Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Intervlan traffic being blocked

    Scheduled Pinned Locked Moved Firewalling
    42 Posts 4 Posters 361 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      greatbush
      last edited by

      Good day, i cannot figure out why traffic is being blocked even though the rule are set to the top
      6545e7a6-1f82-45b3-b835-5fcc9235f7d4-image.png

      7ec5108b-b279-49a5-a54c-b585fa6813ce-image.png

      Pinging from 10.20.160.72 to 172.16.64.200 does not go through. When i look at the logs i do not see any icmp traffic but i do see logs for an rdp session. Does anyone know why?
      The devices on the S interface can reach the internet

      patient0P johnpozJ G 3 Replies Last reply Reply Quote 0
      • patient0P
        patient0 @greatbush
        last edited by

        @greatbush what is the network of Server, 10.20.160.0/24? And is 172.16.64.200 part of another VLAN?

        1 Reply Last reply Reply Quote 0
        • planedropP
          planedrop
          last edited by

          We need more info before we can do much here.

          Are these on separate VLANs and subnets? Are you sure that the VLANs are configured correctly for all clients and on all switches?

          It also could be the client devices firewall, if you have it enabled, it may be blocking pings from other subnets on it's own.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @greatbush
            last edited by

            @greatbush can't make heads or tales of which network is which here.. you have source 10.20.x.x on both interfaces. And then 172.16 as both source and a destination.

            Which network is which here? You only need a rule that allows on the source of traffic interface..

            pc -- S -- pfsense -- Servers -- server.

            If you want pc to ping servers then the allow rule needs to be on the S interface of pfsense - what rules you have on the server interface in pfsense means nothing - you could have zero rules on that interface and the pc in S would be able to ping the server because pfsense would allow the return traffic via the state that was created when pfsense allowed the pc to talk to the server IP on the S interface as the traffic enters pfsense.

            A see some traffic hitting that rule on your S. interface - that 0/1 KiB means that rule has seen 1 KiB of traffic.

            But if server doesn't answer - then no you would never get an answer. Is the server using some other gateway? Is it running its own host firewall?

            Do you have rules in floating?

            For your source why are you not using S. subnet, and rules on your servers interface should be Servers subnet, etc.

            Are these networks downstream networks and not actually the networks on the pfsense interface?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            planedropP 1 Reply Last reply Reply Quote 1
            • G
              greatbush @greatbush
              last edited by

              Server has an interface ip of172.16.64.1/21, vlan 48
              S has an interface ip of 10.20.160.1/24, on vlan 16

              testpc [connected into port1 of S switch] -> S switch[connected into port 1 of server switch] -> Server switch -> pfsense

              @planedrop i have disabled the firewall on the server at 172.16.64.200 and that didn't work. I know the server vlan is configured properly because it can reach other subnets without any issue. its just having trouble with the S subnet

              @johnpoz apologies, i should have added more information. These are unifi switches, all you have to do is define the network and their vlans, set the port to the appropriate vlan and unfi does the rest.
              I connected my test pc to port 1 on the S switch -> which has the Server switch as its upstream. The server isn't using another gateway
              I have tried adding a rule on the server subnet
              interface = server
              source = S net
              destination = Server net

              and
              interface = Server
              destination = S net
              source = Server net

              and still nothing worked.

              johnpozJ 1 Reply Last reply Reply Quote 0
              • planedropP
                planedrop @johnpoz
                last edited by

                @johnpoz This sounds like it could be a VLAN issue on the switch level, do you have this VLAN allowed on the switch port that the Server is connected to?

                G 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @greatbush
                  last edited by johnpoz

                  @greatbush said in Intervlan traffic being blocked:

                  I have tried adding a rule on the server subnet
                  interface = server
                  source = S net
                  destination = Server net

                  Pointless and useless..

                  The rules on server interface have ZERO to do with S network devices talking to the Server network - like I said they could be blank and you could still talk.

                  Can your pc ping pfsense IP for its S interface? Can it ping the IP of pfsense IP on the Server network.

                  You would have to adjust your rules on the S network interface of pfsense to allow that.. Your current rule only allows for a source IP of 10.20.160.72 to talk to 172.16.64.200.. But you want to to validate your connectivity is correct.. Maybe you have rules below that allow? Which would be fine.

                  But you want to validate your connectivity to pfsense on your S network.. If you can ping the IP of pfsense on the Server network, but not things on the server network - then that screams firewall on the server device.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  G 1 Reply Last reply Reply Quote 0
                  • G
                    greatbush @planedrop
                    last edited by

                    @planedrop i have it allowed as an access port on the switch

                    planedropP 1 Reply Last reply Reply Quote 0
                    • planedropP
                      planedrop @greatbush
                      last edited by

                      @greatbush And it's tagged on the other end of the switch going to the firewall?

                      And to be clear, you did not configure the VLAN on the server, right? Since the switch is handling the tagging for you.

                      G 1 Reply Last reply Reply Quote 0
                      • G
                        greatbush @johnpoz
                        last edited by

                        @johnpoz The test pc can ping pfsense ip for the s interface. The test pc is unable to ping pfsense ip for the server network.
                        583749eb-8918-4d2a-8f1a-f5b581c98ff7-image.png.

