Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Static routes

    Scheduled Pinned Locked Moved Routing and Multi WAN
    32 Posts 3 Posters 8.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      agarrett5
      last edited by

      I thought that was the case (as you said in a previous post).  lll have a lay with it then Ill post up screenshots if I don't get anywhere with it :)

      1 Reply Last reply Reply Quote 0
      • A
        agarrett5
        last edited by

        posting up the firewall rules and routing table.  The interfaces I havent posted have no rules in them.  It is still reletively open as a network.

        Lanrules.png
        Lanrules.png_thumb
        routingtable.jpg
        routingtable.jpg_thumb
        ruleswan.jpg
        ruleswan.jpg_thumb
        wan2rules.jpg
        wan2rules.jpg_thumb

        1 Reply Last reply Reply Quote 0
        • H
          heper
          last edited by

          i'm guessing OPT5 & OPT6 are the VLAN interfaces ?

          The interfaces I havent posted have no rules in them.  It is still reletively open as a network.

          Pfsense blocks EVERYTHING by default … so if you have no rules on the OPT interfaces, then they will be unable to go out to anywhere.
          try creating an 'ALLOW ALL' rule on the vlan interfaces (PASS |  protocol/source/destination:any )
          if that works, you can adjust it / add rules to lock it down the way you like.

          1 Reply Last reply Reply Quote 0
          • A
            agarrett5
            last edited by

            Opt1,5,6 and LAN are all vlans.  LAN is working fine.  OPT1 is going to be VoIP, Opt 5 is going to be my DM-z and Opt 6 is going to be my blue.

            Ive just added in the allow rules on opt 1 (which is the VLAN im working on at the moment) and its still not playing ball.  I want WAN1 as my data and WAN2 as my voice.  WAN2 seems to be the one having the issue

            1 Reply Last reply Reply Quote 0
            • P
              podilarius
              last edited by

              just adding rules are not enough if you want them to get to the internet. You are also going to have to create manual NAT rules to make sure that when the traffic goes out, it gets an internet address.

              1 Reply Last reply Reply Quote 0
              • A
                agarrett5
                last edited by

                Ive done that.  When I do ipconfig on the computer it is picking up an ip (DHCP), but when I ping it says that the private interface is unreachable.  ip of pc is 192.168.0.2 and ip of private nic on pfsense on that vlan is 192.168.0.1

                1 Reply Last reply Reply Quote 0
                • H
                  heper
                  last edited by

                  have you double checked the vlan settings on the switch ? untagged ports for clients & correct pvid | tagged port for pfsense

                  1 Reply Last reply Reply Quote 0
                  • A
                    agarrett5
                    last edited by

                    For the time being I am going through the NICSs (directl connecting), I do have 2 shiny Netgear switches sitting here, which at the moment I'm not using, but until I've got the VLANs sorted on firewall I was going to wait before using them.  I have 4 NICs currently.  2 Red, 1 with LAN, OPT5, Opt6, 1 with Opt5 and OPt1. Sorry I should have said earlier. Is that likely where my issue is?

                    1 Reply Last reply Reply Quote 0
                    • P
                      podilarius
                      last edited by

                      So long as there are rules to allow the packets to pass (any protocol, normal is TCP/UDP) and there is an associated rule in the outbound NAT table, it should be able to get tot he internet.

                      what are you trying to ping and from where?

                      1 Reply Last reply Reply Quote 0
                      • H
                        heper
                        last edited by

                        Pfsense will ALLWAYS TAG the packets on vlan interfaces ….

                        if you directly attach your clients, then you will need to force your network driver into the correct VLAN for this to work. (in windows this can be done in device manager when going to advanced settings of the NIC).
                        Do note that this works with most Intel network cards .... not sure if all drivers are able to support VLAN's.

                        1 Reply Last reply Reply Quote 0
                        • A
                          agarrett5
                          last edited by

                          is there anyway to turn off tagging in PfSense?

                          1 Reply Last reply Reply Quote 0
                          • P
                            podilarius
                            last edited by

                            Yes … don't enable VLAN.

                            1 Reply Last reply Reply Quote 0
                            • A
                              agarrett5
                              last edited by

                              lol, ok, ill set up my switches then now instead of going direct.  cheers :)

                              1 Reply Last reply Reply Quote 0
                              • A
                                agarrett5
                                last edited by

                                Ive got a vlan going through the switch, but tagging doesn't appear to be the issue as pfsense is going through a tagged port

                                1 Reply Last reply Reply Quote 0
                                • P
                                  podilarius
                                  last edited by

                                  Yes, you just have to specify which VLAN it has access to and it should work.

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    agarrett5
                                    last edited by

                                    I did :-/

                                    1 Reply Last reply Reply Quote 0
                                    • A
                                      agarrett5
                                      last edited by

                                      I have the vlan tagged, but its not lagged on the switch.  Is that required?

                                      1 Reply Last reply Reply Quote 0
                                      • P
                                        podilarius
                                        last edited by

                                        The switch needs to know what VLAN it has on what port. Basically, it needs a VLAN access group setup.

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          agarrett5
                                          last edited by

                                          I've already done that.  So I'm assuming from that explanation I don't need to set a dedicated lag.  So that then begs the question why is my VLAN access group not doing what it should :-/  I'm sure I'm missing something blatently simple here!

                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            agarrett5
                                            last edited by

                                            Ive tried it through a LAG, Ive tried it with tagged ports to the pfsense box, ive tried it with untagged ports, Its giving out IPs but its not connecting to the internet (and ive setup NAT as far as I'm aware).  I cant ping pfsense from the computer I have going through the switch. I can however ping the switch

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.