Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN Priority when set in a firewall rule, the PASS rule is disrupted

    Scheduled Pinned Locked Moved Plus 24.03 Development Snapshots (Retired)
    16 Posts 2 Posters 935 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      graphene @stephenw10
      last edited by

      @stephenw10 setting the priority

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        I can't replicate that. A pass rule configured to set a priority on matched traffic passes as expected and sets the priority tags:

        pass  in  quick  on $LAN inet from $LAN__NETWORK to any ridentifier 0100000101  set prio 5 keep state label "USER_RULE: Default allow LAN to any rule" label "id:0100000101"
        
        15:48:52.600830 00:90:0b:7c:10:58 > 00:08:a2:0c:c9:91, ethertype 802.1Q (0x8100), length 102: vlan 0, p 5, ethertype IPv4 (0x0800), (tos 0x0, ttl 63, id 50626, offset 0, flags [DF], proto ICMP (1), length 84, bad cksum 0 (->a976)!)
            172.21.16.75 > 8.8.8.8: ICMP echo request, id 11711, seq 1, length 64
        15:48:52.607588 00:08:a2:0c:c9:91 > 00:90:0b:7c:10:58, ethertype IPv4 (0x0800), length 98: (tos 0x60, ttl 116, id 0, offset 0, flags [none], proto ICMP (1), length 84)
            8.8.8.8 > 172.21.16.75: ICMP echo reply, id 11711, seq 1, length 64
        

        You have a screenshot of the rule?

        How are you testing?

        G 1 Reply Last reply Reply Quote 0
        • G
          graphene @stephenw10
          last edited by graphene

          @stephenw10 This rules does not work:

          Screenshot 2024-04-18 074444.png

          This rules does:

          Screenshot 2024-04-18 074645.png

          I confirm that I do not have any VLAN Prio matching rule in the firewall. And as I explained before, this was working in 23.09.1 and has worked for many years until now.

          Testing is done just by making the change, going to the device that belongs to that VLAN and opening a browser to confirm connectivity. In the case of the firewall set as the first screenshot the connection timesout.

          G 1 Reply Last reply Reply Quote 0
          • G
            graphene @graphene
            last edited by

            @graphene Have also tested removing the Tag clause with same results. The below rule does not work. It does when you set the VLAN prio to "none"

            Screenshot 2024-04-18 080154.png

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Ok to be clear it never passes the traffic? Or doesn't set the priority tag?

              Is VLAN99 there actually a VLAN interface on pfSense? I could imagine the tags conflicting somehow.

              Do you see states opened by that rule when traffic is not passing?

              G 1 Reply Last reply Reply Quote 0
              • G
                graphene @stephenw10
                last edited by graphene

                @stephenw10 Have not made any inspection to the packets to check if the priority is set in the frame, so cannot tell you if the tag is set or not.

                What I can tell you is that the traffic does not PASS with VLAN prio set = EE and other values in my particular use case.

                The VLAN99 is an actual interface in pfSense, yes.

                G 1 Reply Last reply Reply Quote 0
                • G
                  graphene @graphene
                  last edited by graphene

                  This is a screenshot of the states on that VLAN after resetting the firewall states and enabling the "not working" rule

                  Screenshot 2024-04-18 082414.png

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Is that filtering by the rule number? I have no idea if those states are passed by that rule. You might have other rules on VLAN99.

                    G 1 Reply Last reply Reply Quote 0
                    • G
                      graphene @stephenw10
                      last edited by

                      @stephenw10 Good point. Should have explained. Apologies.

                      The filter I applied was by IP. All 192.168.199.x devices belong to VLAN99.

                      And there is only one rule that allows outbound traffic from that VLAN and that is the rule we are discussing here.

                      There are a couple of states to the DNS server which is commanded by an interface group rule and that seems to have some traffic Ok based on the above screenshot.

                      Interestingly when I filter by rule Id, I don't get any results.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Hmm, so it looks like with the rule configured to set priority it is matching traffic and opening states on both interfaces. But there are no replies implying that traffic is either not leaving the WAN or is blocked by something upstream?

                        The fact it's opening states on WAN implies it is passing VLAN99.

                        Can you run a packet capture on WAN and see if that traffic is actually leaving?

                        G 1 Reply Last reply Reply Quote 0
                        • G
                          graphene @stephenw10
                          last edited by

                          @stephenw10 Thank you.

                          Yes, it seems the traffic is leaving the WAN interface so it must be something upstream.

                          Interestingly, the same config was working in the previous version. So I wonder if the priority TAG was stripped in 23.09.1 before leaving WAN and now it just continues form the private LAN to WAN.

                          Cheers

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Yes it's possible it's now working correctly and was broken before. There have been a bunch of fixes in pf that might have done that, potentially.

                            1 Reply Last reply Reply Quote 1
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.