Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NAT/Portforward VIPs block

    Scheduled Pinned Locked Moved NAT
    22 Posts 4 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      To just allow traffic out from clients on the VLAN6 subnet you just need a single rule on the VLAN6 interface.

      Action: Pass
      Interface: VLAN6
      Protocol: any
      Source: VLAN6net
      Destination: any

      That will allow clients to reach any other IP.

      Steve

      1 Reply Last reply Reply Quote 0
      • D
        dasm0kinone
        last edited by

        Would I have to do any rules on the LAN since its a VLAN using the LAN interface? Still getting a NO_TRAFFIC:SINGLE on the VLAN6.

        Current LAN rules allow all. But not sure I have to be more specific for that VLAN so I'm using it for a direct connection.

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          If you created a vlan, the rules on the parent interface - ie lan say has ZERO to do with traffic on vlan

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • D
            dasm0kinone
            last edited by

            Is there a dump file I can do that you could look at to see if I'm overlooking something?

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by johnpoz

              you can sniff sure, just use tcpdump.. if you use -e with tcpdump you can see the vlan tags..

              If if the rule on the parent physical interface had anything to do with the traffic on the vlan - then vlans would be completely USELESS nonsense since you wouldn't actually be isolating the traffic. Might as well just run multiple layer 3 on the same layer 2 in such scenario..

              You can also sniff using the diag / packet capture web gui.. But doesn't allow you to see the vlan tags because you can not call out -e

              Where exactly are you seeing
              "NO_TRAFFIC:SINGLE on the VLAN6."

              What state exactly... That info doesn't mean much without more context.

              What exactly is not working? What do you have configured on your switch to allow for the vlan6 you setup, guessing you used vlan ID 6 when you setup that vlan in pfsense? So you have trunk connected to your physical interface on pfsense frm your switch, and then port where you laptop connected via untagged access port in vlan 6, etc.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Have you actually created a VLAN6 interface in Interfaces > Assignments > VLANs?

                Steve

                1 Reply Last reply Reply Quote 0
                • D
                  dasm0kinone
                  last edited by

                  When I look at the "States Detail" under rules for VLAN its stating NO_TRAFFIC:SINGLE" Im unable to get online.
                  I have a trunk port setup on my switch and my other VLANs are working properly but using a local subnet. I do have Port 6 tagged for VLAN 6.

                  I disabled all the NAT for VLAN 6 and keep the rest all the same.

                  Steve: Yes I have VLAN 6 created and I have the public IP block assigned to that interface.

                  What specific rules I would have to create on the WAN?

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    You shouldn't need any rules on WAN to allow traffic out from the VLAN6 subnet.

                    Try to ping out from Diag > Ping choosing the VLAN6 interface as the source address.

                    It sounds like maybe your ISP is not actually routing that subnet to your WAN IP.

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • D
                      dasm0kinone
                      last edited by

                      I cant ping from that interface. this is what the ISP sent to me

                      set routing-options static route 65.15X.XXX.X44/29 next-hop 67.1XX.XXX.198

                      set routing-options static route 63.23X.XXX.X76/28 next-hop 67.1XX.XXX.198

                      So I used the /29 for the WAN and the /28 for VLAN6

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        So they directly attached it to you... Not routed it..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • D
                          dasm0kinone
                          last edited by

                          Ok knowing that now. How would I go about configuring the IPs then?

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by johnpoz

                            Get them to actually route it to you... Or you would have to use vips and port forwarding.

                            They are also having you set gateways outside the IP block... Not very good idea to be honest as well.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            D 1 Reply Last reply Reply Quote 0
                            • D
                              dasm0kinone
                              last edited by

                              If i were to use VIP and port forwards would I have to port forward any devices they use on the network or can you they do that through there firewall? Also with the portforward what IP would be used for the gateway?

                              1 Reply Last reply Reply Quote 0
                              • D
                                dasm0kinone @johnpoz
                                last edited by

                                @johnpoz
                                Could I just assign another nic interface for that second IP block? then Have the VLAN go to that?

                                1 Reply Last reply Reply Quote 0
                                • DerelictD
                                  Derelict LAYER 8 Netgate
                                  last edited by

                                  No. The ISP should route 63.23X.XXX.X76/28 to an address in 65.15X.XXX.X44/29. They should provision your service properly.

                                  Chattanooga, Tennessee, USA
                                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    dasm0kinone
                                    last edited by

                                    Thank you all for your help. I got the ISP to route the IPs and it worked how you all explained it.

                                    1 Reply Last reply Reply Quote 1
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Nice. 😀

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.