Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DHCP problem

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 4 Posters 1.0k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P Offline
      PM_13
      last edited by

      @JKnott thanks for the pointer, I will try it out and share details here. But your post also sparked another thought. Yesterday I made few new rules on LANs to separate out devices based on trust. See attached screenshot for the new rules I inserted on LAN-1, I turned these rules off and the main router SSID seems back online but still cannot connect to satellites.

      I did not think that these rules will have any impact on wireless router but seems otherwise and I have no idea why or how.

      LAN-1.JPG

      1 Reply Last reply Reply Quote 0
      • P Offline
        PM_13
        last edited by

        @JKnott I did some search on Google and found this:
        "The DHCP employs a connectionless service model, using the User Datagram Protocol (UDP). It is implemented with two UDP port numbers for its operations which are the same as for the bootstrap protocol (BOOTP). UDP port number 67 is the destination port of a server, and UDP port number 68 is used by the client."

        Does it make sense to allow access for port 67 & 68 for LAN clients for Orbi Routers and Satellites?

        JKnottJ GertjanG 2 Replies Last reply Reply Quote 0
        • JKnottJ Offline
          JKnott @PM_13
          last edited by

          @PM_13

          Given the problem seems to have started with the new rules, I suggest you start there. You can disable them and then see if the problem persists. If not, then you have a problem with your rules.

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          1 Reply Last reply Reply Quote 0
          • kiokomanK Offline
            kiokoman LAYER 8
            last edited by

            the first DNS rule is wrong, the second, DNS can also be tcp.
            it does not force anything, if you want to force LAN-1 to use pfsense for dns you need a NAT rule with destination ip of pfsense interface

            ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
            Please do not use chat/PM to ask for help
            we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
            Don't forget to Upvote with the 👍 button for any post you find to be helpful.

            P 1 Reply Last reply Reply Quote 0
            • P Offline
              PM_13 @kiokoman
              last edited by

              @kiokoman I got these two rules from the steps mentioned in pfNGBlocker tutorial so your comment peaked my curiosity. Just did a quick test and really feeling stupid!!

              I will check out the NAT option later today, thanks for pointing out the flaw in the rules.👍

              dns.JPG

              1 Reply Last reply Reply Quote 0
              • P Offline
                PM_13
                last edited by

                @JKnott & @kiokoman I managed to solve the initial problem of using Orbi as AP, seems like I turned off DHCP server on LAN...not sure what I was thinking but that was the root cause.

                Also found this handy guide that helped the DNS issue too 😊
                https://docs.netgate.com/pfsense/en/latest/dns/blocking-dns-queries-to-external-resolvers.html

                Thanks to both of you for your input 👍

                1 Reply Last reply Reply Quote 0
                • GertjanG Offline
                  Gertjan @PM_13
                  last edited by

                  @PM_13 said in DHCP problem:

                  Does it make sense to allow access for port 67 & 68 for LAN clients for .....

                  You were told that an - LAN type - interface without (GUI) firewall rules doesn't pass any traffic 'in'.

                  Well, how to say this ..... that wasn't entirely true "they lied"..

                  Check out the /tmp/rules.debug file. It's a human readable file.
                  You'll discover many things. One of them is that DHCP traffic (UDP, ports 67 ...) are actually open.

                  With no rules what so ever on an interface, when you hook up a device, it will ( ! ) obtain a DHCP lease - if there is a DHCP pfSense server running on that interface.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  JKnottJ 1 Reply Last reply Reply Quote 0
                  • JKnottJ Offline
                    JKnott @Gertjan
                    last edited by

                    @Gertjan

                    Quite so. When I set up my guest WiFi a couple of days ago, the first rule allowed ping to the interface (172.16.3.1), the 2nd was to block everything to the entire 172.16.0.0 /16 block. It works fine.

                    Here are the rules:

                    bb36b04a-7d50-4f1a-ad5c-d0e4f6327756-image.png

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    P 1 Reply Last reply Reply Quote 0
                    • P Offline
                      PM_13 @JKnott
                      last edited by

                      @JKnott Does pfSense offer "isolation mode" by default?

                      If not then hosts on VLAN3 can communicate with each other using ARP and bypass firewall rules.

                      JKnottJ 1 Reply Last reply Reply Quote 0
                      • JKnottJ Offline
                        JKnott @PM_13
                        last edited by

                        @PM_13 said in DHCP problem:

                        @JKnott Does pfSense offer "isolation mode" by default?

                        That's a function of the access point, not pfSense. And yes, mine does. Here's what it says:

                        Enable AP Isolation - Isolate all connected wireless stations so that wireless stations cannot access each other through WLAN. This function will be disabled if WDS/Bridge is enabled.

                        However, I'm not worried about whether guests can connect to each other, not that I have a lot of guests at any one time (or ever).

                        Also, ARP doesn't do much, other than provide a MAC address for an IP address. It's not even part of IP. It predates it.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.