Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Routing between VLAN and parent interface

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    12 Posts 5 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 8
      8b2b86ac
      last edited by

      I've setup several VLANs on my network to segment traffic. When I first setup the VLANs it correctly put the right traffic on the right network but the different vlans could still route between each other (i.e. the networks were defined but not separated).

      I then setup firewall rules so each network was blocked from routing to the other networks. This worked great creating the isolation I need.

      I never setup any rules to block the vlan from accessing the network of the parent interface but despite this, traffic cannot route from any vlan to the any machines on the parent interface. In general this is what I want (again isoltation) but there are limited situations where I do want to setup a rule to allow certain machines to the real lan as that network is where the actual switch and AP are.

      I never setup any sort of block rule I'm not sure how to do that. I tried an explicit "allow" rule but that didn't work. How can I route select traffic from a vlan to the non-vlan network?

      bingo600B JKnottJ 2 Replies Last reply Reply Quote 0
      • bingo600B
        bingo600 @8b2b86ac
        last edited by bingo600

        @8b2b86ac

        In order to use the parent interface , you have to assign a pfSense interface to it (handling untagged packets) on that port.
        Then you have to assign an ip address & submet mask to the new pfSense interface ... Now you have something to use for the firewall rules.

        If you don't assign a L3 interface to the parent vlan interface , you have the most "excellent" separation , as pfSense won't handle (route) L2.

        /Bingo

        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

        pfSense+ 23.05.1 (ZFS)

        QOTOM-Q355G4 Quad Lan.
        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

        8 1 Reply Last reply Reply Quote 0
        • 8
          8b2b86ac @bingo600
          last edited by

          @bingo600 - Thanks for responding.

          A pfsense interface is assigned to that port. It has an IP address and subnet masks. The problem is when I create a VLAN with that interface as the parent the VLAN traffic and untagged traffic on the pfsense interface cannot communicate. Maybe I'm missing what you are saying?

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @8b2b86ac
            last edited by

            What rules did you put on the vlan interface after you created the vlan?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            8 1 Reply Last reply Reply Quote 0
            • 8
              8b2b86ac @johnpoz
              last edited by

              @johnpoz - For each VLAN interface the final firewall rule was already there which allows traffic from and to anywhere. I added rules before that to deny to each other VLAN. For example:

              0bb24b1f-60ad-4d8f-a104-a926065a92ab-image.png

              As you can see there is not a deny to the LAN destination but despite that I cannot contact any device on that parent LAN interface. My goal is generally to deny traffic to that parent LAN interface but I plan to allow certain machines. But as you an see I don't have anything denying it yet and despite that I cannot route from a VLAN to a device on the parent interface.

              M 1 Reply Last reply Reply Quote 0
              • M
                marvosa @8b2b86ac
                last edited by

                What do the rules look like on the parent interface?

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @marvosa
                  last edited by johnpoz

                  Can also see that none of those rules have any hits.. Not even your allow. All of them show 0/0 so nothing has triggered any of those rules.

                  So your either looking at the wrong interface, or your vlan tagging is messed up and that interface is not seeing any traffic. Your any any rule should show something.. Or at least one of your denys should be sitting hits..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • 8
                    8b2b86ac
                    last edited by

                    @johnpoz - Sorry, a bad example screenshot. It was my "Guest" VLAN and with COVID I haven't had any guests since I set this up :) Here is my "IOT" VLAN which is similar setup but actually being used:

                    5cf44f75-9ca1-4330-82eb-408b6b053d12-image.png

                    @marvosa - The parent interface is still the default that came with pfSense:

                    af6fc44c-af67-4774-9166-63415aa679d9-image.png

                    Doesn't seem like anything should deny connecting between a VLAN and the LAN parent interface.

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @8b2b86ac
                      last edited by

                      @8b2b86ac said in Routing between VLAN and parent interface:

                      Doesn't seem like anything should deny connecting between a VLAN and the LAN parent interface.

                      In whatever interface that is - your right it should allow access from that vlan to lan net. But what about the firewall on whatever your trying to talk to in the lan net?

                      Doesn't matter if pfsense firewall allows it or not, if the host firewall your trying to talk to says no. Users always forget that..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      8 1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @8b2b86ac
                        last edited by

                        @8b2b86ac said in Routing between VLAN and parent interface:

                        I never setup any rules to block the vlan from accessing the network of the parent interface but despite this, traffic cannot route from any vlan to the any machines on the parent interface. In general this is what I want (again isoltation) but there are limited situations where I do want to setup a rule to allow certain machines to the real lan as that network is where the actual switch and AP are.
                        I never setup any sort of block rule I'm not sure how to do that. I tried an explicit "allow" rule but that didn't work. How can I route select traffic from a vlan to the non-vlan network?

                        Here are my rules for my guest WiFi:

                        b5c7b226-1534-4d6f-b264-45d7ccd64fe8-image.png

                        "Private" is an alias for all RFC 1918 IPv4 addresses and IPv6 Unique Local addresses

                        "Prefix" is an alias for my entire /56 IPv6 prefix.

                        With these rules, the only things the guest can do is ping the interface and access the Internet.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • 8
                          8b2b86ac @johnpoz
                          last edited by

                          @johnpoz - It's not the device I'm trying to route to as I can create a NAT rule to re-route the traffic and that works. But I'm trying to understand why direct access doesn't work since no rules prevent it.

                          1 Reply Last reply Reply Quote 0
                          • 8
                            8b2b86ac
                            last edited by

                            Nevermind. I figured it out. It was something on my own computer blocking it. Thanks for the advice and the help anyway!

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.