Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Devices on different VLANs do not seem to be able to talk across firewall

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    17 Posts 3 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ahking19A
      ahking19 @dlponladd
      last edited by

      @dlponladd does the pfsense laptop have multiple NICs?

      Post your interface assignments. Also post your firewall rules on the VLANs

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @dlponladd
        last edited by

        @dlponladd said in Devices on different VLANs do not seem to be able to talk across firewall:

        Port 8 - VLAN 1, 10-12 tagged
        Port 10 - VLAN 10 tagged

        The idea being that the WAN would be plugged in at port 10 and routed through the pfSense computer to the rest of the network.

        Huh.. if your wan comes into pfsense - why is is tagged, and ok even if tagged - why would be be also taggged on port 8? If vlan 10 is the wan?

        Maybe a basic drawing of what is plugged in where..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        D 1 Reply Last reply Reply Quote 0
        • D
          dlponladd @johnpoz
          last edited by

          @ahking19

          RE : pfSense laptop multiple NICs?

          The pfSense laptop does not have multiple NICs. I based the initial configuration on this youtube video.

          RE : Post interface assignments

          Interface Assignments - pfSense

          Interface / Network Port
          LAN / em0
          WAN / VLAN10 on em0 -lan
          OPT1 / VLAN11 on em0 -lan
          OPT2 / VLAN12 on em0 -lan
          

          Interface Assignments - Cisco CB250 switch

          Interface / Network Port / Mode / VLAN
          GE1 /  1 / Access / 1U
          GE2 /  2 / Disabled
          GE3 /  3 / Disabled
          GE4 /  4 / Access / 11U
          GE5 /  5 / Access / 12U
          GE6 /  6 / Disabled
          GE7 /  7 / Disabled
          GE8 /  8 / Trunk / 1U, 10-12T
          GE9 /  9 / Disabled
          GE10 / 10 / Trunk / 10T
          
          RE : Firewall Rules

          All VLANs have the same rules : Allow All Traffic, based on the Default Allow Lan to Any rule. reference

          RE : Links

          (please note that any linked references are as much for me as for anyone else... I'm trying to keep notes that I can go back and reference later)

          @johnpoz

          RE : WAN

          Due to the hardware limitations of the laptop, I can only connect a single ethernet cable to it. The configuration of ports 8 and 10 are based on the video I linked above. The cliff notes version is that the goal is to force all traffic traveling to and from the WAN through the pfSense box using VLAN configuration.

          That's what I should have written instead of "to the rest of the network".

          I do not have the WAN hooked up for the testing I performed. I, er, wanted to try to wrap my head around what was going on before adding that piece into the puzzle.

          RE : Network Diagrams

          The following are diagrams of the two setups I was working with before posting here.

          Test Connection Setup 1.JPG

          Test Connection Setup 2.JPG

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @dlponladd
            last edited by

            @dlponladd said in Devices on different VLANs do not seem to be able to talk across firewall:

            Due to the hardware limitations of the laptop

            There is nothing wrong with a router on a stick setup.. I wouldn't be trying to tag vlan 1 that is for sure.

            But your test setup 2 should work without problem - forgetting wan.. with your 11 and 12 being access, ie untagged 11 and 12 and them with them tagged to pfsense.

            There should be no reason that shouldn't work as long as your devices are pointing to pfsense as their gateway. And your rules are correct for the interfaces they are on.. Are they really any any, you didn't source network that might be wrong? Or set a gateway on rules?

            Or set a gateway on the enterface where pfsense thinks its a "wan" connection.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            D 1 Reply Last reply Reply Quote 0
            • D
              dlponladd @johnpoz
              last edited by

              @johnpoz

              RE : Rules

              I just went back through and confirmed Permit Any-Any on all interfaces.

              Just for kicks and giggles, I went and reset and retested the two setups to see if anything changed. Test results are the same.

              RE : Gateway on Rules

              I don't know what setting a gateway on rules does... so I just left it at the default. It says "*", which I think means "Any."

              RE : Gateway on Interface

              I have the interfaces set up as Static IPv4. There is an option for a gateway but it is currently blank.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @dlponladd
                last edited by johnpoz

                @dlponladd well something is borked for sure.. This is clickly clicky work.

                Pfsense is not a vm running on this laptop?

