Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN Priority when set in a firewall rule, the PASS rule is disrupted

    Plus 24.03 Development Snapshots (Retired)
    2
    16
    905
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      Matching or Setting a priority?

      G 1 Reply Last reply Reply Quote 0
      • G
        graphene @stephenw10
        last edited by

        @stephenw10 setting the priority

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          I can't replicate that. A pass rule configured to set a priority on matched traffic passes as expected and sets the priority tags:

          pass  in  quick  on $LAN inet from $LAN__NETWORK to any ridentifier 0100000101  set prio 5 keep state label "USER_RULE: Default allow LAN to any rule" label "id:0100000101"
          
          15:48:52.600830 00:90:0b:7c:10:58 > 00:08:a2:0c:c9:91, ethertype 802.1Q (0x8100), length 102: vlan 0, p 5, ethertype IPv4 (0x0800), (tos 0x0, ttl 63, id 50626, offset 0, flags [DF], proto ICMP (1), length 84, bad cksum 0 (->a976)!)
              172.21.16.75 > 8.8.8.8: ICMP echo request, id 11711, seq 1, length 64
          15:48:52.607588 00:08:a2:0c:c9:91 > 00:90:0b:7c:10:58, ethertype IPv4 (0x0800), length 98: (tos 0x60, ttl 116, id 0, offset 0, flags [none], proto ICMP (1), length 84)
              8.8.8.8 > 172.21.16.75: ICMP echo reply, id 11711, seq 1, length 64
          

          You have a screenshot of the rule?

          How are you testing?

          G 1 Reply Last reply Reply Quote 0
          • G
            graphene @stephenw10
            last edited by graphene

            @stephenw10 This rules does not work:

            Screenshot 2024-04-18 074444.png

            This rules does:

            Screenshot 2024-04-18 074645.png

            I confirm that I do not have any VLAN Prio matching rule in the firewall. And as I explained before, this was working in 23.09.1 and has worked for many years until now.

            Testing is done just by making the change, going to the device that belongs to that VLAN and opening a browser to confirm connectivity. In the case of the firewall set as the first screenshot the connection timesout.

            G 1 Reply Last reply Reply Quote 0
            • G
              graphene @graphene
              last edited by

              @graphene Have also tested removing the Tag clause with same results. The below rule does not work. It does when you set the VLAN prio to "none"

              Screenshot 2024-04-18 080154.png

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Ok to be clear it never passes the traffic? Or doesn't set the priority tag?

                Is VLAN99 there actually a VLAN interface on pfSense? I could imagine the tags conflicting somehow.

                Do you see states opened by that rule when traffic is not passing?

                G 1 Reply Last reply Reply Quote 0
                • G
                  graphene @stephenw10
                  last edited by graphene

                  @stephenw10 Have not made any inspection to the packets to check if the priority is set in the frame, so cannot tell you if the tag is set or not.

                  What I can tell you is that the traffic does not PASS with VLAN prio set = EE and other values in my particular use case.

                  The VLAN99 is an actual interface in pfSense, yes.

                  G 1 Reply Last reply Reply Quote 0
                  • G
                    graphene @graphene
                    last edited by graphene

                    This is a screenshot of the states on that VLAN after resetting the firewall states and enabling the "not working" rule

                    Screenshot 2024-04-18 082414.png

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Is that filtering by the rule number? I have no idea if those states are passed by that rule. You might have other rules on VLAN99.

                      G 1 Reply Last reply Reply Quote 0
                      • G
                        graphene @stephenw10
                        last edited by

                        @stephenw10 Good point. Should have explained. Apologies.

                        The filter I applied was by IP. All 192.168.199.x devices belong to VLAN99.

                        And there is only one rule that allows outbound traffic from that VLAN and that is the rule we are discussing here.

                        There are a couple of states to the DNS server which is commanded by an interface group rule and that seems to have some traffic Ok based on the above screenshot.

                        Interestingly when I filter by rule Id, I don't get any results.

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Hmm, so it looks like with the rule configured to set priority it is matching traffic and opening states on both interfaces. But there are no replies implying that traffic is either not leaving the WAN or is blocked by something upstream?

                          The fact it's opening states on WAN implies it is passing VLAN99.

                          Can you run a packet capture on WAN and see if that traffic is actually leaving?

                          G 1 Reply Last reply Reply Quote 0
                          • G
                            graphene @stephenw10
                            last edited by

                            @stephenw10 Thank you.

                            Yes, it seems the traffic is leaving the WAN interface so it must be something upstream.

                            Interestingly, the same config was working in the previous version. So I wonder if the priority TAG was stripped in 23.09.1 before leaving WAN and now it just continues form the private LAN to WAN.

                            Cheers

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Yes it's possible it's now working correctly and was broken before. There have been a bunch of fixes in pf that might have done that, potentially.

                              1 Reply Last reply Reply Quote 1
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.