Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Getting PFSense to See Internal Network

    Scheduled Pinned Locked Moved General pfSense Questions
    20 Posts 5 Posters 1.9k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S Offline
      stephenw10 Netgate Administrator
      last edited by

      Again, what are you actually trying to connect to on the inside subnet?

      You could have a separate interface in pfSense that connects to the switch directly and only carries inbound traffic. You would have to outbound NAT it in pfSense to prevent asymmetry.

      Steve

      G 1 Reply Last reply Reply Quote 0
      • G Offline
        greg.dreelin @stephenw10
        last edited by

        @stephenw10 said in Getting PFSense to See Internal Network:

        Again, what are you actually trying to connect to on the inside subnet?

        You could have a separate interface in pfSense that connects to the switch directly and only carries inbound traffic. You would have to outbound NAT it in pfSense to prevent asymmetry.

        Steve

        Well I have a Plex Server I want to allow access to someone in my family. I have put in port forwarding from the device through the Google Wifi, through the PFSense, and the ISP's gateway. When the person tries to access it I can see the request come in on the PFSense but for the internal IP and it denies it. I am assuming since it cannot see the 192.168.32.0 net it dumps it. I have tried a rule to allow but it keeps denying it. I am at a loss right now on getting it through.

        1 Reply Last reply Reply Quote 0
        • stephenw10S Offline
          stephenw10 Netgate Administrator
          last edited by stephenw10

          If you are seeing traffic with a destination in the 192.168.32.x subnet hitting something on a pfSense interface then you have one of those port forwards setup wrong. Probably the one in pfSense since it's actually arriving there.
          Adding a port forward will normally automatically add a firewall rule on WAN to pass that so I assume you either changed that or chose not to have it added.
          Port forwards happen before the firewall so if your port forward is configured to use the 192.168.30.x destination and you have removed (or just added) the rule you will see that blocked on WAN.
          However that's wrong anyway because the pfSense forward should be to the Google WIFI node IP, 10.2. The forward in Google WIFI should be to the 192.168.32.X IP.

          Can we see a screenshot of the forward and WAN rules?

          What are you running Plex on? You can probably tunnel to pfSense from there and get past the WIFI as I initially suggested.

          Steve

          G 1 Reply Last reply Reply Quote 1
          • G Offline
            greg.dreelin @stephenw10
            last edited by

            @stephenw10 I am running the Plex on a 14Tb UnRAID rack mount system. It is a docker on the UnRAID platform. This issue is getting connection to in from the outside. Dynamic DNS is a bit hokey at best.

            bingo600B 1 Reply Last reply Reply Quote 0
            • bingo600B Offline
              bingo600 @greg.dreelin
              last edited by

              @greg-dreelin

              Why don't you split the WiFi Lan and "Switch Lan" into two lans, each with a pfSense interface.

              Make (keep) a Lan/Vlan just having the WiFi stuff (192.168.32.0/24)

              Make a new one 192.168.33.0/24 , where you put all your non wifi attached stuff.

              You could be quite permissive on the pfSense wifi interface , as it is also a trusted zone.
              Allow ip src 192.168.10.2 dest 192.168.33.0/24

              Traffic from Wifi to "Switch" should not be an issue (well it would be natted to the google outside) , prob. but not a problem.

              Traffic initiated from "Switch" to Wifi would be troublesome (portforward needed) , but do you really have any need for that ?

              If done like that , then you'll get kind of two separate segments in your house.
              But at least one of them will be "normal".

              /Bingo

              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

              pfSense+ 23.05.1 (ZFS)

              QOTOM-Q355G4 Quad Lan.
              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

              1 Reply Last reply Reply Quote 0
              • stephenw10S Offline
                stephenw10 Netgate Administrator
                last edited by stephenw10

                Well I'm pretty sure you could setup a tunnel from Unraid to pfSense. Even if that's a, probably unnecessary, VPN tunnel. Then have Plex listen on the tunnel subnet too. You could then port forward to it in pfSense as though it's directly connected.

                But if you can port forward in Google WFI you just need to get all three port forwards setup correctly.

                Or, yes, move the Unraid box to a different interface on pfSense dircetly.

                Steve

                1 Reply Last reply Reply Quote 0
                • G Offline
                  greg.dreelin
                  last edited by

                  Thank you all for some great ideas. Unfortunately I can't VLAN with Google Wifi networks (yep it blows), the switch can but the wifis can't figure it out. I theory it should work with port forwarding and punching through the PFSense but I am missing something that is not allowing the push from the firewall to the local network behind the first Google Wifi. I am interested in the second line idea and may try that. I appreciate all the advice and help.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ Online
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    Your google wifi is also doing nat.. If you want something from outside to get to something on the google network, you would have to do 2 port forwards.

                    1 at edge, and then again at your downstream nat router.

                    Here is the thing - if you want to run a big boy network.. Your not going to do it with soho stuff designed for home users.

                    Get APs that support vlans. Get switch(es) that do vlans if you want.. Your only going to cause yourself grief trying to do enterprise grade networking with home user stuff..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 25.07 | Lab VMs 2.8, 25.07

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S Offline
                      stephenw10 Netgate Administrator
                      last edited by

                      It's ugly (triple NAT!) but you can port-forward in Google WIFI: https://support.google.com/wifi/answer/6274503?hl=en-GB

                      This will work if you have all three port forwards setup correctly.

                      The fact you were seeing blocked traffic in pfSense shows at least one port forward is wrong. See my comments above.

                      Steve

                      1 Reply Last reply Reply Quote 0
                      • G Offline
                        geoffrey Banned
                        last edited by

                        This post is deleted!
                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.