Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    No internet access from DMZ(OPT1)

    Scheduled Pinned Locked Moved Firewalling
    39 Posts 8 Posters 31.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kejianshi
      last edited by

      "Can't ping the gatway which is the OPT IP"?

      Shouldn't the gateway be the WAN IP?

      Are you attempting to use OPT1 like a LAN interface or another WAN interface?

      If you get internet through WAN and you plan to connect hosts via OPT1 then it should be set up nearly identically to your LAN interface.
      That means that under interfaces > OPT1 you should have a static IP assigned and gateway should be set to "none".

      So, maybe I am misunderstanding your reference to OPT and Gateway, but to me, it seems odd.  Could you clarify?

      1 Reply Last reply Reply Quote 0
      • A
        atakacs
        last edited by

        "Can't ping the gatway which is the OPT IP"?
        Shouldn't the gateway be the WAN IP?

        My understanding is that within the context of the OPT subnet the gateway should be the OPT interface IP (and that's how it is set up by the DHCP server - 172.16.35.254 in my case, see my previous screenshot). As far as my networking knowledge goes any non local packets will be sent to 172.16.35.254 where they should be relayed further - presumably to the WAN gateway. Obviously if I can't ping 172.16.35.254 something is not working as expected…

        Are you attempting to use OPT1 like a LAN interface or another WAN interface?

        As another LAN.

        If you get internet through WAN and you plan to connect hosts via OPT1 then it should be set up nearly identically to your LAN interface. That means that under interfaces > OPT1 you should have a static IP assigned and gateway should be set to "none".

        That's what I'm having as far as I can tell:

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          Just wondering here, because I have never done it the way you have it and I'm not sure if its an issue or not.

          you have the static IP of that OPT1 interface set as 172.16.35.254.  Is your LAN set up similarly with a .254 in the last digit?

          I'm not sure if that makes a difference at all with pfsense, but I have always placed the static IP at .1

          like 172.16.35.1 /24

          1 Reply Last reply Reply Quote 0
          • S
            Supermule Banned
            last edited by

            Have you enabled outbound NAT from the OPT1 interface?

            1 Reply Last reply Reply Quote 0
            • K
              kejianshi
              last edited by

              Earlier, he has a post of the outbound nat set to auto.
              I don't use AUTO anymore, but instead use on manual and set up outbound NAT for each LAN interface manually.
              I was going to go there next if changing static IP to .1 vs .254 had no effect.

              However, supposedly on "auto", outbound NAT should handle its self.

              1 Reply Last reply Reply Quote 0
              • A
                atakacs
                last edited by

                Ok I have changed the OPT IP to .1 to no avail (it was picked up correctly by the DHCP client after a renew).

                I have also tried to create a manual outbound NAT rule:

                Still no cigar…

                That being said - and I would certainly not call myself an expert in this area - I would think that even if outbound NAT was fully turned off the .1 address should still ping ?

                Oh BTW my ARP tables:

                172.16.35.100 00:0c:29🆎48:b0 ManagementVM   OPT1
                172.16.10.210 00:0c:29:6c:f8:91 pfSdc.local LAN
                172.16.35.1 00:0c:29:6c:f8:9b OPT1
                172.16.10.62 3c:07:54:27:ff:55 LAN
                #.#.46.18 00:0c:29:6c:f8:87 WAN
                #.#.46.17 78:19:f7:f5:ed:c1 WAN

                Seems correct (last two are my WAN addresses that I have anonymised).

                172.16.35.100 is the DHCP client on the OPT network - correct
                172.16.10.210 is the LAN IP for the firewall - correct
                172.16.35.1 is the OPT IP for the firewall - correct
                172.16.10.62 is the LAN IP for the client machine I am using to configure - also correct

                Anyway... what's next ?

                1 Reply Last reply Reply Quote 0
                • K
                  kejianshi
                  last edited by

                  Oh my.

                  Well, if it were me, I would have made:

                  interface:  WAN

                  NAT Address * (any)

                  Source is Fine.  172.16.35.0/24

                  You would need one of those to pass the LAN traffic also

                  interface: WAN

                  NAT Address * (any)

                  Source LAN subnet

                  1 Reply Last reply Reply Quote 0
                  • A
                    atakacs
                    last edited by

                    Something like that then:

                    ?

                    Still no go :(

                    What do you make of my remark regarding ping vs. NAT ? Am I wrong to assume that ping should work regardless of NAT setup ?

                    1 Reply Last reply Reply Quote 0
                    • K
                      kejianshi
                      last edited by

                      I would have made NAT address ANY.  You can lock it down later when it starts working.

                      "What do you make of my remark regarding ping vs. NAT ? Am I wrong to assume that ping should work regardless of NAT setup ?"

                      As far as should the address ping, that depends.  Where are you pinging from?  What interface?  LAN?

                      If so, I'd have to see your LAN firewall rules to know if traffic is allowed from the LAN to OPT1.

