Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can't HTTP, HTTPS, SSH or Map drive across networks

    Scheduled Pinned Locked Moved General pfSense Questions
    11 Posts 4 Posters 848 Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bingo600B Offline
      bingo600 @rmoroni3
      last edited by

      @rmoroni3

      Sounds a bit like a DNS issue to me.

      When you say you can ping the device on VL11 , is that by dns-name or by ip ?

      /Bingo

      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

      pfSense+ 23.05.1 (ZFS)

      QOTOM-Q355G4 Quad Lan.
      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

      R 1 Reply Last reply Reply Quote 0
      • R Offline
        rmoroni3 @bingo600
        last edited by

        @bingo600 :
        Everything is by IP address. I am trying to http or https from my PC on 192.168.10.2 to a VMware Host server on 192.168.11.20. You have to use http://192.168.11.20 to get to the tools like the VMware Client which in turn uses https://192.168.11.20 to actually manage it. None of this works unless my PC is on the same network as the server. I'll try to post a Wire Shark packet capture of what the traffic looks like when it won't connect.

        G 1 Reply Last reply Reply Quote 0
        • G Offline
          Griffo @rmoroni3
          last edited by

          @rmoroni3 Wireshark will help, you can also do a packet trace on teh firewall itself on the two different interfaces, so you can see what's entering the interface and what's exiting.

          You say that your devices has 5 NIC's and then mention vlans. Can you clarify which interfaces are physical and which are vlans?

          I'd be double checking all your vlan tagging configs on your physical and virtual switches too.

          R 1 Reply Last reply Reply Quote 0
          • R Offline
            rmoroni3 @Griffo
            last edited by

            @griffo
            I have two dual-port Intel PRO/1000 NICs plus the RealteK gigabit NIC built-in on the mobo. The Intel NICs are used for the WAN1, VLAN10, VLAN11 and VLAN12 networks. The Realtek NIC is used for WAN2 which is the WiFi Internet failover in case my cable Internet goes down. I can tether that NIC to my cellphone which is set up as a hotspot so I can keep working and all of my Smart devices still work.

            When I first embarked on this adventure I started to use VLANs but decided not to. I never changed the network names. SO, there aren't any VLANs, just the 5 separate networks. I really should change that unless VLANs is what will solve the problem!

            You mention virtual switches. I don't have any. I do have two unmanaged switches, one plugged into the 192.168.10.X network, and one plugged into the 192.168.11.X network.

            I work on the packet capture tomorrow.

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator @rmoroni3
              last edited by

              Well sniff on the destination network interface on pfsense. Then send traffic from the source network.. Do you see pfsense send on the traffic to the destination IP?

              If so then its not pfsense.

              You say you can ping.. Lets see your rules on the source network interface.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              R 2 Replies Last reply Reply Quote 0
              • R Offline
                rmoroni3 @johnpoz
                last edited by

                @johnpoz
                Here are the requested screenshots/packet captures. When I tried to capture the traffic on VLAN11 from my PC to the server on pfSense, it was blank so I captured the traffic from VLAN10.

                From VLAN10 to Server on pfSense.png
                From my PC to Server.png
                VLAN11 Firewall Rules.png
                VLAN10 Firewall Rules.png
                Ping and Tracert from my PC to Server.png

                I tried to upload the actual packet capture files but it didn't look like they uploaded properly. I got an error on both when I tried. Sorry!

                1 Reply Last reply Reply Quote 0
                • R Offline
                  rmoroni3 @johnpoz
                  last edited by

                  @johnpoz
                  Here are two traceroutes on pfSense:
                  Tracert to Server on pfSense1.png
                  Tracert to Server on pfSense2.png

                  The only difference is I turned on ICMP on the one and it completed. I find the interesting and I am sure it is probably telling me something but what??

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ Offline
                    johnpoz LAYER 8 Global Moderator @rmoroni3
                    last edited by johnpoz

                    When I tried to capture the traffic on VLAN11 from my PC to the server on pfSense, it was blank

                    When you ping? Then your not pinging what you think your pinging.

                    Lets see the sniff on dest vlan interface while you ping from your source network.

                    Do you have any rules in floating? For example shoving traffic out a specific wan gateway. As I see from your posted rules your doing something or trying to with multiple wans?

                    How exactly are you doing the captures? Just do packet capture on pfsense.. There is no point in sniffing on the source side to be honest.. Since your not getting any response.. But to rule out pfsense you need to see it sending traffic on your dest interface to whatever your trying to talk to in the destination network.

                    If your saying its blank, but you can ping - then your not pinging what your think your pinging. Or you would of seen that in the sniff (packet capture)

                    edit: One thing I could see for sure presenting itself exactly like what your seeing is a floating rule shoving traffic out your wan for tcp.. Or tcp/udp while your normal lan rule with no policy routing allows for the ping.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    R 1 Reply Last reply Reply Quote 0
                    • R Offline
                      rmoroni3 @johnpoz
                      last edited by

                      @johnpoz
                      Here are some screenshots. Here is the sniff on the dest vlan while pinging from my PC on vlan 10:

                      d932f8a0-f3b3-4721-b509-360f4c0bbf86-image.png

                      Here is the sniff on the same setup but trying to https fo the destination:

                      84918058-f6ec-4574-ac0b-2306e7015cdc-image.png

                      As you can see it IS blank.

                      Here is the firewall Floating rule:

                      ac5ef1a9-0368-41c3-bfc6-ec3dfd162a72-image.png

                      Now, just for chuckles, I disabled the floating rule and now everything works. Here is the sniff while connecting from my PC the VMware host server:

                      8c402c59-7d81-4408-a106-50afeb2bce16-image.png

                      I am not sure I fully understand what is going on. Looking at the rule it sort of makes sense but some explanation would be a great help.

                      I didn't think to look at the floating rule. Now my Internet failover doesn't work. It was a pain to get it working in the first place and now it is broken. I suppose I need to open a new post for that issue, correct?

                      Thanks for all of your help on this. This was really frustrating me and I need this to work the way I want it to. Now I can go back and change the rules the way I want them to be.

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ Offline
                        johnpoz LAYER 8 Global Moderator @rmoroni3
                        last edited by johnpoz

                        See that rule there in your floating - its forcing traffic that is TCP, ie http or https out your gateway. So no your not going to get to your other vlans.

                        See the bypassing policy routing section here.

                        https://docs.netgate.com/pfsense/en/latest/multiwan/policy-route.html#bypassing-policy-routing

                        You need a rule that allows the traffic to your other vlans - before you shove traffic out the wan.. Which isn't going get your vlans.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.