Setting up new device on LAN
-
@luckman212
NAT works fine for clients on the LAN, it's only pfSense itself that cannot see the gateway but yet can NAT clients to it just fine.I tried the gateway settings both monitor to the IP and past it but it did make a difference:
-
@peterlecki ok confused, thought you said your gateway was 192.168.4.1 - why are you blocking it out? from the wangw on the gateway tabs.
Is what pfsense show for it wangw not 192.168.4.1 and some public IP?
If pfsense was actually sending traffic to 192.168.4.1 there is no possible way it could work without a mac address... Just not possible at all..
You say clients behind pfsense work - lets see your state table please to some remote site... So for example... get a constant ping going to say 8.8.8.8, you say that works right from your clients..
In the state table list that... So example here is mine..
See where you see state on lan from my pc at 192.168.9.100 sending to 8.8.8.8 and then pfsense natting this to my wan IP (which is public IP address)..
-
This post is deleted! -
There is no NAT on those WAN states so something upstream is NATing it. Or not NATing it since there are no replies.
More importantly that's not ping traffic so where ever you're pinging from there is not going through the firewall at all.
Steve
-
8.8.8.8 does show states in UDP on port 53 but 8.8.8.8 is my primary configured DNS. Still no icmp states, though. So 8.8.4.4 is a better test you wanted to see, John.
-
Where are you running that ping? It's not passing the firewall.
-
@peterlecki yup clearly that client isn't using pfsense at all..
Do a simple traceroute, or even lets see the ipconfig /all of that box..
Clearly pfsense that you say is connect to your other router isn't - since if it was it would see the mac address. Since it can not see the mac address - there is no way anything could route through it, etc..
Your states of your wan IP trying to talk to 8.8.8.8:53 go unanswered.. Not even sure why it would create a state - if has no where to send it, ie no mac of your gateway 4.1
Still not sure why you would hide your wangw if like you say its 192.168.4.1..
-
@johnpoz @stephenw10
This was an ID10T error. I had wireless active on the client device I was testing from so of course it was accessing the internet via the normal gateway. I now noticed this after you pointed it out and turned it off. Now it no longer can access the internet. Apologies for wasting your time and energy and thank you for pointing this out.Anyway, now that I no longer complicate the situation even further with "fake news", let's get back to the issue at hand. John, blocked out in that screenshot was my real ISP gateway IP. The WANGW_TEMP was configured as the gateway for the WAN interface. So the public WANGW gateway was available but not used. Just to eliminate any potential problems, I now completely removed it:
And here are the icmp states:
-
Ok, so the states look correct but your temporary WAN gateway is not responding so the pings go nowhere.
I assume it is not in the ARP table still?So what is 192.168.4.1? How is the WAN interface connected to it?
I would not expect the public WAN gateway to be available at the same time if there is another router in between.
Steve
-
@peterlecki here is the thing if 192.168.4.1 is actually suppose to be pfsense gateway. It needs to answer arp.. If no then no there is no way its going to do anything, answer ping pass traffic nothing.
So either you do not have pfsense wan IP plugged into the correct port, or 192.168.4.1 is not the correct IP..
Your saying if you plug pfsense into this router it gets that wan IP via dhcp? But can not arp for 192.168.4.1?? You sure that is what is suppose to be used for the gateway?
If I had a router and its IP was say 192.168.4.254, I could hand out dhcp - in the 192.168.4.x network - but if I told dhcp clients 192.168.4.1 was the gateway when there is no 192.168.4.1 then no you wouldn't work couldn't arp for it..
So your saying when wifi clients are on wifi they get 192.168.4.1 as their gateway and they can ping it.. Well then seems whatever your plugging pfsense wire into isn't that..
-
4.1 does answer ARP and I can see it from PC 4.100: 192.168.4.1 70-4f-57-01-24-b0
but pfSense still shows MAC of 4.1 as "incomplete" in the ARP table.from 4.100 I can ping 4.244 and 4.1
from 4.1 I can ping 4.100 but cannot ping 4.244
so it does seem as if the wires were not correctly plugged in somewhere but 4.1 has just ONE wire going into it but only 4.100 can ping it but 4.244 cannot -
Try swapping the wires or the ports on the switch.
There is something low level failing.
I assume you see link LEDs on the WAN port and switch?
It could be a bad NIC you could reassign the WAN to a different port.
Steve
-
@peterlecki said in Setting up new device on LAN:
from 4.100 I can ping 4.244 and 4.1
And pfsense sees the mac of .100 in its arp table but not .1?
Is that just a dumb switch? Or a vlan cable switch? Or smart switch - could be doing private vlan setup that is not correct for how you want to use it, etc.
-
@stephenw10
LEDs are the same on WAN and LAN ports. I just switched them around and LAN works on the previous WAN port and WAN still doesn't work on the previous LAN port. So it's not the hardware. -
@johnpoz
Correct, pfSense can see 4.100 but not 4.1
It's a dumb switch in between them. -
You tried swapping the swotch ports the pfSense WAN and laptop are connected to?
Because some sort of private VLAN setup on the switch could present like this as @johnpoz said.
Edit: Missed your updateSteve
-
Try running a packet capture on WAN in promiscuous mode. You should see at least broadcast traffic from the other hosts in the subnet.
-
@stephenw10
Interesting!ARP, Request who-has 192.168.4.1 tell 192.168.4.244
So the 4.1 gateway is not responding. Yet it responds to the 4.100 host. Plus the 4.1 device shows 4.244's MAC in its own ARP table. But never responds to the request? I am fucking tripping, man.
-
Ah, well hallucinogenic substances is one explanation.
But is it fact responding and the pfSense WAN simply never receives it...
Try pinging the 4.100 host whilst running a pcap. It should ARP for that too and should see a response.
-
@stephenw10
I do see the ARP request for 4.100 and the reply on the pfSense capture.
I also ran a promiscuous capture on the 4.100 host and can see ARP requests from 4.244 for 4.1 but 4.1 never responds. I can see it respond to 4.100 but it never responds to 4.244, as if it is completely ignoring any and all packets from that host.