Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Intervlan traffic being blocked

    Scheduled Pinned Locked Moved Firewalling
    42 Posts 4 Posters 361 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      greatbush @johnpoz
      last edited by

      @johnpoz The test pc can ping pfsense ip for the s interface. The test pc is unable to ping pfsense ip for the server network.
      583749eb-8918-4d2a-8f1a-f5b581c98ff7-image.png.

      johnpozJ 1 Reply Last reply Reply Quote 0
      • G
        greatbush @planedrop
        last edited by

        @planedrop No there are no vlans on the server. And yes its tagged on the trunk port. I have dhcp enabled for this interface and i am able to pull an from the pool i specified.

        planedropP 1 Reply Last reply Reply Quote 0
        • planedropP
          planedrop @greatbush
          last edited by

          @greatbush I think it's time to start packet captures.

          From the rule you showed, that device on S should be able to ping across to Servers.

          I would start a pcap on the S interface, then ping the server IP and see if you get ICMP packets to show up on the S interface.

          If you do, then go to the Servers interface and do a pcap there and see if the ICMP packets show up there, this will tell you where the breakdown is. If they do show up, then it's not the firewall, if they don't then something is blocking them.

          G 1 Reply Last reply Reply Quote 0
          • G
            greatbush @planedrop
            last edited by

            @planedrop i have done that. all i see are echo ping requests but no response hence why i am scratching my head. I know the rules on the server interface aren't meant to be there but i was hoping that would fix the issue which it didn't

            planedropP 1 Reply Last reply Reply Quote 0
            • planedropP
              planedrop @greatbush
              last edited by

              @greatbush Did you do the pcaps on both interfaces from the pfSense side?

              So you're seeing the echo requests, and you see them hit the S interface, and then also see them leave the Servers interface?

              If that is the case, then your device on the Server interface isn't responding and the issue isn't pfSense specific.

              G 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @greatbush
                last edited by johnpoz

                @greatbush said in Intervlan traffic being blocked:

                The test pc is unable to ping pfsense ip for the server network.

                Well then something is wrong.. is your client not using pfsense as its gateway - or is it running vpn?

                On your pcap you did on the S interface you see the ping request from your S client to pfsense server IP?

                I would guess possible mask issue maybe on your client - but that sure can not be the case if your pc is a 10 network and your server network is 172.x etc..

                Hmmm - this is turning out to be something interesting with the info so far. You have no rules in floating? I would guess maybe a vpn on the pc? Like to see the pcap to pfsense S interface.. Its being sent to the pfsense mac address of S interface with destination IP of pfsense server IP.

                example - I can simulate what sounds like your saying is happening by pinging an IP on another network on pfsense that doesn't exist.

                So pc on my lan 192.168.9.0/24 pinging 192.168.3.14 (doesn't exist) but pfsense has an network 192.168.3.0/24

                Notice the mac address it is sending to is pfsense mac address of my my lan interface on pfsense (192.168.9.253)

                destping.jpg

                See how the mac in my packet capture is pfsense lan mac address.

                macaddress.jpg

                If you are seeing similar when you sniff on S interface of pfsense - I can only guess floating rule blocking the traffic. Or something not right in pfsense.. Or like me your pinging an IP that doesn't exist? You sure you are pinging pfsense Server interface IP - etc..

                edit: just for complete example - here is my pinging the actual IP of pfsense interface on that network 192.168.3.253.. See how the capture shows it still sending it to the lan mac address of pfsense.

                workingping.jpg

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 1
                • G
                  greatbush @planedrop
                  last edited by

                  @johnpoz @planedrop From the S interface
                  26229495-b487-485a-b064-079edd9e6418-image.png

                  Server interface
                  7abdca95-d043-49b2-9868-a6790a823e57-image.png

                  Pfsense log
                  8f05a00a-4cab-43fa-8fca-48b793b4fd01-image.png

                  planedropP johnpozJ 2 Replies Last reply Reply Quote 0
                  • planedropP
                    planedrop @greatbush
                    last edited by

                    @greatbush Is it possible the subnet is configured wrong? Like, is the Servers interface actually setup with the right subnet and mask?

                    From what I am seeing, pfSense is getting the packet and allowing the connection, but if you don't see it on Servers, then for some reason pfSense isn't routing it to that interface.

                    Which means maybe the interface is setup wrong, or maybe pfSense's routing table has another entry from something like BGP?

                    Check your Route Table on pfSense: https://docs.netgate.com/pfsense/en/latest/monitoring/status/routes.html

                    G 1 Reply Last reply Reply Quote 0
                    • G
                      greatbush @planedrop
                      last edited by

                      @planedrop i am hundred percent sure it is
                      test pc
                      051f4507-e791-4806-a175-6c00668cae7c-image.png
                      unifi
                      a02e6374-9537-46b6-aa04-c65b914b735d-image.png

                      pfsense
                      1a208686-f1ee-4618-8c7d-87bb0db84f59-image.png

                      G 1 Reply Last reply Reply Quote 0
                      • planedropP
                        planedrop
                        last edited by

                        What about the Servers interface though? The 172 network.

