Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can't access PPPOE/ADSL modem from pfSense

    Scheduled Pinned Locked Moved General pfSense Questions
    14 Posts 2 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by stephenw10

      Ok. Try again from Diag > Ping in pfSense but set the source as the LAN interface.

      That will test the outbound NAT rule but not any firewall rules. So if that works look for a bad or missing firewall rule on the LAN.

      If you can post screenshots of your LAN firewall rules and outbound NAT rules we can review them.

      Steve

      V 1 Reply Last reply Reply Quote 0
      • V
        Var @stephenw10
        last edited by

        @stephenw10

        Ok. Try again from Diag > Ping in pfSense but set the source as the LAN interface.

        86871303-8412-49cd-b438-771935051a54-image.png

        If you can post screenshots of your LAN firewall rules and outbound NAT rules we can review them.

        ModemAccess interface setup included for completeness.

        Note: ALL the PIA and PS4 Pro rules were added long after all my testing for ModemAccess.
        None of the IPs involved in those rules include any computer I have tested access to the modem interface from.

        I had tested both Manual Outbound NAT (per the guide) and Hybrid Outbound NAT, and neither worked. I left it on Hybrid, as I believe this will at least will allow for any possible automatic rules to be setup if I add any other VPN connections.

        628c9fb6-7e91-472d-80c6-fc1f11677d74-image.png

        548b5d20-3bd4-4c61-ad49-747198b9400e-image.png

        5c3b67a1-aa10-4156-b944-dae003ba4a1d-image.png

        eceb87bc-2257-4cbb-a685-d3cb8941e3a9-image.png

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Ok, what IP are you testing from that fails?
          Is it in the PIA_route_chicago alias?

          If it is then you will need a more specific rule above that to pass the traffic to the modem without policy routing it over the VPN. That's probably what's happening there.

          Steve

          V 1 Reply Last reply Reply Quote 0
          • V
            Var @stephenw10
            last edited by

            @stephenw10
            I have tested access to the modem from 10.27.27.2, 10.27.27.3, and10.27.27.150. All of these are Statically DHCP mapped.
            None of these are in the PIA_ROUTE_CHICAGO (re-verified before posting this). I confirmed that the computers get my public ISP IP when I test on a whatsmyip website, and it does.
            I ensured also that a computer in the PIA_ROUTE_CHICAGO alias gets my VPN IP, and it does.

            I previously tested ModemAccess from DHCP-assigned (i.e. non-static mapped) computers, before I ever setup the PIA_ROUTE_CHICAGO or the static DHCP mappings (i.e. vanilla pfSense install) , and none of the computers could reach the modem's interface.

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Hmm, I would expect that to work.

              Can those hosts ping the modem?

              If they can then try testing against the modem web port from Diag > TestPort.

              Assuming it's https make sure you can connect on port 443 successfully from the default source. Then change the source to LAN and retest.

              If that succeeds but clients still fail I would be looking at the state table when you are trying to make sure the correct states are opened on LAN and MODEMACCESS.

              Steve

              V 1 Reply Last reply Reply Quote 0
              • V
                Var @stephenw10
                last edited by Var

                @stephenw10
                Well this is both bizarre, and welcomed...

                I wanted to re-verify that the modem access IP was indeed what I had been saying, and that nothing could possibly have been altered by the ISP (doubtful, but had to eliminate it).

                I reconnected a computer <> modem.
                Checked the IP address for the modem web interface.
                On confirming it was still the same, I reconnected modem to pfSense router, and voila...
                Modem web interface was accessible from all devices.

                Nothing at all was changed in any settings for modem or pfSense router.

                Perhaps the unplug/replugging action for the modem<>pfSense router connection reset the state tables, or enforced rules.

                (edited due to next post)

                V 1 Reply Last reply Reply Quote 1
                • V
                  Var @Var
                  last edited by Var

                  Update: It WAS accessible, and now it is not.

                  And nothing has changed in any cabling, or alterations to modem interface settings or pfSense settings, since mentioning earlier I did get access.

                  @stephenw10 I'll investigate further what you mentioned in your last posting.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Hmm, that sort of timing 'feels' like an ARP issue. But if the modem or pfSense was not responding to ARP correctly they would not be able to ping each other. Check the ARP table in pfSense anyway though.

                    Maybe a bad subnet mask somewhere? Seems unlikely though.

                    Steve

                    V 1 Reply Last reply Reply Quote 0
                    • V
                      Var @stephenw10
                      last edited by

                      @stephenw10
                      I know for sure my modem's internal interface does not require (or work with) https for access. http only.

                      State table
                      fb2dbe00-e186-44dd-abaa-6ff038f460c9-image.png

                      ARP Table entries.
                      I confirmed these were the only mentions in the table, for either MODEMACCESS or 10.27.1.x :

                      34441e96-6931-4d45-ac5d-89fad2ccd07d-image.png

                      V 1 Reply Last reply Reply Quote 0
                      • V
                        Var @Var
                        last edited by

                        @stephenw10
                        And today, now it's all just....working.

                        No issues with access anywhere that is not a device assigned into my VPN alias (I never expected them to work though) - and I have tested this at various times throughout the day, with variant workloads, to be sure that something errant wasn't what was causing issues, by firing up and blocking access.
                        No changes made to configs. Nothing has reset.
                        Thus, I am both baffled and gratified.

                        I'll work on seeing if there's a way to make those VPN'd devices able to access this ModemAccess IP too - if feasible - maybe by some sort of split-tunnel ruleset.

                        A few more days of testing, just to be sure.
                        But, for now, this works!

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Hmm, weird!

                          Well if it fails again check the states that are open from the internal client IP. You should see the pass state open on LAN and the NAT'd state on MODEMACCESS.
                          You could check that while it is working so you know what it should look like.

                          Steve

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.