1
General Discussion / Re: Clean install won't allow internal VLANs to connect to internet
« on: May 29, 2019, 04:03:52 am »
I think I know why this is happening.
In pfsense, after a complete set up, I noticed that under the "Firewall/Nat/Outbound" menu, the automatic NAT rules are being updated to reflect the newly added static routes, as follow:
- first entry:
interface: WAN
Source: 127.0.0.0/8 ::1/128 192.168.1.0/24 192.168.20.0/24 192.168.30.0/24 192.168.40.0/24 192.168.10.0/24
Source Port: *
Destination: *
Destination Port: 500
NAT Address: WAN address
NAT Port: *
Static Port: v (check mark)
Description: Auto created rule for ISAKMP
- second entry
interface: WAN
Source: 127.0.0.0/8 ::1/128 192.168.1.0/24 192.168.20.0/24 192.168.30.0/24 192.168.40.0/24 192.168.10.0/24
Source Port: *
Destination: *
Destination Port: *
NAT Address: WAN address
NAT Port: *
Static Port: some cross path sign
Description: Auto created rule
The important bit in all this info is the "Source" networks: they are being updated to reflect the newly added network rules in the LAN rules section. A NAT for each of the networks.
In opnsense, after I added the firewall rules for the LAN interface, the automatic NAT tab has not been updated. This would correlate what I've seen in the live view firewall log, where the VLAN30/wifi network requests were showing up as originating on the firewall itself and not from the internal LAN/VLAN. In other words, the opnsense is not executing the NAT for any of the VLANs, except for the native VLAN10.
So the real question is: is this a bug or are there anymore steps that I should've performed after implementing the firewall rules?
Thank you in advance.
In pfsense, after a complete set up, I noticed that under the "Firewall/Nat/Outbound" menu, the automatic NAT rules are being updated to reflect the newly added static routes, as follow:
- first entry:
interface: WAN
Source: 127.0.0.0/8 ::1/128 192.168.1.0/24 192.168.20.0/24 192.168.30.0/24 192.168.40.0/24 192.168.10.0/24
Source Port: *
Destination: *
Destination Port: 500
NAT Address: WAN address
NAT Port: *
Static Port: v (check mark)
Description: Auto created rule for ISAKMP
- second entry
interface: WAN
Source: 127.0.0.0/8 ::1/128 192.168.1.0/24 192.168.20.0/24 192.168.30.0/24 192.168.40.0/24 192.168.10.0/24
Source Port: *
Destination: *
Destination Port: *
NAT Address: WAN address
NAT Port: *
Static Port: some cross path sign
Description: Auto created rule
The important bit in all this info is the "Source" networks: they are being updated to reflect the newly added network rules in the LAN rules section. A NAT for each of the networks.
In opnsense, after I added the firewall rules for the LAN interface, the automatic NAT tab has not been updated. This would correlate what I've seen in the live view firewall log, where the VLAN30/wifi network requests were showing up as originating on the firewall itself and not from the internal LAN/VLAN. In other words, the opnsense is not executing the NAT for any of the VLANs, except for the native VLAN10.
So the real question is: is this a bug or are there anymore steps that I should've performed after implementing the firewall rules?
Thank you in advance.