Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN won't communicate with LAN

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    58 Posts 5 Posters 12.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      DjJoakim
      last edited by

      Hi!
      First of all - yes, i know there is a TON of these threads on this forum, i have read maybe 60% of them, but i still can't figure out what i am doing wrong..
      I am pretty new to PFsense so please excuse me.

      So, to the topic.
      I have 3 VLANs.
      VLAN30 - 172.18.0.1 (VPN1)
      VLAN40 - 172.19.0.1 (VPN2)
      VLAN60 - 192.168.2.1 (WIFI)
      LAN - 192.168.1.1 (PC)

      The thing is, with the standard allow all lan rule to VLAN60, i could access it from my LAN network. So i have now blocked that from all the other networks using Aliases, and that works fine - now anything in that subnet can't reach anything else, just like i wan't.

      But here comes the struggle, my VLAN30 and 40 can communicate with the same rule applied to them, but i can't communicate with VLAN30 or 40 from my LAN (?) I wan't these network to be seperated but since i have some devices in VLAN30 that have webui i need to reach these specific ip adresses from LAN. I have tried all night to allow rules from LAN, in VLAN30 and so on... But i just can't get this working. Since i am new to this, i assume it have something to do with the range of ip adresses (?) Since i could access VLAN60 (becuse it is 192.168.... just like LAN) and the same goes with VLAN30 and 40, they can communicate becouse they are 172.... and not with 192. Or am i completley wrong?

      For now - i have "Default allow LAN to any rule" in both Vlan 30 and 40, and both those VLAN can access internet, with forced gateway of VPN.

      Maybe this is something easy for someone that have more knowledge.
      Thanks! (Sorry for broken english...)

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @DjJoakim
        last edited by johnpoz

        @djjoakim if your not going to post your rules - not able to help. Users say X and do Y all the time.

        Rules are evaluated as traffic enters an interface from the network attached too. Evaluated top down, first rule to trigger wins, no other rules are evaluated.

        Its that simple... If you don't want say vlan 30 to not go somewhere, then those rules would be put on the vlan 30 interface.

        If you have states already established - they would allow traffic, even if you block after.. You would need to kill the state or wait for it to time out.

        If you are going to policy route - Which I assume by having 2 vlans named vpn - then rules to allow traffic to other vlans would have to be above rules that send traffic out a gateway.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        D 1 Reply Last reply Reply Quote 1
        • D
          DjJoakim @johnpoz
          last edited by DjJoakim

          @johnpoz Okey, yeah i see - well, like i said, i only have "allow all" and that's why i am so confusing why it's not working, since it can't communicate with each other.
          Here is a pic of all my rules. https://i.imgur.com/BFiTTOw.png (Ps, ignore all the "PoolVPN" rules for now, i use them for now to route traffic through vpn, since i can't get VLAN working)
          "WIFI" VLAN60
          "FAST" VLAN30
          "EJFAST" VLAN40

          I don't really know what policy route means, but what i wan't to establish is that those devices connected to VLAN30 will never gain internet access if the VPN is down, same with VLAN40. That's why i am forcing them in VPN gateway, i know i need some kind of block aswell after those rules, but for now - i just wan't to fix the communication between vlan and lan. Maybe, you can explain how to do that aswell?

          Thanks! And, sorry for being a noob at this.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @DjJoakim
            last edited by

            @djjoakim said in VLAN won't communicate with LAN:

            "allow all" and that's why i am so confusing why it's not working, si

            Again - post them!! if you had allow all then it would be working - are you policy routing it? Default is tcp, not all.. etc..

            Take the 3.2 seconds it takes to post a screenshot of your rules and we will all be 100% sure what you have..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            D 1 Reply Last reply Reply Quote 1
            • D
              DjJoakim @johnpoz
              last edited by

              @johnpoz I did...

