• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

VLAN Priority when set in a firewall rule, the PASS rule is disrupted

Plus 24.03 Development Snapshots (Retired)
2
16
901
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    stephenw10 Netgate Administrator
    last edited by Apr 17, 2024, 1:01 PM

    So a pass rule on a VLAN that has a priority set? Or a pass rules matching against priority tags? Or passing and setting a priority?

    G 1 Reply Last reply Apr 17, 2024, 2:04 PM Reply Quote 0
    • G
      graphene @stephenw10
      last edited by Apr 17, 2024, 2:04 PM

      @stephenw10 PASS with priority set

      1 Reply Last reply Reply Quote 0
      • S
        stephenw10 Netgate Administrator
        last edited by Apr 17, 2024, 2:25 PM

        Matching or Setting a priority?

        G 1 Reply Last reply Apr 17, 2024, 2:27 PM Reply Quote 0
        • G
          graphene @stephenw10
          last edited by Apr 17, 2024, 2:27 PM

          @stephenw10 setting the priority

          1 Reply Last reply Reply Quote 0
          • S
            stephenw10 Netgate Administrator
            last edited by Apr 17, 2024, 2:53 PM

            I can't replicate that. A pass rule configured to set a priority on matched traffic passes as expected and sets the priority tags:

            pass  in  quick  on $LAN inet from $LAN__NETWORK to any ridentifier 0100000101  set prio 5 keep state label "USER_RULE: Default allow LAN to any rule" label "id:0100000101"
            
            15:48:52.600830 00:90:0b:7c:10:58 > 00:08:a2:0c:c9:91, ethertype 802.1Q (0x8100), length 102: vlan 0, p 5, ethertype IPv4 (0x0800), (tos 0x0, ttl 63, id 50626, offset 0, flags [DF], proto ICMP (1), length 84, bad cksum 0 (->a976)!)
                172.21.16.75 > 8.8.8.8: ICMP echo request, id 11711, seq 1, length 64
            15:48:52.607588 00:08:a2:0c:c9:91 > 00:90:0b:7c:10:58, ethertype IPv4 (0x0800), length 98: (tos 0x60, ttl 116, id 0, offset 0, flags [none], proto ICMP (1), length 84)
                8.8.8.8 > 172.21.16.75: ICMP echo reply, id 11711, seq 1, length 64
            

            You have a screenshot of the rule?

            How are you testing?

            G 1 Reply Last reply Apr 17, 2024, 9:49 PM Reply Quote 0
            • G
              graphene @stephenw10
              last edited by graphene Apr 17, 2024, 9:52 PM Apr 17, 2024, 9:49 PM

              @stephenw10 This rules does not work:

              login-to-view

              This rules does:

              login-to-view

              I confirm that I do not have any VLAN Prio matching rule in the firewall. And as I explained before, this was working in 23.09.1 and has worked for many years until now.

              Testing is done just by making the change, going to the device that belongs to that VLAN and opening a browser to confirm connectivity. In the case of the firewall set as the first screenshot the connection timesout.

              G 1 Reply Last reply Apr 17, 2024, 10:03 PM Reply Quote 0
              • G
                graphene @graphene
                last edited by Apr 17, 2024, 10:03 PM

                @graphene Have also tested removing the Tag clause with same results. The below rule does not work. It does when you set the VLAN prio to "none"

                login-to-view

                1 Reply Last reply Reply Quote 0
                • S
                  stephenw10 Netgate Administrator
                  last edited by Apr 17, 2024, 10:07 PM

                  Ok to be clear it never passes the traffic? Or doesn't set the priority tag?

                  Is VLAN99 there actually a VLAN interface on pfSense? I could imagine the tags conflicting somehow.

                  Do you see states opened by that rule when traffic is not passing?

                  G 1 Reply Last reply Apr 17, 2024, 10:20 PM Reply Quote 0
                  • G
                    graphene @stephenw10
                    last edited by graphene Apr 17, 2024, 10:21 PM Apr 17, 2024, 10:20 PM

                    @stephenw10 Have not made any inspection to the packets to check if the priority is set in the frame, so cannot tell you if the tag is set or not.

                    What I can tell you is that the traffic does not PASS with VLAN prio set = EE and other values in my particular use case.

                    The VLAN99 is an actual interface in pfSense, yes.

                    G 1 Reply Last reply Apr 17, 2024, 10:25 PM Reply Quote 0
                    • G
                      graphene @graphene
                      last edited by graphene Apr 17, 2024, 10:29 PM Apr 17, 2024, 10:25 PM

                      This is a screenshot of the states on that VLAN after resetting the firewall states and enabling the "not working" rule

                      login-to-view

                      1 Reply Last reply Reply Quote 0
                      • S
                        stephenw10 Netgate Administrator
                        last edited by Apr 17, 2024, 10:40 PM

                        Is that filtering by the rule number? I have no idea if those states are passed by that rule. You might have other rules on VLAN99.

                        G 1 Reply Last reply Apr 17, 2024, 11:00 PM Reply Quote 0
                        • G
                          graphene @stephenw10
                          last edited by Apr 17, 2024, 11:00 PM

                          @stephenw10 Good point. Should have explained. Apologies.

                          The filter I applied was by IP. All 192.168.199.x devices belong to VLAN99.

                          And there is only one rule that allows outbound traffic from that VLAN and that is the rule we are discussing here.

                          There are a couple of states to the DNS server which is commanded by an interface group rule and that seems to have some traffic Ok based on the above screenshot.

                          Interestingly when I filter by rule Id, I don't get any results.

                          1 Reply Last reply Reply Quote 0
                          • S
                            stephenw10 Netgate Administrator
                            last edited by Apr 18, 2024, 12:16 PM

                            Hmm, so it looks like with the rule configured to set priority it is matching traffic and opening states on both interfaces. But there are no replies implying that traffic is either not leaving the WAN or is blocked by something upstream?

                            The fact it's opening states on WAN implies it is passing VLAN99.

                            Can you run a packet capture on WAN and see if that traffic is actually leaving?

                            G 1 Reply Last reply Apr 19, 2024, 8:30 AM Reply Quote 0
                            • G
                              graphene @stephenw10
                              last edited by Apr 19, 2024, 8:30 AM

                              @stephenw10 Thank you.

                              Yes, it seems the traffic is leaving the WAN interface so it must be something upstream.

                              Interestingly, the same config was working in the previous version. So I wonder if the priority TAG was stripped in 23.09.1 before leaving WAN and now it just continues form the private LAN to WAN.

                              Cheers

                              1 Reply Last reply Reply Quote 0
                              • S
                                stephenw10 Netgate Administrator
                                last edited by Apr 19, 2024, 3:25 PM

                                Yes it's possible it's now working correctly and was broken before. There have been a bunch of fixes in pf that might have done that, potentially.

                                1 Reply Last reply Reply Quote 1
                                11 out of 16
                                • First post
                                  11/16
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.