Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    One of the interfaces setup as an additional isolated LAN not working

    Scheduled Pinned Locked Moved NAT
    8 Posts 2 Posters 371 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      Kajetan321
      last edited by

      Hello, I’m trying to configure one of my spare interfaces as an additional isolated LAN (I’m calling it Carleton). I’m following this tutorial here:

      https://docs.netgate.com/pfsense/en/latest/solutions/xg-7100/opt-lan.html

      The DHCP seems to works, a test computer gets assigned with an IP address but I’m unable to ping anything on the outside from that computer. I can’t even ping the gateway.

      Here’s how I set things up:

      Setting up the Carleton Interface
      pfSense > Interfaces > LAN3
      Description: Carleton
      IPv4 Config: Static IPv4
      IPv4 Address: 192.168.55.3 /24,

      Setting up DHCP
      Enable: Enable DHCP server on CARLETON interface
      Range 192.168.55.100 to 192.168.55.239

      Firewall:

      Screenshot 2024-01-23 at 12-52-15 pfSense1.lan.optiwave.com - Firewall Rules CARLETON.png

      Screenshot 2024-01-23 at 12-54-10 pfSense1.lan.optiwave.com - Firewall NAT Outbound.png

      Please help. I have been at this the whole afternoon.

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @Kajetan321
        last edited by

        @Kajetan321
        Note that this rule allows TCP only. It doesn't allow pings, which uses ICMP.
        Try protocol = any for testing.

        K 1 Reply Last reply Reply Quote 0
        • K
          Kajetan321 @viragomann
          last edited by

          @viragomann said in One of the interfaces setup as an additional isolated LAN not working:

          @Kajetan321
          Note that this rule allows TCP only. It doesn't allow pings, which uses ICMP.
          Try protocol = any for testing.

          I tried this and still no change.

          Screenshot 2024-01-23 at 17-21-52 pfsense1.lan.optiwave.com - Firewall Rules Edit.png

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @Kajetan321
            last edited by

            @Kajetan321
            Now you limited the source to the interface address.
            Select "Carleton net" to limit it to the connected subnet.

            K 1 Reply Last reply Reply Quote 0
            • K
              Kajetan321 @viragomann
              last edited by Kajetan321

              @viragomann

              OK, changes made and I'm now able to ping google. This is great, I still can't ping the gateway though.

              Screenshot 2024-01-23 at 17-36-05 pfsense1.lan.optiwave.com - Firewall Rules Edit2.png

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @Kajetan321
                last edited by

                @Kajetan321
                What is this source now? An alias?
                If so does it include the computer, which you're testing from?

                I'd recommend to set all rule options to any for test period.

                Are you even able to ping the pfSense interface IP then?

                K 2 Replies Last reply Reply Quote 0
                • K
                  Kajetan321 @viragomann
                  last edited by

                  This post is deleted!
                  1 Reply Last reply Reply Quote 0
                  • K
                    Kajetan321 @viragomann
                    last edited by

                    @viragomann Thanks you it all works now. I was mistyping the ping address. It's time to go home.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.