• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Two subnets, virtual IP Address, with one gateway

NAT
2
9
443
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    jogovogo
    last edited by Nov 9, 2023, 12:10 PM

    Hello everyone,

    I have a question about two subnets with one gateway.

    Once the primary network, 172.17.17.1/24 and then the second network with Virtual IP Address 172.16.155.1/24. Access to the Internet via the gateway (172.16.155.1) works perfectly with the Virtual IP Address.

    But now I want to prevent both networks from reaching each other, because that works now.

    At what point the rule and what it must look like, I don't know exactly now and don't want to block all network traffic, because I'm connected via VPN myself...

    The question is whether this is the right way or whether it should be solved via an OPT interface, where I have to assign the traffic route and, if necessary, a VLAN ID.

    Thank you for your help in advance!
    Ron

    V 1 Reply Last reply Nov 9, 2023, 12:27 PM Reply Quote 0
    • V
      viragomann @jogovogo
      last edited by Nov 9, 2023, 12:27 PM

      @jogovogo said in Two subnets, virtual IP Address, with one gateway:

      I have a question about two subnets with one gateway.

      Once the primary network, 172.17.17.1/24 and then the second network with Virtual IP Address 172.16.155.1/24. Access to the Internet via the gateway (172.16.155.1) works perfectly with the Virtual IP Address.

      You mean, both subnets are assigned to a single interface of pfSene, i.e. you have a single layer 2 for both?

      and don't want to block all network traffic, because I'm connected via VPN myself...

      Your VPN might not be concerned from rules you are adding to other interfaces.

      J 1 Reply Last reply Nov 9, 2023, 12:35 PM Reply Quote 0
      • J
        jogovogo @viragomann
        last edited by Nov 9, 2023, 12:35 PM

        @viragomann

        Thank you for your answer yes, both networks are connected to the same interface.

        The note with the VPN only serves that I access the web interface from the Pfsense from the outside.
        The VPN access itself does not take place via Pfsense.

        The question is where do I set the "deny" rule for both subnets.

        regards
        ron

        V 1 Reply Last reply Nov 9, 2023, 1:24 PM Reply Quote 0
        • V
          viragomann @jogovogo
          last edited by Nov 9, 2023, 1:24 PM

          @jogovogo said in Two subnets, virtual IP Address, with one gateway:

          The question is where do I set the "deny" rule for both subnets.

          On the interface tab as any other rule.

          You can block access to any other private subnet. Best practice for doing this is to create an alias of type network and add all RFC 1918 ranges to it. Then add a block rule to the LAN interface and use this alias as destination. Put this rule above of the allow-any rule.
          Note that the rules are probed from the top to the bottom of the rule set. So access to private destinations are blocked, but internet access is permitted.

          However to not block access to used services on pfSense itself, for instance if pfSense provides DNS for the internal subnets, you then need to create a pass rule for these services and place it above of the block rule, means at the topmost position.
          For accessing the webGUI you should have enable the anti-lockout rule. So this rule is always on the very first place and cannot be moved down.

          J 1 Reply Last reply Nov 9, 2023, 1:41 PM Reply Quote 0
          • J
            jogovogo @viragomann
            last edited by jogovogo Nov 9, 2023, 1:41 PM Nov 9, 2023, 1:41 PM

            @viragomann

            Okay, I would have made it easy for myself now by simply banning the subnet among each other, if possible.

            login-to-view

            V 1 Reply Last reply Nov 9, 2023, 1:57 PM Reply Quote 0
            • V
              viragomann @jogovogo
              last edited by Nov 9, 2023, 1:57 PM

              @jogovogo
              Yes, you can do that, but makes no sense.
              At source you can select "any", at destination simply use 172.16.0.0/12. There is no need to limit this anyhow at all.
              Traffic between devices within the same subnet does not pass pfSense, hence the rule has no affect on it.

              J 1 Reply Last reply Nov 9, 2023, 2:58 PM Reply Quote 0
              • J
                jogovogo @viragomann
                last edited by Nov 9, 2023, 2:58 PM

                @viragomann said in Two subnets, virtual IP Address, with one gateway:

                @jogovogo
                Yes, you can do that, but makes no sense.
                At source you can select "any", at destination simply use 172.16.0.0/12. There is no need to limit this anyhow at all.
                Traffic between devices within the same subnet does not pass pfSense, hence the rule has no affect on it.

                Okay, understandable, that has no effect, I hadn't even thought about it...
                So it had to be right, didn't it?

                login-to-view login-to-view 
                

                V 1 Reply Last reply Nov 9, 2023, 3:02 PM Reply Quote 0
                • V
                  viragomann @jogovogo
                  last edited by Nov 9, 2023, 3:02 PM

                  @jogovogo
                  You might want to block any protocol, not only TCP. Apart from this it seems well.

                  J 1 Reply Last reply Nov 12, 2023, 11:09 AM Reply Quote 1
                  • J
                    jogovogo @viragomann
                    last edited by Nov 12, 2023, 11:09 AM

                    @viragomann

                    The rule works perfectly. The problem is that it automatically deletes itself...

                    Do you have an idea if there is any management like autorule creation / delete.

                    regards
                    ron

                    1 Reply Last reply Reply Quote 0
                    3 out of 9
                    • First post
                      3/9
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.