Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unable to access to device on network A from network B on VLAN

    Firewalling
    2
    5
    272
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • SipriusPTS
      SipriusPT
      last edited by SipriusPT

      Hello,

      I am trying to migrate some rules that I already had working on another previous network, but I really dont know why, I simply cannot access the damn device.

      This is the classic case of a guest network, where its suppose to have internet access, but not to other local networks in general, only to certain devices:

      e825ab01-e67e-47db-9dc6-b598473f686d-image.png

      But seems like its possible to access to all the permited mail services but not that NAS 10.0.0.5 at all (I tried previously with ports 80 and 8080 and nothing) with the yellow rectangle.

      This is how the rule is setup:

      4831bcb2-b964-490d-b9f4-710d4a2fded1-image.png

      I really dont know why I cannot access that device, not even through ICMP PING.

      Note that I can access from another network (an OpenVPN) to this device, without problem, and the device can reach internet and communicate with the rest of the network 10.0.0.0/24 where is it.

      Anyone here knows what I am missing here?!

      If you need more info feel free to ask.

      1xSG-4860-1U
      1xSG-3100
      2xpfSense Virtual Machines

      1 Reply Last reply Reply Quote 0
      • V
        viragomann
        last edited by

        Ensure that it isn't blocked by a floating rule or one on an interface group including the concerned interface.

        To investigate, enable the logging in your rules and look in the firewall log to see which rule is applied to that traffic.

        If the NAS responses to pings from outside its subnet you may use Diagnostic > Ping and check if you get a responses when using different sources.

        1 Reply Last reply Reply Quote 1
        • SipriusPTS
          SipriusPT
          last edited by SipriusPT

          There is no interface groups set in this firewall or even floating rules.

          Just to let you know that I have Pure NAT activated and those 4 working rules with PASS permissions, are set to gain access for NAT rules set in OPT1_REDE_INTERNA net to be acessable from internet.

          As a test I changed all block rules in that interface for other subnets, from TCP to ANY:

          fc7dfb8e-9cee-41b6-8102-fed4c0c59218-image.png

          And use diagnostic ping, and I was able to ping from that interface nic 10.0.2.1 to 10.0.0.5:

          05088cf4-de55-439f-bdfd-967f8d757b03-image.png

          But I also made a ping to 10.0.0.88, who is another machine in OPT1_REDE_INTERNA net, and I was also able to ping, but it was not supposed to do it:

          fbf2bec5-9324-4875-b76b-2c539e1da672-image.png

          From a laptop device, connected to this subnet 10.0.2.1/24, its unable to ping to those blocked subnets (including 10.0.0.88), even to 10.0.0.5.

          Its like all rules instead of those 4 rules and the rule for internet acess, that I have mentioned above, are not being applied to this interface.

          This interface is new, I have created a VLAN 2 to run in OPT1 for it, where I had another network already running in OPT1 with the default VLAN 1 untagged (OPT1_REDE_INTERNA), but using this VLAN 2 I have only set a smart switch to use VLAN 2 tagged in the nic connected to pfsense, and the port used to connect to an ubiquiti AP, where I setup the corresponded WIFI to use that VLAN 2.

          I have also created another VLAN 3 as a test, in OPT1 as well, and associate it to another WIFI in that AP, and samething, it doesnt respect all the rules created as it happeans with that network in VLAN 2.

          I have already check if there was duplicated subnets that could be messing around but there is nothing.

          Damn I really dont know what can be overide those rules ... on other interfaces using non tagged VLANs it works as expected, through interface using VLANs not.

          I am still using pfsense 2.4.4-RELEASE-p3, and notice that there was some changes in VLANs and Rules in next 3 updates, but I am not sure if could be from that.

          1xSG-4860-1U
          1xSG-3100
          2xpfSense Virtual Machines

          1 Reply Last reply Reply Quote 0
          • SipriusPTS
            SipriusPT
            last edited by SipriusPT

            Seems like on those VLANs, there is something blocking access to bogon networks, even between machines inside of the same VLAN network, who is a also a bogon network.

            Only rules in NAT are accessable, that was setup for WAN uplink.

            But still not sure if is something on pfsense (even knowing that there is no rules for those interfaces), or HPE 1920s smartswitch in the middle or even on ubiquiti AP LR.

            1xSG-4860-1U
            1xSG-3100
            2xpfSense Virtual Machines

            1 Reply Last reply Reply Quote 0
            • SipriusPTS
              SipriusPT
              last edited by

              So I finaly discovered what was causing this, and it was from Ubiquiti AP, with this option checked:

              6fb77267-2f34-48d4-b72f-5f859700b44a-image.png

              After being enable, to unable, it was necessary to restart all WIFI current connections. Doing that it worked like a charm.

              I have set that option because there was a diferent icon associated with devices connected to that wireless network, but I was not expecting that there was rules being applied since I am only using Ubiquiti APs, and not firewalls.

              Thanks anyway for the help.

              1xSG-4860-1U
              1xSG-3100
              2xpfSense Virtual Machines

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.