Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    General Routing issue on new install

    General pfSense Questions
    3
    16
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      awair
      last edited by

      Still trying to take 'full' advantage of my new pfsense machine, but having a couple of apparently random problems. I am fairly sure that this first one is not Firewall related, but could be some simple tick-in-the-box that I've missed:

      1) I have created an OpenVPN connection to home, in an attempt to access/control/review various devices while away:

      iPad (OpenVPN) on the wild internet > PFS Router (OpenVPN Server & Home GW) > WAP 1 or WAP 2 or WAP 3 or other device in my LAN…

      I can connect successfully to the OpenVPN server, and talk to PFS itself, as well as WAP 1, and a few other local devices. I cannot connect to, or ping WAP 2 or 3.

      Both WAP 1 & 2 are identical hardware and firmware version (Asus RT-AC66 running Tomato). I thought that all settings were identical, but one is visible, the other is not. Any suggestions as to why this may occur? Is there some (obscure?) firewall setting I missed, or is there a general network setting that may help?

      WAP 1 is connected to PFS via an unmanaged Gigabit switch. WAP 2 is connected via a (same-brand) 2nd unmanaged Gigabit switch (total 2), as is WAP 3 via a 3rd unmanaged Gigabit switch (total 2). Cable length is not an issue, as WAP 1 is further away. All Cat 5e ducted through the building.

      PFS Router (Home GW) > Gigabit switch A > WAP 1
                                                                    > Gigabit switch B > WAP 2
                                                                    > Gigabit switch C > WAP 3

      When I am at home, all devices are accessible via WiFi/ethernet from any local device.

      The strange thing is (strange to me, maybe a clue…):

      iPad (OpenVPN) on the wild internet > PFS Router (Home GW) > PFS test (OpenVPN Server inside the LAN) & WAP 1 or WAP 2 or WAP 3 or other device in my LAN…

      As I still have my test PFS device running, I can also connect (via OpenVPN, running on a different port) to my test PFS installation. Now I can access all devices, as the test PFS has a WAN address in the primary LAN.

      So is this a Firewall/rules problem, something to do with 'hops' or something else?

      Any pointers gratefully received! As soon as I've fixed this, I can shut down the test device, as I will finally have a (functional) improvement over my prior setup.

      2) The second problem is that having setup a new interface (e.g. DMZ), added IP4, DHCP & Firewall rules, I cannot talk from LAN > DMZ. I'm fairly sure this is a firewall issue (but not 100%), but cannot see anything blocked or even attempted in the Firewall logs (changed settings to temporarily log everything).

      As a solution, I have temporarily (disabled IP & DHCP on the interface, and) enabled LAN/DMZ to be bridged. Did I miss a simple step? Any pointers to the full steps required to prevent DMZ accessing LAN, but allow LAN to access DMZ would be appreciated.

      Many thanks.

      2.4.3 (amd64)
      and given up on the SG-1000

      1 Reply Last reply Reply Quote 0
      • A
        awair
        last edited by

        Success!

        …but why?

        It turns out that 'Switch B' was redundant, the Asus RT-AC66 had spare ports and the Switch wasn't fully utilised.

        Now that the WAP is only 'one hop' from the PFS OpenVPN Server, I can access this remotely.

        What setting do I need to change to get this fully working?

        I cannot change the cabling for Switch C (still required), and more importantly my NAS is still inaccessible as it is connected to the Asus (now only 2 hops instead of 3).

        Or is there a setting to change on the OpenVPN Server?

        Many thanks again.

        2.4.3 (amd64)
        and given up on the SG-1000

        1 Reply Last reply Reply Quote 0
        • A
          awair
          last edited by

          Installing RIP seems to have fixed the issue.

          System/Package Manager/Available Packages/ "routed"

          2.4.3 (amd64)
          and given up on the SG-1000

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            What??  Why would you need RIP?

            Dude what network are you AP in.. I take it these are all on the same network?  You have 3 switches daisy chained?  A switch is not really a "hop"  a hop is when you go through a router that makes a routing decision..

            More than likely your issues with access to your AP if they are setup as AP on the same network?  Are these all on the same rfc1918 network, ie 192.168.?/24 ?  Is you do not have a gateway set on these other APs.. Like you do on AP 1 pointing to pfsense as their gateway.

            Unless you are running RIP in your network with multiple downstream routers there is ZERO need for you to install the package that adds RIP..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            1 Reply Last reply Reply Quote 0
            • A
              awair
              last edited by

              John,

              Thanks for the reply. I have absolutely no idea why I need RIP. Just wanted to report that adding it fixed whatever problem I had.

              All devices are in the 192.168.31.0/24 network, all working and interconnected fine (including via an incoming IPsec tunnel). The only difference was that prior to my change I didn't have an OpenVPNServer.

              Moving to pfsense was supposed to replicate (all) the existing functionality, and add OpenVPN access (as well as update/enhance security).

