Three Interfaces, one does not behave as intended, I'm lost.
-
Hello Community,
I have some knowledge about pfsense, working with the CE at work and home, now have to install a pfsense+ at a customer and run into an issue I cannot resolve.
following setup (only relevant interfaces and rules mentioned, everything wide open to finally understand the issue):
netgate 6100, on 23.05.1-RELEASE
Interfaces:
LAN1: 192.168.10.0/24 alias LAN
LAN2: 10.0.0.0/24 alias Management
LAN3: 192.168.11.0/24 alias DMZFirewall rules set on LAN:
Protocol Source Port Destination Port IPv4 TCP/UDP LAN net * Management net * IPv4 TCP/UDP LAN net * DMZ net * IPv4 ICMP any LAN net * Management net * IPv4 ICMP any LAN net * DMZ net *
Problem:
from LAN to DMZ, everything works as intended. Pings and traceroute to 192.168.11.0 can pass.
from LAN to Management, not a single packet get's through. No ping from 192.168.10.0 to 10.0.0.0 possible.If I ping from the pfsense directly via diagnostics->ping via the 10.0.0.0-interface, I can ping all three hosts.
If I ping from the pfsense directly via diagnostics->ping via the 192.168.10.0-interface, nothing get's through.Now up to you ;-) I'm absolutely not getting what messes with me.
Thanks in advance!
//edit: typo
-
@itsw
Consider that the host in the MM subnet may block the access by their own firewalls.
You probably have to allow access from outside of their subnet. -
@itsw said in Three Interfaces, one does not behave as intended, I'm lost.:
If I ping from the pfsense directly via diagnostics->ping via the 10.0.0.0-interface, I can ping all three hosts.
If I ping from the pfsense directly via diagnostics->ping via the 192.168.10.0-interface, nothing get's through.As @viragomann said, that smells like Windows Servers/Clients that have their firewall up and have their setting on "Domain/Public network" where everything NOT the same subnet as the host itself is considered "external" thus blocked.
If that's not it that could mean there are some shady routings, other gateways or very strange rulesets at work.
As an addition: I'd have LAN1/2 switched and made the first LAN interface (the one internally configured as "lan", not "optX") the management one. Simple reason: practicality and making use of the allow all rule for management makes more sense then having it running on a LAN with servers or clients that have no dealing on the firewall itself.
Cheers
\jens -
Thanks for your input, both of you.
The host firewall thing would evtl. kick in on the ESXi, but not for the other two hosts, which are switches that answer on ICMP echo requests from any subnet.
The routing is as simple as it can get, as the firewall has just been deployed and is mostly on default settings.
@JeGr I'll get in touch with you via dm.
-
@itsw I just wanted to share my.... "findings" with you ;-)
If one takes over a project from another contractor, always make sure to get as much of documentation as possible.
The gateway address on LAN and DMZ were on .254, the gateway address for the MANAGEMENT was on .1
everything was working as intended from the start, but the hosts in management network did not pass the traffic bc of wrong gateway.