• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Routing between VLAN and parent interface

Scheduled Pinned Locked Moved L2/Switching/VLANs
12 Posts 5 Posters 1.8k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • 8
    8b2b86ac
    last edited by Dec 4, 2020, 12:35 AM

    I've setup several VLANs on my network to segment traffic. When I first setup the VLANs it correctly put the right traffic on the right network but the different vlans could still route between each other (i.e. the networks were defined but not separated).

    I then setup firewall rules so each network was blocked from routing to the other networks. This worked great creating the isolation I need.

    I never setup any rules to block the vlan from accessing the network of the parent interface but despite this, traffic cannot route from any vlan to the any machines on the parent interface. In general this is what I want (again isoltation) but there are limited situations where I do want to setup a rule to allow certain machines to the real lan as that network is where the actual switch and AP are.

    I never setup any sort of block rule I'm not sure how to do that. I tried an explicit "allow" rule but that didn't work. How can I route select traffic from a vlan to the non-vlan network?

    B J 2 Replies Last reply Dec 9, 2020, 2:27 PM Reply Quote 0
    • B
      bingo600 @8b2b86ac
      last edited by bingo600 Dec 9, 2020, 2:28 PM Dec 9, 2020, 2:27 PM

      @8b2b86ac

      In order to use the parent interface , you have to assign a pfSense interface to it (handling untagged packets) on that port.
      Then you have to assign an ip address & submet mask to the new pfSense interface ... Now you have something to use for the firewall rules.

      If you don't assign a L3 interface to the parent vlan interface , you have the most "excellent" separation , as pfSense won't handle (route) L2.

      /Bingo

      If you find my answer useful - Please give the post a 👍 - "thumbs up"

      pfSense+ 23.05.1 (ZFS)

      QOTOM-Q355G4 Quad Lan.
      CPU  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
      LAN  : 4 x Intel 211, Disk  : 240G SAMSUNG MZ7L3240HCHQ SSD

      8 1 Reply Last reply Dec 23, 2020, 2:02 AM Reply Quote 0
      • 8
        8b2b86ac @bingo600
        last edited by Dec 23, 2020, 2:02 AM

        @bingo600 - Thanks for responding.

        A pfsense interface is assigned to that port. It has an IP address and subnet masks. The problem is when I create a VLAN with that interface as the parent the VLAN traffic and untagged traffic on the pfsense interface cannot communicate. Maybe I'm missing what you are saying?

        J 1 Reply Last reply Dec 23, 2020, 2:45 AM Reply Quote 0
        • J
          johnpoz LAYER 8 Global Moderator @8b2b86ac
          last edited by Dec 23, 2020, 2:45 AM

          What rules did you put on the vlan interface after you created the vlan?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          8 1 Reply Last reply Dec 23, 2020, 2:50 AM Reply Quote 0
          • 8
            8b2b86ac @johnpoz
            last edited by Dec 23, 2020, 2:50 AM

            @johnpoz - For each VLAN interface the final firewall rule was already there which allows traffic from and to anywhere. I added rules before that to deny to each other VLAN. For example:

            0bb24b1f-60ad-4d8f-a104-a926065a92ab-image.png

            As you can see there is not a deny to the LAN destination but despite that I cannot contact any device on that parent LAN interface. My goal is generally to deny traffic to that parent LAN interface but I plan to allow certain machines. But as you an see I don't have anything denying it yet and despite that I cannot route from a VLAN to a device on the parent interface.

            M 1 Reply Last reply Dec 24, 2020, 4:48 PM Reply Quote 0
            • M
              marvosa @8b2b86ac
              last edited by Dec 24, 2020, 4:48 PM

              What do the rules look like on the parent interface?

              J 1 Reply Last reply Dec 24, 2020, 4:58 PM Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator @marvosa
                last edited by johnpoz Dec 24, 2020, 5:00 PM Dec 24, 2020, 4:58 PM

                Can also see that none of those rules have any hits.. Not even your allow. All of them show 0/0 so nothing has triggered any of those rules.

                So your either looking at the wrong interface, or your vlan tagging is messed up and that interface is not seeing any traffic. Your any any rule should show something.. Or at least one of your denys should be sitting hits..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 0
                • 8
                  8b2b86ac
                  last edited by Dec 29, 2020, 2:31 AM

                  @johnpoz - Sorry, a bad example screenshot. It was my "Guest" VLAN and with COVID I haven't had any guests since I set this up :) Here is my "IOT" VLAN which is similar setup but actually being used:

                  5cf44f75-9ca1-4330-82eb-408b6b053d12-image.png

                  @marvosa - The parent interface is still the default that came with pfSense:

                  af6fc44c-af67-4774-9166-63415aa679d9-image.png

                  Doesn't seem like anything should deny connecting between a VLAN and the LAN parent interface.

                  J 1 Reply Last reply Dec 29, 2020, 12:03 PM Reply Quote 0
                  • J
                    johnpoz LAYER 8 Global Moderator @8b2b86ac
                    last edited by Dec 29, 2020, 12:03 PM

                    @8b2b86ac said in Routing between VLAN and parent interface:

                    Doesn't seem like anything should deny connecting between a VLAN and the LAN parent interface.

                    In whatever interface that is - your right it should allow access from that vlan to lan net. But what about the firewall on whatever your trying to talk to in the lan net?

                    Doesn't matter if pfsense firewall allows it or not, if the host firewall your trying to talk to says no. Users always forget that..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    8 1 Reply Last reply Dec 30, 2020, 1:34 AM Reply Quote 0
                    • J
                      JKnott @8b2b86ac
                      last edited by Dec 29, 2020, 1:57 PM

                      @8b2b86ac said in Routing between VLAN and parent interface:

                      I never setup any rules to block the vlan from accessing the network of the parent interface but despite this, traffic cannot route from any vlan to the any machines on the parent interface. In general this is what I want (again isoltation) but there are limited situations where I do want to setup a rule to allow certain machines to the real lan as that network is where the actual switch and AP are.
                      I never setup any sort of block rule I'm not sure how to do that. I tried an explicit "allow" rule but that didn't work. How can I route select traffic from a vlan to the non-vlan network?

                      Here are my rules for my guest WiFi:

                      b5c7b226-1534-4d6f-b264-45d7ccd64fe8-image.png

                      "Private" is an alias for all RFC 1918 IPv4 addresses and IPv6 Unique Local addresses

                      "Prefix" is an alias for my entire /56 IPv6 prefix.

                      With these rules, the only things the guest can do is ping the interface and access the Internet.

                      PfSense running on Qotom mini PC
                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                      UniFi AC-Lite access point

                      I haven't lost my mind. It's around here...somewhere...

                      1 Reply Last reply Reply Quote 0
                      • 8
                        8b2b86ac @johnpoz
                        last edited by Dec 30, 2020, 1:34 AM

                        @johnpoz - It's not the device I'm trying to route to as I can create a NAT rule to re-route the traffic and that works. But I'm trying to understand why direct access doesn't work since no rules prevent it.

                        1 Reply Last reply Reply Quote 0
                        • 8
                          8b2b86ac
                          last edited by Dec 30, 2020, 2:09 AM

                          Nevermind. I figured it out. It was something on my own computer blocking it. Thanks for the advice and the help anyway!

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                            This community forum collects and processes your personal information.
                            consent.not_received