Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Inter VLAN Access

    Scheduled Pinned Locked Moved Firewalling
    6 Posts 3 Posters 307 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      Overcon
      last edited by

      I have read many articles, followed AI-generated steps, and used pfSense for a few years (with one subnet), but I am having issues getting access between the LAN subnet and the VLANS. I have managed to get PING to ping the 'gateway' for each VLAN from the LAN, but not the other way around. I think once I get the method down, that works, I should have it, or I am missing something important somewhere else.

      I have Windows servers on the LAN subnet (172.16.1.2, 172.16.1.3, 172.16.1.4) that feed DNS, and 172.16.1.2 that feeds DHCP.

      I want to get DNS from the LAN servers and send it to the VLANS.
      I want to be able to PING from the LAN to all the VLANS and vice versa.

      I have tried several rules on the LAN side, the VLAN side, and back, but none seem to work. I can add a rule to hit the WebGUI, and it works. So, I believe the rules are working, but I am just stuck.

      I would appreciate some ideas on resolving this.

      Here are just some things I have tried:
      image_2025-06-26_210127276.png

      555a15dc-30bd-4cbc-ae7b-cc17d2f070af-image.png

      Thanks!

      Bob.DigB GertjanG 2 Replies Last reply Reply Quote 0
      • Bob.DigB
        Bob.Dig LAYER 8 @Overcon
        last edited by

        @Overcon All rules on any interface are only inbound. That means you can only control IPs connected to that interface, what they allowed to reach and what not. If you want some device on VLANx to connect to some other device on LAN, you have to do that on VLANx, not on the LAN.
        Also top to bottom, first match wins. Your screenshots show that you didn't do it right, yet.

        1 Reply Last reply Reply Quote 0
        • GertjanG
          Gertjan @Overcon
          last edited by Gertjan

          @Overcon

          Inter VLAN Access

          When you initially installed pfSense, you found on the on LAN interface these two rules :

          37b4ff6a-271a-44a5-b556-18adf3f1f87b-image.png

          Then you created 'more' LANs (VLAN, whatever, its all the same at this point).

          Use the copy icon on the IPv4 rule on the LAN interface, and assign it to a new other LAN(VLAN) ....
          and - wait for it .... => change "LAN subnets" source to name of of that interface, like your "GUESTWIFI subnet".
          Save.
          Do the same thing for the IPv6 rule.

          Repeat all this for your other new LANs(VLANs).
          Now Apply all.
          Done.

          All LANs(VLANs) can now communicate with each other.

          The idea is : every interface needs rules so traffic can enter that interface.

          Btw : you use VLAN, not normal LAN - possible stress, pain and a steep learning process is still ahead.

          AI should have told you not to use VLANs, but classic LANs as way easier to set up and maintain.
          There only one physical part to admin LAN : slide in a NIC in on both side and plug the RJ45 cable. Done. No mouse, no strange interfaces, no hassle. Easy to rebuild when thing go wrong 😊

          VLANs can be useful of course, for example when you have a shared SSID AP.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          O 1 Reply Last reply Reply Quote 0
          • O
            Overcon @Gertjan
            last edited by

            @Gertjan @Bob-Dig

            Thanks, guys. I have tried copying the default allow rules from LAN, but I am still getting blocked by a Default Deny. I have even tried accessing via creating an EasyRule, but still no luck.

            bf67b78e-cfc7-4aea-89a4-004f2d83c6b4-image.png

            ee05422e-e086-4c38-b35b-6f63cf6bcdcb-image.png

            GertjanG 1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @Overcon
              last edited by

              @Overcon said in Inter VLAN Access:

              but I am still getting blocked by a Default Deny

              You should use the (default) rules proposed by Netgate. You can trust these guys, they created pfSense, and know about firewalls.

              These two :

              70cfe139-4cc3-4147-95ab-a33776ded352-image.png

              can happen anymore as you've added :

              2b370edd-4c7a-4055-b9e9-2f8d1e26bcf6-image.png

              although your WWW firewall rule set is already problamatic.

              The first 3 rules are TCP only, that ... can be done, but is already fishy - not a real live scenario.
              Rule 2 and 3 are doubles, one is useless.
              Limitations of rule 1 are overridden by rule 2 (and 3).

              Get the default rules back in place, and use Diagnostics > Packet Capture and scan your traffic for a while.
              You'll be seeing https, DNS, NTP, and many many others.
              Then make your own list with what you allow, and what not.
              Then you build your rules upon your choices.
              And then you test and see what's broken ... and you redo the process.

              And after a while, and this can take weeks, you get back to the original Netgate's proposition :

              29074741-2bf5-41ae-b21f-add4a236d736-image.png
              (rule 3 and 4).

              and live will be good.

              That said, you have a firewall, as we all have. Even the basic ISP router or the most stupid TP-Link from Walmart uses a firewall.
              You still have to check all your devices (on your LANs) and see what they do, what traffic kind of traffic they generate, what you will accept, what you don't accept, etc. You should do this even before opting for a firewall with more bells and whisles like pfSense.
              True, with pfSense you can packet capture to see what goes down the LAN(s).

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              O 1 Reply Last reply Reply Quote 0
              • O
                Overcon @Gertjan
                last edited by

                @Gertjan

                I figured it out. It was my old IPSEC tunnel. It was capturing the traffic, so the rules never really impacted the traffic. Once I removed the IPSEC tunnel, the rules started working, as mentioned.

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.