                      1 Reply Last reply Reply Quote 0
                      • A
                        atakacs
                        last edited by

                        I would have made NAT address ANY.  You can lock it down later when it starts working.

                        Hmm.. how would you do that in the following screen ?

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          What you have there looks correct on outbound NAT.

                          1 Reply Last reply Reply Quote 0
                          • A
                            atakacs
                            last edited by

                            ok. It translates in the NAT WAN address setting you see in my 02:14:22 message.

                            And I am pinging within the 172.16.35.0 subnet (from the 172.16.35.100  machine). Interestingly I can't seem to ping that machine from the firewall either:

                            PING 172.16.35.100 (172.16.35.100) from 172.16.35.1: 56 data bytes

                            –- 172.16.35.100 ping statistics ---
                            3 packets transmitted, 0 packets received, 100.0% packet loss

                            Whatever my issue I honestly don't think it's NAT forwarding...

                            1 Reply Last reply Reply Quote 0
                            • K
                              kejianshi
                              last edited by

                              I agree that even with no outbound NAT configured you should be able to see the OPT1 interface from either the pfsense command prompt or a computer on the OPT1 LAN.   You say this is a VM?  What model of network card is your virtual interface assigned to OPT1 emulating?

                              1 Reply Last reply Reply Quote 0
                              • K
                                kejianshi
                                last edited by

                                With this VM, what version of pfsense are you running?  Is this like a 2.1 snapshot?

                                Is there any reason you couldn't load a stable release and configure the interfaces immediately from the bootup on the console?

                                Reason I bring it up is that if you have inadvertantly clicked some tiny nit-noid setting that is breaking everything, that would clear it.

                                Also, if its a pfsense problem because you are living on the bleeding edge of releases, that might also fix your issue.

                                Just wondering about the options.

                                1 Reply Last reply Reply Quote 0
                                • B
                                  biggsy
                                  last edited by

                                  … bleeding edge of releases ...

                                  Unlikely to be the problem.

                                  atakacs

                                  • Is it ESXi you're using?  If so, does your network diagram pretty much look like the image below?
                                  • Windows firewall off in the VM?
                                  • After making firewall rule changes did you reset states or reboot pfSense

                                  pfs_esxi_5_8.png
                                  pfs_esxi_5_8.png_thumb

                                  1 Reply Last reply Reply Quote 0
                                  • K
                                    kejianshi
                                    last edited by

                                    In my experience, "stable" is for people who have some work they are trying to get done and "Beta" and "RC" are for tinkering or for when you just must have some feature not found in a full stable release.  Thats for everything, not just pfsense.

                                    The reason I'd lean towards a clean reinstall of a stable release is he has about 18 hours invested in about 5 minutes worth of install and 2 minutes worth of firewall rule entries. At most, a complete reinstall plus re-entering the firewall rules might cost 7-10 minutes and we will know if it was just a silly button check, some weird one time glitch or if it just isn't about to work for him.  This forum is replete with people on snapshot releases rolling back to a previous install because some update broke their functionality, so I figured why not try rather than keep banging away on settings that at this point seem correct?

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      biggsy
                                      last edited by

                                      My comment was not meant as a criticism of your suggestion.  Just pointing out that there are also lots of people running 2.1 successfully.  Many of them, including the developers, also run them as VMs.

                                      You are, of course, completely justified in being wary of beta or RC software and I agree that it doesn't take a lot of work to fire-up a new pfSense VM, do a clean install and configure from scratch.

                                      I don't know atakacs' motivation for using 2.1 but, honestly, I doubt that is the problem.  Changing to a release version now won't help establish whether it was a "silly button click" or something else.

                                      A reset to factory defaults and reconfigure might be good compromise.  If 2.1 was to blame then we might find a solution or, at least, identify a bug - to everyone's benefit.

                                      Either way, there are questions from both of us that probably need to be answered first.

                                      1 Reply Last reply Reply Quote 0
                                      • K
                                        kejianshi
                                        last edited by

                                        Yeah - I'd almost like to SSH to his box, proxy to his web interface and check all the menus and settings, but that would be sort of like handing me the keys to his shiny new car.  Without seeing all of the menus and checking the firewall settings on the hypervisor, I'm sort of at a loss.

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          atakacs
                                          last edited by

                                          Hello

                                          yes my networking is fairly similar

                                          I have instantiated another VM on the OPT LAN an interestingly enough both machine can't ping each other, although they both get DCHP leases correctly from pfSense. .

                                          So I have created another "local lan" and connected both VM to it (no pfs involved). They still can't ping each other (manual IP). Very odd. It's clearly an issue with ESXi itself although I have done such "host only" setups dozen times without any problem…

                                          So I'll get back to you once this is sorted out

                                          1 Reply Last reply Reply Quote 0
                                          • K
                                            kejianshi
                                            last edited by

                                            OK - I'm switching from advice mode to learning mode.  When you sort it out, please post.  I'm interested in why such a (seemingly) crazy simple install isn't working.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.