• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Can't ping outside dns server from VLAN interface

Scheduled Pinned Locked Moved Routing and Multi WAN
8 Posts 3 Posters 2.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C
    cesjr
    last edited by May 10, 2017, 9:58 AM May 9, 2017, 10:18 AM

    Hi guys
    Below is my scenario.
    I have a little problem about the ping issue.

    On L3 switch (Cisco 3750)

    • ping outside global server fail

    • ping inside server success

    • client reside on VLAN can access the internet. EX: browsing webpage

    On FreeBSD router

    • ping outside global server success

    • ping inside server success

    • client can access the internet. EX: browsing webpage

    The Pfsense rules on LAN and outbound NAT are :

    • Allow 10.1.1.0/24 to any

    • Allow 10.1.2.0/24 to any

    • Allow 10.5.1.0/24 to any

    • Allow 192.168.1.0/24 to any

    The attachment are tesing results.

    ![browsing ok.jpg](/public/imported_attachments/1/browsing ok.jpg)
    ![browsing ok.jpg_thumb](/public/imported_attachments/1/browsing ok.jpg_thumb)
    ![ping fail.jpg](/public/imported_attachments/1/ping fail.jpg)
    ![ping fail.jpg_thumb](/public/imported_attachments/1/ping fail.jpg_thumb)
    ![tracert fail.jpg](/public/imported_attachments/1/tracert fail.jpg)
    ![tracert fail.jpg_thumb](/public/imported_attachments/1/tracert fail.jpg_thumb)
    ![ping name server success.jpg](/public/imported_attachments/1/ping name server success.jpg)
    ![ping name server success.jpg_thumb](/public/imported_attachments/1/ping name server success.jpg_thumb)
    ![corswitch1 ping fail .jpg](/public/imported_attachments/1/corswitch1 ping fail .jpg)
    ![corswitch1 ping fail .jpg_thumb](/public/imported_attachments/1/corswitch1 ping fail .jpg_thumb)

    1 Reply Last reply Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator
      last edited by May 9, 2017, 1:04 PM

      so your vlan 1 is your transit?  To your L3, and you have network behind it.

      So what are your rules on your pfsense interface that is connected to your L3 switch via this transit network?

      So 192.168.1.247 is your gateway for this 10.1.2 network as well?

      I am confused why you call it vlan 1 if its actually on your LAN interface?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • C
        cesjr
        last edited by May 10, 2017, 2:58 AM

        Sorry, The problem description is not clear enough.
        The article has been updated .
        Thanks your reply.

        1 Reply Last reply Reply Quote 0
        • J
          johnpoz LAYER 8 Global Moderator
          last edited by May 10, 2017, 10:56 AM

          your ping sniff shows icmp unreachable?  Why is that from your dns box at .254??

          Did you sniff on pfsense that your ping actually gets to pfsense?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • H
            heper
            last edited by May 11, 2017, 1:16 PM

            Rule limited to TCP/UDP ? That might explain why pings (ICMP) fail

            1 Reply Last reply Reply Quote 0
            • C
              cesjr
              last edited by May 12, 2017, 9:32 AM May 12, 2017, 9:25 AM

              @heper:

              Rule limited to TCP/UDP ? That might explain why pings (ICMP) fail

              Thanks , there is no rules limited to TCP/UDP on LAN interface , should I allow ICMP permission on WAN to LAN ?

              @johnpoz:

              your ping sniff shows icmp unreachable?  Why is that from your dns box at .254??

              Did you sniff on pfsense that your ping actually gets to pfsense?

              Tracert from 192.168.1.254 to www.google.com was ok!

