Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can't access PPPOE/ADSL modem from pfSense

    Scheduled Pinned Locked Moved General pfSense Questions
    14 Posts 2 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      That should work as long as the modem is actually at that IP. How did you set it?
      Can you ping it from Diag > Ping in pfSense?

      Steve

      V 1 Reply Last reply Reply Quote 0
      • V
        Var @stephenw10
        last edited by

        @stephenw10
        Modem's web interface IP was set via the modem's internal interface.
        It has options to set an IP and subnet mask (I chose the mask 255.255.255.0) for local access.

        I tested the modem was reachable by direct ethernet connection (modem <> computer), and manually set the computer's IP/subnet to be on the same network as the modem (tested with both modem interface set 192.168.1.1, and when changed to 10.27.1.1).
        Computer could reach the modem interface without issue, based on configuring its IP/subnet manually to conform to the modem's network.

        I also checked that I was truly getting a PPPoE connection from the modem, by configuring the computer to dial out via PPPoE - and computer reached the internet with no issues.

        With interface set, and NAT rule in place:
        Pinging modem via Diagnostics>Ping - 0% packet loss
        Pinging modem via terminal/command prompt on multiple different computers - 100% packet loss

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by stephenw10

          Ok. Try again from Diag > Ping in pfSense but set the source as the LAN interface.

          That will test the outbound NAT rule but not any firewall rules. So if that works look for a bad or missing firewall rule on the LAN.

          If you can post screenshots of your LAN firewall rules and outbound NAT rules we can review them.

          Steve

          V 1 Reply Last reply Reply Quote 0
          • V
            Var @stephenw10
            last edited by

            @stephenw10

            Ok. Try again from Diag > Ping in pfSense but set the source as the LAN interface.

            86871303-8412-49cd-b438-771935051a54-image.png

            If you can post screenshots of your LAN firewall rules and outbound NAT rules we can review them.

            ModemAccess interface setup included for completeness.

            Note: ALL the PIA and PS4 Pro rules were added long after all my testing for ModemAccess.
            None of the IPs involved in those rules include any computer I have tested access to the modem interface from.

            I had tested both Manual Outbound NAT (per the guide) and Hybrid Outbound NAT, and neither worked. I left it on Hybrid, as I believe this will at least will allow for any possible automatic rules to be setup if I add any other VPN connections.

            628c9fb6-7e91-472d-80c6-fc1f11677d74-image.png

            548b5d20-3bd4-4c61-ad49-747198b9400e-image.png

            5c3b67a1-aa10-4156-b944-dae003ba4a1d-image.png

            eceb87bc-2257-4cbb-a685-d3cb8941e3a9-image.png

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Ok, what IP are you testing from that fails?
              Is it in the PIA_route_chicago alias?

              If it is then you will need a more specific rule above that to pass the traffic to the modem without policy routing it over the VPN. That's probably what's happening there.

              Steve

              V 1 Reply Last reply Reply Quote 0
              • V
                Var @stephenw10
                last edited by

                @stephenw10
                I have tested access to the modem from 10.27.27.2, 10.27.27.3, and10.27.27.150. All of these are Statically DHCP mapped.
                None of these are in the PIA_ROUTE_CHICAGO (re-verified before posting this). I confirmed that the computers get my public ISP IP when I test on a whatsmyip website, and it does.
                I ensured also that a computer in the PIA_ROUTE_CHICAGO alias gets my VPN IP, and it does.

                I previously tested ModemAccess from DHCP-assigned (i.e. non-static mapped) computers, before I ever setup the PIA_ROUTE_CHICAGO or the static DHCP mappings (i.e. vanilla pfSense install) , and none of the computers could reach the modem's interface.

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Hmm, I would expect that to work.

                  Can those hosts ping the modem?

                  If they can then try testing against the modem web port from Diag > TestPort.

                  Assuming it's https make sure you can connect on port 443 successfully from the default source. Then change the source to LAN and retest.

                  If that succeeds but clients still fail I would be looking at the state table when you are trying to make sure the correct states are opened on LAN and MODEMACCESS.

                  Steve

                  V 1 Reply Last reply Reply Quote 0
                  • V
                    Var @stephenw10
                    last edited by Var

                    @stephenw10
                    Well this is both bizarre, and welcomed...

                    I wanted to re-verify that the modem access IP was indeed what I had been saying, and that nothing could possibly have been altered by the ISP (doubtful, but had to eliminate it).

                    I reconnected a computer <> modem.
                    Checked the IP address for the modem web interface.
                    On confirming it was still the same, I reconnected modem to pfSense router, and voila...
                    Modem web interface was accessible from all devices.

                    Nothing at all was changed in any settings for modem or pfSense router.

                    Perhaps the unplug/replugging action for the modem<>pfSense router connection reset the state tables, or enforced rules.

                    (edited due to next post)

                    V 1 Reply Last reply Reply Quote 1
                    • V
                      Var @Var
                      last edited by Var

                      Update: It WAS accessible, and now it is not.

                      And nothing has changed in any cabling, or alterations to modem interface settings or pfSense settings, since mentioning earlier I did get access.

                      @stephenw10 I'll investigate further what you mentioned in your last posting.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Hmm, that sort of timing 'feels' like an ARP issue. But if the modem or pfSense was not responding to ARP correctly they would not be able to ping each other. Check the ARP table in pfSense anyway though.

                        Maybe a bad subnet mask somewhere? Seems unlikely though.

                        Steve

                        V 1 Reply Last reply Reply Quote 0
                        • V
                          Var @stephenw10
                          last edited by

                          @stephenw10
                          I know for sure my modem's internal interface does not require (or work with) https for access. http only.

                          State table
                          fb2dbe00-e186-44dd-abaa-6ff038f460c9-image.png

                          ARP Table entries.
                          I confirmed these were the only mentions in the table, for either MODEMACCESS or 10.27.1.x :

                          34441e96-6931-4d45-ac5d-89fad2ccd07d-image.png

                          V 1 Reply Last reply Reply Quote 0
                          • V
                            Var @Var
                            last edited by

                            @stephenw10
                            And today, now it's all just....working.

                            No issues with access anywhere that is not a device assigned into my VPN alias (I never expected them to work though) - and I have tested this at various times throughout the day, with variant workloads, to be sure that something errant wasn't what was causing issues, by firing up and blocking access.
                            No changes made to configs. Nothing has reset.
                            Thus, I am both baffled and gratified.

                            I'll work on seeing if there's a way to make those VPN'd devices able to access this ModemAccess IP too - if feasible - maybe by some sort of split-tunnel ruleset.

                            A few more days of testing, just to be sure.
                            But, for now, this works!

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Hmm, weird!

                              Well if it fails again check the states that are open from the internal client IP. You should see the pass state open on LAN and the NAT'd state on MODEMACCESS.
                              You could check that while it is working so you know what it should look like.

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.