• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

[resolved] pfSense not routing between connected subnets

Scheduled Pinned Locked Moved Routing and Multi WAN
24 Posts 6 Posters 63.0k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    jswj
    last edited by Mar 10, 2014, 9:47 AM Mar 10, 2014, 9:45 AM

    on pfsense, all LAN interface must not have gateway IP set. both clients host should point its gateway to its respective LAN IP of the pfsense LAN interface.

    create firewall rules on both LAN interface on pfsense to allow any to any traffic, for now. see if client host on both LAN can reach each other.

    pfsense WAN, disable blocked private networks, and enable auto outbound NAT.

    would that work?

    1 Reply Last reply Reply Quote 0
    • B
      b3nno
      last edited by Mar 10, 2014, 10:26 AM

      Neither LAN nor DMZ interface on pfSense is configured with a gateway. It is set to "none".

      Hosts in DMZ:192.168.1.0/24 have 192.168.1.1 as default gateway. Hosts in LAN:10.0.10.0/24 have 10.0.10.1 as their default gateway.

      Both LAN and DMZ have rules that say allow traffic from any to any. Clients can not reach each other.

      WAN interface is ofcourse not configured with "block private networks", because the WAN adress space is in such a network.

      I will try enabling Auto Outbound NAT later today.. Doubt it will work however, because it did not work with Manual NAT & no rules.

      NAT/PATing works wonderful however. Hosts in both LAN and DMZ currently have internet access. They can not reach each other though.

      I've successfully tried NATing with source LAN destination DMZ with a NAT rule as pictured in the attachment. Hosts on LAN:10.0.10.0/24 can that way access hosts in DMZ:192.168.1.0/24 but not the other way without manually mapping ports etc. This would probably be fine for a normal DMZ network but not in this case :)

      pfsenseNATrules.png
      pfsenseNATrules.png_thumb

      1 Reply Last reply Reply Quote 0
      • J
        jswj
        last edited by Mar 10, 2014, 11:08 AM

        Remove all the mappings on the manual NAT configurations. If both LAN and DMZ can ping to its own gateway, they should be able to talk to each other.

        It is maybe stupid of me by saying this, but sometime the LAN cable is not where its suppose to be check LAN and DMZ are connected to the correct interface on t pfsense, just maybe.

        I have simulate your situation within a virtual environment, all works ok.

        1 Reply Last reply Reply Quote 0
        • B
          b3nno
          last edited by Mar 10, 2014, 6:44 PM Mar 10, 2014, 6:11 PM

          I tried removing the NAT configurations. In this scenario both LAN and DMZ can ping to its own gateway, but they can not talk to each other.

          Yeah I'm pretty sure about where the cables go. LAN and DMZ hosts rely on DHCP leases so that is another way to know for sure hosts are connected to the correct interface.

          What other settings/rules have you configured to manage this in your virtual environment?

          I'm starting to think the motherboard simply can not be used for routing.. Tried m0n0wall too, no luck there. Maybe I should start over with some other hardware.

          Attached: firewall rules and NAT rules. This is the current setup. If I delete all NAT rules there is no internet access (of course), and hosts in LAN (10.0.10.0/24) can not access DMZ hosts (192.168.1.0/24) at all.

          pfsenserulesNAT.png
          pfsenserulesNAT.png_thumb

          1 Reply Last reply Reply Quote 0
          • P
            podilarius
            last edited by Mar 10, 2014, 6:51 PM

            Do you have promiscuous mode turn on for the vswitches in ESX?

            1 Reply Last reply Reply Quote 0
            • B
              b3nno
              last edited by Mar 10, 2014, 6:56 PM

              This is a physical pfsense box.. hosts are physical aswell :) no vswitches.

              1 Reply Last reply Reply Quote 0
              • P
                podilarius
                last edited by Mar 10, 2014, 7:00 PM

                Sorry posted in wrong thread. Let me look over the attachment.

                1 Reply Last reply Reply Quote 0
                • P
                  podilarius
                  last edited by Mar 10, 2014, 7:13 PM

                  I have heard of this only one other time, and it was hardware related then. What type of NICs and hardware are you running?

                  1 Reply Last reply Reply Quote 0
                  • B
                    b3nno
                    last edited by Mar 10, 2014, 8:30 PM Mar 10, 2014, 8:21 PM

                    Its running on a Jetway 7F4K1G5DS-LF motherboard, 1,5 Ghz VIA C7-D embedded processor, with two realtek gigabit NICs onboard with RTL8101SC chip. Third NIC is a generic 100/10 mbit davicom. Booting from 512MB CF-card in a CF-IDE converter.

                    1 Reply Last reply Reply Quote 0
                    • M
                      mikeisfly
                      last edited by Mar 11, 2014, 1:03 AM

                      What network is your WAN on? can you post screen shots of your LAN interfaces?

