Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Upgrade 21.05.2 to 22.01 - no VLAN internet conection

    General pfSense Questions
    3
    13
    1.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pinballwiz
      last edited by

      I've been following the other threads regarding no internet access after upgrading to 22.01 and wanted to share my experience in hope that it might provide some additional clues as to what is going on.

      Upgrade to 22.01 on a SG-5100. Install completed with the following errors (packages were not updated prior to upgrade):

      2022-02-18-0730a.jpg

      • It rebooted fine and established a VPN connection without issue.
      • Internal network and VLANs out through the VPN all worked normal. However the VLANs routed to the WAN had no internet access. I could ping the gateway but no external sites.
      • A port configured with WAN access (direct WAN access, not through VPN and not configured as a VLAN) worked as expected.
      • No limiters are in use.
      • Tried a fresh install from image with the same known good config file running fine on 21.05.2 and got the same connectivity results.

      After messing with it for several days I had to get things back up so I reverted back to 21.05.2 and all is running normally.

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Those errors shown are expected, nothing that will cause an issue.

        If you can ping the WAN side gateway but nothing beyond that it's probably an outbound NAT issue. I wouldn't have expected anything to change between 21.05.2 and 22.01 there though.
        Do you have Outbound NAT in automatic mode?

        Steve

        P 1 Reply Last reply Reply Quote 0
        • P
          pinballwiz @stephenw10
          last edited by

          @stephenw10 NAT is set to manual mode. I also tried Hybrid after the upgrade but saw no change.

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Is there a rule being generated for the subnet you were testing from?

            P 1 Reply Last reply Reply Quote 0
            • P
              pinballwiz @stephenw10
              last edited by

              In Hybrid, automatic rules were created which were redundant with my manually created rules to the WAN. The non working VLANs had mappings in place to WAN in either mode (manual or hybrid).

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Hmm, is your VPN set as the default system gateway?

                P 1 Reply Last reply Reply Quote 0
                • P
                  pinballwiz @stephenw10
                  last edited by

                  Default gateway is the WAN

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Hmm, that's.... weird!

                    Are the failing connections policy routed to WAN or just using the default route?

                    Is there a valid default route shown? That would also prevent connecting to anything beyond the gateway, which is in a directly connected subnet.

                    Steve

                    P 1 Reply Last reply Reply Quote 0
                    • G
                      GeorgeCZ58
                      last edited by

                      Have you limiters on that VLAN? Try to turn them off. This was my case. Seems like bug here, or config change needed.

                      1 Reply Last reply Reply Quote 0
                      • P
                        pinballwiz @stephenw10
                        last edited by

                        OK after much gnashing of teeth last night I have determined the root cause - Captive portal.
                        I have one Zone setup with multiple interfaces and MAC addresses allowed. I have triple checked the MAC addresses (including packet capture) to verify but some are still blocked. Those blocked reside on the same VLAN(s). Only a few VLANs are affected (strange). If I IP allow them I have connectivity. If I disable Captive Portal on the interface, connectivity is restored.

                        1 Reply Last reply Reply Quote 0
                        • S SteveITS referenced this topic on
                        • S SteveITS referenced this topic on
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Do you have bandwidth limits set on the affected captive portal zones?

                          P 1 Reply Last reply Reply Quote 0
                          • P
                            pinballwiz @stephenw10
                            last edited by

                            No bandwidth limits set now or previously.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              OK thanks. There's definitely some issue there. We are trying to pin it down.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.