Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Inter vlan routing issues

    Scheduled Pinned Locked Moved Firewalling
    9 Posts 3 Posters 826 Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      blinkydamo
      last edited by blinkydamo

      Hi all,

      I have currently two vlans setup:

      • list item10.0.0.0/24 the default LAN

      • list item10.0.70.0/24 Wireless vlan

      I am trying to prevent inter vlan routing but then allow an ip address to communicate between the vlans. The issue at the moment is that I can't even prevent inter vlan routing.

      Firewall Rules:
      LAN
      alt text

      Wireless
      alt text

      From what I understand the above should prevent all inter vlan routing but it is not working, I am still able to ping from 10.0.0.10 through to 10.0.70.6.

      Could someone please show me the errors of my ways so that I can continue to build the other vlans I want.

      Thanks in advance.

      Blinky

      1 Reply Last reply Reply Quote 0
      • NogBadTheBadN Offline
        NogBadTheBad
        last edited by

        This post is deleted!
        1 Reply Last reply Reply Quote 0
        • NogBadTheBadN Offline
          NogBadTheBad
          last edited by NogBadTheBad

          @blinkydamo said in Inter vlan routing issues:

          m what I understand the above should prevent all inter vlan

          Looks like the rules are wrong, bit hard to tell with the tiny screenshots.

          Screenshot 2019-11-06 at 13.26.14.png

          The 3rd rule would allow traffic from 172.16.7.10 to anything on the LAN net and everything else would be blocked.

          n_ip_local is an alias with all my subnets in.

          1 Reply Last reply Reply Quote 0
          • johnpozJ Offline
            johnpoz LAYER 8 Global Moderator
            last edited by

            @blinkydamo said in Inter vlan routing issues:

            list item10.0.0.0/16 the default LAN
            list item10.0.70.0/24 Wireless vlan

            You understand those overlap right.. 10.0.70/24 falls under 10.0/16

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07 | Lab VMs 2.8, 25.07

            NogBadTheBadN 1 Reply Last reply Reply Quote 1
            • NogBadTheBadN Offline
              NogBadTheBad @johnpoz
              last edited by

              @johnpoz said in Inter vlan routing issues:

              @blinkydamo said in Inter vlan routing issues:

              list item10.0.0.0/16 the default LAN
              list item10.0.70.0/24 Wireless vlan

              You understand those overlap right.. 10.0.70/24 falls under 10.0/16

              LOL didn't even spot that.

              1 Reply Last reply Reply Quote 0
              • johnpozJ Offline
                johnpoz LAYER 8 Global Moderator
                last edited by johnpoz

                And yeah those rules are wrong as well, he has the other vlan listed as source in his rules.. Which will never happen - how could lan net be the source IP into vlan interface?

                If you want to stop vlan from talking to lan, then on the vlan interface your block would be to lan net as the dest, not the source.

                I don't see how pfsense would of even let him create those networks.. You can not create a vlan or interface with a network that overlaps another network on pfsense. So my guess is the info he as given is not correct - maybe they are both /24s Why anyone would use a /16 as a mask for a local network in the first place?? I can not think of a use case where that would ever make any sense. As a route, as a firewall rule source or dest - sure ok.. But actually on the interface - no.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07 | Lab VMs 2.8, 25.07

                1 Reply Last reply Reply Quote 0
                • B Offline
                  blinkydamo
                  last edited by

                  Sorry all, mis-typed.

                  The LAN IP address is 10.0.0.0/24 and the Wireless is 10.0.70.0/24.

                  I am trying to upload better images but in the meantime am I understanding correctly that in the wireless vlan I need to place a block where the source is any and the destination is the LAN net? I have just placed a block source * and dest as LAN net into the wireless vlan and I can still ping a wireless device from the lan network.

                  Do both the LAN and Wireless vlans need to have blocks for each other?

                  NogBadTheBadN 1 Reply Last reply Reply Quote 0
                  • NogBadTheBadN Offline
                    NogBadTheBad @blinkydamo
                    last edited by NogBadTheBad

                    @blinkydamo

                    Look at my example that blocks traffic from my TEST network to any other lan.

                    The rule above my reject rule allows a specific host to access my LAN network.

                    If you don't want LAN -> WIFI you'd also need a block rule on the LAN interface where the source is LAN net

                    https://www.netgate.com/resources/videos/

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ Offline
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Post your rules!! They are evaluated top down, first rule to trigger wins, no other rules are evaluated.

                      Keep in mind that even when you add a new block rule that would block, if you have any existing states for that traffic - they would still be allowed.. You have to flush any existing states that would be allowing the traffic you are wanting to block.

                      And the source wouldn't be any, it would be the source network - any works, but its not as clean looking.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 25.07 | Lab VMs 2.8, 25.07

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.