Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Allow any not working

    Scheduled Pinned Locked Moved Firewalling
    7 Posts 3 Posters 805 Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D Offline
      Darth 0
      last edited by

      Hello pfsense Community,

      i m trying to create a "allow all" rule for my PC in the firewall, but is is not working...
      I created the rule on the top:
      00eb314b-96b6-4e09-a6ae-cadbb1d00fe3-grafik.png

      My setup:

      LAN
      ====
      Subnet:    192.168.0.XX
      PC:        192.168.0.10
      pfsense:   192.168.0.37
      Gateway:   192.168.0.1 (hardware router + modem)
      
      VLAN
      ====
      Subnet:    192.168.11.XX
      pfsense:   192.168.0.37
      Gateway:   192.168.1.11 (pfsense)
      

      When my PC is in LAN with Gateway 192.168.0.1, there is no access to VLAN => ok

      When i switch Gateway of PC oto 192.168.0.37 he has acces to LAN an VLAN (if firewall rules allow access) => ok

      But my PC has no complete access to the internet, pfsense firewall is still blocking requests.
      I tried to create an "allow all access" rule
      f0d7ee67-2969-4991-8d45-957a34353be6-grafik.png

      but it is not working, still have to allow each IP address seperatly (like rules 2-4).

      Any idea why?

      Kind Regards
      Darth

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ Offline
        johnpoz LAYER 8 Global Moderator @Darth 0
        last edited by

        @darth-0 said in Allow any not working:

        PC: 192.168.0.10
        pfsense: 192.168.0.37
        Gateway: 192.168.0.1 (hardware router + modem)

        How would that work?? If the vlan is off of pfsense, then you would have to use pfsense as your gateway to get to that vlan. Or you would have to have a route on your PC that says when you want to get to the pfsense.

        This also makes no sense

        Subnet:    192.168.11.XX
        pfsense:   192.168.0.37
        Gateway:   192.168.1.11 (pfsense)
        

        What mask are you using? /24 /16 something else..

        None of those rules you created show any evaluations even see the 0/0 in the states column.. So not sure what they are allowing or not allowing - because from what you posted they are never being triggered..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

        D 1 Reply Last reply Reply Quote 1
        • D Offline
          Darth 0 @johnpoz
          last edited by Darth 0

          @johnpoz
          of course youe are right, there are no 192.168.0.XX IPS in the VLAN...
          And alls Subnets are /24.

          here the corret ones:

          VLAN
          ====
          Subnet:    192.168.11.XX
          pfsense:   192.168.11.1
          Gateway:   pfsense
          DHCP:      pfsense
          

          pfSense has in LAN 192.168.0.37 and in VLAN 192.168.11.1.

          Now i am searching for a way to get access to both subnets (i want to move servers to VLAN) and clients in LAN should still be able to consume services from them.

          Your hint with a route is working fine on my PC ๐Ÿ‘ .

          But is there another way none PCs like Tablets or Cellphones?

          Best regards
          Darth

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ Offline
            johnpoz LAYER 8 Global Moderator @Darth 0
            last edited by

            @darth-0 so what is the end goal here.. If you have some setup like this..

            endgoal.jpg

            And you have devices on the 192.168.0 network and you want to get to devices on that vlan 192.168.11 network and you can not create routes on the devices.

            You would have to setup port forwards and and nats so that say you want to access 192.168.11.X you really access 192.168.0.37 on port xyz, and pfsense forwards that traffic to 192.168.11.X

            I take it this is just some temp thing while you setup some new overall network layout..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

            D 1 Reply Last reply Reply Quote 1
            • D Offline
              Darth 0 @johnpoz
              last edited by

              @johnpoz

              Greate assumption and 100 points to you ๐Ÿ‘ ๐Ÿ‘
              That is my current situation.

              Hmm, bad network setup?

              Would this be a better approach:

              b6a61ab5-0d73-4f0a-a22c-6a32b099d1b0-grafik.png

              Each device in 192.168.10.XX/24 and 192.168.20.XX/24 uses pfsense dhcp and gateway in their VLANs.
              (Pfsense has access to all VLANs and 192.168.0.XX/24)

              A big thanks for your help so fare!!

              1 Reply Last reply Reply Quote 0
              • the otherT Offline
                the other
                last edited by

                Morning,
                it might make even more sense, when you would put your managed switch behind your pfsense device:

                Router---------pfsense-------switch------vlans with devices (you might want to put your guest network behind pfsense as another VLAN with strict ruleset, so guests cannot get into other vlans and just reach the i-net...

                Then every subnet (vlan) will get dhcp, dns, ad-blocking/ipblocking (pfblockerng_dev) etc from your centralized pfsense, you could install rules for every vlan dependent on your needs...
                :)

                the other

                pure amateur home user, no business or professional background
                please excuse poor english skills and typpoz :)

                D 1 Reply Last reply Reply Quote 0
                • D Offline
                  Darth 0 @the other
                  last edited by

                  @the-other
                  Yeah this is even better ๐Ÿ˜Š

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.