Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    No internet access to VLAN when isolating it with LAN net

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 3 Posters 1.3k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 0 Offline
      062bel313
      last edited by

      Hello team:

      Beginner here of Pfsense and exploring few ideas to isolate the networks using VLANS.

      I have created a VLAN and GUEST network
      203e1130-6906-472c-9269-7dba595f9eb7-image.png

      The VLAN has DHCP server:
      99843bc6-d2e3-4413-af57-44e119bc6d05-image.png

      which is going to be different than my LAN (192.168.10.1/24)

      Now in the firewall, I am creating rules so that the GUEST do not have access to LAN net but has access to internet. Here is the configuration:
      6ccb96f4-236d-4e77-94b4-1d9bfeb2f741-image.png

      I then tested the setup in one computer: the isolation worked, but the device in GUEST network does not have internet access.
      If I disabled the first rule, the internet worked, but then the isolation did not work.

      Can you please suggest what I might be doing wrong here. Sorry if I didn't provide relevant information. Let me know I will provide more information.

      Thank you..

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ Online
        johnpoz LAYER 8 Global Moderator @062bel313
        last edited by johnpoz

        @062bel313 where did you come up with 120.168.10/24

        You can not just pull public IP space out of thin air and use it on your internal network - well you can ;) but its borked out of the gate.

        Is this your isp? And they are letting you use this space?

        inetnum:        120.168.10.0 - 120.168.10.255
        netname:        GGSN-3G-ISAT-ID
        descr:          GGSN 3G
        descr:          INDOSAT's 3g Broadband Customer
        descr:          Jakarta
        

        As to internet working - where are you pointing client for dns - if your pointing it to lan IP or something on lan for dns - then no your nothing to get internet if your blocking access to its dns.

        You should be using rfc1918 space for your network - unless you have the public networks assigned for your use. rfc1918 would be 10/8, 192.168/16 or 172.16/12

        You could use for example 192.168.20.0/24 for your "guest" vlan.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 25.07 | Lab VMs 2.8, 25.07

        0 1 Reply Last reply Reply Quote 0
        • 0 Offline
          062bel313 @johnpoz
          last edited by

          @johnpoz I randomly selected 120.168.10 for my VLAN. It is inside my network so thought it would not be a problem. May be I can change later if that creates issue.

          Regarding the DNS, yes I have adguard running in 192.168.10.9:53. I initially guessed so and created allow from GUEST net to that specific IP and port, but that also didn't help. this is what I was doing.
          f0febfce-2f94-415d-8bea-3ba8e0ccb441-image.png
          I am testing different ways to create firewall rules. The invert should be same as before (I guess), and added DNS as first rule so that I have access to DNS server.
          I also tried IP address of google directly (142.250.114.102) in the computer with guest network and that also did not work.
          May be I am not correctly creating rules? or can it be because of the IP I am assigning?

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ Online
            johnpoz LAYER 8 Global Moderator @062bel313
            last edited by johnpoz

            @062bel313 said in No internet access to VLAN when isolating it with LAN net:

            May be I can change later if that creates issue.

            It is really bad practice to just use public space internally - while technically it can work.. If you ever wanted to actually go to a public site hosted off that public network you would not be able to get there.

            You should use the more than adequate amount of space specifically assigned for use on local network, ie rfc1918..

            If your dns is on 192.168.10.9 - maybe it doesn't allow access from what it feels is public IP space..

            I would not use ! rules, unless there is some specific reason for it. Rules are evaluated top down, first rule to trigger wins, no other rules are evaluated.

            Your first set of rule were fine - depending on where your client on your guest was pointing to for dns..

            I would correct your guest network to be rfc1918, and then can work on whatever problem your having. But I can tell you right now anyone looking to helping you and seeing your use of public space internally that is not actually assigned for you to use is going to point it out as problematic.. There is ZERO reason to just use random public IP space internally..

            did you mess with the default outbound automatic setup? Out of the box pfsense will auto nat any new local networks you create vlan or native to your wan IP. If you changed this from auto, you would have to manually create the outbound nat rules?

