VLAN Assistance
-
Could use some help.
I've setup a vlan specifically for the kids and I'm having a hard time with getting the vlan to route anything. Obviously I'm doing something wrong, in the firewall rules I have a any to any rule which I thought should allow any and all traffic but that's not the case.
Physically I have a NIC interface dedicated to the WiFi AP (by default 10.0.20.0/24) and then the vlan12 (10.0.12.0/24) associated. Anything that connects to the main SSID routes just fine but once I enable vlan12 on the kids wifi network nothing happens. I'm sure I'm doing something very wrong or missing a step. Any help would greatly appreciated.
Thank you
-
Is it an actual AP ?
Is it connected to a switch where your trunking the native vlan and VLAN 12 to the AP ?
-
@nogbadthebad said in VLAN Assistance:
Is it an actual AP ?
Is it connected to a switch where your trunking the native vlan and VLAN 12 to the AP ?
Actual AP, an Unifi AC-Pro. It's connected directly to the pfsense box. The clients do connect and get the correct IP. Just no traffic moves, not even to the management page of the pfsense.
-
What rules did you put on the vlan 12 interface in pfsense? Had you messed with the outbound nat and taken it off automatic. If so when you add a network/vlan you would have to make sure you adjust the outbound nat, etc.
-
This may be a dumb question, but did you set up a VLAN interface in pfSense? Do the kids get an IP address? If they get one, can they ping the VLAN interface on pfSense?
-
Ah same AP that I have then, I use a POE switch as well :)
Should work, what do your firewall rules on VLAN 12 look like ?
-
Here are the rules I have setup for the WiFi interface. - https://gyazo.com/952b4386388881cf71458ea1e1fdb219
Here are the rules I have setup for the Kids Wifi Interface. - https://gyazo.com/06da96f5d8d992af67b087833301cca1
Here are my current NAT rules - https://gyazo.com/e6cd81fa145743bead73f8a6a963ac03
I'm definitely not the brightest bulb in the pack, I'm sure it's something dumb stupid that I'm overlooking. All help is greatly appreciated.
-
you can remove the 127.0.0.1 firewall rule, as 127.0.0.1 is the device itself.
You can just drop screenshots into the compose window btw :)
-
Yes pleas just attach.. Some of us are at work, and work proxy blocks access to such image hosting sites most of the time. I can not access those without bypass the proxy.. Which isn't all that hard - just a bit of a PITA ;)
-
@johnpoz said in VLAN Assistance:
Yes pleas just attach.. Some of us are at work, and work proxy blocks access to such image hosting sites most of the time. I can not access those without bypass the proxy.. Which isn't all that hard - just a bit of a PITA ;)
I had to do a shift reload to see it the second time :)
-
-
It seems like it's a rule problem but I'm really not sure. DHCP for the vlan works, the clients get an IP but nothing else besides that work, can't hit the admin page for pfsense and no internet access. Looking at my rules I'm sure I need to clean them up but getting this vlan thing figured out would be so great right now. I'm about to start locking down the network.
-
Why do you have all those manual mappings in your outbound nat that duplicate your automatic?
What is your vlan 12 interface settings.. Can your wireless clients on this vlan even ping your pfsense IP on this interface? You have a any any rule so they should be able to get to pfsense.
Are you running unifi controller? I was not aware that they allow for their phone app to set ssid with vlan IDs on them? Thought that had to be done in the controller?
Been running unifi and pfsense for years. Run multiple vlans on mine and also even got their MAB working on their psk networks with freerad, etc. This is clickity clickity stuff so missing something stupid for sure.
-
Do you have any sort of device you can connect to the pfSense port that supports VLANS so you could rule out the AP?
You can with a MAC:-
Choose Apple menu > System Preferences, then click Network. Click the Action pop-up menu at the bottom of the list on the left, then choose Manage Virtual Interfaces. Click the Add button , then choose New VLAN. Give the service a name, then enter a value in the Tag field.
Also I'd not open my NAS up to the internet unless I had a very good reason.
-
I removed the additional rules. May have been left overs of some other crazy idea I had.
Here is the configuration for interface vlan 12 aka KdsWiFi
š Log in to view
š Log in to viewYes, I am using a unifi controller. Since that's wired, thats on another IP range but I've opened the rules to allow bi-directional talks between the two.
Appreciate your feedback.
-
Originally this worked perfectly. I had two lan ports bridged and attached a vlan to the mix + a PoE managed switch. All was well with the world, then my PoE switch died. I saw online where someone has there AP setup on a dedicated LAN port and attached some vlans. I'm either an idiot or missing something in my setup.
