• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

VLAN an Firewall rule not matching

L2/Switching/VLANs
3
68
11.0k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • I
    interessierter @johnpoz
    last edited by Dec 10, 2021, 11:52 AM

    @johnpoz I know that there should no relation. But when I have a ANY ANY Rule, and still the log tells me the default rule block the request, than it must be something else

    I 1 Reply Last reply Dec 10, 2021, 12:23 PM Reply Quote 0
    • I
      interessierter @interessierter
      last edited by Dec 10, 2021, 12:23 PM

      @interessierter Hm after a restart of pfnblocker it works

      J I 2 Replies Last reply Dec 10, 2021, 1:34 PM Reply Quote 0
      • J
        johnpoz LAYER 8 Global Moderator @interessierter
        last edited by Dec 10, 2021, 1:34 PM

        @interessierter Please show us the blocks... And your rules - I want to see if there is any triggers 0/0 like you showed that none of those rules have matched.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        I 1 Reply Last reply Dec 11, 2021, 5:37 PM Reply Quote 0
        • I
          interessierter @johnpoz
          last edited by Dec 11, 2021, 5:37 PM

          @johnpoz its solved, its working after a reboot of pfnblocker

          1 Reply Last reply Reply Quote 0
          • I
            interessierter @interessierter
            last edited by Dec 12, 2021, 11:08 AM

            @interessierter said in VLAN an Firewall rule not matching:

            @interessierter Hm after a restart of pfnblocker it works

            The Part of DHCP is working now.
            I got a xaomi vacuum cleaner, and this device needs WLAN to work fully. However I want to seperate this device from the rest of my network, but I strugle here.

            I have created vlans, a seperate WLAN SSID, and tag this SSID of VLAN ID 4000. This is configured on the switch between, the AP and the pfsense. But right now all other devices are NOT tagged with vlans, I have to do that step by step. However I want to start with the new xaomi device.

            What I want to do is, to allow on the VLAN 4000 only Internet access, but DENY all access to my existing network infrastructure. I have tried several DENY rules on pfsense, but the access is still possible.

            How should such a rule look like to work?
            thanks

            J 1 Reply Last reply Dec 12, 2021, 1:57 PM Reply Quote 0
            • J
              johnpoz LAYER 8 Global Moderator @interessierter
              last edited by Dec 12, 2021, 1:57 PM

              @interessierter here is a typical common configuration for a locked down vlan

              login-to-view

              Create an alias that contains all the rfc1918 space, this way as you add more vlans you don't have to worry that they would not be blocked.

              login-to-view

              Certain services are normally required like dns, etc.. But if the device points to outside for dns, you could remove that, same with ntp, and if you don't want it to ping its gateway.

              But this is a very limited vlan setup. It can not talk to anything on local networks, only internet

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              I 1 Reply Last reply Dec 12, 2021, 5:02 PM Reply Quote 1
              • I
                interessierter @johnpoz
                last edited by Dec 12, 2021, 5:02 PM

                @johnpoz I have a Alias with 192.168.1.0/24 and this Firewall rule to block:

                login-to-view

                But the browser access to 192.168.1.30 is still possible. The Test Client is in 10.40.23.99 net.

                J 1 Reply Last reply Dec 12, 2021, 5:14 PM Reply Quote 0
                • J
                  johnpoz LAYER 8 Global Moderator @interessierter
                  last edited by Dec 12, 2021, 5:14 PM

                  @interessierter did you clear states after you created a block rule?

                  States are evaluated before rules, so if there was an existing state, that state would allow it before your rules are even looked at.

                  I don't see any triggers on that rule.. It shows 0/0 for states - so it was never evaluated.

                  Do you have any rules in floating that would allow the traffic?

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  I 1 Reply Last reply Dec 12, 2021, 5:23 PM Reply Quote 0
                  • I
                    interessierter @johnpoz
                    last edited by Dec 12, 2021, 5:23 PM

                    @johnpoz I have found this in the logs. It seems like all traffic will be blocked, only the connection to 192.168.1.30 is working. Why is that threaded differently?

                    login-to-view

                    I B 2 Replies Last reply Dec 12, 2021, 5:26 PM Reply Quote 0
                    • I
                      interessierter @interessierter
                      last edited by Dec 12, 2021, 5:26 PM

                      @interessierter the other rules on this vlan. No floating rules

                      login-to-view

                      J 1 Reply Last reply Dec 12, 2021, 6:02 PM Reply Quote 0
                      • J
                        johnpoz LAYER 8 Global Moderator @interessierter
                        last edited by Dec 12, 2021, 6:02 PM

                        @interessierter well your rule is not triggering, again you have a 0/0 for states..

                        You created your alias wrong maybe..

                        Rules are evaluated top down, first rule to trigger wins.. no other rules are evaluated. If default deny rule is being trigger then non of your rules above it either block or allowed were triggered.

