Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NAT/Portforward VIPs block

    Scheduled Pinned Locked Moved NAT
    22 Posts 4 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      dasm0kinone
      last edited by

      Is there a dump file I can do that you could look at to see if I'm overlooking something?

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by johnpoz

        you can sniff sure, just use tcpdump.. if you use -e with tcpdump you can see the vlan tags..

        If if the rule on the parent physical interface had anything to do with the traffic on the vlan - then vlans would be completely USELESS nonsense since you wouldn't actually be isolating the traffic. Might as well just run multiple layer 3 on the same layer 2 in such scenario..

        You can also sniff using the diag / packet capture web gui.. But doesn't allow you to see the vlan tags because you can not call out -e

        Where exactly are you seeing
        "NO_TRAFFIC:SINGLE on the VLAN6."

        What state exactly... That info doesn't mean much without more context.

        What exactly is not working? What do you have configured on your switch to allow for the vlan6 you setup, guessing you used vlan ID 6 when you setup that vlan in pfsense? So you have trunk connected to your physical interface on pfsense frm your switch, and then port where you laptop connected via untagged access port in vlan 6, etc.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Have you actually created a VLAN6 interface in Interfaces > Assignments > VLANs?

          Steve

          1 Reply Last reply Reply Quote 0
          • D
            dasm0kinone
            last edited by

            When I look at the "States Detail" under rules for VLAN its stating NO_TRAFFIC:SINGLE" Im unable to get online.
            I have a trunk port setup on my switch and my other VLANs are working properly but using a local subnet. I do have Port 6 tagged for VLAN 6.

            I disabled all the NAT for VLAN 6 and keep the rest all the same.

            Steve: Yes I have VLAN 6 created and I have the public IP block assigned to that interface.

            What specific rules I would have to create on the WAN?

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              You shouldn't need any rules on WAN to allow traffic out from the VLAN6 subnet.

              Try to ping out from Diag > Ping choosing the VLAN6 interface as the source address.

              It sounds like maybe your ISP is not actually routing that subnet to your WAN IP.

              Steve

              1 Reply Last reply Reply Quote 0
              • D
                dasm0kinone
                last edited by

                I cant ping from that interface. this is what the ISP sent to me

                set routing-options static route 65.15X.XXX.X44/29 next-hop 67.1XX.XXX.198

                set routing-options static route 63.23X.XXX.X76/28 next-hop 67.1XX.XXX.198

                So I used the /29 for the WAN and the /28 for VLAN6

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  So they directly attached it to you... Not routed it..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • D
                    dasm0kinone
                    last edited by

                    Ok knowing that now. How would I go about configuring the IPs then?

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by johnpoz

                      Get them to actually route it to you... Or you would have to use vips and port forwarding.

                      They are also having you set gateways outside the IP block... Not very good idea to be honest as well.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      D 1 Reply Last reply Reply Quote 0
                      • D
                        dasm0kinone
                        last edited by

                        If i were to use VIP and port forwards would I have to port forward any devices they use on the network or can you they do that through there firewall? Also with the portforward what IP would be used for the gateway?

                        1 Reply Last reply Reply Quote 0
                        • D
                          dasm0kinone @johnpoz
                          last edited by

                          @johnpoz
                          Could I just assign another nic interface for that second IP block? then Have the VLAN go to that?

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            No. The ISP should route 63.23X.XXX.X76/28 to an address in 65.15X.XXX.X44/29. They should provision your service properly.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • D
                              dasm0kinone
                              last edited by

                              Thank you all for your help. I got the ISP to route the IPs and it worked how you all explained it.

                              1 Reply Last reply Reply Quote 1
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                Nice. 😀

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.