                        G 1 Reply Last reply Reply Quote 0
                        • G
                          greatbush @planedrop
                          last edited by

                          @planedrop For the route
                          daf6b2ce-4a66-43c2-ab3e-0ad0d2e3b5b9-image.png

                          planedropP johnpozJ 2 Replies Last reply Reply Quote 0
                          • planedropP
                            planedrop @greatbush
                            last edited by

                            @greatbush I think we are getting closer, if that is your entire routing table, then pfSense does not have a clue where to route the 172 network, so it's just going to send it to it's default route which is likely your gateway, unless I am misunderstanding something about your configuration.

                            Is the Servers interface properly configured? Not the S but the Servers one.

                            G 1 Reply Last reply Reply Quote 0
                            • G
                              greatbush @greatbush
                              last edited by

                              @greatbush The server network is fine. It can reach my other subnets without any issue. Hmm. I don't know if this is going to help. the 10.20.160.x was the network at another site and an ipsec tunnel was setup for that site.
                              be95267e-6b12-4f43-8036-a50830586710-image.png
                              I don't know if this might be causing issues.

                              planedropP 1 Reply Last reply Reply Quote 0
                              • G
                                greatbush @planedrop
                                last edited by

                                @planedrop Server network
                                af20f8eb-85c8-43eb-a04c-218d02a93de7-image.png

                                bb993bc9-b1a9-457c-a07c-e1726dfd31ce-image.png

                                G 1 Reply Last reply Reply Quote 0
                                • planedropP
                                  planedrop @greatbush
                                  last edited by

                                  @greatbush I don't think IPsec is the issue here, you would see the ICMP responses on the Servers interface if that was the case, they just wouldn't route back to the S interface.

                                  Again though, it looks to me like pfSense doesn't have a routing table entry for the 172. network so those echo request are never going to get to a device on any network, it'll just send them through it's default gateway, which is presumably your internet provider.

                                  Also, why are you configuring actual networks on the Unifi side? Those should be VLAN only networks since you're using a 3rd party gateway (pfSense) for them. I don't think that is what is breaking things here but was worth mentioning.

                                  I did just see that you're using Broadcom NICs though, check out this just in case cuz it might affect pings: https://docs.netgate.com/pfsense/en/latest/hardware/tune.html#packet-loss-with-many-small-udp-packets:~:text=and%20disable%20msix.-,Packet%20loss%20with%20many%20(small)%20UDP%20packets,-%C2%B6

                                  1 Reply Last reply Reply Quote 0
                                  • G
                                    greatbush @greatbush
                                    last edited by

                                    @greatbush route for server
                                    e30c0ffd-d2b7-4d42-b380-5fc173be3fa6-image.png
                                    I inherited the network so i am going with the flow. I have made the changes and its the same result for the ping. I was able to get the ping to work last week friday but i was not keeping track on the changes i was making. Will creating a static route help? I read that this isn't needed since pfsense knows the route
                                    f1c65b9f-9daa-49c7-8aba-e03f04275f22-image.png

                                    1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @greatbush
                                      last edited by

                                      @greatbush on your sniff - what is the mac address - have no idea why you searched for 10.20.x.x as a src IP?

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      G 1 Reply Last reply Reply Quote 0
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator @greatbush
                                        last edited by johnpoz

                                        @greatbush There is no way your system is working how you think it is - where are the rest of your networks??

                                        Here is a routing table on pfsense with multiple interfaces.

                                        Here is a snip of mine.
                                        routingtable.jpg

                                        See multiple local interface, some native some vlans - notice a wan route - etc..

                                        How would pfsense be doing any routing if all it shows is 1 network??

                                        edit: oh I snipped off the top part showing the default route - see how it points to an IP on my wan interface 209.x.x.x network

                                        defaultroute.jpg

                                        How would pfsense route between 2 networks when it doesn't even show that its connected to it in the routing table?

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                                        1 Reply Last reply Reply Quote 0
                                        • G
                                          greatbush @johnpoz
                                          last edited by

                                          @johnpoz the mac address is 98:fc:84:d1:db:44.
                                          I used the filer 'eth.addr == 98:fc:84:d1:db:44' and searched the other pcap files but the only thing that shows up is the echo ping request.
                                          12e9c958-0f42-4f27-a677-6d6423b386e4-image.png

                                          For some reason its not reach the 172.16.64.1 interface.

                                          planedropP johnpozJ 3 Replies Last reply Reply Quote 0
                                          • planedropP
                                            planedrop @greatbush
                                            last edited by

                                            @greatbush Can you send us your entire routing table under Diagnostics > Routes?

                                            No need to send the IPv6 one but the IPv4 one would be good.

                                            Since the allow rule is in place, and it doesn't sound like any floating rules are being used, I'm thinking this is a routing issue.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.