Crazy thing is the clients get an IP, just no internet and I can't hit the admin page or pin the pfsense.
-
Getting DHCP and nothing else is the behaviour you see when there are no firewall rules on the interface.
Though you have added rules to pass that the behaviour indicates they may not be loading correctly.
Do you see any alerts shown in the GUI at the top of the page? None of your screenshots quite showed that.You might be hitting this:
https://forum.netgate.com/topic/129001/solved-2-4-3-rc-filter_configure_sync-cannot-define-table-bogonsv6Steve
-
@easysimpleit Stupid question but I remember it being of use previously: did you reboot pfSense?
-
@stephenw10 Iāve made the adjustment but havenāt tested it. Iāll get back to you
-
@jahonix I did not but I can. Let me try that.
-
At a total loss.
When I monitor the firewall logs, everything that comes across has a green check. As if the FW isn't stopping anything but yet nothing is happening.
Could it be something with the NIC? This is a dedicated NIC, could it be something with the way pfsense deals with multiple interfaces?
Any other suggested on what to check? I really feel like it's something I'm overlooking but can't put my finger on it.
Thanks again everyone.
- 12 days later
-
To be clear devices on that VLAN/SSID do pull an IP address in the correct subnet for the VLAN interface?
Are clients able to resolve IP addresses? If you ping pfsense.org for example?
But no other traffic is shown?
I would run a packet capture on the parent interface and look for VLAN tagged packets coming in.
Steve
-
@stephenw10 Hi Stephen, tried that. I have the packet captures and from what I'm seeing or not seeing this still isn't making sense to me. Can I DM you the pcaps and you give me your thoughts? Maybe I'm missing something.
-
Sure. Mark them with where they were captured and what filtering was in place, if any.
Steve
-
@stephenw10 forgive me I was trying to send you the file, not really sure how to do that?
-
Hmm, good question. New forum...new problems!
I guess via the 'chat' feature which substitutes for PMs here maybe? Though I don't see an obvious way to attach anything.... -
If you can email me support@easysimpleit.com, Iāll reply with Dropbox links. If thatās easier
-
If I recall even the PM system before was limited, I do not think you could attach in pms either on smf??
-
I am not sure... but are you running captive portal or proxy ?
I had a similar issue with vlans where captive portal was enabled on the main interface and not on vlan attached to it. If so either disable captive portal or chose vlan interface too.
Similarly if you are running proxy chose the vlan interface too.
I hope this helps you.
Ashima -
Mmm, captive portal is an interesting suggestion. I've not seen that personally but I'm not sure I've ever tried such a setup.
Steve
-
@stephenw10 no captive portal or proxy. Only thing I'm running is the DNS resolver w/ SquidGuard Proxy filter.
The issue seems much deeper while also very shallow. when I join the the Wifi network I get the proper vlan IP and it's provided by the DHCP of the pfsense. After that I get nothing, no internet or access to the firewall management page. Just nothing.
-
Please post the firewall rules for the KdsWiFi interface.
If you are getting DHCP, your Layer 2 / VLANs are good (unless it's really getting DHCP from elsewhere).
-
@easysimpleit said in VLAN Assistance:
no captive portal or proxy. Only thing Iām running is the DNS resolver w/ SquidGuard Proxy filter.
That means you're running a squid proxy.
ping 8.8.8.8
does it work?
ping smtp.gmail.com
does it work? -
Here you go.
-
Do you have a port forward to localhost for DNS on that interface?
The Allow all rule should pass anything anyway.
Do you actually see leases in Status > DHCP leases for that subnet when devices are connected to it?
Steve
-
-
@derelict Yes I am & no, sadly it does not.
-
Side thinking:
Before I had two NICS that I had bridged for LAN. Both NICS feed two separate switches, one was my regular gig switch managed & the other was my PoE gig management switch. When my PoE switch died, I removed the bridge setup and reconfigured the second NIC to be dedicated to the Unifi AP. After that I have it setup with the vlan.
Should I bridge both the LAN & WIFI NIC so they are on the same network and then attached the kids VLAN that way? I take it that should work since it technically worked before. I'm just not sure why it's not working now, in the current configuration.
Running out of ideas so I'm just thinking out loud.
-
@easysimpleit said in VLAN Assistance:
Should I bridge both the LAN & WIFI NIC
You should never bridge anything unless its the LAST freaking way to get something to work.. If you need switch ports - use a switch..
-
I just noticed in your attached screenshot of port forwarding... The 1st rule of DNS for kids network :
The dest Address should be !KIDSWIFI_VLAN12 address .
"!" is missing.
Can you try with that.