              Here is a pic of all my rules. https://i.imgur.com/BFiTTOw.png (Ps, ignore all the "PoolVPN" rules for now, i use them for now to route traffic through vpn, since i can't get VLAN working)

              P 1 Reply Last reply Reply Quote 0
              • P
                Patch @DjJoakim
                last edited by

                @djjoakim please upload images to the forum so other users do not need to go to other sites and can see the images in context.

                johnpozJ 1 Reply Last reply Reply Quote 1
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @Patch
                  last edited by

                  And exactly as I stated your policy routing - forcing traffic out a gateway - so why would you think you would be able to get to your other networks.

                  policyroute.jpg

                  https://docs.netgate.com/pfsense/en/latest/multiwan/policy-route.html#bypassing-policy-routing

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  D 1 Reply Last reply Reply Quote 2
                  • D
                    DjJoakim @johnpoz
                    last edited by

                    @johnpoz Well like i said in the beginning, i am new to this - and i don't really understand what policy routing means, but i see now what you mean. The only problem is, the devices connected to that vlan must go trough the vpn client, i can't let the ip slip into the other wan, so i must force it.
                    Anyway, that's another problem - the thing is, like i said in the first thread, i have tried 1000 different options but nothing works, i have also tried to not force the gateway.

                    Can you explain why these 2 networks can't communicate?
                    LAN is 192.168.1.1 and WIFI is 10.0.0.1 - not forcing anything.

                    wt.png

                    1 Reply Last reply Reply Quote 0
                    • D
                      DjJoakim
                      last edited by

                      I have done exacly like that link you sent me, and still - they won't communicate... What am i doing wrong?

                      www.png

                      bingo600B 1 Reply Last reply Reply Quote 0
                      • bingo600B
                        bingo600 @DjJoakim
                        last edited by

                        @djjoakim

                        e0d507fd-adbd-4187-be09-c046ee0e0850-image.png

                        I'll just ask some questions, sometimes answering , forces one to rethink a solution.

                        1:
                        On FastLan - Why do you have a rule with source Lan net ?
                        Seems strange to me

                        2:
                        On Lan - Why do you have a rule with source Fast net ?
                        Seems strange to me

                        3:
                        The deny's on Lan (small arrows) , why do they have the "Gear wheel" , that's usualy just shown if you do some "trickery's" as setting "Gateway"
                        What have you set ? , show the config .
                        It is always adviceable (at least when debugging) to enable logging on all deny's including these.

                        4: Please show the definition of those POOLVPN and POOLVPNEJ

                        /Bingo

                        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                        pfSense+ 23.05.1 (ZFS)

                        QOTOM-Q355G4 Quad Lan.
                        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                        D 1 Reply Last reply Reply Quote 0
                        • D
                          DjJoakim @bingo600
                          last edited by

                          @bingo600 Hey!
                          Thanks for you'r questions and for taking the time to help me.
                          First and all, i am very new to this - so everything dosen't make sense for now, and i have a friend that is trying to help me, so he has done some of the rules.

                          1. I am just trying every possible way to make it work, so even if it seems strange, i open up to every possible way for the networks to communicate.

                          2. Same here as the above, i am trying to open up every possible senario to make the networks communicate.

                          3. The PoolVPN is something my friend helped me set up, as for now - the VLAN don't work since they cant communicate, so everything on my network runs on LAN (192.168.1.x) and to make those devices not access internet except they go through the vpn client, he did that PoolVPN thing. The reason it's a gear wheel is becouse he added some tag, to make the network block if the devices somehow don't go through vpn client, here is the settings for PoolVPN and the meaing of that "gear wheel"
                            How can i enable logging?

                          cog.png

                          And here is what's behind "PoolVPN"

                          pool.png

                          Thanks

                          bingo600B 2 Replies Last reply Reply Quote 0
                          • bingo600B
                            bingo600 @DjJoakim
                            last edited by

                            @djjoakim

                            Enable logging on rules by editing it (pencil) , and click this one.

