Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    [SOLVED] access between two networks

    Firewalling
    4
    24
    900
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpoz
      johnpoz LAYER 8 Global Moderator last edited by

      post your rules please.

      Rules are always evaluated as traffic enters the firewall interface, top down, first rule to trigger wins no other rules are evaluated.

      Problem that is common is if your doing any policy routing, ie sending clients on your lan out a specific gateway - say a vpn service.  Your rules that allow traffic to opt1 on the lan interface for for what you want to allow need to be above any rule that sends traffic out any specific gateway.

      Easy thing is post your rules for your lan and opt1 interfaces and let us know what you want to allow.  Also keep in mind another common issue is software firewalls running on the devices your trying to access blocking access from any IP other than their local network.

      1 Reply Last reply Reply Quote 0
      • V
        vocal last edited by

        In desparate act, I have disabled all rules for captive portal and just on top (only one rule) I have put

        OPT1 : 
        Protocol Source Port Destination Port Gateway
        IPv4 *      *              *      *                      *      *                  pass

        LAN:
        Protocol Source Port Destination Port Gateway
        IPv4*        *              *      *                      *      *              pass

        and  still cannot access  OPT1 from LAN

        1 Reply Last reply Reply Quote 0
        • johnpoz
          johnpoz LAYER 8 Global Moderator last edited by

          Well then that points to issue with software firewall on the devices your trying to access from the other network.

          Or just plain connectivity issue completely on the devices your testing with, or they are pointing to something other than pfsense as their gateway.

          1 Reply Last reply Reply Quote 0
          • V
            vocal last edited by

            I have few different devices on OPT1 and all of them are responding while accessing from OPT1. However you have pointed me to right direction, and instead of playing with firewall rules, I started checking other options. Finally, when I add MAC address (of the device I want to acces) to captive portal allowed MACs, then I can access OPT1 device from LAN. Does it mean, that static IPs cannot be accessed across networks? Did I miss something?

            1 Reply Last reply Reply Quote 0
            • johnpoz
              johnpoz LAYER 8 Global Moderator last edited by

              well if your using a captive portal that could cause you problems.  Have to know what your captive portal settings are and are you clients not authing to it then no they wouldn't be able to access anything.

              1 Reply Last reply Reply Quote 0
              • Derelict
                Derelict LAYER 8 Netgate last edited by

                Split DNSBL conversation here: https://forum.pfsense.org/index.php?topic=128978.0

                1 Reply Last reply Reply Quote 0
                • V
                  vocal last edited by

                  My settings are:

                  WAN - static IP from multiwan router
                  LAN - Business network with static IP, no DHCP server
                  OPT1 - guest WiFi, DHCP server 192.168.0.1/22

                  Im running captive portal with freeradius on OPT1 and wanted to access all APs and switches on OPT1 from LAN. At the same time I don't want guests to be able to access any AP or switch.

                  1 Reply Last reply Reply Quote 0
                  • Derelict
                    Derelict LAYER 8 Netgate last edited by

                    Then you are going to need a management network/VLAN for the devices on OPT1.

                    Typically you would put the APs and switches on LAN (or a dedicated management/trusted network), then tag the guest VLAN on the guest SSID and switch ports.

                    Your firewall cannot prevent something on the guest network from accessing something else on the guest network. That has to be done at layer 2 (switches, AP Radio chipsets).

                    1 Reply Last reply Reply Quote 0
                    • V
                      vocal last edited by

                      But it still doesn't answer my question why I cannot access OPT1 devices from LAN. As I said, when I add allowed MAC address (of AP) in captive portal settings, then I can log on it (AP) but then, guests logged via this AP dont go trough CP.

                      1 Reply Last reply Reply Quote 0
                      • D
                        DarkSky last edited by

                        Something like this? I have no CP set. Just need the rules to be created.

                        From LAN to OPT1 (called WIFI in my case):

                        • Proto:TCP, Source:ANY, Port:ANY, Dest.:WIFI net, Port:ANY, Gateway:ANY, Description: Permit LAN to OPT1.

                        From OPT1 to LAN:

                        • Proto:TCP, source:ANY, Port:ANY, Dest.:LAN net, Port:ANY, Gateway:ANY, Description: Permit OPT1 to LAN.

                        ![Sans titre.jpg_thumb](/public/imported_attachments/1/Sans titre.jpg_thumb)
                        ![Sans titre.jpg](/public/imported_attachments/1/Sans titre.jpg)

                        1 Reply Last reply Reply Quote 0
                        • johnpoz
                          johnpoz LAYER 8 Global Moderator last edited by

                          you do understand those rules are TCP only.. So you are not going to be able to ping (icmp)..  Wouldn't be able to use dns, which is UDP..

                          What are the other rules… Always show the whole listing of rules.. Rules are evaluated top down, first rule to trigger wins, no other rules are evaluated.. So unless your showing use the top rule on the interface - and that allows what you want.. For all we know you have a block above that, or if nothing below that for example your devices on a specific interface wouldn't be able to ask pfsense for dns even, etc..

