1
24.1 Legacy Series / Re: can not reach web UI from different subnet than LAN
« on: February 18, 2024, 10:33:28 pm »
I think I'm already past that stage.
What I've tried until now:
One of the first things that I tested today: created a floating rule on top for all interfaces to allow access to port 443 on "this firewall". Same behaviour: I see that this rule is then hit before my network-specific rule for access to port 443 on the firewall, again in the green, rule hit with pass. However, same behaviour, no web interface loading.
The web ui only loads over the LAN-bridge, which is the only bridge not linked to a vlan interface. All other bridges are linked to a VLAN interface. The Lan-bridge was created initially during install and has the web ui access, without VLAN.
Maybe also interesting to mention: even already used the firewall-settings to disable packet filtering, basically disabling whole firewall: still no access to web ui from that specific network segment.
Also tried completely disabling firewalld on the hypervisor, in the assumption that this was blocking something, also no luck.
My instinct is telling me it's almost as if the vlan tagging is disappearing when the response packets are coming from the opnsense vm to my laptop, but I don't see how that's possible.
For the hypervisor itself it's working, I can SSH to it over that same bridge in that same VLAN.
It's just your normal eth0 -> eth0.100 -> bridge100 setup, so as I understand it, it's not necessary to do any further config on the hypervisor side to keep those VLAN tags.
The packets coming from the opnsense VM over that bridge will automatically be tagged with the correct bridge right?
What I am wondering at the moment; I just read this article:
https://computingpost.medium.com/create-linux-bridge-on-vlan-interface-in-debian-11-10-e5679e3894bd
This is basically what I did, times 7.
Especially this part I found interesting:
echo "net.ipv4.ip_forward=1" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.conf.all.arp_filter=0" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.conf.all.rp_filter=2" | sudo tee -a /etc/sysctl.conf
=> I didn't make these changes on my hypervisor, but I'm wondering if these could explain the behaviour I'm seeing.
Especially since these settings appear to be relevant for multihomed machines but also to determine on which interface to send replies...
I'm still wondering if the ip_forward is even necessary. But those other 2 settings I think I would need to check.
What I've tried until now:
One of the first things that I tested today: created a floating rule on top for all interfaces to allow access to port 443 on "this firewall". Same behaviour: I see that this rule is then hit before my network-specific rule for access to port 443 on the firewall, again in the green, rule hit with pass. However, same behaviour, no web interface loading.
The web ui only loads over the LAN-bridge, which is the only bridge not linked to a vlan interface. All other bridges are linked to a VLAN interface. The Lan-bridge was created initially during install and has the web ui access, without VLAN.
Maybe also interesting to mention: even already used the firewall-settings to disable packet filtering, basically disabling whole firewall: still no access to web ui from that specific network segment.
Also tried completely disabling firewalld on the hypervisor, in the assumption that this was blocking something, also no luck.
My instinct is telling me it's almost as if the vlan tagging is disappearing when the response packets are coming from the opnsense vm to my laptop, but I don't see how that's possible.
For the hypervisor itself it's working, I can SSH to it over that same bridge in that same VLAN.
It's just your normal eth0 -> eth0.100 -> bridge100 setup, so as I understand it, it's not necessary to do any further config on the hypervisor side to keep those VLAN tags.
The packets coming from the opnsense VM over that bridge will automatically be tagged with the correct bridge right?
What I am wondering at the moment; I just read this article:
https://computingpost.medium.com/create-linux-bridge-on-vlan-interface-in-debian-11-10-e5679e3894bd
This is basically what I did, times 7.
Especially this part I found interesting:
echo "net.ipv4.ip_forward=1" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.conf.all.arp_filter=0" | sudo tee -a /etc/sysctl.conf
echo "net.ipv4.conf.all.rp_filter=2" | sudo tee -a /etc/sysctl.conf
=> I didn't make these changes on my hypervisor, but I'm wondering if these could explain the behaviour I'm seeing.
Especially since these settings appear to be relevant for multihomed machines but also to determine on which interface to send replies...
I'm still wondering if the ip_forward is even necessary. But those other 2 settings I think I would need to check.