Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Intervlan traffic being blocked

    Scheduled Pinned Locked Moved Firewalling
    42 Posts 4 Posters 479 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • planedropP
      planedrop
      last edited by

      What about the Servers interface though? The 172 network.

      G 1 Reply Last reply Reply Quote 0
      • G
        greatbush @planedrop
        last edited by

        @planedrop For the route
        daf6b2ce-4a66-43c2-ab3e-0ad0d2e3b5b9-image.png

        planedropP johnpozJ 2 Replies Last reply Reply Quote 0
        • planedropP
          planedrop @greatbush
          last edited by

          @greatbush I think we are getting closer, if that is your entire routing table, then pfSense does not have a clue where to route the 172 network, so it's just going to send it to it's default route which is likely your gateway, unless I am misunderstanding something about your configuration.

          Is the Servers interface properly configured? Not the S but the Servers one.

          G 1 Reply Last reply Reply Quote 0
          • G
            greatbush @greatbush
            last edited by

            @greatbush The server network is fine. It can reach my other subnets without any issue. Hmm. I don't know if this is going to help. the 10.20.160.x was the network at another site and an ipsec tunnel was setup for that site.
            be95267e-6b12-4f43-8036-a50830586710-image.png
            I don't know if this might be causing issues.

            planedropP 1 Reply Last reply Reply Quote 0
            • G
              greatbush @planedrop
              last edited by

              @planedrop Server network
              af20f8eb-85c8-43eb-a04c-218d02a93de7-image.png

              bb993bc9-b1a9-457c-a07c-e1726dfd31ce-image.png

              G 1 Reply Last reply Reply Quote 0
              • planedropP
                planedrop @greatbush
                last edited by

                @greatbush I don't think IPsec is the issue here, you would see the ICMP responses on the Servers interface if that was the case, they just wouldn't route back to the S interface.

                Again though, it looks to me like pfSense doesn't have a routing table entry for the 172. network so those echo request are never going to get to a device on any network, it'll just send them through it's default gateway, which is presumably your internet provider.

                Also, why are you configuring actual networks on the Unifi side? Those should be VLAN only networks since you're using a 3rd party gateway (pfSense) for them. I don't think that is what is breaking things here but was worth mentioning.

                I did just see that you're using Broadcom NICs though, check out this just in case cuz it might affect pings: https://docs.netgate.com/pfsense/en/latest/hardware/tune.html#packet-loss-with-many-small-udp-packets:~:text=and%20disable%20msix.-,Packet%20loss%20with%20many%20(small)%20UDP%20packets,-%C2%B6

                1 Reply Last reply Reply Quote 0
                • G
                  greatbush @greatbush
                  last edited by

                  @greatbush route for server
                  e30c0ffd-d2b7-4d42-b380-5fc173be3fa6-image.png
                  I inherited the network so i am going with the flow. I have made the changes and its the same result for the ping. I was able to get the ping to work last week friday but i was not keeping track on the changes i was making. Will creating a static route help? I read that this isn't needed since pfsense knows the route
                  f1c65b9f-9daa-49c7-8aba-e03f04275f22-image.png

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @greatbush
                    last edited by

                    @greatbush on your sniff - what is the mac address - have no idea why you searched for 10.20.x.x as a src IP?

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    G 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @greatbush
                      last edited by johnpoz

                      @greatbush There is no way your system is working how you think it is - where are the rest of your networks??

                      Here is a routing table on pfsense with multiple interfaces.

                      Here is a snip of mine.
                      routingtable.jpg

                      See multiple local interface, some native some vlans - notice a wan route - etc..

                      How would pfsense be doing any routing if all it shows is 1 network??

                      edit: oh I snipped off the top part showing the default route - see how it points to an IP on my wan interface 209.x.x.x network

                      defaultroute.jpg

                      How would pfsense route between 2 networks when it doesn't even show that its connected to it in the routing table?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • G
                        greatbush @johnpoz
                        last edited by

                        @johnpoz the mac address is 98:fc:84:d1:db:44.
                        I used the filer 'eth.addr == 98:fc:84:d1:db:44' and searched the other pcap files but the only thing that shows up is the echo ping request.
                        12e9c958-0f42-4f27-a677-6d6423b386e4-image.png

                        For some reason its not reach the 172.16.64.1 interface.

                        planedropP johnpozJ 3 Replies Last reply Reply Quote 0
                        • planedropP
                          planedrop @greatbush
                          last edited by

                          @greatbush Can you send us your entire routing table under Diagnostics > Routes?

                          No need to send the IPv6 one but the IPv4 one would be good.

                          Since the allow rule is in place, and it doesn't sound like any floating rules are being used, I'm thinking this is a routing issue.

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @greatbush
                            last edited by johnpoz

                            @greatbush Please show the pcap from pinging pfsense IP address on the server network?

                            We know you can not get to this server - but you also said you can not even ping pfsense IP address on the server network..

                            And yes like to see your full route table - from what you posted no there is no way your going to get to this other network because from your routing table pfsense doesn't even think its connected to this network.

                            What is this a about a ipsec tunnel - this 10.20 network is via a ipsec tunnel? What about your 2 unifi switches - no where did you say this network was from other site via a tunnel??

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            G 2 Replies Last reply Reply Quote 0
                            • G
                              greatbush @johnpoz
                              last edited by

                              @johnpoz @planedrop I will send you a pm

                              1 Reply Last reply Reply Quote 0
                              • G
                                greatbush @johnpoz
                                last edited by

                                @johnpoz The network was at another site. I tore it down and rebuilt the config at my current location.

                                1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator @greatbush
                                  last edited by

                                  @greatbush said in Intervlan traffic being blocked:

                                  For some reason its not reach the 172.16.64.1 interface.

                                  that is pinging the server at .200 - ping pfsense IP on the server network 172.16.64.1 I believe is what you have posted.

                                  There is a huge difference between not getting an answer from server, and not being able to ping pfsense IP on that network.

                                  All kinds of other issues could be going on to why that server doesn't answer - but pfsense no answering when you ping one of its IPs and your firewall rules allow it, and traffic gets to pfsense is something going on in pfsense.

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  G 1 Reply Last reply Reply Quote 0
                                  • G
                                    greatbush @johnpoz
                                    last edited by greatbush

                                    @johnpoz i have tried pinging both .200 and .64.1 and i got the exact same result despite me adding rules for both on the S interface. Pfsense isn't dying, right?

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @greatbush
                                      last edited by

                                      @greatbush I have no idea what is going on to be honest - if your rules allow it, and traffic is getting there.. you should get an answer.

                                      Your routing table shows the interfaces there.. Only thing that comes to mind is something wrong with the tag. But your doing the packet capture on the actual vlan interface right. Not the parent interface.

                                      You can ping pfsense IP on the S interface right?

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      G 1 Reply Last reply Reply Quote 0
                                      • G
                                        greatbush @johnpoz
                                        last edited by

                                        @johnpoz yep. my test pc can ping its pfsense interface ip

                                        G 1 Reply Last reply Reply Quote 0
                                        • G
                                          greatbush @greatbush
                                          last edited by greatbush

                                          @johnpoz a2b153cc-d73c-475e-b48b-41a5820aca0f-image.png

                                          johnpozJ 1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator @greatbush
                                            last edited by

                                            @greatbush but that test PC that is different IP 160.100 can not ping the server IP of 64.1 ?

                                            You changed the rules to any S subnet to Server subnet I believe. So yeah you should be able to ping the pfsense server interface IP.

                                            Can we see the full ruleset on the S interface of pfsense.

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            G 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.