Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block Traffic Between Subnets?

    Scheduled Pinned Locked Moved General pfSense Questions
    12 Posts 5 Posters 4.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      Agreed, that guide is horrible. It seems to exhibit some pretty fundamental lack of understanding throughout.
      The OP wasn't to know that though.

      Steve

      1 Reply Last reply Reply Quote 0
      • L
        Longhair
        last edited by

        johnpoz - Thank you very much for making it very easy to understand  :)

        I'm using a quad-port Intel nic in a spare computer (no VMs).

        It took a few minutes but I have it working now after following your post.

        When I had your 2nd pic rule (LAN2 … any) with the 5th pic rule (LAN2 net ... ! Lan1 net) together, nothing was blocked even when changing the order. Once I removed the Lan2 ... any rule, there is Internet access.

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          @stephenw10:

          Agreed, that guide is horrible. It seems to exhibit some pretty fundamental lack of understanding throughout.
          The OP wasn't to know that though.

          I don't know this comment he makes at the bottom kind of tells me its gibberish ;)

          "It could very well be that my approach is STILL all wrong. Maybe it is catastrophically wrong! I feel stupid even posting this on the Internet,"

          "When I had your 2nd pic rule (LAN2 … any) with the 5th pic rule (LAN2 net ... ! Lan1 net) together"

          What rules did you have together - there should not be any rules together on your interfaces in this simple setup.  Only when you were going to make exceptions to this rule would you put rules above it.  Rules are parsed top down when looking at interfaces in pfsense.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 1
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Ha! Yes.
            I meant the OP of this thread but I guess there were warnings.  ;)
            To be fair to the poster of that blog it's not written as a guide, more as a log of what didn't work for their own benefit.

            Steve

            1 Reply Last reply Reply Quote 0
            • L
              Longhair
              last edited by

              After implementing these rules, I haven't touched the pfSense except to backup the configuration & update the release. I discovered this problem when I had Windows laptop set for Obtain an IP address automatically and had the static IP set in Alternate Configuration instead of Use the following IP Address.

              I'm running 2.3.2 (latest version) and the Windows DHCP Server (LAN) is handing out IP addresses for devices on other subnets (OPT1 & OPT2). It is not an option to turn off the Windows DHCP Server because it breaks the server.

              If you look closely at the image, you will see that Laptop 1 is connected to WAP-1 (Laptop 2 … WAP-2) but is getting an IP address for the LAN. No DHCP Server is running on OPT1 & OPT2 because static IP addresses are given.

              When I plug the WAPs directly into pfSense, the laptops were unable to get an IP address automatically and used the alternate configurations.

              Due to the location of pfSense, I have to run it from an unmanaged switch to another unmanaged switch. Moving things or running more cable is not an option so I need to have this fixed through the rules.

              pfs1.png
              pfs1.png_thumb

              1 Reply Last reply Reply Quote 0
              • D
                doktornotor Banned
                last edited by

                WTF?! If all you have are dumb switches, then pfSense is supposed to be connected directly to your modem. Everything else goes behind it, through the switches (one switch per interface required).

                1 Reply Last reply Reply Quote 0
                • L
                  Longhair
                  last edited by

                  @doktornotor:

                  WTF?! If all you have are dumb switches, then pfSense is supposed to be connected directly to your modem. Everything else goes behind it, through the switches (one switch per interface required).

                  The modem was placed in an area which only allowed enough space for an unmanaged switch and all the cables were run to that location long before my time. If I was able to have modem –> pfsense --> switch per interface, I would be doing it that way but that is not possible.

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    You cannot do that. You need to separate all your LAN segments into VLANs using managed dot1q-capable gear.

                    You do not need to pull more cable. VLAN tagging allows you to run multiple, isolated layer 2 networks on one cable. You do need proper, managed switches however.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 1
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      So why are you just coming back to this thread from 2014??  And where exactly is pfsense in those drawings?

                      But as stated your running multiple layer 3 over the same layer 2 - this is BORKED!!!  You need vlan capable switches to have more than 1 network on the same switch and be isolated.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Um, yeah you need VLANs if you can't physically moved the different bits of equipment.

                        Potentially your WAPs might be able to tag traffic directly and your unmanaged switches might pass that tagged traffic which would allow you to isolate that traffic to pfSense. But that still leaves WAN and LAN in the same layer 2 which is all wrong!

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.