Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfsense is online - no internet to clients

    Scheduled Pinned Locked Moved General pfSense Questions
    8 Posts 4 Posters 870 Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M Offline
      Modesty
      last edited by

      Hi

      ISP router on 192.168.1.1/24 gives pfsens box adress 192.168.1.114.
      Pfsense box deliver DHCP 192.168.0.1/24 to clients

      (ISP router dont have bridge mode.)

      Here is my setup:
      4a247acc-89b7-417f-b3e4-774282263997-image.png

      in pfsense i see this:
      bd131e91-163f-464c-b864-9bfb5ed4a169-image.png

      A ping from pfsense to cnn.com= 100% packet loss.

      Any ideas?

      Thanks up fromt!

      Everything can be rebuilt!

      P M 2 Replies Last reply Reply Quote 0
      • P Offline
        Patch @Modesty
        last edited by

        @modesty said in pfsense is online - no internet to clients:

        Any ideas?

        Your pfSense WAN needs to receive packets from the RFC 1918 addresses range (ISP router lan port 192.1.1) which is blocked it you check that option
        Goto Interface -> WAN -> un-check "Block private networks and loopback addresses"

        Btw you have set up a double NAT. Do you need the ISP router, or can you put it in bridged mode?

        1 Reply Last reply Reply Quote 0
        • M Offline
          mer @Modesty
          last edited by

          @modesty do you have dns servers set up or are you running local DNS server?
          as @Patch says make sure you allow the RFC1918 networks.
          It looks like you say you can't put the router into bridged mode, is that correct?

          1 Reply Last reply Reply Quote 0
          • M Offline
            Modesty
            last edited by

            @patch Thanks for help.

            You had rigth, I had blocked private networks in WAN.

            Thanks!

            Everything can be rebuilt!

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator @Modesty
              last edited by johnpoz

              @modesty said in pfsense is online - no internet to clients:

              I had blocked private networks in WAN.
              Thanks!

              That is default, but that is only blocks source port inbound traffic. Had you created your own rule in say outbound direction via floating?

              The rfc1918 block on wan that is there out of the box only blocks unsolicited inbound traffic from a rfc1918 source. That would not stop you from using the internet in a double nat setup like you show.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              M 1 Reply Last reply Reply Quote 0
              • M Offline
                mer @johnpoz
                last edited by mer

                @johnpoz said in pfsense is online - no internet to clients:

                The rfc1918 block on wan that is there out of the box only blocks unsolicited inbound traffic from a rfc1918 source. That would not stop you from using the internet in a double nat setup like you show.

                John is not wrong here (never thought he was, but had to check for myself), so I did a pfctl -sr on one of my devices just to see what the rules are.
                And of course they look like this:
                block drop in log quick on igb0 inet from 10.0.0.0/8 to any label "Block private networks from WAN block 10/8"
                block drop in log quick on igb0 inet from 127.0.0.0/8 to any label "Block private networks from WAN block 127/8"
                block drop in log quick on igb0 inet from 172.16.0.0/12 to any label "Block private networks from WAN block 172.16/12"
                block drop in log quick on igb0 inet from 192.168.0.0/16 to any label "Block private networks from WAN block 192.168/16"

                So they all have a direction component of the rules.
                Assuming you need to do DHCP to the router, the normal rules allow that, they keep state, so responses should be fine.
                The pass rules for DHCP are above the blocks, also have a "quick" so that should be working.

                Unless there is something else going on.

                It would also be an easy test if you wanted to.

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ Offline
                  johnpoz LAYER 8 Global Moderator @mer
                  last edited by

                  @mer hehe - if they blocked rfc1918 any traffic on the wan out of the box. They would have shitton of users complaining pfsense didn't work.

                  I bet there is a huge percentage of pfsense users that are double natting..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  M 1 Reply Last reply Reply Quote 1
                  • M Offline
                    mer @johnpoz
                    last edited by

                    @johnpoz No doubt. I did at one point simply because I was lazy and didn't trust comcast to do the right thing if I swapped out a wrt54g. In my case, it actually saved me because my sg2440 fell victim to the red led of death, so moved one cable, rebooted wifes stuff and minimal downtime.
                    (that sg2440 was fixed under RMA and has been working fine, but I've got a 5100 on order just in case).

                    I always liked seeing the rules as applied (pf user before pfSense), that command helps me figure out exactly what is going on, you can mentally walk a packet flow.

                    1 Reply Last reply Reply Quote 1
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.