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • G
                          greatbush @planedrop
                          last edited by

                          @planedrop No there are no vlans on the server. And yes its tagged on the trunk port. I have dhcp enabled for this interface and i am able to pull an from the pool i specified.

                          planedropP 1 Reply Last reply Reply Quote 0
                          • planedropP
                            planedrop @greatbush
                            last edited by

                            @greatbush I think it's time to start packet captures.

                            From the rule you showed, that device on S should be able to ping across to Servers.

                            I would start a pcap on the S interface, then ping the server IP and see if you get ICMP packets to show up on the S interface.

                            If you do, then go to the Servers interface and do a pcap there and see if the ICMP packets show up there, this will tell you where the breakdown is. If they do show up, then it's not the firewall, if they don't then something is blocking them.

                            G 1 Reply Last reply Reply Quote 0
                            • G
                              greatbush @planedrop
                              last edited by

                              @planedrop i have done that. all i see are echo ping requests but no response hence why i am scratching my head. I know the rules on the server interface aren't meant to be there but i was hoping that would fix the issue which it didn't

                              planedropP 1 Reply Last reply Reply Quote 0
                              • planedropP
                                planedrop @greatbush
                                last edited by

                                @greatbush Did you do the pcaps on both interfaces from the pfSense side?

                                So you're seeing the echo requests, and you see them hit the S interface, and then also see them leave the Servers interface?

                                If that is the case, then your device on the Server interface isn't responding and the issue isn't pfSense specific.

                                G 1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator @greatbush
                                  last edited by johnpoz

                                  @greatbush said in Intervlan traffic being blocked:

                                  The test pc is unable to ping pfsense ip for the server network.

                                  Well then something is wrong.. is your client not using pfsense as its gateway - or is it running vpn?

                                  On your pcap you did on the S interface you see the ping request from your S client to pfsense server IP?

                                  I would guess possible mask issue maybe on your client - but that sure can not be the case if your pc is a 10 network and your server network is 172.x etc..

                                  Hmmm - this is turning out to be something interesting with the info so far. You have no rules in floating? I would guess maybe a vpn on the pc? Like to see the pcap to pfsense S interface.. Its being sent to the pfsense mac address of S interface with destination IP of pfsense server IP.

                                  example - I can simulate what sounds like your saying is happening by pinging an IP on another network on pfsense that doesn't exist.

                                  So pc on my lan 192.168.9.0/24 pinging 192.168.3.14 (doesn't exist) but pfsense has an network 192.168.3.0/24

                                  Notice the mac address it is sending to is pfsense mac address of my my lan interface on pfsense (192.168.9.253)

                                  destping.jpg

                                  See how the mac in my packet capture is pfsense lan mac address.

                                  macaddress.jpg

                                  If you are seeing similar when you sniff on S interface of pfsense - I can only guess floating rule blocking the traffic. Or something not right in pfsense.. Or like me your pinging an IP that doesn't exist? You sure you are pinging pfsense Server interface IP - etc..

                                  edit: just for complete example - here is my pinging the actual IP of pfsense interface on that network 192.168.3.253.. See how the capture shows it still sending it to the lan mac address of pfsense.

                                  workingping.jpg

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  1 Reply Last reply Reply Quote 1
                                  • G
                                    greatbush @planedrop
                                    last edited by

                                    @johnpoz @planedrop From the S interface
                                    26229495-b487-485a-b064-079edd9e6418-image.png

                                    Server interface
                                    7abdca95-d043-49b2-9868-a6790a823e57-image.png

                                    Pfsense log
                                    8f05a00a-4cab-43fa-8fca-48b793b4fd01-image.png

                                    planedropP johnpozJ 2 Replies Last reply Reply Quote 0
                                    • planedropP
                                      planedrop @greatbush
                                      last edited by

                                      @greatbush Is it possible the subnet is configured wrong? Like, is the Servers interface actually setup with the right subnet and mask?

                                      From what I am seeing, pfSense is getting the packet and allowing the connection, but if you don't see it on Servers, then for some reason pfSense isn't routing it to that interface.

                                      Which means maybe the interface is setup wrong, or maybe pfSense's routing table has another entry from something like BGP?

                                      Check your Route Table on pfSense: https://docs.netgate.com/pfsense/en/latest/monitoring/status/routes.html

                                      G 1 Reply Last reply Reply Quote 0
                                      • G
                                        greatbush @planedrop
                                        last edited by

                                        @planedrop i am hundred percent sure it is
                                        test pc
                                        051f4507-e791-4806-a175-6c00668cae7c-image.png
                                        unifi
                                        a02e6374-9537-46b6-aa04-c65b914b735d-image.png

                                        pfsense
                                        1a208686-f1ee-4618-8c7d-87bb0db84f59-image.png

                                        G 1 Reply Last reply Reply Quote 0
                                        • planedropP
                                          planedrop
                                          last edited by

                                          What about the Servers interface though? The 172 network.

                                          G 1 Reply Last reply Reply Quote 0
                                          • G
                                            greatbush @planedrop
                                            last edited by

                                            @planedrop For the route
                                            daf6b2ce-4a66-43c2-ab3e-0ad0d2e3b5b9-image.png

                                            planedropP johnpozJ 2 Replies Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.