Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN an Firewall rule not matching

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    68 Posts 3 Posters 11.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Bob.DigB
      Bob.Dig LAYER 8 @interessierter
      last edited by Bob.Dig

      @interessierter said in VLAN an Firewall rule not matching:

      64c4cf98-0b39-4ba3-a59b-21170b98a02f-image.png

      Why are those IP ranges identical and why LAN has a triangle. Maybe your NAT rules are wrong? Better show all the NAT rules and Portforwarding too.

      Or start with a fresh install. 😉

      I 1 Reply Last reply Reply Quote 0
      • I
        interessierter @Bob.Dig
        last edited by

        @bob-dig 37abeb86-6405-4ca9-8501-ce145ad54012-image.png

        The last 4 lines are created from pfnblocker, is that the reason?

        1 Reply Last reply Reply Quote 0
        • I
          interessierter @interessierter
          last edited by

          @interessierter said in VLAN an Firewall rule not matching:

          @johnpoz The Alias is correct:

          687efef1-b94f-4060-bc08-b0135897c36b-image.png

          OK the Block rule was not on the first position, but it does not make any difference. Access is still possible.

          What I found is here some old NAT rules from a TEST for VPN:
          e70f2d73-0aef-4586-9a05-df0cb7996bd0-image.png

          I have removed and deleted all VPN and IPSEC configuration however this rules are still there. And this NAT WAN defintily include the subnets that I use for VLAN

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @interessierter
            last edited by johnpoz

            @interessierter any interface that has a gateway and considered a "wan" would auto create outbound nat rules when your in auto mode.

            You can see only wan as outbound nat auto.

            wan.jpg

            I then created a gateway on one of my test interfaces - and it auto created the test outbound nat

            test.jpg

            If you have some interface with a gateway set, it would create auto outbound nats. If you want to get rid of those you would need to remove this gateway your no longer using.

            edit: BTW this firewall entry is the firewall itself creating traffic, not pfsense allowing traffic from 1 vlan to another

            thisrule.jpg

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            I 1 Reply Last reply Reply Quote 0
            • I
              interessierter @johnpoz
              last edited by

              @johnpoz I have a second interface thats right, its a power Beam connection that use 10.224.1.14 as IP address, so thats not the subnet of my vlan.

              Yes I have my used subnet in the NAT rule, but I don t know why

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @interessierter
                last edited by

                @interessierter just saying that is why you have auto outbound listed. Any interface that can be used as wan (ie has a gateway) with auto outbound nat will be seen.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                I 1 Reply Last reply Reply Quote 0
                • I
                  interessierter @johnpoz
                  last edited by

                  @johnpoz But the seperate network (power beam) use 10.224.1.14/28, so it does not overlap with my networks 10.40.1.99/24.

                  Also the overlapping subnet is not only in the power beam NAT, it s also in the WAN source list. I still don t get why he list the IPs here.

                  So what is the solution? Disable the automatic Nating ?

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @interessierter
                    last edited by johnpoz

                    @interessierter nobody said it overlapped?

                    edit: as to solution for what? You can have more than 1 wan, routing will just use normal routing via the default gateway or other routes you have setup, or policy routing via the firewall rules.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    1 Reply Last reply Reply Quote 0
                    • I
                      interessierter
                      last edited by

                      @johnpoz I plan to have 4 different VLANS, and the first vlan should be a iot Vlan that only allow Internet access. Right now this nating route route to my "main" network so the separation does not make sense.

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @interessierter
                        last edited by

                        @interessierter you lost me..

                        Your traffic is not matching from the last you posted, the firewall rule shows 0/0

                        The other firewall entry you listed was firewall generating traffic.

                        If you say you can get to this IP from another vlan.. It wouldn't have anything to do with outbound nat, port forwards could be.. But I don't see any portforwards on your lan that would match that traffic.

                        If your saying your client can get to that IP, maybe its taking a different path... Maybe its on the same L2 and you have the client with the wrong mask?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        I 1 Reply Last reply Reply Quote 0
                        • I
                          interessierter @johnpoz
                          last edited by

                          @johnpoz Yes maybe I m lost.

                          The main network is 192.168.1.0/24, the VLAN 10.40.23.99/24

                          The Client (mobile phone) is connected with a Access Point, the SSID is tagged with 4000, the switch have a configuration as hybrid port, and the tags 1000,2000,3000,4000,1 is configured. Than the switch connect to pfsense with the same config.