            Do you have any floating rules that could be blocking this guest network from going out your wan?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07 | Lab VMs 2.8, 25.07

            0 2 Replies Last reply Reply Quote 0
            • 0 Offline
              062bel313 @johnpoz
              last edited by

              @johnpoz Got it,
              my taks:
              I will change the IP address of my VLAN to 192.168.20.0/24
              Then use 1.1.1.1 as DNS server
              Will revert back the firewall rule as before and update the thread (if it works, and if it doesn't work)
              I will also create guest network as rfc1918 (no idea how to do that, but google should help on it :-))

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ Online
                johnpoz LAYER 8 Global Moderator @062bel313
                last edited by

                @062bel313 said in No internet access to VLAN when isolating it with LAN net:

                I will also create guest network as rfc1918

                Just pick some address space out of that VAST amount of space, 192.168.20/24 for example - anything in rfc1918 space will work just fine, as long as it doesn't overlap with your existing lan or other networks, etc.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07 | Lab VMs 2.8, 25.07

                1 Reply Last reply Reply Quote 0
                • AndyRHA Offline
                  AndyRH
                  last edited by

                  Just for easy reading I use a 10. addresses for things outside my LAN.

                  o||||o
                  7100-1u

                  1 Reply Last reply Reply Quote 0
                  • 0 Offline
                    062bel313 @johnpoz
                    last edited by

                    did you mess with the default outbound automatic setup? Out of the box pfsense will auto nat any new local networks you create vlan or native to your wan IP. If you changed this from auto, you would have to manually create the outbound nat rules?

                    I have not changed anything on NAT side. This is what I see after I changed my guest network to 192.168.20.0/24:
                    b73cba9a-c54c-40d0-a7aa-8e5106347c13-image.png

                    Do you have any floating rules that could be blocking this guest network from going out your wan?

                    My floating rules are blank.

                    If I use 1.1.1.1 as DNS server, GUEST network has internet access, but if I changed it to 192.168.10.9, I do not have access to internet. So I guess the problem is with my DNS server running on the LAN net. I set up my firewall rule as this, is it correct?
                    933c5056-5e00-4bc5-9de2-e26b473f9a22-image.png

                    0 johnpozJ 2 Replies Last reply Reply Quote 0
                    • 0 Offline
                      062bel313 @062bel313
                      last edited by

                      Ok the problem got resolved. I should have used UDP for DNS port.
                      03f6d7b8-71a7-4206-9fbf-a8b6535688a5-image.png

                      Thank you guys @AndyRH @johnpoz

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ Online
                        johnpoz LAYER 8 Global Moderator @062bel313
                        last edited by johnpoz

                        @062bel313 and what are you running on your 10.9 for dns - its firewall rules might not allow your vlan network? Or like unbound with ACLs, or Bind also has ACLs, etc. which need to be set to allow for queries, etc.

                        Also you should prob fix up that 130.168 network while your fixing stuff..

                        NetRange:       130.168.0.0 - 130.168.255.255
                        CIDR:           130.168.0.0/16
                        Organization:   Agilent Technologies (AGILEN-2)
                        

                        I didn't catch the tcp only rule - because focus was on your NON rfc1918 network ;) hehehe

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 25.07 | Lab VMs 2.8, 25.07

                        0 1 Reply Last reply Reply Quote 1
                        • 0 Offline
                          062bel313 @johnpoz
                          last edited by

                          @johnpoz Agree: I have to change that 130. 168 VLAN. I have changed it. Now every thing is working as expected. I am using Adguard as DNS server, not sure about your questions on ACLs, no idea hehehe.

                          Thank you all.

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ Online
                            johnpoz LAYER 8 Global Moderator @062bel313
                            last edited by

                            @062bel313 said in No internet access to VLAN when isolating it with LAN net:

                            not sure about your questions on ACLs, no idea hehehe.

                            What are you running for dns on 10.9? Different dns software has a feature of Access Control Lists which determine what IPs or IP ranges can do different types of queries..

                            Unbound and Bind both support this feature for example. Unbound running on pfsense out of the box will auto create ACL entries for locally attached networks, etc.

                            acl.jpg

                            Here is bind package for example

                            bindacl.jpg

                            So depending on what dns you running on 10.9 - it would be possible that you would have to edit whatever ACLs to allow for queries from your other network/vlans

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 25.07 | Lab VMs 2.8, 25.07

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.