                            e410cbd1-a0d1-4bc6-b30e-4d768175947d-image.png

                            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                            pfSense+ 23.05.1 (ZFS)

                            QOTOM-Q355G4 Quad Lan.
                            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                            D 1 Reply Last reply Reply Quote 1
                            • D
                              DjJoakim @bingo600
                              last edited by

                              @bingo600 Thank you, will do.

                              1 Reply Last reply Reply Quote 0
                              • bingo600B
                                bingo600 @DjJoakim
                                last edited by bingo600

                                @djjoakim

                                Let's take LAN

                                437b0845-17cb-4a4d-91fd-813706c3aa2d-image.png

                                Disable the Top rule by clicking the "No parking icon" , it wont delete the rule just disable it.
                                03acf454-b374-4eda-bd4b-bfc69850f1c0-image.png

                                You can enable it again by clicking the "ok" icon that will be shown instead of the "no parking".

                                What happens here after first rule is disabled....
                                Is that ANY ip in either of the VPNxx lists will be "Policy routed" aka "Forced out of" the gateway the rule points to. The "Deny rule below" is tagging the packet , prob. so that : If the VPN Gateway (above) goes down , the tagged package is not allowed to exit via normal wan.

                                If the IP is NOT in those VPN lists the package is allowed to go "anywere" including to wifi or exit via wan.

                                This means that ANY IP in those lists will not be able to go to wifi , as they match the "Exit via VPN policy" before they hit the bottom allow lan to anywhere rule.

                                Do you (from a wifi unit) test or ping a device on Lan that is not on the POOL lists ??
                                Else you will never get an ansver.

                                If what you wanted was to allow anything on lan to be able to talk to units on wifi (all local RFC1918 IP's) , and still have those in the pool exit via vpn's.

                                You should reenable the top rule , but change it's source to Lan net .

                                You will hopefully never see a source ip of Fast Lan , on your Lan.
                                So that rule won't do much good on lan ... aka never match.

                                /Bingo

                                If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                pfSense+ 23.05.1 (ZFS)

                                QOTOM-Q355G4 Quad Lan.
                                CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                D 1 Reply Last reply Reply Quote 0
                                • D
                                  DjJoakim @bingo600
                                  last edited by DjJoakim

                                  @bingo600 Thank you for taking the time, the thing is - the PoolVPN only exist for now since my VLAN don't work as they should. And yes, the devices are now on LAN network, 192.168.1.x, so just like you said, all those that are in the PoolVPN is allowed except they don't go though the wrong wan exit, and then they are banned - that works fine, but that's not what i am after.
                                  The devices that now are in PoolVPN and PoolVPNEJ is going to the Vlan. The devices in PoolVPN is going to VLAN30 = 172.18.0.1 (FAST) and the devices on PoolVPNEJ is going to VLAN40 = 172.19.0.1 (EJFAST)

                                  So they should not be botherd by the PoolVPN rule since they don't belong in that Aliases. So the question still remains, why does the devices on FAST access internet but i can't access them from my LAN network..

                                  Thanks

                                  bingo600B 1 Reply Last reply Reply Quote 0
                                  • bingo600B
                                    bingo600 @DjJoakim
                                    last edited by bingo600

                                    @djjoakim said in VLAN won't communicate with LAN:
                                    in that Aliases. So the question still remains, why does the devices on FAST access internet but i can't access them from my LAN network..

                                    Now you are changing the goal ....
                                    You mentioned Lan to WiFi ... Does that work.

                                    I think you need to describe what it is you want to end up with , not strange "quirks" you have made because , you couldn't get it to work.

                                    Edit: And what does go to 172.18.0.1 mean ???
                                    Should they get policy routed to 172.18.0.1 ?
                                    Should they "just" be allowed to communicate with 172.18.0.1 or ??

