Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    2 LANs cannot communicate

    Scheduled Pinned Locked Moved General pfSense Questions
    19 Posts 3 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      perfectdark
      last edited by

      hi, sorry i'm still learning pfsense
      I have 3 NIC cards (1 WAN) (1 LAN#1 ) and (1 LAN#2 - VPN)
      everything is working except both LANS cannot communicate with each other, I think I need a rule to allow for this but not sure
      LAN#1 - 192.168.1.0/24
      LAN#2 - 192.168.123.0/24

      from either LAN I can ping the other LANs gateway but no of the devices

      example: PC 192.168.1.100 can ping both 192.168.1.1 and 192.168.123.1 but not 192.168.123.100

      I have a plex server on 192.168.123.69 which is not seen as local/LAN but 192.168.1.0/24 network, they see it as a remote device.

      1 Reply Last reply Reply Quote 0
      • P
        perfectdark
        last edited by

        I also just noticed that none of the devices on 192.168.123.0/24 network can ping each other. They can all ping the gateway 192.168.123.1 but nothing else

        example: 192.168.123.69 cannot ping (and vice versa) 192.168.123.100

        P 1 Reply Last reply Reply Quote 0
        • P
          perfectdark @perfectdark
          last edited by

          @perfectdark said in 2 LANs cannot communicate:

          I also just noticed that none of the devices on 192.168.123.0/24 network can ping each other. They can all ping the gateway 192.168.123.1 but nothing else

          example: 192.168.123.69 cannot ping (and vice versa) 192.168.123.100

          I added a firewall rule Source 192.168.123.0/24 to destination 192.168.123.0/24 and the devices on subnet 192.168.123.0/24 can ping each other. I added a similar rule from 192.168.123.0/24 to 192.168.1.0/24 and vice versa but still devices on either subnet can not communicate through

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            @perfectdark said in 2 LANs cannot communicate:

            I also just noticed that none of the devices on 192.168.123.0/24 network can ping each other.

            That has zero to do with pfsense.. Pfsense is not involved in devices talking to themselves on the same network.

            I added a firewall rule Source 192.168.123.0/24 to destination 192.168.123.0/24 and the devices on subnet 192.168.123.0/24 can ping each other.

            NO that is not how it works at ALL!!!

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            P 1 Reply Last reply Reply Quote 0
            • P
              perfectdark @johnpoz
              last edited by perfectdark

              @johnpoz pfsense has to be blocking communication between subnets. I followed the airvpn guide and have OPT1 as AirVPN WAN and NIC3 as AirVPN LAN. NIC1 as WAN and NIC2 as regular LAN. I'm assuming there has to be a firewall rule or static route to allow both my LAN subnets to talk? because they are not able to ping or communicate right now.

              any help with the rules that would allow communication between to seperate subnets would greatly be appreciated

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by johnpoz

                If your forcing traffic out a gatway, ie your vpn - then how would it get to your other vlan?

                Post up your rules for your lan and vlan..

                You do not need a route for any network that is directly attached. But you do have to have a rule that allows the traffic if you have a rule that forces traffic out your vpn.

                Rules are evaluated top down, first rule to trigger wins, no other rules are evaluated... But pfsense has ZERO to do with devices talking to other devices on the same network.. ZERO!!! If you have a device at 192.168.1.100/24, why would it send traffic to the "gateway" 192.168.1.1 to talk to say 192.168.1.101.. It wouldnt!!! It only sends traffic to gateway when the IP is not on its own network..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                P 1 Reply Last reply Reply Quote 0
                • P
                  perfectdark @johnpoz
                  last edited by

                  @johnpoz I understand, just to clarify I don't have a vlan, I have 2 physical LANs (3 NIC cards in pfsense)
                  0_1548107965811_0.PNG

                  0_1548107978365_1.PNG

                  0_1548107987752_2.PNG

                  0_1548107996526_3.PNG

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by johnpoz

                    vlan/physical network - its all the same..

                    See here
                    0_1548119800300_gatewaypolicyroute.png

                    How exactly are you suppose to get to your other networks if your forcing traffic out your wan?? Why would you setup that rule?

                    Rules are evaluated top down, first rule to trigger wins... That rule that allows lan net to get to airvpn_lan net will never be evaluated because you have a any any rule from lan net that sends everything out your wan.

                    Why would you do such a thing?

                    This guide told you to do that?? I find that almost impossible to believe - they can not be that stupid?

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    P 1 Reply Last reply Reply Quote 1
                    • P
                      perfectdark @johnpoz
                      last edited by

                      @johnpoz this is the guide I followed from airvpn https://airvpn.org/topic/11245-how-to-set-up-pfsense-21-for-airvpn/

                      Second LAN Firewall Rule:

                      "ALLOW LAN OUTBOUND"

                      1.) Go to: Firewall > Rules
                      http://192.168.1.1/firewall_rules.php
                      -or-
                      https://192.168.1.1/firewall_rules.php
                      and select your "LAN" interface.

                      2.) Click the [+] on the right to "Add New Rule" and create a rule we will title "ALLOW LAN OUTBOUND" (Note: There may already be a rule titled " Default Allow LAN Outbound" or similar. You certainly can just edit that entry to these settings, or delete and create this.)