                Your saying your 2 test boxes in both vlans get the correct IPs from dhcp on pfsense?

                What IP ranges are you using? Each test box can ping its gateway, ie pfsense IP address on each vlan

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                D 1 Reply Last reply Reply Quote 0
                • D
                  dlponladd @johnpoz
                  last edited by dlponladd

                  @johnpoz

                  RE : pfSense in VM

                  I had wanted to run pfSense in something akin to a dual-boot configuration but the installer had other ideas. And/or I didn't quite understand what was going on. Call it user error.

                  pfSense is not running inside a VM.

                  RE : IP Ranges

                  VLAN 1 is assigned 192.168.9.10 to 254
                  VLAN 11 is assigned 192.168.11.10 to 254
                  VLAN 12 is assigned 192.168.12.10 to 254

                  [edit] Fixed the IP ranges for 11 and 12 to not be wrong.

                  Based on my observations, the firewall usually grabs the .1 address. The managed switch usually grabs the .10 address. The test computers grab the .11 address, typically. There is occasionally some weirdness where a computer will hold onto an IP address when I swap what port it is connected to on the switch. Sometimes it happens, sometimes not.

                  Both test boxes get correct IP addresses from DHCP on pfSense. I think it's from pfSense. I think the Managed Switch can do DHCP, but I also think I have that turned off. In any case, I don't see unexpected IPs.

                  RE : Pinging

                  I get normal pings from both the switch port and from the pfSense firewall/gateway. I am a little fuzzy on the terminology.

                  The IP address that shows up on the dashboard with the associated interface/VLAN. Each box can ping that for the VLAN that that box is connected to at the time of the test.

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @dlponladd
                    last edited by johnpoz

                    @dlponladd said in Devices on different VLANs do not seem to be able to talk across firewall:

                    , the firewall usually grabs the .1 address.

                    What do you mean grabs? Pfsense would have static IPs.

                    From one of your test boxes do a ping to pfsense other IP..

                    example.. My pc is 192.168.9.100, pfsense is .253, it has another interface on another network 192.168.3.253

                    Does that work?

                    $ ping 192.168.3.253
                    
                    Pinging 192.168.3.253 with 32 bytes of data:
                    Reply from 192.168.3.253: bytes=32 time=1ms TTL=64
                    Reply from 192.168.3.253: bytes=32 time=16ms TTL=64
                    

                    If you can ping pfsense 192.168.12.x IP from your 192.168.11.x test box, but you can't ping your 192.168.12.testbox IP then that screams firewall on the test box and nothing to do with pfsense.

                    Windows firewall for example out of the box would not allow a ping from 192.168.11.x/24 if it was on a 192.168.12.x/24 network.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    D 1 Reply Last reply Reply Quote 0
                    • D
                      dlponladd @johnpoz
                      last edited by dlponladd

                      @johnpoz

                      RE : Grabs IP

                      My thought process was something along the lines of trying to make a distinction between what I tell it to assign during configuration and what it reports as being assigned on the Dashboard.

                      I'm not sure that's a meaningful distinction in this context... but that was what I was thinking when I wrote "...grabs the .1 address."

                      RE : Test Setup 2, ping from Config Computer to pfSense Interface for VLAN 12.

                      Config computer IP during test : 192.168.11.11

                      C:\>ping 192.168.12.1
                      
                      Pinging 192.168.12.1 with 32 bytes of data:
                      PING : transmit failed.  General failure.
                      PING : transmit failed.  General failure.
                      PING : transmit failed.  General failure.
                      PING : transmit failed.  General failure.
                      
                      Ping statistics for 192.168.12.1:
                            Packets: Sent = 4, Received = 0, Lost = 4 (100% lost).
                      

                      The response is quick, almost as if it isn't actually transmitting a ping. But I don't know enough to be sure one way or another. Those results don't seem to give me any information to work with.

                      I get identical results when trying to ping the switch port at 192.168.12.10 and the test computer at 192.168.12.11.

                      Just to demonstrate that it is actually connected to the switch, and the switch is connected to pfSense, I pinged the pfSense interface for VLAN 11.