              traceroute -d www.google.com.tw
              traceroute to www.google.com.tw (172.217.27.131), 64 hops max, 40 byte packets
              1  192.168.1.1 (192.168.1.1)  0.281 ms  0.376 ms  0.307 ms
              2  h254.s98.ts.hinet.net (168.95.98.254)  0.793 ms  0.807 ms  0.787 ms
              3  fyfy-3302.hinet.net (168.95.151.22)  0.796 ms  0.769 ms  0.758 ms
              4  tchn-3012.hinet.net (220.128.17.38)  5.058 ms
                  chch-3012.hinet.net (220.128.19.18)  4.901 ms
                  tchn-3012.hinet.net (220.128.17.38)  2.019 ms
              5  chch-3301.hinet.net (220.128.19.205)  2.954 ms
                  chch-3012.hinet.net (220.128.17.29)  4.658 ms  6.603 ms
              6  72.14.243.254 (72.14.243.254)  6.951 ms
                  chch-3301.hinet.net (220.128.19.205)  2.437 ms
                  72.14.243.254 (72.14.243.254)  7.400 ms
              7  72.14.243.254 (72.14.243.254)  6.555 ms
                  108.170.244.97 (108.170.244.97)  5.975 ms
                  72.14.243.254 (72.14.243.254)  6.551 ms
              8  209.85.142.13 (209.85.142.13)  6.872 ms
                  209.85.240.15 (209.85.240.15)  7.366 ms
                  209.85.142.13 (209.85.142.13)  6.673 ms
              9  tsa03s02-in-f3.1e100.net (172.217.27.131)  8.904 ms
                  209.85.142.13 (209.85.142.13)  6.306 ms
                  tsa03s02-in-f3.1e100.net (172.217.27.131)  13.638 ms

              I using sniffer to watch the icmp packet was actually gets to pfsense  but no response .
              Either 192.168.1.247 to 192.168.1.1 or 192.168.1.1 to 192.168.1.247
              See  corswitch_1.jpg / corswitch_2.jpg
              It is strange  that code of icmp was 0 and it should be normal but still no response , the value of TTL gots no change.

              I can ping  virtual IP on the other pfsense but the result of tracert still stop on 192.168.1.1

              CorSwitch1#ping 59...25
              Type escape sequence to abort.
              Sending 5, 100-byte ICMP Echos to 59...25, timeout is 2 seconds:
              !!!!!
              Success rate is 100 percent (5/5), round-trip min/avg/max = 1/10/25 ms

              CorSwitch1#tracer 59...25
              Type escape sequence to abort.
              Tracing the route to domain.com.tw (59...25)

              1 192.168.1.1 0 msec 8 msec 0 msec
                2  *  *  *
                3  *  *  *
                4  *  *  *
                5  *  *  *
                6  *  *  *
                7  *  *  *
                8  *  *  *
                9  *

              Is that possible pfsense don't recognizant VLAN interface ?

              corswitch_1.jpg
              corswitch_1.jpg_thumb
              corswitch_2.jpg
              corswitch_2.jpg_thumb

              1 Reply Last reply Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator
                last edited by May 12, 2017, 10:24 AM May 12, 2017, 10:04 AM

                "Is that possible pfsense don't recognizant VLAN interface ?"

                Again what vlan interface would pfsense have setup???  Pfsense does not give a shit about any vlans or tagging?  Are you trying to tag your vlan 1 which is your transit network here??

                Post your LAN rules - post your outbound Nat rules!

                So devices on same transit network this 192.168.1/24 network can not ping pfsense???  And pfsense can not ping them??  .254, .247 ??  Then there is something wrong in your switching setup or firewall rules.

                According to your sniffs pings were working!

                Edgeswitch 1 is what?  Just a dumb switch since this is vlan 1 only (untagged traffic) L2???

                Not sure why you have your freebsd router hanging off your L3??  Why not just connected to your L2 switch?  since this L2 is just doing your 192.168.1/24 transit network???  Your going to have issues with asymmetrical routing with devices in your downstream networks talking to stuff in the transit network!  And routing stuff to network connected to freebsd router bouncing off pfsense is wrong…  So freebsd has no route for 10.5.1/24?

                What are you clients asking for dns??  Pfsense or .254??  So ask .254 from downstream - L3 sends it directly to .254 since attached.  But where does .254 send to get to downstream networks - has to send to pfsense.. Asymmetrical!!

                Your dns is HOST, hosts do not belong in a transit network.. your 192.168.1/24 is transit - freaking HUGE transit, but putting stuff like dns in the transit is going to have issues with asymmetrical routing!!!  Why is your dns not on one of your other vlans?  And any router connected to via your transit need to have routes for all the other networks connected to other routers.  You have 3 routers connected.  But your freebsd is missing routes to network attached to your L3..  What is 10.1.1 wants to talk to 10.1.2??  Follow your path..  Its asymmetrical

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • C
                  cesjr
                  last edited by May 13, 2017, 11:29 AM

                  what vlan interface would pfsense have setup ?