                          1 Reply Last reply Reply Quote 0
                          • V
                            vocal last edited by

                            As I said before :

                            @vocal:

                            In desparate act, I have disabled all rules for captive portal and just on top (only one rule) I have put

                            OPT1 : 
                            Protocol Source Port Destination Port Gateway
                            IPv4 *      *              *      *                      *      *                  pass

                            LAN:
                            Protocol Source Port Destination Port Gateway
                            IPv4*        *              *      *                      *      *              pass

                            and  still cannot access  OPT1 from LAN

                            basically I should access everything from anywhere with above rules but not OPT1 devices from LAN
                            I even cannot ping it.
                            When I add allowed MACs in CP then Im able to access it but guests are not going trough CP as APs are allowed without auth

                            My settings are:

                            WAN - static IP from multiwan router
                            LAN - Business network with static IP, no DHCP server
                            OPT1 - guest WiFi, DHCP server 192.168.0.1/22 GTW  192.168.2.1

                            All devices (APs and managed switches) are in 192.168.1.1 network.
                            OPT1 DHCP - 192.168.2.2 - 192.168.3.254

                            Im running captive portal with freeradius on OPT1

                            I had pfBlocker installed earlier on but uninstalled it already. Maybe it left something in pfS config?

                            1 Reply Last reply Reply Quote 0
                            • johnpoz
                              johnpoz LAYER 8 Global Moderator last edited by

                              "as APs are allowed without auth"

                              What does that have to do with clients of your AP?

                              Unless you were doing a wireless router with natting, your clients mac would not be the same as your AP..

                              1 Reply Last reply Reply Quote 0
                              • V
                                vocal last edited by

                                indeed its confusing…
                                as soon as I allowed APs MACs on CP, all guests could log withouth auth.
                                All was working on previous server but I decided to go with pfSense.
                                Probably Im making silly mistake but really no clue what.
                                However I will keep trying :)

                                1 Reply Last reply Reply Quote 0
                                • Derelict
                                  Derelict LAYER 8 Netgate last edited by

                                  You will not be able to access anything in the portal network unless they are somehow passed through the portal. A MAC address passthrough will accomplish that.

                                  Having devices that need management behind the CP is only going to cause you pain and suffering. Put the management interfaces of the managed devices on a management network. Tag the guest traffic to be on the network with the portal.

                                  It also sounds like you are using routers for wireless and not true access points. In that case your CP will never work correctly because you will never see the users' IP addresses and MAC addresses because the AP/Router is performing NAT. The first user will get prompted for authentication and all subsequent users will not because the CP will have the AP/Router's IP and MAC address in its user table.

                                  You need a serious redesign, a better understanding of exactly what Captive Portals actually do, and probably some new gear to accomplish what you want to do.

                                  1 Reply Last reply Reply Quote 0
                                  • johnpoz
                                    johnpoz LAYER 8 Global Moderator last edited by

                                    ^ exactly!!!  What devices are using use for AP?  And what exactly are you wanting to accomplish with your CP?

                                    1 Reply Last reply Reply Quote 0
                                    • V
                                      vocal last edited by

                                      Im using tp-link wdr3600 with dd-wrt installed
                                      No NAT, no firewall, no wifi pass. Just transparent.

                                      Im using netgear gs724 switches. I have two VLANs. Bussines and guests, all works fine

                                      1 Reply Last reply Reply Quote 0
                                      • Derelict
                                        Derelict LAYER 8 Netgate last edited by

                                        Except it is not working fine. That's why you're here asking why it's not working fine.

                                        This is simple. If adding the AP/Router's MAC address to a MAC address pass through passes all guest traffic, then the CP is not seeing the IP/MAC address of the wireless client, but that of the AP/Router because it is performing NAT.

                                        1 Reply Last reply Reply Quote 0
                                        • V
                                          vocal last edited by

                                          I've done some more tests. I can ping OPT1 from LAN, but only devices which have DHCP IP assigned by OPT1 DHCP server. My APs have static IP.

                                          1 Reply Last reply Reply Quote 0
                                          • johnpoz
                                            johnpoz LAYER 8 Global Moderator last edited by

                                            "My APs have static IP. "

                                            And do your AP have a gateway setup pointing back to pfsense opt1 IP?

                                            1 Reply Last reply Reply Quote 0
                                            • V
                                              vocal last edited by

                                              yes they have

                                              1 Reply Last reply Reply Quote 0
                                              • johnpoz
                                                johnpoz LAYER 8 Global Moderator last edited by

                                                Well then then sniff on your opt interface… When you ping the AP.. Doe you see it go out to their mac, do you not see a reply?

                                                You sure your AP have the correct mask setup.. If your saying you can talk to boxes with dhcp.. Then points to a problem with what you set for their static, like no gateway which you say they have.  So maybe you messed up the mask, etc.

                                                1 Reply Last reply Reply Quote 0
                                                • V
                                                  vocal last edited by

                                                  Got it!!!
                                                  finally

                                                  Machine I was testing it from, was using IPv6, and I have blocked IPv6 lol
                                                  Other machine works fine.
                                                  However I still don't understand why all those strange things was happening.

                                                  Now, I have normal firewall rules (as I want), normal config, etc and all works fine

                                                  thanks for pointing me to the right direction :)

                                                  1 Reply Last reply Reply Quote 0
                                                  • First post
                                                    Last post

                                                  Products

                                                  • Platform Overview
                                                  • TNSR
                                                  • pfSense
                                                  • Appliances

                                                  Services

                                                  • Training
                                                  • Professional Services

                                                  Support

                                                  • Subscription Plans
                                                  • Contact Support
                                                  • Product Lifecycle
                                                  • Documentation

                                                  News

                                                  • Media Coverage
                                                  • Press
                                                  • Events

                                                  Resources

                                                  • Blog
                                                  • FAQ
                                                  • Find a Partner
                                                  • Resource Library
                                                  • Security Information

                                                  Company

                                                  • About Us
                                                  • Careers
                                                  • Partners
                                                  • Contact Us
                                                  • Legal
                                                  Our Mission

                                                  We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

                                                  Subscribe to our Newsletter

                                                  Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

                                                  © 2021 Rubicon Communications, LLC | Privacy Policy