                        As to that lan rule anything from the firewall itself are you natting this vlan for some reason?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        I 1 Reply Last reply Dec 13, 2021, 7:58 AM Reply Quote 0
                        • I
                          interessierter @johnpoz
                          last edited by interessierter Dec 13, 2021, 8:00 AM Dec 13, 2021, 7:58 AM

                          @johnpoz The Alias is correct:

                          login-to-view

                          OK the Block rule was not on the first position, but it does not make any difference. Access is still possible.

                          What I found is here some old NAT rules from a TEST for VPN:
                          login-to-view

                          I 1 Reply Last reply Dec 13, 2021, 2:07 PM Reply Quote 0
                          • B
                            Bob.Dig LAYER 8 @interessierter
                            last edited by Bob.Dig Dec 13, 2021, 8:43 AM Dec 13, 2021, 8:31 AM

                            @interessierter said in VLAN an Firewall rule not matching:

                            login-to-view

                            Why are those IP ranges identical and why LAN has a triangle. Maybe your NAT rules are wrong? Better show all the NAT rules and Portforwarding too.

                            Or start with a fresh install. 😉

                            I 1 Reply Last reply Dec 13, 2021, 2:03 PM Reply Quote 0
                            • I
                              interessierter @Bob.Dig
                              last edited by Dec 13, 2021, 2:03 PM

                              @bob-dig login-to-view

                              The last 4 lines are created from pfnblocker, is that the reason?

                              1 Reply Last reply Reply Quote 0
                              • I
                                interessierter @interessierter
                                last edited by Dec 13, 2021, 2:07 PM

                                @interessierter said in VLAN an Firewall rule not matching:

                                @johnpoz The Alias is correct:

                                login-to-view

                                OK the Block rule was not on the first position, but it does not make any difference. Access is still possible.

                                What I found is here some old NAT rules from a TEST for VPN:
                                login-to-view

                                I have removed and deleted all VPN and IPSEC configuration however this rules are still there. And this NAT WAN defintily include the subnets that I use for VLAN

                                J 1 Reply Last reply Dec 13, 2021, 2:20 PM Reply Quote 0
                                • J
                                  johnpoz LAYER 8 Global Moderator @interessierter
                                  last edited by johnpoz Dec 13, 2021, 2:28 PM Dec 13, 2021, 2:20 PM

                                  @interessierter any interface that has a gateway and considered a "wan" would auto create outbound nat rules when your in auto mode.

                                  You can see only wan as outbound nat auto.

                                  login-to-view

                                  I then created a gateway on one of my test interfaces - and it auto created the test outbound nat

                                  login-to-view

                                  If you have some interface with a gateway set, it would create auto outbound nats. If you want to get rid of those you would need to remove this gateway your no longer using.

                                  edit: BTW this firewall entry is the firewall itself creating traffic, not pfsense allowing traffic from 1 vlan to another

                                  login-to-view

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                  I 1 Reply Last reply Dec 13, 2021, 2:55 PM Reply Quote 0
                                  • I
                                    interessierter @johnpoz
                                    last edited by Dec 13, 2021, 2:55 PM

                                    @johnpoz I have a second interface thats right, its a power Beam connection that use 10.224.1.14 as IP address, so thats not the subnet of my vlan.

                                    Yes I have my used subnet in the NAT rule, but I don t know why

                                    J 1 Reply Last reply Dec 13, 2021, 2:59 PM Reply Quote 0
                                    • J
                                      johnpoz LAYER 8 Global Moderator @interessierter
                                      last edited by Dec 13, 2021, 2:59 PM

                                      @interessierter just saying that is why you have auto outbound listed. Any interface that can be used as wan (ie has a gateway) with auto outbound nat will be seen.

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                      I 1 Reply Last reply Dec 13, 2021, 3:08 PM Reply Quote 0
                                      • I
                                        interessierter @johnpoz
                                        last edited by Dec 13, 2021, 3:08 PM

                                        @johnpoz But the seperate network (power beam) use 10.224.1.14/28, so it does not overlap with my networks 10.40.1.99/24.

                                        Also the overlapping subnet is not only in the power beam NAT, it s also in the WAN source list. I still don t get why he list the IPs here.

                                        So what is the solution? Disable the automatic Nating ?

                                        J 1 Reply Last reply Dec 13, 2021, 3:11 PM Reply Quote 0
                                        • J
                                          johnpoz LAYER 8 Global Moderator @interessierter
                                          last edited by johnpoz Dec 13, 2021, 3:12 PM Dec 13, 2021, 3:11 PM

                                          @interessierter nobody said it overlapped?

                                          edit: as to solution for what? You can have more than 1 wan, routing will just use normal routing via the default gateway or other routes you have setup, or policy routing via the firewall rules.

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                          1 Reply Last reply Reply Quote 0
                                          18 out of 68
                                          • First post
                                            18/68
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.