              All of the APs are Asus Wireless Routers running Tomato. Set to 'WAN disabled' and Gateway 192.168.31.1 (which was previously a Linksys RV082, now pfsense).

              I know a switch is not supposed to be a hop, but unless the switches just needed a power cycle, I have no idea why it was only half working, and now it is is 'fixed'. As reported in my 2nd/3rd posts, I only made one change at a time. Plugging everything into the Asus, instead of via a 2nd switch gave me access to WAP 2 but not 3. Adding RIP (and enabling) gave me access to WAP 3.

              Having spent about a month testing the basic settings and getting OpenVPN working, I honestly expected everything to work just by swapping out my old router for pfsense.

              Thanks again.

              2.4.3 (amd64)
              and given up on the SG-1000

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                Going to be clear on this – RIP has ZERO to do with it.. ZERO!!!

                Unless your not running tomato devices as AP Like you think, and your routing to them..

                Here is the big thing.. "I have absolutely no idea why I need RIP."  then clearly you don't need it!!!

                How you have described your setup of your AP has ZERO to do with an old school routing protocol..  What I would really suggest you do is remove RIP and if your still having issue then troubleshoot it and actually find the actual problem vs thinking you need something you dont..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 0
                • A
                  awair
                  last edited by

                  Just to clarify, the problem only exists when I access the 192.1.68.31.0/24 network via OpenVPN access to the (external facing) pfsense router.

                  I can access the pfsense interface (31.1) and some of the other internal LAN devices (31.7 - an AP, 31.10 - Server, 31.17 - a NAS) when connected via the 192.168.30.0/24 OpenVPN tunnel (firewall rules to allow traffic between these interfaces).

                  I could not access 31.5 (an AP), because it had two unmanaged switches between it and the pfsense gateway. Removing one switch corresponded with being able to access 31.5. No settings changed at all.

                  I was not able to try this for access to the 31.9 AP, (because I couldn't remove the intermediate 2nd switch).

                  192.168.30.2 (OpenVPN client) > 192.168.30.1 (PFS OpenVPN Server IP/LAN IP) 192.168.31.1 > 192.168.31.7 accessible
                  192.168.30.2 (OpenVPN client) > 192.168.30.1 (PFS OpenVPN Server IP/LAN IP) 192.168.31.1 > 192.168.31.9 not accessible

                  Inside the LAN:

                  192.168.31.100 (typical client) > 192.168.31.1 accessible
                  192.168.31.100 (typical client) > 192.168.31.7 accessible
                  192.168.31.100 (typical client) > 192.168.31.9 accessible
                  192.168.31.100 (typical client) > 192.168.31.15 accessible
                  192.168.31.100 (typical client) > 192.168.31.17 accessible

                  Prior to introducing pfsense, as a direct replcaement for 192.168.31.1, I had a perfectly working, albeit less secure network. Just trying to find out what is the issue, that prevents access when using this OpenVPN tunnel only.

                  If I access an alternate OpenVPN tunnel at 192.168.31.31 (my test PFS device), everything is accessible.

                  10.0.9.2 (OpenVPN client from internet) > port forwarding via 192.168.31.1 > 10.0.9.1 (PFS OpenVPN Server IP/WAN IP) 192.168.31.31 > 192.168.31.1/7/9/15/17 all accessible

                  2.4.3 (amd64)
                  and given up on the SG-1000

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    This makes ZERO sense
                        192.168.30.2 (OpenVPN client) > 192.168.30.1 (PFS OpenVPN Server IP/LAN IP) 192.168.31.1 > 192.168.31.7 accessible
                        192.168.30.2 (OpenVPN client) > 192.168.30.1 (PFS OpenVPN Server IP/LAN IP) 192.168.31.1 > 192.168.31.9 not accessible

                    Unless you have some really odd mask? Maybe a /29??  That would put .7 at the broadcast address and .9 in the next subnet.

                    Or you have some add firewall rules on your vpn interface?

                    What I can you for sure is RIP is not a requirement for such a setup..  And I don't see how enabling it would allow you access.. Unless you have some weird masking setup and rip is being handed off to your vpn client???  Make no sense..

                    So from your vpn client what route table after you connect to the vpn?  You sure this other AP you can not connect to is using pfsense as its gateway with the correct mask on its network?

                    Your dumb switches inline would also have nothing to do with it..  Unless you had some sort of connectivity issue with its uplink and when your local your the same switch as your AP?

                    With the limited info I not sure exactly what your problem is - but RIP would have nothing to do with it as described where all your AP on 192.168.31/24 on your lan and your vpn users are on 192.168.30/24  And your vpn server either says hey default gateway come down the vpn or if you want to talk to 192.168.31/24 come down the tunnel.

