Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can't get additional interface to work

    General pfSense Questions
    5
    32
    4.6k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      marvosa
      last edited by

      Post a network map that includes the subnets in use along with the firewall rules on both interfaces.

      1 Reply Last reply Reply Quote 0
      • B
        brannenj
        last edited by

        It's a pretty simple setup.  All of the normal devices are on 192.168.1.xxx, and pfSense is set to 192.168.1.1 for that interface.  DHCP is used, with most devices having static mappings.  No issues on this interface.

        All of the security devices are on 10.10.10.xxx, with the pfSense interface on that network segment at 10.10.10.100, and all of the devices have IPs statically assigned.

        The only firewall rule on the security interface is a rule to pass all traffic (any protocol).  There's also a rule to block any traffic from that interface to WAN, but I've had it disabled while I troubleshoot.

        The computer the footage goes to has network cards for both LANs, but they aren't bridged.

        There's a 24 port managed switch with separate port based VLANs to segment the traffic between the two networks.

        That's all there is to it.

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          The computer the footage goes to has network cards for both LANs, but they aren't bridged.

          That can easily create asymmetric routing situations you will need to understand and account for.

          You will probably have to draw up what you have there, and where all the hosts and servers in play are in relation to the firewall.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • B
            brannenj
            last edited by

            I guess I don't understand…..pfSense isn't really doing any "routing tasks" on the Security LAN.  All of this was up and running fine before I installed pfSense, and I added the network card to the pfSense box for the specific purpose of having the cameras hit it to sync the time.

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              List your interfaces, addresses, subnets and their default gateways of clients and servers. at least one example on each interface. include both interfaces on the server.

              Some routers allow bad network design by default.

              Not going to be able to help without a better picture of your network.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • chpalmerC
                chpalmer
                last edited by

                @Derelict:

                List your interfaces, addresses, subnets and their default gateways of clients and servers. at least one example on each interface. include both interfaces on the server.

                Some routers allow bad network design by default.

                Not going to be able to help without a better picture of your network.

                WAN address public or private IP space?

                Doesn't conflict does it?

                Triggering snowflakes one by one..
                Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  Much depends on the default gateway of the system with 2 NICs in it and whether that system is talking through the router, on a local subnet, or both.

                  Some routers will allow hairpinning of traffic in and out the same interface by default. pfSense does not allow it by default.

                  Need more information.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • B
                    brannenj
                    last edited by

                    Attached are the ipconfig output of the computer with the dual interfaces, the capture of the interfaces on pfSense, and a crude network map.

                    EDIT:  Where the network map says that "various" clients are connected, each client is of course plugged into the switch with its own cable…there aren't switches downstream or anything.

                    ![network map.JPG](/public/imported_attachments/1/network map.JPG)
                    ![network map.JPG_thumb](/public/imported_attachments/1/network map.JPG_thumb)
                    pfsense.JPG
                    pfsense.JPG_thumb
                    interfaces.PNG
                    interfaces.PNG_thumb

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      "The computer the footage goes to has network cards for both LANs, but they aren't bridged."

                      Why???

                      Why do you have your PC with 2 default gateways?

                      And where exactly can you not ping 10.10.10.100?  From your pc??  And what are the rules on your security interface on pfsense?  You mention any any.. but is it for only tcp or something?

                      Can your PC see mac of pfsense lan interface?  If not then you got some sort of connectivity issue.  Wrong setup on your switch would be first guess.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        Can maybe fix your problem if the actual, specific issue you are really seeing is communicated.

                        Only one of your interfaces should have a default gateway, as has been noticed by @johnpoz.

                        If it were me I would take one of those interfaces out of the server and route traffic through the firewall from one interface or the other to the server. Doesn't really matter which way. Probably the one that involves the least traffic. Like if the cameras are constantly streaming to the server and PCs only connect once in a while to view footage, I would remove the 192.168.1.10 interface.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • B
                          brannenj
                          last edited by

                          @johnpoz:

                          "The computer the footage goes to has network cards for both LANs, but they aren't bridged."