                          As I can see the allow of the connection from the 10.40.23/24 network to 192.168.1.0/24 in the pfsense log I guess, that the routing must be happening here and not before.

                          Here a post again of my port forwardings, that also does not contain any network that is in question here:

                          5ffcf102-4dae-41cd-9203-c0b332ff5bfb-image.png

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @interessierter
                            last edited by johnpoz

                            @interessierter said in VLAN an Firewall rule not matching:

                            As I can see the allow of the connection from the 10.40.23/24 network to 192.168.1.0/24 in the pfsense log I guess

                            where?

                            Here?

                            hits.jpg

                            The allowed there is because the traffic was generated by pfsense.. There are rules that let the firewall go where it wants..

                            [21.05.2-RELEASE][admin@sg4860.local.lan]/root: pfctl -sr | grep "let out"
                            pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself"
                            pass out inet6 all flags S/SA keep state allow-opts label "let out anything IPv6 from firewall host itself"
                            

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                            I 1 Reply Last reply Reply Quote 0
                            • I
                              interessierter @johnpoz
                              last edited by

                              @johnpoz Yes but to be honest I don t know what rule that should be? How does such a rule look like?

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @interessierter
                                last edited by johnpoz

                                @interessierter I just showed you what the rule looks like ;)

                                Its a hidden rule.

                                You can view all the rules via
                                https://docs.netgate.com/pfsense/en/latest/firewall/pf-ruleset.html

                                There are a few hidden rules, mostly to keep users from shooting themselves in the foot ;) Common example of these is when you enable dhcp server on an interface, rules are created (hidden) that make sure dhcp will work.

                                notice those rules are pass "out" rules, which is why you see the little black triangle on the firewall entry.

                                What I would look into is why your rule is not triggering? Do you still show 0/0 for the states on your block 192_netz rule? You could look in your tables under the diagnotic menu to make sure that table is showing your 192.168.1/24 network.

                                Possible your rules have not be loaded?

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                I 1 Reply Last reply Reply Quote 0
                                • I
                                  interessierter @johnpoz
                                  last edited by

                                  @johnpoz My rules are definitly saved and loaded, the tables show this:

                                  daf36c8f-70cf-42ce-9988-cfcc659fe35e-image.png

                                  Yes it s still zero

                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @interessierter
                                    last edited by johnpoz

                                    @interessierter that is not the 192_netz table..

                                    Also why are you natting a 172.168.1.0? that is a typo? without a mask?

                                    See here is my rfc1918 alias table I created entries

                                    rfctable.jpg

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                    I 1 Reply Last reply Reply Quote 0
                                    • I
                                      interessierter @johnpoz
                                      last edited by interessierter

                                      @johnpoz I dont know but I guess it will not solve the issue right?

                                      I have for my main network right now 192.168.1.0/24
                                      vlan 10.10.23.99/24
                                      vlan2 10.20.23.99/24
                                      vlan3 10.30.23.99/24
                                      vlan4 10.40.23.99/24
                                      vlan5 10.45.23.99/24

                                      My 192 Netz only contains 192.168.1.0/24, because I want to block requests to this network

                                      johnpozJ 1 Reply Last reply Reply Quote 0
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator @interessierter
                                        last edited by

                                        @interessierter I get that.. But your not showing that the table actually loaded.

                                        And your rule is not triggering from the 0/0 in the states column.. Why its not is the question.. Maybe the table didn't load? Maybe your client isn't going through pfsense?

                                        I don't see any other rules above it that would allow the traffic..

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                        I 1 Reply Last reply Reply Quote 0
                                        • I
                                          interessierter @johnpoz
                                          last edited by johnpoz

                                          @johnpoz What table you want to see?

                                          johnpozJ 1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator @interessierter
                                            last edited by johnpoz

                                            @interessierter

                                            The table alias you created the 192_netz table.

                                            What version of pfsense are you running exactly? There was some issues in the dev versions the other day where state tables not counting.. and all showing 0/0

                                            Alias tables normally do not populate until used in a rule.. But lets make sure the alias you created actually created the table and put in the 192.168.1.0/24 network.

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                            I 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.