should. And yes, the devices are now on LAN network, 192.168.1.x, so just like you said, all those that are in the PoolVPN is allowed except they don't go though the wrong wan exit, and then they are banned - that works fine, but that's not what i am after.
            The devices that now are in PoolVPN and PoolVPNEJ is going to the Vlan. The devices in PoolVPN is going to VLAN30 = 172.18.0.1 (FAST) and the devices on PoolVPNEJ is going to VLAN40 = 172.19.0.1 (EJFAST)

            So they should not be botherd by the PoolVPN rule since they don't belong in that Aliases. So the question still remains, why does the devices on FAST access internet but i can't access them from my LAN network..

            Thanks

            bingo600B 1 Reply Last reply Reply Quote 0
            • bingo600B
              bingo600 @DjJoakim
              last edited by bingo600

              @djjoakim said in VLAN won't communicate with LAN:
              in that Aliases. So the question still remains, why does the devices on FAST access internet but i can't access them from my LAN network..

              Now you are changing the goal ....
              You mentioned Lan to WiFi ... Does that work.

              I think you need to describe what it is you want to end up with , not strange "quirks" you have made because , you couldn't get it to work.

              Edit: And what does go to 172.18.0.1 mean ???
              Should they get policy routed to 172.18.0.1 ?
              Should they "just" be allowed to communicate with 172.18.0.1 or ??

              Back in my IBM Mainframe days IBM's APAR Team would the pressed the (in)Famous - More Documentation is required ... button , in a situation like this

              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

              pfSense+ 23.05.1 (ZFS)

              QOTOM-Q355G4 Quad Lan.
              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

              D 1 Reply Last reply Reply Quote 0
              • D
                DjJoakim @bingo600
                last edited by

                @bingo600 No, i am not changing the goal - this is exacly what i was trying to explain in my main post, i only used the WIFI example for johnpoz response, since the wifi wasn't forced out of any gateway. (Since he said the problem was becouse of that on FAST interface)
                Anyway, i am sorry for the confusion - not having english as my first language sometimes makes everything 10x harder aswell. I will try and explain exacly what's my plan is:
                (Ignore all that PoolVPN for now, since that's "quirks")

                I have 3 VLAN networks.
                VLAN30 (FAST) 172.18.0.1
                VLAN40 (EJFAST) 172.19.0.1
                VLAN60 (WIFI) 10.0.0.1

                And then there is my LAN network 192.168.1.1

                So all devices placed under VLAN30 and VLAN40 must be forced through different VPN Clients, they can not leak into my orignal WAN.
                Everything so far seems to work, all devices i place under VLAN30 can access internet fine, but i can't access them thought my PC that's placed in LAN.
                (Some devices that will be in VLAN30 have webui witch i need to access from my PC, that's why i need to access some of the IP adresses)

                Now, when i have changed some of the settings (see pic below) i can ping my PC (192.168.1.103) from one device on FAST (172.18.0.124), but i can't ping 172.18.0.124 from my pc (192.168.1.103).
                So somehow, i managed to get it working one way, but not the other way back.. And i can't figure out what i have done wrong.

                ping.png

                Thanks

                bingo600B 1 Reply Last reply Reply Quote 0
                • bingo600B
                  bingo600 @DjJoakim
                  last edited by bingo600

                  @djjoakim

                  The config you showed above , ought to work for LAN <--> FAST.
                  Have you tried to reboot the firewall , or "Clear the states" ?

                  f63cfd89-9e9d-4798-bc67-79bb20b9f1f0-image.png

                  And it seems you haven't enabled loggong on all the "deny" lines , that can be super helpfull during debugging an issue like this.

                  If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                  pfSense+ 23.05.1 (ZFS)

                  QOTOM-Q355G4 Quad Lan.
                  CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                  LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                  D 1 Reply Last reply Reply Quote 1
                  • D
                    DjJoakim @bingo600
                    last edited by DjJoakim

                    @bingo600 Yes i just did that, and still dosen't work..
                    I have also tried to make the same rules for WIFI, just to be sure there was nothing wrong with the device on FAST that i tried to ping, but the problem remains - i can ping LAN but i can't ping the VLAN..
                    Edit: Hmmm.. Now i can access FAST from WIFI (VLAN60), but i can't reach WIFI from FAST, So, in this equation the problem is on the other way.
                    LAN - FAST Can't ping
                    FAST - LAN Can ping
                    FAST - WIFI Can't ping
                    WIFI - FAST Can ping

                    Sorry, i have now enabled the logging for those.

                    strang.png

                    Thanks

                    bingo600B 1 Reply Last reply Reply Quote 0
                    • bingo600B
                      bingo600 @DjJoakim
                      last edited by

                      @djjoakim

                      What can you ping from Lan (your 192.168.1.103)

                      Can you ping 192.168.1.1
                      Can you ping 10.0.0.1
                      Can you ping 172.18.0.1

                      How does your RFC1918 definition look

                      /Bingo

                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                      pfSense+ 23.05.1 (ZFS)

                      QOTOM-Q355G4 Quad Lan.
                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                      D 1 Reply Last reply Reply Quote 0
                      • D
                        DjJoakim @bingo600
                        last edited by

                        @bingo600 Hmm, strange.
                        I did an edit on my last post, i tried to "reduce" the issue so i tried the same thing on my other vlan, WIFI. And when i did that, the problem is on the other way. From WIFI i can reach FAST, but from FAST i can't reach WIFI, something is really strange here.