                          Why???

                          Because I want to keep the networks entirely segregated.

                          Why do you have your PC with 2 default gateways?

                          I don't actually want the Security LAN to be able to get to WAN….so the Security LAN is just routed to pfSense for the default gateway on that interface.  I'll remove the gateway from that interface and see if that makes a difference.....

                          And where exactly can you not ping 10.10.10.100?  From your pc??

                          Correct.  The PC with the two network cards cannot ping the pfSense box on the 10.10.10.100 interface.

                          And what are the rules on your security interface on pfsense?  You mention any any.. but is it for only tcp or something?

                          I simply did a copy and paste of the default pfSense rule for allowing LAN traffic that is added in the default configuration for the 192.168.1.XXX interface.  It's set to allow any protocol.  Clearly, traffic is being allowed since the cameras are communicating fine back to the PC where the footage is stored.

                          Can your PC see mac of pfsense lan interface?  If not then you got some sort of connectivity issue.  Wrong setup on your switch would be first guess.

                          Yes.  No problems there.  The 192.168.1.1 interface works fine.

                          1 Reply Last reply Reply Quote 0
                          • B
                            brannenj
                            last edited by

                            @Derelict:

                            Can maybe fix your problem if the actual, specific issue you are really seeing is communicated.

                            I wish I had more information to give you.  Essentially, as far as the rest of the network is concerned, the 10.10.10.100 interface on pfSense does not exist.  The lone computer on that netwrok segment can't see it, and neither can any of the cameras when I try to point them to that IP as the NTP server.

                            If it were me I would take one of those interfaces out of the server and route traffic through the firewall from one interface or the other to the server. Doesn't really matter which way. Probably the one that involves the least traffic. Like if the cameras are constantly streaming to the server and PCs only connect once in a while to view footage, I would remove the 192.168.1.10 interface.

                            I need both interfaces in that machine because it handles more duties than just the cameras.  That computer is, however, the only PC physically connected to the 10.10.10.XXX network segment (besides the firewall, of course).  The only purpose I need pfSense to serve on that network segment is as an NTP server.

                            1 Reply Last reply Reply Quote 0
                            • DerelictD
                              Derelict LAYER 8 Netgate
                              last edited by

                              PC (192.168.1.100) needs to ping 10.10.10.100

                              PCs default gateway is 192.168.1.1 so it sends the traffic to pfSense

                              pfSense sends traffic to 10.10.10.100 sourced from 192.168.1.100

                              10.10.10.100 has a route for 192.168.1.0/24 so it sends the reply directly to 192.168.1.100, creating asymmetry. Should work fine for ping in that case.

                              However the problem might be that the server at 10.10.10.100 has a firewall enabled and is rejecting traffic from 192.168.1.0/24 on that interface.

                              If you want to segment and isolate two networks, pretty much the last thing you want to do is put a host with nics on both sides that isn't a firewall.

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              1 Reply Last reply Reply Quote 0
                              • DerelictD
                                Derelict LAYER 8 Netgate
                                last edited by

                                Sounds like either your layer 2 is hosed or your firewall rules are wrong. Nothing really fits what you are describing.

                                If you have an interface with the address 10.10.10.1 on pfSense, you need a firewall rule on the 192.168.1.1 passing traffic (including ICMP) from 192.168.1.0/24 to 10.10.10.1. It can also be an any rule as long as the traffic matches. The default LAN rules will pass it.

                                If that is in place and you still cannot ping 10.10.10.1 from hosts one 192.168.1.0/24 AND the default gateway of those hosts is pfSense, then traffic is not routing in a sane manner and something else is wrong somewhere.

                                For hosts on 10.10.10.0/24 to be able to ping that interface, the rules have to be on that interface.

