Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    10.X.X.X addresses on Interfaces

    Scheduled Pinned Locked Moved General pfSense Questions
    7 Posts 5 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      bbman1746
      last edited by

      I am very new to PFSense, but have successfully configured everything in test environments using a wide range of IP addresses and subnet masks.  However, our production network uses 10.x.x.x (specifically 10.250.x.x/19 at one site), and 10.x.x.x is not reachable on any of the interfaces (including even when assigned by DHCP).  I have cleared the Block private networks and reviewed other options, but it still will not allow me to connect to the web interface or ping the interface.  It does allow me to ping external ips (connected PCs) from PFSense, but not the reverse.

      Please help me understand what I am missing and thanks for helping me.

      1 Reply Last reply Reply Quote 0
      • jimpJ Offline
        jimp Rebel Alliance Developer Netgate
        last edited by

        Without knowing exactly what settings you placed on the interfaces, rules, etc, it's impossible to say.

        There is no problem specific to 10.x.x.x or any specific numbered network when used on any interface of pfSense, aside from the "block private networks" or "block bogon networks" matching some of them. With those options disabled, unless you have created an invalid, overlapping, or otherwise broken network configuration, it should work.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • johnpozJ Offline
          johnpoz LAYER 8 Global Moderator
          last edited by

          I don't understand the need to hide this "specifically 10.250.x.x/19"

          Are you saying you have multiple 10.250.x /19 networks?  like 10.250.0.0/19, 10.250.32.0/19, 10.250.64.0/19

          As jimp has stated without some actual details of what your doing have no idea, do you have these multiple /19s on some downstream switches?  What exact IP address do you have on the pfsense interface connected to this segment, and what specific rules do you have?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • B Offline
            bbman1746
            last edited by

            It has to be end user error…I'll start again and provide more details, if it doesn't work.

            Thank you for being kind.

            1 Reply Last reply Reply Quote 0
            • B Offline
              bbman1746
              last edited by

              I did confirm the issue was on my end, although I am completely baffled as to what happened other than fatigue.  It  likely deals with my confusion over bridging and adding a third nic to the mix.  Thanks again for the help.

              1 Reply Last reply Reply Quote 0
              • K Offline
                kejianshi
                last edited by

                Do you have a practical reason to be using /19s?

                1 Reply Last reply Reply Quote 0
                • DerelictD Offline
                  Derelict LAYER 8 Netgate
                  last edited by

                  @kejianshi:

                  Do you have a practical reason to be using /19s?

                  And bridges?

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.