                        To answer you'r question, from my PC (LAN) i can only ping 192.168.1.1, it dosen't respond on anything else. (While on my WIFI, i can ping 172.18.0.1, 172.19.0.1, 192.168.1.1, and the same on FAST)
                        Sorry, i am not trying to confuse the situation by starting to talk about the WIFI vlan, i just think it's strange that the problem is on the other way around there.

                        Anyways, here is my RFC1918

                        RFC.png

                        D bingo600B 2 Replies Last reply Reply Quote 0
                        • D
                          DjJoakim @DjJoakim
                          last edited by DjJoakim

                          Hmm okey, well - forget about that WIFI connection, i used my brain and figured out that it probably had something with windows firewall to do, said and done - when i turn off the firewall on that WIFI device, i can reach it from FAST - so clearly it was something wrong at that side.
                          So, since everything works with the firewall settings in that VLAN, it seems like there is something really wrong with my LAN, and maybe not PFsense fault...

                          1 Reply Last reply Reply Quote 0
                          • bingo600B
                            bingo600 @DjJoakim
                            last edited by bingo600

                            @djjoakim

                            That RFC1918 rule is outright "Sick" .....

                            RFC1918 should be defined like this.

                            db8e178f-45e9-4b06-9ded-8b21d275c158-image.png

                            Dammm šŸ¤•

                            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                            pfSense+ 23.05.1 (ZFS)

                            QOTOM-Q355G4 Quad Lan.
                            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                            D 2 Replies Last reply Reply Quote 1
                            • D
                              DjJoakim @bingo600
                              last edited by

                              @bingo600 I followed this "guide" https://docs.netgate.com/pfsense/en/latest/multiwan/policy-route.html#bypassing-policy-routing
                              Isn't it how i should do it? šŸ˜“

                              bingo600B 1 Reply Last reply Reply Quote 0
                              • D
                                DjJoakim @bingo600
                                last edited by

                                @bingo600 Ooops.. Well, fixed now 😌

                                1 Reply Last reply Reply Quote 0
                                • bingo600B
                                  bingo600 @DjJoakim
                                  last edited by bingo600

                                  @djjoakim

                                  @djjoakim said in VLAN won't communicate with LAN:

                                  @bingo600 I followed this "guide" https://docs.netgate.com/pfsense/en/latest/multiwan/policy-route.html#bypassing-policy-routing
                                  Isn't it how i should do it? šŸ˜“

                                  Yes but do as they write

                                  1e365ef8-90ba-4529-b768-97eb2d39db65-image.png

                                  Can i see your RFC1819 rule now please

                                  If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                  pfSense+ 23.05.1 (ZFS)

                                  QOTOM-Q355G4 Quad Lan.
                                  CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                  LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                  D 1 Reply Last reply Reply Quote 1
                                  • D
                                    DjJoakim @bingo600
                                    last edited by

                                    @bingo600 Yeah sorry, i am new to this.. one step at a time šŸ¤•

                                    wwwww.png

                                    bingo600B 1 Reply Last reply Reply Quote 0
                                    • bingo600B
                                      bingo600 @DjJoakim
                                      last edited by

                                      @djjoakim

                                      Would work ...

                                      But please don't call it RFC1918

                                      Call it LOCAL_LANS or something

                                      RFC1918 is

                                      eab4cefd-fbb2-449b-a019-ded9828ff129-image.png

                                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                      pfSense+ 23.05.1 (ZFS)

                                      QOTOM-Q355G4 Quad Lan.
                                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                      D 1 Reply Last reply Reply Quote 0
                                      • D
                                        DjJoakim @bingo600
                                        last edited by

                                        @bingo600 Yep, changed it... I saw RFC1918 was on the "WAN" rule, so i didn't wan't to confuse it, so now it's called Local_lan.

                                        bingo600B 2 Replies Last reply Reply Quote 0
                                        • bingo600B
                                          bingo600 @DjJoakim
                                          last edited by

                                          @djjoakim

                                          The guy making this RFC1918 Alias should be ....... 😠

                                          I'm 90% sure that every "professional" in here would expect a RFC1918 alias to contain :

                                          65369e94-f7c3-4f98-93bd-1103e4cde87b-image.png

                                          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                          pfSense+ 23.05.1 (ZFS)

                                          QOTOM-Q355G4 Quad Lan.
                                          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                          1 Reply Last reply Reply Quote 1
                                          • bingo600B
                                            bingo600 @DjJoakim
                                            last edited by

                                            @djjoakim said in VLAN won't communicate with LAN:

                                            @bingo600 Yep, changed it... I saw RFC1918 was on the "WAN" rule, so i didn't wan't to confuse it, so now it's called Local_lan.

                                            If it's used on the WAN
                                            Did you remember to change it back to the hosts it contained , not the networks you made.

                                            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                            pfSense+ 23.05.1 (ZFS)

                                            QOTOM-Q355G4 Quad Lan.
                                            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                            bingo600B D 2 Replies Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.