                                https://doc.pfsense.org/index.php/Firewall_Rule_Basics

                                https://doc.pfsense.org/index.php/Firewall_Rule_Troubleshooting

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • B
                                  brannenj
                                  last edited by

                                  I'll willfully profess my ignorance here.  I put this setup in place before pfSense was even a part of the network.  The purpose in segmenting the network this way was to make absolutely certain that no one logging onto the "normal" LAN would have access to the cameras.  There's probably a simpler way to accomplish this.  The computer with both NICs is locked away, so there is no physical access to it.  I usually get on it by remote using RealVNC.

                                  Regardless of me being able to ping from the computer, the cameras, which have no connection to 192.168.1.XXX at all, still can't connect to the 10.10.10.100 interface for NTP.  Cameras have static IPs, and mask of 255.255.255.0, and a default gateway of the 10.10.10.100, the pfSense interface.

                                  This is the sole rule in place on the 10.10.10.100 interface:

                                  rule1.JPG
                                  rule1.JPG_thumb

                                  1 Reply Last reply Reply Quote 0
                                  • B
                                    brannenj
                                    last edited by

                                    I also thought I might try to change the IP of the 10.10.10.100 interface to one on the 192.168.1.XXX subnet that was free and see if I could ping that, just to make sure there's not some physical problem with the NIC, but pfSense doesn't like that…..

                                    1 Reply Last reply Reply Quote 0
                                    • DerelictD
                                      Derelict LAYER 8 Netgate
                                      last edited by

                                      That's because it is unsound to have the same subnet on two different interfaces. Nothing about what pfSense does or doesn't like. That's basic IP networking.

                                      The rule you posted is for connections from the 10.10.10.0/24 network and has ZERO to do with what is accessible from the 192.168.1.0/24 network. That is governed by rules on the other interface. The ones that connections go INTO. All covered in the links above.

                                      Try to ping 10.10.10.1 from the LAN side then go to Status > System Logs, Firewall and filter on destination 10.10.10.1

                                      Anything show up there?

                                      Click the red x if you see blocks. That will tell you which rule blocked it.

                                      Chattanooga, Tennessee, USA
                                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                      1 Reply Last reply Reply Quote 0
                                      • B
                                        brannenj
                                        last edited by

                                        I don't need that interface to be accessible from the 192.168.1.XXX network.  I understand what you're saying about the ping, but it still doesn't explain why the cameras, which have no connection to 192.168.1.0/24 can't get on.  So setting up a rule to make sure that traffic passes from 192.168.1.0/24 through to 10.10.10.100 isn't something I really want to put in place, and it doesn't help me troubleshoot my core issue.

                                        Unfortunately, the cameras don't have a diagnostic feature to ping an IP.  At first I thought it was just that my NTP setup was hosed, but I don't think that's the case.  In any event, here's the LAN rule for 192.168.1.0/24:

                                        rule2.JPG
                                        rule2.JPG_thumb

                                        1 Reply Last reply Reply Quote 0
                                        • B
                                          brannenj
                                          last edited by

                                          @Derelict:

                                          Try to ping 10.10.10.1 from the LAN side then go to Status > System Logs, Firewall and filter on destination 10.10.10.1

                                          Anything show up there?

                                          Click the red x if you see blocks. That will tell you which rule blocked it.

                                          Nope, nothing to do with that ping request, anyway….

                                          1 Reply Last reply Reply Quote 0
                                          • DerelictD
                                            Derelict LAYER 8 Netgate
                                            last edited by

                                            Do the cameras have a default gateway set? Is it the pfSense interface?

                                            Does a laptop on 10.10.10.0/24 get a DHCP address? Can it ping 10.10.10.100? Get out to the internet? Can it ping 10.10.10.101? Access that server?

                                            Did you (or someone else) turn on manual outbound NAT? If so did you add outbound NAT for source 10.10.10.0/24? (This will have zero to do with pinging 10.10.10.100 from that subnet)

                                            Your problem is virtually 100% not pfSense with those rules in place on those interface. Unless there are some cockamamie rules on the Floating tab or a captive portal you haven't said anything about or IPsec traffic selectors that match or something else that might suck up the traffic)

                                            Chattanooga, Tennessee, USA
                                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.