                      C:\>ping 192.168.11.1
                      
                      Pinging 192.168.11.1 with 32 bytes of data:
                      Reply from 192.168.11.1: bytes=32 time<1ms TTL=64
                      Reply from 192.168.11.1: bytes=32 time<1ms TTL=64
                      Reply from 192.168.11.1: bytes=32 time<1ms TTL=64
                      Reply from 192.168.11.1: bytes=32 time<1ms TTL=64
                      
                      Ping statistics for 192.168.11.1:
                            Packets: Sent = 4, Received = 4, Lost = 0 (0% lost).
                      Approximate round trip times in milli-seconds:
                            Minimum = 0ms, Maximum = 0ms, Average = 0ms
                      

                      And at the end of writing this entire response... I had a thought. What if... I tell pfSense to ping itself. From one interface to another.

                      PING 192.168.11.1 (192.168.11.1) from 192.168.12.1 : 56 data bytes
                      64 bytes from 192.168.11.1 : icmp_seq=1 ttl=64 time=0.072ms
                      64 bytes from 192.168.11.1 : icmp_seq=2 ttl=64 time=0.065ms
                      64 bytes from 192.168.11.1 : icmp_seq=3 ttl=64 time=0.082ms
                      
                      - - -  192.168.11.1 ping statistics  - - -
                      3 packets transmitted, 3 packets received, 0.0% packet loss
                      round-trip min/avg/max/stddev = 0.065/0.073/0.082/0.007 ms
                      

                      I don't pretend to understand what is going on under the hood. What is happening to the packets? Maybe this means that the pfSense configuration is working?

                      ...I don't understand...

                      [edit : follow-up] Weirdly enough, adding a firewall rule to the VLAN 12 list to prevent this test (pinging interface from interface) doesn't seem to have an effect. Nor does it prevent pinging the switch port (#4), either. Both of the following tests performed from the pfSense GUI.

                      I put the block rule above the default allow rules previously mentioned.

                      Just as a reminder :
                      OPT1 = VLAN11 = 192.168.11.10 to 254
                      Switch port #4 is assigned VLAN11
                      OPT2 = VLAN12 = 192.168.12.10 to 254
                      Switch port #5 is assigned VLAN12

                      I tried doing the following:
                      Attempt 1 :
                      Rule : Block IPv4*/Source OPT2 subnets/Port Any/Destination OPT1 subnets/Port Any/Gateway Any/Queue none

                      Test Ping 192.168.11.1 from 192.168.12.1 --> test pfSense interface
                      Result : no effect (ping goes through)

                      Test Ping 192.168.11.10 from 192.168.12.1 --> test Switch port
                      Result : no effect (ping goes through)

                      Attempt 2 :
                      Rule : Block IPv4*/Source Any/Port Any/Destination OPT1 subnets/Port Any/Gateway Any/Queue none

                      Test Ping 192.168.11.1 from 192.168.12.1 --> test pfSense interface
                      Result : no effect (ping goes through)

                      Test Ping 192.168.11.10 from 192.168.12.1 --> test Switch port
                      Result : no effect (ping goes through)

                      I had hoped to use the two computers in tandem to test and verify network configuration and firewall rules.

                      RE : Windows Firewall on Config/Test computers

                      I ran into some text somewhere in the pfSense documentation that suggested that firewalls might block ICMP echo requests by default. I decided to see if turning off the firewalls might do anything, and it did.

                      Before turning off the firewalls, I couldn't ping the test and config computers from either pfSense or the switch. After turning the firewalls off on both the test and config computers, I was able to successfully ping both computers from both the pfSense computer and the switch.

                      I poked around in the Advanced Firewall settings to see if there was some behind the scenes "I'm showing 'off' but I'm not really 'off'" configuration that wasn't showing from the basic Firewall menu. I didn't find anything, but I'm not much of an OS admin so I doubt if I would notice anything out of place.

                      I did find something that suggested that ICMP echo requests would be allowed through. But, with the firewall "off", I don't know what the expected behavior actually is.

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @dlponladd
                        last edited by johnpoz

                        @dlponladd said in Devices on different VLANs do not seem to be able to talk across firewall:

                        Pinging 192.168.12.1 with 32 bytes of data:
                        PING : transmit failed. General failure.

                        That screams no gateway to me.. Your machine doesn't know how to get to 192.168.12.1 and its not on its local network.