                                    Back in my IBM Mainframe days IBM's APAR Team would the pressed the (in)Famous - More Documentation is required ... button , in a situation like this

                                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                    pfSense+ 23.05.1 (ZFS)

                                    QOTOM-Q355G4 Quad Lan.
                                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                    D 1 Reply Last reply Reply Quote 0
                                    • D
                                      DjJoakim @bingo600
                                      last edited by

                                      @bingo600 No, i am not changing the goal - this is exacly what i was trying to explain in my main post, i only used the WIFI example for johnpoz response, since the wifi wasn't forced out of any gateway. (Since he said the problem was becouse of that on FAST interface)
                                      Anyway, i am sorry for the confusion - not having english as my first language sometimes makes everything 10x harder aswell. I will try and explain exacly what's my plan is:
                                      (Ignore all that PoolVPN for now, since that's "quirks")

                                      I have 3 VLAN networks.
                                      VLAN30 (FAST) 172.18.0.1
                                      VLAN40 (EJFAST) 172.19.0.1
                                      VLAN60 (WIFI) 10.0.0.1

                                      And then there is my LAN network 192.168.1.1

                                      So all devices placed under VLAN30 and VLAN40 must be forced through different VPN Clients, they can not leak into my orignal WAN.
                                      Everything so far seems to work, all devices i place under VLAN30 can access internet fine, but i can't access them thought my PC that's placed in LAN.
                                      (Some devices that will be in VLAN30 have webui witch i need to access from my PC, that's why i need to access some of the IP adresses)

                                      Now, when i have changed some of the settings (see pic below) i can ping my PC (192.168.1.103) from one device on FAST (172.18.0.124), but i can't ping 172.18.0.124 from my pc (192.168.1.103).
                                      So somehow, i managed to get it working one way, but not the other way back.. And i can't figure out what i have done wrong.

                                      ping.png

                                      Thanks

                                      bingo600B 1 Reply Last reply Reply Quote 0
                                      • bingo600B
                                        bingo600 @DjJoakim
                                        last edited by bingo600

                                        @djjoakim

                                        The config you showed above , ought to work for LAN <--> FAST.
                                        Have you tried to reboot the firewall , or "Clear the states" ?

                                        f63cfd89-9e9d-4798-bc67-79bb20b9f1f0-image.png

                                        And it seems you haven't enabled loggong on all the "deny" lines , that can be super helpfull during debugging an issue like this.

                                        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                        pfSense+ 23.05.1 (ZFS)

                                        QOTOM-Q355G4 Quad Lan.
                                        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                        D 1 Reply Last reply Reply Quote 1
                                        • D
                                          DjJoakim @bingo600
                                          last edited by DjJoakim

                                          @bingo600 Yes i just did that, and still dosen't work..
                                          I have also tried to make the same rules for WIFI, just to be sure there was nothing wrong with the device on FAST that i tried to ping, but the problem remains - i can ping LAN but i can't ping the VLAN..
                                          Edit: Hmmm.. Now i can access FAST from WIFI (VLAN60), but i can't reach WIFI from FAST, So, in this equation the problem is on the other way.
                                          LAN - FAST Can't ping
                                          FAST - LAN Can ping
                                          FAST - WIFI Can't ping
                                          WIFI - FAST Can ping

                                          Sorry, i have now enabled the logging for those.

                                          strang.png

                                          Thanks

                                          bingo600B 1 Reply Last reply Reply Quote 0
                                          • bingo600B
                                            bingo600 @DjJoakim
                                            last edited by

                                            @djjoakim

                                            What can you ping from Lan (your 192.168.1.103)

                                            Can you ping 192.168.1.1
                                            Can you ping 10.0.0.1
                                            Can you ping 172.18.0.1

                                            How does your RFC1918 definition look

                                            /Bingo

                                            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                            pfSense+ 23.05.1 (ZFS)

                                            QOTOM-Q355G4 Quad Lan.
                                            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                            D 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.