Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Preventing to access pfSense login page on IoT VLAN

    Scheduled Pinned Locked Moved Firewalling
    44 Posts 6 Posters 6.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      keesdek
      last edited by

      @kom Unable to ping anything. Computer is not able to acquire a DHCP address, while the DHCP server is active on the test VLAN

      KOMK 1 Reply Last reply Reply Quote 0
      • KOMK
        KOM @keesdek
        last edited by

        @keesdek Post a screen of your rules for that interface.

        K 1 Reply Last reply Reply Quote 0
        • K
          keesdek @KOM
          last edited by

          @kom 202105 Screenshot pfSense Test-VLAN Rules.png

          KOMK 1 Reply Last reply Reply Quote 0
          • KOMK
            KOM @keesdek
            last edited by KOM

            @keesdek Rules are processed top-down first match (except floating rules which are last-match unless you have the Quick option selected.) All your rules are out of order since the top rule allows everything. That rule should be last, not first. Your problem isn't your rules.

            K 1 Reply Last reply Reply Quote 0
            • K
              keesdek @KOM
              last edited by

              @kom Thanks again for your help!
              I tried 'johnpoz' (above) order first, but since it didn't work then, I started changing the order...

              KOMK 1 Reply Last reply Reply Quote 0
              • KOMK
                KOM @keesdek
                last edited by

                @keesdek Can you confirm that your test client is on test_vlan30?

                K 1 Reply Last reply Reply Quote 0
                • K
                  keesdek @KOM
                  last edited by

                  @kom Yes, the test client is on test_vlan30. And in the mean time my computer has acquired an IP address. But still no internet

                  KOMK 1 Reply Last reply Reply Quote 0
                  • KOMK
                    KOM @keesdek
                    last edited by

                    @keesdek In the meantime? Getting an address via DHCP should be almost instantaneous. What is this client? PC, phone? Physical, virtual? Windows, Mac, Linux? Any hardware like a switch between client and pfSense? What do your outbound NAT rules look like?

                    K 1 Reply Last reply Reply Quote 0
                    • K
                      keesdek @KOM
                      last edited by

                      @kom Well... initially I configured the test_vlan30 interface incorrectly. But that is fixed. Attached a screenshot of the outbound NAT rules202105 pfSense NAT Outbound Rules.jpg

                      KOMK 1 Reply Last reply Reply Quote 0
                      • KOMK
                        KOM @keesdek
                        last edited by

                        @keesdek What is this client? PC, phone? Physical, virtual? Windows, Mac, Linux? Any hardware like a switch between client and pfSense?

                        K 1 Reply Last reply Reply Quote 0
                        • K
                          keesdek @KOM
                          last edited by

                          @kom Client is a Mac, connected via UniFy switch and wireless access point

                          KOMK 1 Reply Last reply Reply Quote 0
                          • KOMK
                            KOM @keesdek
                            last edited by KOM

                            @keesdek So lots in between to cause problems. I'm not a Mac guy. Can you confirm that it gets an IP address in the correct range, has the correct mask, gateway and DNS?

                            Troubleshooting Network Connectivity

                            K 1 Reply Last reply Reply Quote 0
                            • K
                              keesdek @KOM
                              last edited by

                              @kom I can confirm all

                              KOMK 1 Reply Last reply Reply Quote 0
                              • KOMK
                                KOM @keesdek
                                last edited by

                                @keesdek Delete all your rules on that interface except an allow all rule. Get basic connectivity working before you start to restrict things. Once that is done, can you ping the interface from the Mac?

                                K 1 Reply Last reply Reply Quote 0
                                • K
                                  keesdek @KOM
                                  last edited by

                                  @kom Did that and am able to ping the interface. In the webbrowser the pfSense web gui opens as well. And I have internet connection as well

                                  K 1 Reply Last reply Reply Quote 0
                                  • K
                                    keesdek @keesdek
                                    last edited by

                                    @keesdek Well, looks like it works now. Here is what I did. After deleting all the rules except the allow rule, I started turning the rules on again from the bottom up. When I leave the top rule turned off, it works! On the test network I can connect to the internet, but am not able to open the pfSense web gui
                                    Thank you very much for your help KOM and others!!
                                    Still a lot to learn on my side😊

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @keesdek
                                      last edited by johnpoz

                                      @keesdek said in Preventing to access pfSense login page on IoT VLAN:

                                      eave the top rule turned off,

                                      Then there is no way you would have internet.. Again rules are evaluated top down.. If you have not any rule - how would you have internet? You wouldn't not through this interface you wouldn't..

                                      Also whatever you dhcp issue - has nothing to do with rules.. You could have zero rules, you could have explicit rules blocking dhcp and it would still work.. once you enable dhcp on interface - hidden rules are created that allow dhcp to work..

                                      So you saying dhcp wasn't working had nothing to do with any rules you created that is for sure.

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      K 1 Reply Last reply Reply Quote 0
                                      • K
                                        keesdek @johnpoz
                                        last edited by

                                        @johnpoz The dhcp issue was due to the fact that I misconfigured the test_vlan interface...

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          AWilson60 @johnpoz
                                          last edited by

                                          @johnpoz Brilliantly useful. This is EXACTLY what I wasted time trying to blindly do on my own via google and youtube. THANK YOU

                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            aclouden
                                            last edited by aclouden

                                            Hey all... I was just reading through firewalling posts and wanted an opinion on this topic where rules I have setup are concerned. In my case, I needed other trusted networks to be able to initiate traffic to IOT devices but not the other way round. Further, I do not use pfsense as a dhcp server because it acts as a dhcp relay. My setup is a bit different where I am using a L3 switch for trusted networks where the routing between them is done on the switch. Untrusted vlans such as GUEST and IOT are sent up to pfsense via a separate trunked interface where I have the firewall governing where the traffic on those vlans can and cannot go. I wanted to know if what I am doing on IOT from a rule perspective is the best method. You will notice some of the original rules I have disabled in favor of the newer rules. What you see below functions as I described for the IOT network. Thoughts?

                                            iot-rules.PNG

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.