                      1 Reply Last reply Reply Quote 0
                      • P
                        podilarius
                        last edited by Mar 11, 2014, 12:39 PM

                        I have not heard of this davicom nic. What chip set is it using? Do you have another NIC, preferably Intel, that you can replace it with for further testing?

                        1 Reply Last reply Reply Quote 0
                        • B
                          b3nno
                          last edited by Mar 11, 2014, 1:17 PM Mar 11, 2014, 1:12 PM

                          My WAN network lies in 10.0.0.0/24. I have tried to replace the davicom PCI card with realtek PCI 100/10 NIC. Still no routing happening. LAN and DMZ is configured on the onboard NICs. I did try to use the third PCI for LAN, still no routing. Realtek 100/10 PCI card is using RL driver. Onboard Realtek NICs is using RE driver.

                          Attached screens from LAN and DMZ int config page.

                          DMZINT.png
                          DMZINT.png_thumb
                          LANINT.png
                          LANINT.png_thumb

                          1 Reply Last reply Reply Quote 0
                          • P
                            podilarius
                            last edited by Mar 11, 2014, 3:22 PM

                            With that setup and the correct rules, it should route without issue. Did you say that if you disable the firewall in advanced, it still will not route?

                            1 Reply Last reply Reply Quote 0
                            • B
                              b3nno
                              last edited by Mar 12, 2014, 9:56 AM Mar 12, 2014, 9:46 AM

                              That is correct. It will not route between connected subnets even with firewall disabled.

                              I will try routing between nets on different vlans in a trunk from the pfsense box later today. If the NICs support vlan/trunking at all :)

                              1 Reply Last reply Reply Quote 0
                              • B
                                b3nno
                                last edited by Mar 12, 2014, 10:36 PM

                                Breaking news!

                                The error of my ways has revealed it self. Windows firewall blocks both icmp and IP traffic from an other subnet than that the host resides in. All this time the poor pfSense box was doing its job probably perfectly.

                                Sorry for wasting your time people, but thanks a bunch for your posts :) really appreciate it.

                                1 Reply Last reply Reply Quote 2
                                • P
                                  podilarius
                                  last edited by Mar 13, 2014, 3:33 AM

                                  Good old Windows … At least they are error on somewhat safe now. Good luck.

                                  1 Reply Last reply Reply Quote 0
                                  • B
                                    b3nno
                                    last edited by Mar 13, 2014, 7:05 AM

                                    Hehe yeah. Both hosts were running Win 8 so maybe its something new. I have not heard of this atleast. I figured it out when I put a cisco switch in to the mix, which I could ping from all subnets.

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      Brutal
                                      last edited by Mar 13, 2014, 11:58 PM

                                      I've been caught by this in the past and now packet capture on each port to see exactly what's going on.  Sure saves a lot of time.

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        madVaX
                                        last edited by Jul 3, 2014, 11:56 PM

                                        I have an almost identical setup with almost identical issues.

                                        One pfSense box (PC Engines APU 1C4, three Realtek RTL8111E NICs), re0 is the WAN interface, connecting to a cable modem which connects to a public IP network of the Internet provider, re1 is the LAN interface connecting a bunch of machines in the 192.168.0.0/24 private subnet and re2 is the OPT1 interface connecting some machine in the 192.168.1.0/24 private subnet.

                                        WAN has filter private and bogons enabled, those settings as well as the upstream route are off for both the LAN and OPT1 configured subnets.

                                        Routing to the Internet works on both subnets, all hosts get their IP from DHCP on their respective interface.

                                        There are any-to-any rules for both local subnetworks configured (OPT1 basically with the LAN rules as template, replacing the relevant interface names).

                                        I have a NAT rule, which allows access from the internet on port 443 to one server on the ~0.0/24 network. I also had NAT reflection enabled ("NAT + proxy") for this NAT rule. The default behaviour is "Disable". This works.

                                        I run Linux boxes, mostly Ubuntu and small SOHO Access Points (Sitecom) on both LANs, but as the original poster, I am unable to ping machines in the ~1.0/24 from the ~0.0/24 subnet and vice versa.

                                        I tried pinging with Ubuntu UFW personal firewall disabled on the client towards the AP in the other subnet, and it does not work.

                                        As with the OP, I can ping the other interface (~1.1/24 from ~0.1/24 and vice versa) but not the machines in the other subnet.

                                        Adding a firewall rule to monitor traffic shows, that packet are passed. Packet capture shows, that nothing comes back if I send pings.

                                        I simply don't understand this (must be a stupid oversight probably an issue with the machine config of the AP I used for testing so far).

                                        If anyone could help here, I would be very gratefull.

                                        1 Reply Last reply Reply Quote 0
                                        • M
                                          madVaX
                                          last edited by Jul 6, 2014, 5:33 PM

                                          Reply to self:

                                          Similar issue as the original poster. The Access Points I used as ping targets are configured not to reply to pings from other subnets. Packets where passed around with no problem by pfSense.

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received