Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cross interface talk (how to)

    Firewalling
    2
    22
    1.6k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      tknospdr @viragomann
      last edited by

      @viragomann said in Cross interface talk (how to):

      @tknospdr
      For sure you should be able to access the AP from the other subnet.

      So you have a firewall rule in place to allow this?
      Then enable to logging in the rule and check the log to find out if it even matches the traffic.

      So I'm really new to pfSense. Can you help me out with what the FW rule should look like?
      The management interface is on interface ETH3, the AP's static IP is 10.100.10.0, and the GUI runs on port 8001.
      The interface I'm connected to when sending the requests is ETH3_20_SECURE, subnet is 10.100.20.0

      Also enable logging of the default blocks and check if concerned packets are blocked.

      Also I would sniff the packets on the interface, where the AP is connected to, to verify that both, request and respond packets are passing pfSense. Since the AP is multi-homed, maybe it sends responses out on the wrong interface. However, it shouldn't do this at all if it's really in AP-mode.

      Once I'm sure I've got the correct FW rules on the correct interfaces, then I'll tackle learning how to sniff packets et al.

      The rule should be on the 20.0 interface since that's where the packets are coming from right?

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @tknospdr
        last edited by

        @tknospdr
        Yes, the rule has to be on the incoming interface, so ETH3_20_SECURE.

        So to allow access from the whole subnet the values should be:
        Interface: ETH3_20_SECURE
        address family: IPv4
        protocol: TCP
        source: ETH3_20_SECURE net
        destination: single IP > 10.100.10.9
        dest. port: 8001
        Log checked
        enter a description

        However, since you said you didn't get access even with an allow any to any rule, I suspect that it's not on the firewall itself.

        In Status > System Logs > Settings check "Log firewall default blocks".

        Try to access and then check the firewall logs for concerned blocks.

        T 2 Replies Last reply Reply Quote 0
        • T
          tknospdr @viragomann
          last edited by

          @viragomann

          Idiot power company cut the fiber to my house for the 2nd time this month.
          So I'll have to wait till I get home to create any rules and do any testing.

          Will report as soon as I can.

          1 Reply Last reply Reply Quote 0
          • T
            tknospdr @viragomann
            last edited by

            @viragomann said in Cross interface talk (how to):

            Try to access and then check the firewall logs for concerned blocks.

            There are no entries in the log.

            V 1 Reply Last reply Reply Quote 0
            • V
              viragomann @tknospdr
              last edited by

              @tknospdr
              If you've enabled all rules logging and there is nothing in the log, the packets doesn't pass pfSense obviously.
              In the rule set do also see any state or bytes?

              Are sure that the AP is running in real AP-mode? Does it have IPs in both subnets?

              Yes, you can run a packet capture on ETH3_20_SECURE to see if there is any packet coming in, when you try to access the AP from this subnet. But I'm in doubt.

              1 Reply Last reply Reply Quote 0
              • T
                tknospdr
                last edited by

                I feel like I've tried every possible set of rules, and like you said, since even an ANY/ANY/ANY rule wasn't passing the traffic I've given up.

                I created a NAT rule to pass outside traffic to the AP, and then I turned on 'Pure NAT' reflection. I know it's not the most elegant solution, but I can now access the GUI from any internal subnet as well as from outside if I need to.

                1 Reply Last reply Reply Quote 0
                • T tknospdr referenced this topic on
                • T
                  tknospdr
                  last edited by

                  I just re-read the thread, you also said something about IP masquerading.

                  How would I do that to see if it's a viable solution?

                  T 1 Reply Last reply Reply Quote 0
                  • T
                    tknospdr @tknospdr
                    last edited by

                    Answering my own question (partially).
                    I set up a NAT 1:1 rule and I'm now able to access the WAP GUI on it's internal IP address from this computer, but it's tenuous.
                    I had to create the rule using the IP address of this computer that is subject to change via DHCP.
                    When I changed the rule from IP to 'net' it broke.
                    Is there a way to do the masquerading via the whole subnet I want to connect from, or should I just stick to the NAT reflection that I've already set up?
                    It's certainly much faster to respond via IP.

                    I guess it's probably not an issue for most folks, but I'm a bit of a computer hoarder, I access my network from a small army of different devices. Inside my home I may connect from my desktop Mac, or one of my two different laptops depending on where I am, then there's the iOS app I can connect on from either my iPhone or iPad. And I swap out my computers on a semi-regular basis.

                    I'm an Apple Certified hardware tech so I always find good deals that then make their way to my armada.

                    V 1 Reply Last reply Reply Quote 0
                    • V
                      viragomann @tknospdr
                      last edited by

                      @tknospdr
                      There is no NAT 1:1 needed.

                      Set a static mapping for the AP to get a fix IP via DHCP.

                      Masquerading is done with outbound NAT in pfSense.
                      Enable the hybrid mode and add a rule:
                      Interface: which the AP is connected to
                      source: your management network
                      destination: AP IP
                      translation: interface address

                      T 1 Reply Last reply Reply Quote 1
                      • T
                        tknospdr @viragomann
                        last edited by

                        @viragomann

                        I see now. I actually started with a rule in that section, but it remained in 'disabled' mode no matter what I did. I was missing the info about changing to hybrid mode.

                        Also, I just set up a host override for the name of the router too, and that also works now.

                        Thanks!

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.