                  There is no vlan interface on pfsense.

                  Pfsense does not give a shit about any vlans or tagging?

                  I don't give any vlans or tagging on pfsense.

                  Are you trying to tag your vlan 1 which is your transit network here

                  I don't tag vlan 1 on my network,vlan 1 is untagged native vlan.

                  So devices on same transit network this 192.168.1/24 network can not ping pfsense???  And pfsense can not ping them??  .254, .247 ??  Then there is something wrong in your switching setup or firewall rules.

                  Devices on same transit network can ping pfsense ,pfsense also can ping them.
                  .254 and .247 can ping each other including pfsense.

                  Edgeswitch 1 is what?  Just a dumb switch since this is vlan 1 only (untagged traffic) L2???

                  Edgeswitch1 is a cisco 2960 series switch , I have some vlan on them and vlan 1 is untagged vlan.

                  EdgSwitchB1#show vlan

                  VLAN Name                            Status    Ports
                  –-- -------------------------------- --------- -------------------------------
                  1    default                                active    Fa0/1, Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12, Fa0/13, Fa0/14,
                                                                  Fa0/15 Fa0/16, Fa0/17, Fa0/18, Fa0/19, Fa0/21, Fa0/22, Fa0/23, Fa0/24, Fa0/25, Fa0/26, Fa0/27, Fa0/28,
                                                                  Fa0/29, Fa0/30 Fa0/31, Fa0/32, Fa0/33, Fa0/34, Fa0/35, Fa0/36, Fa0/37, Fa0/38, Fa0/39, Fa0/40, Fa0/41,
                                                                  Fa0/42, Fa0/43,  Fa0/47, Fa0/48
                  11  ACCOUNTING                      active
                  12  RD                                      active
                  13  MANAGE                              active
                  14  TESTING                              active
                  15  WIFI                                    active
                  51  PANTEC                              active    Fa0/20, Fa0/45, Fa0/46
                  1002 fddi-default                        act/unsup
                  1003 trcrf-default                      act/unsup
                  1004 fddinet-default                  act/unsup
                  1005 trbrf-default                      act/unsup

                  I'm going to move FreeBSD router to L2 , finally change 10.1.2.0/24 to L3 and let FreeBSD just doing DHCP job.
                  FreeBSD has a static route to 10.5.1.0/24 .
                  What does it mean of routing stuff to network connected to freebsd router bouncing off pfsense is wrong ?
                  Does this mean that if a packet is sent to the router it should be processed , rather than resent to pfsense ? (hairpin network?)

                  Client asking for dns is .254 , and .254 has stacic route to downstream networks.

                  #netstat -nr
                  Routing tables

                  Internet:
                  Destination        Gateway                Flags        Netif Expire
                  default                192.168.1.1          UGS        em0
                  10.1.1.0/24        192.168.1.247      UGS        em0
                  10.1.2.0/24        192.168.1.244      UGS        em0
                  10.5.1.0/24        192.168.1.247      UGS        em0
                  127.0.0.1              link#2                UH          lo0
                  192.168.1.0/24    link#1                  U          em0
                  192.168.1.254      link#1                UHS        lo0

                  How should I fix freaking HUGE transit network?
                  What does it mean of dns not on one of your other vlans ?
                  Does this  represents 10.1.2.0/24 to has its own dns server, for example 10.1.2.1.
                  If this is true , then I have to create three dns server for three different networks.

                  Sorry I forgot to say that there is a static route to 10.1.2.0/24 via 192.168.1.244 on L3.
                  So far, I manually add static route on all the routers.
                  In the end  I will only routing on L3.

                  Thanks your reply and suggestion. and sorry for my bad English and grammar.

                  ![LAN Rules.jpg](/public/imported_attachments/1/LAN Rules.jpg)
                  ![LAN Rules.jpg_thumb](/public/imported_attachments/1/LAN Rules.jpg_thumb)
                  ![outbound NAT rules.jpg](/public/imported_attachments/1/outbound NAT rules.jpg)
                  ![outbound NAT rules.jpg_thumb](/public/imported_attachments/1/outbound NAT rules.jpg_thumb)

                  1 Reply Last reply Reply Quote 0
                  8 out of 8
                  • First post
                    8/8
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                    This community forum collects and processes your personal information.
                    consent.not_received