                    The most likely problem is your AP you can not get to from another network is its gateway is wrong..  As to why it works alternate - that would point to it using that as its gateway.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    1 Reply Last reply Reply Quote 0
                    • A
                      awair
                      last edited by

                      sorry it didn't make sense…

                      OpenVPN network
                      192.168.30.0/24

                      LAN
                      192.168.31.0/24

                      Firewall rule
                      permit any from source 192.168.30.0/24 to destination 192.168.31.0/24

                      All devices have standard mask 255.255.255.0 for /24 network.

                      Gateway is definitely not wrong on any device. I agree something is not right, but I have no idea what, hence my initial question.

                      The removal of the switch was obviously a factor, but the NAS connected to the Asus AP (that replaced the switch) was still not accessible until RIP was enabled.

                      The Asus Router is definitely in AP-only mode (LAN only address, with pfsense as GW & DNS. I don't know why this behaviour is happening. Apart from re-checking the obvious, I am at a loss. RIP may not have been the problem, but it did seem to be the solution.

                      2.4.3 (amd64)
                      and given up on the SG-1000

                      1 Reply Last reply Reply Quote 0
                      • A
                        awair
                        last edited by

                        RIP disabled, still working…

                        No other changes made to configuration or topology.

                        Any other clues as to what might have been the issue?

                        2.4.3 (amd64)
                        and given up on the SG-1000

                        1 Reply Last reply Reply Quote 0
                        • I
                          imaginary_number
                          last edited by

                          Can you confirm WAP 2 and WAP 3 have gateways configured?  The most likely explanation is either they do not have gateways or have something other than the pfSense as a gateway (this applies to any other devices you are unable to reach via the tunnel, as well).

                          If the switches are unmanaged stop worrying about their effect on the network.  If they are managed, unless you are fiddling with VLANs or something, just treat them like the WAPs (ie. only care if they have correct ip address and gateways configured).

                          EDIT: oops you said this, "Gateway is definitely not wrong on any device. I agree something is not right, but I have no idea what, hence my initial question."  My bad!

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            "RIP disabled, still working…"

                            So now we may never know what was the issue.. But like I said RIP had zero to do with it :)

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                            1 Reply Last reply Reply Quote 0
                            • A
                              awair
                              last edited by

                              Update:

                              Obviously I spoke too soon. Now away from home, no configuration changes since I previously switched off RIP. The two hosts that were previously accessible, are no longer.

                              At least that's what I thought…

                              I am currently connected via 3 different devices to my home network. All OpenVPN users, with a separate IP address in the VPN subnet (192.168.30.0).

                              On my iPad, which I previously used for testing, I can still access all hosts on the 192.168.31.0 network. However, on the two Macs, which I hadn't used before, I cannot access two of the critical devices - exactly as before.

                              I will admit that there is definitely something very weird with my network. I have no idea what, or even how to begin diagnosing this. Firewall rules are OK, Gateway is the same, OpenVPN configurations were exported directly from pfsense. Nothing in the firewall logs to indicate what's going on…

                              IMG_0400.jpg
                              IMG_0400.jpg_thumb

                              2.4.3 (amd64)
                              and given up on the SG-1000

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                " or even how to begin diagnosing this."

                                Well follow the packets.. So device that can access 192.168.31.9 but not .7  So when you do traceroute it goes down the tunnel?  I would sniff on pfsense and make sure you see the packets come in the tunnel And then go where they are suppose to go..  Do you see an answer from the .7 box?  Maybe that device is just offline?  Or nobody can access it from vpn currently because pfsense doesn't know its mac, or there is duplicate IP?

                                So your saying that your Ipad at the same time as your other device can use .7 but your other device can not?

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                1 Reply Last reply Reply Quote 0
                                • A
                                  awair
                                  last edited by

                                  All fixed, with many thanks to @johnpoz.

                                  My fault for neglecting to include some (vital) information, that I had posted in another thread…
                                  https://forum.pfsense.org/index.php?topic=123209.msg680758#msg680758

                                  My APs, running Tomato, are used as alternate Gateways for devices that need an OpenVPN tunnel. At least one of the APs had two 'Default Routes'.

                                  It was pure luck that I 'fixed' this previously, as the fix was only temporary (and random).

                                  Adding a Static Route to the AP to permit a return path (for traffic from pfsense) appears to have been the correct solution, and probably also for the 2nd issue (DMZ) in my first post.

                                  My follow-up task is now to prevent the Tomato box adding a 2nd default route when starting an OpenVPN client session.

                                  Once again, many thanks to John - without whom, this would still be a puzzle.

                                  I should add that the OpenVPN clients are scheduled for removal from the APs, and integrated into pfsense…
                                  ... one step at a time...

                                  2.4.3 (amd64)
                                  and given up on the SG-1000

                                  1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator
                                    last edited by

                                    Glad we got it worked out, great that you were in chicagoland, and thanks for lunch! ;)

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.