                        Here I removed gateway from my pc, and then tried ping that 192.168.3.253 address

                        nogateway.jpg

                        If your device on your 12 network doesn't have a gateway, then no you would never be able to talk to it from some other network.. Its gateway should point to pfsense IP on your 12 network.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        D 1 Reply Last reply Reply Quote 0
                        • D
                          dlponladd @johnpoz
                          last edited by dlponladd

                          @johnpoz

                          RE : Gateway

                          So... I compared my ipconfig to your screenshots.

                          Both the config and test computers have "Connection-specific DNS Suffix". My Daily Driver does not have this filled out, nor does your screenshot.

                          I note that my Daily Driver has a Default Gateway, but that your screenshot and my test computers do not have that filled out.

                          My suspicion is that shows up in the DHCP server config on pfSense.

                          I have checked and I left the gateway setting in the DHCP server as default (it says firewall interface address).

                          Which suggests to me that this is a windows thing.

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @dlponladd
                            last edited by johnpoz

                            @dlponladd So neither of your test boxes have a gateway set? Well no wonder it would never work!

                            Your saying your clients get an IP from pfsense and their is no gateway?

                            So here is my client getting dhcp from pfsense. It was like that before because I set it to static and did not set a gateway to show you that general error points to not having a gateway. Here is normal dhcp listing

                            gateway.jpg

                            Notice it lists who the dhcp server is, and has a gateway.. Pointing to the same IP, because pfsense is the dhcp server and gateway (router to get off this network)..

                            If you do not have a gateway then no its not possible to talk to other networks, or for other networks to talk to you..

                            So your saying on your dhcp server in pfsense.. You have it like this

                            dhcp.jpg

                            And its enabled and shows pfsense IP there, kind of greyed out? See how my lan has 192.168.9.253 there

                            And here is from the dhcp server on my 192.168.3.0/24 network

                            other.jpg

                            Dhcp isn't going to run if your interfaces are set for dhcp, which still confused why you would say "grabbed" if you actually set it on pfsense... This is how your interfaces should be set..

                            static.jpg

                            Your 11 and 12 interfaces should be static.. You have to actually set their IP if you want to run dhcp server on them.. And you want your dhcp server to hand out the pfsense IP in dhcp. Are you using ISC for your dhcp, or Kea? Kea is preview maybe there is something going on wrong there?

                            But no if your clients don't have a gateway that points to pfsense IP on the network they are on - then no your devices will never be able to talk to each other thru pfsense.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            D 1 Reply Last reply Reply Quote 0
                            • D
                              dlponladd @johnpoz
                              last edited by dlponladd

                              @johnpoz

                              RE : IP From pfSense

                              Yep. They get an IP address correctly from pfSense based on the VLAN they are in.

                              But no Default Gateway.

                              RE : Normal DHCP listing

                              The ipconfig report from the test and configuration computers looks very similar to the picture, but the Default Gateway entry is blank.

                              It seems reasonable to me to expect the DHCP IP and the Default Gateway to be identical. Somehow, my computers are getting one and not the other.

                              I went diving into the windows Event Viewer, but I didn't see anything relevant.

                              RE : DHCP Server configuration

                              Yep. Gateway is left as default, greyed out. All the DHCP servers are configured this way.

                              RE : Interface configuration

                              I set up the interfaces with only Static IPv4 for testing purposes. I may include IPv6 later or go another route. I haven't made it that far in my research.

                              Other than that, the interfaces are set up very similar to the pictures you provided.

                              OPT1 is set up with static address 192.168.11.1/24.
                              OPT2 is set up with static address 192.168.12.1/24.

                              RE : ISC/Kea

                              When I was doing the initial configuration and set up, there was a popup in pfSense saying that ISC was being depreciated and to use Kea. For the testing above, the DHCP servers were using the Kea server.

                              I set the DHCP server to ISC and rebooted pfSense (to be safe).

                              It doesn't seem to be setting the Default Gateway after the change. Both computers still get an appropriate IP address.

                              As an aside, I went through the process of manually resetting the ethernet adapter and flushing netsh. That didn't seem to change anything one way or another.

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @dlponladd
                                last edited by johnpoz

                                @dlponladd well that explains your issues then.. Cuz never going to work without a gateway.. You could sniff to see if not being offered or asked for..

                                Or if being asked for and just not offered.. Here is a sniff of my client doing a dhcp discover and getting its IP from pfsense dhcpd.

