Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN parent Interface LAN no routing from VLAN to LAN

    Routing and Multi WAN
    3
    9
    830
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      cpohle
      last edited by cpohle

      Hi,

      I am in a migration from Sophos UTM to pfsense and so far I have everything up and running except one little thing where cant get a solution even after googling and reading for hours.

      My pfsense has two NICs. One for WAN and one for LAN.
      On LAN I also added 1 VLAN to seperate my GuestWifi from my LAN.

      GuestWifi is working fine. Clients in their do receive the correct IP Addresses from pfsense DHCP Server and they are also able to access Internet.

      The only thing that isnt working is, that I cant reach any device from one subnet to another.
      So e.g. a GuestWifi Client with IP 10.49.13.10 is unable to reach a webserver on 192.168.178.10.

      I assigned IPs to every interface and only the WAN Interface has a Gateway defined.
      I also changed all the firewall rules to "any any" without success.

      I cant even see in the firewall log, that the GuestWifi Client is trying to reach a Client in the LAN Segment.
      If I ping from GuestWifi Client to Gateway Addresses in both VLAN and LAN I do get a reply and also this traffic is logged in Firewall Log.
      But as I said, I am unable to get another Client from one subnet to another.

      I made a little simple drawing. Green represents traffic that works, red one which does not work.
      Screenshot 2023-08-09 105546.png
      vlan.png

      I now read a lot and found some articles stating, that having VLAN on "LAN Interface" problems could accur regarding routing.
      Dont know the exact reason, but I guess "tagged, untagged problems etc.".

      Could this be my problem?

      FWRulesGuest.png FWRulesLAN.png Guest.png LAN.png

      Hope someone is able to give some hints.
      The pfsense is running on ESXi 6.7 and the LAN Interface that is mapped from esxi has 4095 as VLAN ID (within esxi)
      Also the VLAN is tagged on the underlying HP Switch.

      Thanks a lot and regards
      Christian

      V johnpozJ 2 Replies Last reply Reply Quote 0
      • V
        viragomann @cpohle
        last edited by

        @cpohle said in VLAN parent Interface LAN no routing from VLAN to LAN:

        I now read a lot and found some articles stating, that having VLAN on "LAN Interface" problems could accur regarding routing.
        Dont know the exact reason, but I guess "tagged, untagged problems etc.".

        But none of these problems are caused by pfSense. Mostly this is due a VLAN misconfiguration outside, so that the L2 is leaking or somewhat else.

        First of all ensure that your destination device is accepting access from outside of its own subnet. By default this is not allowed and you have to configure its firewall properly.

        To investigate the routing you can use Diagnostic > Packet Capture on pfSense to analyze the traffic on LAN and VLAN.

        Also check the firewall log for block lines.

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @cpohle
          last edited by

          @cpohle said in VLAN parent Interface LAN no routing from VLAN to LAN:

          that having VLAN on "LAN Interface" problems could accur regarding routing.

          Where did you read this - do you have a link? if I took a guess to what that is about, I would say they were talking about using your lan as a transit for a downstream network. Which yes could and will cause asymmetrical routing.

          But having tagged vlan isn't going to cause any problem no matter what "interface" its on in pfsense. As long as the vlan and the parent native "vlan" (untagged) are correctly isolated throughout the network.

          Or maybe you were reading something that said its not good to have untagged and tagged networks on the same interface. There is some common practice in enterprise networks to not run untagged (native) vlan and then tagged networks on the same interface.

          While running only tagged is one way to do it. 1 Untagged or "native" network while other vlans are tagged works just fine - comes down to more of policy of the network to try and prevent any mistakes or ability to access a network without configuration.. This can prevent possible issue where tag was not used and then have access to a network not suppose to have.

          Comes down to oh forget to set a vlan on this interface, and now its in default vlan 1, and something plugged into this port is now on the default vlan which is untagged.

          As long as your network is setup correctly, you can run 1 untagged network/vlan on an interface along with other tagged vlans. What can not do is have more than 1 untagged vlan, and your pvid need to be setup correctly for any ports that will have untagged vlan, and tagged vlans on them.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          C 1 Reply Last reply Reply Quote 0
          • C
            cpohle @johnpoz
            last edited by

            @johnpoz
            I don not know where I read this to be honest. If I find the link I will of course share it.

            Here was someone with a similar problem:
            https://forum.netgate.com/topic/138670/routing-between-interfaces-lan-vlan/16

            I would guess that VLANs are correctly Tagged/Untagged in both esxi and the Switch as my Clients in the VLAN do receive the right IP from the DHCP Server on the PFSense. Also they are able to reach the Internet.

            Only thing that isnt working is from VLAN to LAN. Hosts in my LAN are accepting connections from VLAN Subnet for sure. There is no Client Firewall active or so.

            If it would be Firewall related I would expect to see something in the logs. But I dont see anything there!

            Here is my route print from the pfsense GUI
            Screenshot 2023-08-09 165953.png

            Thanks Guys!

            johnpozJ C 2 Replies Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @cpohle
              last edited by johnpoz

              @cpohle said in VLAN parent Interface LAN no routing from VLAN to LAN:

              in both esxi and the Switch

              So your passing all the tags to pfsense via setting a vlan ID on the esxi vswitch/port group to 4095 (VGT).. There are couple different ways to handle vlans in esxi, you can have esxi handle it by creating vswitches or port groups that are in the specific vlan. Or you can pass the tags to pfsense interface by setting 4095

              its possible you got some weirdness in that configuration?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              1 Reply Last reply Reply Quote 0
              • C
                cpohle @cpohle
                last edited by

                I captured the traffic coming from VLAN. My iPhone with IP 10.49.13.10 is trying to open http website under 192.168.178.21.

                I cant find anything in the capture file regarding such traffic.

                Screenshot 2023-08-09 171406.png

                What in hell I am doing wrong? Shouldnt I see at least anything trying to connect to this target subnet 192.168.178.0/24?

                V 1 Reply Last reply Reply Quote 0
                • V
                  viragomann @cpohle
                  last edited by

                  @cpohle
                  Maybe a guest wifi configuration on the AP which only allows access to public destinations?

                  C 2 Replies Last reply Reply Quote 0
                  • C
                    cpohle @viragomann
                    last edited by

                    @viragomann
                    Could be, I will check this again. As far as I could see, all security related features within the GuestWifi were turned off. Its Ubiquiti APs btw

                    Here is my network config in my esxi

                    PhysicalNics.png

                    PortGroups.png

                    Let me know if you need other infos as well.

                    1 Reply Last reply Reply Quote 0
                    • C
                      cpohle @viragomann
                      last edited by

                      @viragomann And exactly that was the case/issue.

                      The VLAN contains my GuestWifi Clients. On the Unifi APs I had seperate LAN configured and in here there was "apply Guestpoliy" option enabled.

                      GuestWifiSettings.png

                      From there Ubiquiti Forum I had a description of what this feature does once enabled:

                      **Guest policies on VLAN will have firewall rules blocking that VLAN from all others and will apply L2 isolation.**
                      

                      After that checkbox was disabled I can reach the LAN Subnet just fine.

                      Thanks for help folks!!

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.