Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    LAN Clients can Ping out, but nothing else

    Scheduled Pinned Locked Moved General pfSense Questions
    16 Posts 3 Posters 1.7k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • RicoR Offline
      Rico LAYER 8 Rebel Alliance @theokonos
      last edited by

      @theokonos said in LAN Clients can Ping out, but nothing else:

      using the official guide

      This one https://docs.netgate.com/pfsense/en/latest/recipes/virtualize-proxmox.html ?

      -Rico

      T 1 Reply Last reply Reply Quote 1
      • T Offline
        theokonos @Rico
        last edited by

        @rico Yes, that one. but how could something be borked upstream when pfsense has no issue without outbound access? I can ping and port-test beyond my router from pfsense itself. And all of my LAN traffic is being NAT'd with the WAN IP of pfsense, so it should all appear the same to the upstream router.

        1 Reply Last reply Reply Quote 0
        • RicoR Offline
          Rico LAYER 8 Rebel Alliance
          last edited by

          Can you draw how your stuff is connected together including IP/network addresses?

          -Rico

          T 1 Reply Last reply Reply Quote 1
          • T Offline
            theokonos @Rico
            last edited by

            @rico So, here are a couple of illustrations. One is more proxmox-centric and the other is more topology-centric.

            Basically, I have three gateway interfaces on my router: one for proxmox's management subnet (.100), one for my other normal VMs (.200), and one for a point-to-point link between my router and pfsense's WAN (.201).

            Proxmox is enabled with two bridges; one that allows VMs to connect to my router directly (vbridge0), and one without any ports in it (just an empty virtual switch) that allow other VMs to connect to pfsense (vbridge1).

            pfsense has its WAN on vbridge0 and its WAN on vbridge1.

            In this topology, pfsense should be able to talk directly to my router's vlan 201 address as its upstream gateway. Then any VMs connecting to pfsense would connect to vbridge1 on vlan 199. (I'm doing all of my VLAN tagging actually on the individual VM interfaces, not in the OS or pfsense config.)

            Here is an illustration of the bridges and the system architecture:

            b1ac8f67-73e0-487a-9363-571e187ee5ad-image.png

            And here is one that's more straightforward regarding the network topology:

            635764a2-b154-4b73-bedc-43e12cc4c8ba-image.png

            (all IPs are 10.1.x.x)

            stephenw10S 1 Reply Last reply Reply Quote 0
            • stephenw10S Online
              stephenw10 Netgate Administrator @theokonos
              last edited by

              Hmm, well that should pass. I would look in the rules file /tmp/rules.debug to see what rule that tracker is for.

              Are you using dhcp on the LAN side?

              You have any floating rules?

              Steve

              T 1 Reply Last reply Reply Quote 1
              • T Offline
                theokonos @stephenw10
                last edited by

                @stephenw10 @Rico Well, thank you both for your input and your help. Time for me to eat some crow!

                Because while I said that I had followed the official pfsense guide for proxmox installation, I had neglected to change a configuration setting toward the end of the guide. I think I had done it initially, but after several factory resets I at some point forgot to re-apply the setting.

                In proxmox, hardware checksum offloading must be disabled in pfsense for proper functionality. The guide makes it seem like it's just for performance reasons, but in a virtual environment like proxmox, the hardware obviously isn't available. And apparently this can mess with pfsense's routing, because as soon as I disabled the offloading, everything started passing.

                The setting in question is found here in the guide: https://docs.netgate.com/pfsense/en/latest/recipes/virtualize-proxmox.html#configuring-pfsense-software-to-work-with-proxmox-virtio

                Thanks again for your help!
                Theo

                1 Reply Last reply Reply Quote 0
                • stephenw10S Online
                  stephenw10 Netgate Administrator
                  last edited by

                  Using VirtIO NICs?

                  I have a number of pfSense VMs in Proxmox without that disabled and they work fine.

                  That would not explain that blocked traffic either. I suspect there might have been more happening here. Disabling Hardware Checksum Offloading is certainly a good idea though.

                  Steve

                  T 1 Reply Last reply Reply Quote 1
                  • T Offline
                    theokonos @stephenw10
                    last edited by

                    @stephenw10 Yeah, VirtIO NICs. And yeah that's another one of the reasons why I hadn't re-applied it. But low and behold, after trying everything else, I disabled it and it started working.

                    stephenw10S 1 Reply Last reply Reply Quote 0
                    • stephenw10S Online
                      stephenw10 Netgate Administrator @theokonos
                      last edited by

                      Take the win and move on. 😉

                      1 Reply Last reply Reply Quote 0
                      • RicoR Offline
                        Rico LAYER 8 Rebel Alliance
                        last edited by

                        Glad you have it working now. ☺

                        -Rico

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.