                                On the left is the discover, you can see in its request list it asks for the router, then on the right is the offer, and you can see dhcp sent the IP of pfsense.

                                dhcprouter.jpg

                                As a quick test, I would just set your machines your using for test to be static IPs and set the gateway on them to point to pfsense IP on whatever network they are on. This should work then, and you could then dig into why your not getting the gateway from dhcp.

                                You could also manually put in the gateway in the dhcp server vs letting it do it by default - does that then hand out the gateway to the client?

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                D 1 Reply Last reply Reply Quote 0
                                • D
                                  dlponladd @johnpoz
                                  last edited by

                                  @johnpoz

                                  RE : Default Gateway

                                  Manually entering the gateway IP address into the DHCP server does, in fact, cause it to be sent to the attached computers. Woot!

                                  But there's now some weirdness going on.

                                  I did a bunch of testing to see what changed. Failures now are timeouts.

                                  Config Computer Ping pfSense (any VLAN) : success
                                  Config Computer Ping Switch (any VLAN) : success
                                  Config Computer Ping Test Computer : failure
                                  
                                  Test Computer Ping pfSense (any VLAN) : success
                                  Test Computer Ping Switch (any VLAN) : success
                                  Test Computer Ping Config Computer : failure
                                  
                                  pfSense Ping Switch (any VLAN) : success
                                  pfSense Ping Config Computer (any VLAN) : success
                                  pfSense Ping Test Computer : mixed
                                     Same VLAN : success
                                     Different VLAN : failure
                                  
                                  Switch to pfSense (any VLAN) : success
                                  Switch to Config Computer : mixed
                                     Same VLAN : success
                                     Different VLAN : failure
                                  Switch to Test Computer : mixed
                                     VLAN 1 : success
                                     VLAN 4 : failure
                                     VLAN 5 : failure (the VLAN this one is attached to; test computer did successfully get IP address and Default Gateway).
                                  

                                  I don't know what's going on. The VLANs on the switch used to show up in the DHCP leases menu on pfSense and now they don't.
                                  This doesn't seem right.

                                  I am going to bring the whole network down and do a cold start.

                                  If it's still behaving weird after that, I may restore to factory configuration on both pfSense and the switch.

                                  D 1 Reply Last reply Reply Quote 0
                                  • D
                                    dlponladd @dlponladd
                                    last edited by

                                    I just wanted to follow up after having had some time to test and tinker.

                                    @johnpoz : Thanks for your help and patience! Your insight was invaluable.

                                    RECAP : Issue

                                    My original issue was identified by the supposed failure of pings to traverse through pfSense between two devices on different networks (ex. 192.168.11.xx and 192.168.12.xx).

                                    RECAP : Issue No.1 : Windows Firewall Behavior

                                    Important issue no.1 didn't have anything to do with pfSense or, for that matter, with the network in general. Windows firewall blocks ICMP Echo requests and this behavior seems to continue even with the firewall turned off in the Control Panel.

                                    The weird part with this issue is that both pfSense AND the managed switch could ping both computers. The issue was revealed when the computers could not ping each other (pings timed out).

                                    The simplest way to fix this behavior is to add an Allow Rule to Windows Firewall for ICMP behavior. Just... make sure to turn it off before using those test machines elsewhere.

                                    RECAP : Issue No.2 : pfSense DHCP

                                    Important issue no.2 had to do with weird behavior from the DHCP service on my pfSense machine. I cannot say if this is the result of a bug. I would have to do further testing (which I may follow up on later).

                                    This was described by johnpoz as : "if your device... doesn't have a gateway, then you would never be able to talk to it from some other network."

                                    Or even simpler : No door (gateway), no exit.

                                    This issue was revealed by the ping attempt on one of the computers throwing a "General Failure" error when trying to ping the other computer. Investigation of ipconfig results confirmed the issue (missing network gateway).

                                    The proposed solution that fixed the issue was simply to enter a value in the DHCP configuration screen : Other DHCP Options/Gateway. Adding a value here propagated to the two testing machines.

                                    The value I used was the IP address of the associated firewall interface (... the default value...).

                                    Fin

                                    That's it.

                                    Pings between the two computers works as expected, even when they are in different networks. The ping works in both directions.

                                    Thanks again!

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.