                      3.) Set as follows:
                      Action = [ Pass ▼]
                      Interface = [LAN ▼]
                      TCP/IP Version = [IPv4 ▼]
                      Protocol = [Any ▼]
                      Source = [] Not (UNCHECKED)
                      Type: [ LAN Subnet ▼]
                      Address: [
                      ] (BLANK)
                      Destination = [
                      ] Not (UNCHECKED)
                      Type: [ Any ▼]
                      Address: [
                      __] (BLANK)
                      Description = [✎ ALLOW LAN OUTBOUND]
                      *****IMPORTANT STEP: [ADVANCED FEATURES] > GATEWAY = [ WAN_DHCP ▼]

                      4.) Click [ SAVE ]

                      5.) Click [ Apply Changes ]

                      .) Go to Firewall > Rules
                      http://192.168.1.1/firewall_rules.php
                      -or-
                      https://192.168.1.1/firewall_rules.php
                      and Select your "LAN" interface.

                      2.) The order of the rules we just created is important!
                      They should appear in this following order when viewed:
                      BLOCK DNS LEAKS LAN
                      ALLOW LAN OUTBOUND
                      BLOCK ALL ELSE LAN

                      ENSURE THE RULES ARE IN THIS PRECISE ORDER, IF THEY ARE NOT, ORGANIZE THEM AS NECCESSARY!

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by johnpoz

                        @perfectdark said in 2 LANs cannot communicate:

                        *****IMPORTANT STEP: [ADVANCED FEATURES] > GATEWAY = [ WAN_DHCP ▼]

                        Just Moronic!!!

                        And clearly doesn't take into account or mention if you have other networks.

                        How exactly do they expect dns to work even? Your client has to ask some public dns?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        P 1 Reply Last reply Reply Quote 0
                        • P
                          perfectdark @johnpoz
                          last edited by

                          @johnpoz you are 100% right (thank you) and funny thing is that guide was for 3 NICs (1 WAN, 1 for VPN LAN and 1 for LAN)

                          I moved my rule to the top and both subnets can communicate now. Thank you for your assistance in pointing this out.

                          0_1548121539170_4.PNG

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by johnpoz

                            How you going to resolve anything locally? Since you can not ask pfsense for dns per those rules.

                            What is the point of the last rule? There is a default deny on all interfaces... There is zero reason for that last rule..

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            P 1 Reply Last reply Reply Quote 0
                            • P
                              perfectdark @johnpoz
                              last edited by

                              @johnpoz I’m still trying to understand all the rules , I just followed the guide to get things going. Then I can spend some time learning what means what.

                              I’ve tested both my subnets and both are working and resolving websites. My airVPN LAN also has no DNS leaks. The LAN subnet uses the Public Open DNS and the AirVPN LAN is using the DNS static provided by airvpn and assigned to each device via the airvpn dhcp server.

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by johnpoz

                                And how exactly do you resolve a host on on the other network to access it by name?

                                Why would you not just let your resolver resolve through the vpn connection, and have your local devices ask your local resolver?

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                P 1 Reply Last reply Reply Quote 0
                                • P
                                  perfectdark @johnpoz
                                  last edited by

                                  @johnpoz i don’t have the DNS resolver active , I’m using the DNS Forwarder

                                  1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator
                                    last edited by

                                    Again no reason for that.. Resolve through your vpn connection, that way your not sending all your queries to your VPN dns.. But guess its ok, they don't log anything <rolleyes>

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    P 1 Reply Last reply Reply Quote 0
                                    • P
                                      perfectdark @johnpoz
                                      last edited by

                                      @johnpoz lol “roll eyes” I’ll look into this as I’m not sure what changes I need to make

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        mattlach
                                        last edited by mattlach

                                        Generally what you are doing is not best practice.

                                        Unless you need your two subnets isolated from eachother, its much better to use only one LAN port on your pfSense device, and use a hardware switch to manage multiple devices.

                                        pfSense is also a pretty lousy WiFi access point, so I wouldn't do that AirVPN thing at all. Get a dedicated Wireless AP instead.

                                        pfSense is just about the best firewall and router setup you can get yourself, but it is essentially an enterprise tool, and not intended to replace the traditional consumer router.

                                        In enterprise settings you usually have dedicated routers/firewalls and separate hardware switches and hardware Wireless Access Points.

                                        This is how it is designed to work.

                                        You CAN bridge ports and have them talk to eachother, but performance will not be good. Its much better to use a switch for this. They are cheap, and that is what they are designed for.

                                        P 1 Reply Last reply Reply Quote 0
                                        • P
                                          perfectdark @mattlach
                                          last edited by

                                          @mattlach I think you are misunderstanding my setup
                                          I am not using pfsense as an Access Point. I have eero behind my LAN port for that.
                                          AirVPN is my VPN provider. The reason for two LANs is one subnet routes directly to ISP and other subnet through VPN for privacy.

                                          Example my Xbox and XB6 STBs will go through ISP via LAN and my wifi traffic , Torrents etc will go through VPN for privacy.

                                          My switch is located behind the pfsense firewall

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.