Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Reactor8393

#1
Just wanted to update that I resolved my issue. Thanks for helping. I didn't make any changes to the Outbound NATs, they are still set to Automatic.
#2
QuoteAnd does it resolve successfully?
It does not.

QuoteSo you have a different local DNS server running?

If so you have to state its IP in the DHCP server settings.
I want to separate the DNS services.
I did set the IP in the DHCP settings in Services > ISC DHCPv4 > Home - no success.

I want to continue using Opnsense so I'm going to abandon the VLAN issue for another day or when I get better equipment.
For now, I'm going to separate my network based on physical ports.

Thanks for replying and trying to help me through the issue.
#3
Quote from: viragomann on November 04, 2024, 04:46:03 PM
Run nslookup or dig on the devices to find out, which DNS server is requested. What do you get?

Ensure that the requests are not blocked by OPNsense firewall.
The nslookup and dig returns the DNS server of the inferface IP 10.5.11.1 or 10.5.12.1.
I tried changing the DNS server to my local DNS server and times out.

When I view the logs in Live View, I'm not able to see any traffic from the Home or Server interface.
I also use the filter: interface, contains, Home - no success.

I also created a new interface with a different IP scheme, assigned it to a physical interface without VLANs, created the DHCP services, and created the Firewall rule of Any, Any - it works without issue.

Perhaps it's my equipment.
#4
Quote from: viragomann on November 04, 2024, 09:29:45 AM
Are the devices able to resolve host names?
No, I'm not able to resolve hostnames.

Quote from: viragomann on November 04, 2024, 09:29:45 AM
Is your outbound NAT in automatic or hybrid mode?
Outbound NAT is in automatic mode.

Quote from: viragomann on November 04, 2024, 09:29:45 AM
If so does it show automatically generated rule for the VLANs?
There are two automatic rules

Interface: WAN
Source Networks: Home networks, LAN networks, Loopback networks, Servers networks, 127.0.0.0/8
Source Port: *
Destination: *
Destination Port: 500
NAT Address: WAN
NAT Port: *
Static Port: YES
Description: Auto created rule for ISAKMP

Interface: WAN
Source Networks: Home networks, LAN networks, Loopback networks, Servers networks, 127.0.0.0/8
Source Port: *
Destination: *
Destination Port: *
NAT Address: WAN
NAT Port: *
Static Port: NO
Description: Auto created rule

#5
I'm trying to understand why my VLANs are not able to reach the internet.
All of the VLANs obtain the appropriate IPs from the Opnsense DHCP server.

LAN is the only network that can reach the internet. All other fail.
I'm also unable to see any traffic (Block/Pass) in the Firewall > Log Files > Live View from Home or Server Interfaces.

What am I missing?

OPNsense 24.7.7
Set DNS
System > General > DNS servers: DNS1 - 208.67.222.222, DNS2 - 208.67.220.220
Created VLANs
Interfaces > Other Types > VLAN igc1_vlan11 tag 11
Interfaces > Other Types > VLAN igc1_vlan12 tag 12
Assigned to Interfaces
Interfaces > Assignments: opt1 igc1_vlan11 parent igc1
Interfaces > Assignments: opt2 igc1_vlan12 parent igc1
Enable Interface and Set to Static IPv4
Interfaces > Home > Enable Interface
Interfaces > Home > IPv4 Configuration Type: Static IPv4
Interfaces > Home > IPv4 address: 10.5.11.1
Interfaces > Servers > Enable Interface
Interfaces > Servers > IPv4 Configuration Type: Static IPv4
Interfaces > Servers > IPv4 address: 10.5.12.1
Enable DHCP for Home and Servers
Services > ISC DHCPv4 > Home > Enable DHCP
Services > ISC DHCPv4 > Home > Set Range 10.5.11.50 - 10.5.11.250
Services > ISC DHCPv4 > Servers > Enable DHCP
Services > ISC DHCPv4 > Servers > Set Range 10.5.12.50 - 10.5.12.250
Enable Firewall Rules for Home and Servers
Firewall > Rules > Home: Pass, Interface: Home, Source: Home net, Any, Any
Firewall > Rules > Servers: Pass, Interface: Servers, Source: Servers net, Any, Any

RESOLVED!
Final edit:
I feel like I did everything the same expect I configured the device and made sure it was functional and added the VLANs afterwards. This is what I did and I hope it helps someone else.

In my Samba AD DC Bind configs I added the ACL in /etc/bind/named.conf.options for my VLANs:

acl goodclients {
10.5.10.0/24;
10.6.10.0/24;
172.16.55.0/24;
172.16.60.0/24;
172.16.61.0/24;
172.16.62.0/24;
};

options {
......
allow-query {goodclients;};
}


OPNsense 24.7.8-amd64
Interfaces > Other Types > VLAN
Device: vlan01
Parent: igc3
VLAN tag: 60
VLAN Priority: Best Effort
Description: Server VLAN60

Device: vlan02
Parent: igc3
VLAN tag: 61
VLAN Priority: Best Effort
Description: Server VLAN61

Device: vlan03
Parent: igc3
VLAN tag: 62
VLAN Priority: Best Effort
Description: Server VLAN62

Interfaces ServerVLAN60, ServerVLAN61, ServerVLAN62
Enable Interface
Set Static IPv4

Services > ISC DHCPv4
Enable ServerVLAN60, ServerVLAN61, ServerVLAN62
ServerVLAN60, ServerVLAN61, ServerVLAN62 – Set DHCP Range

Firewall > Rules
ServerVLAN60, ServerVLAN61, ServerVLAN62
Action: Pass
Quick: Enabled
Interface: ServerLAN60
Direction: in
TCP/IP Version: IPv4
Protocol: any
Source: ServerVLAN60 net
Destination: any

Sodola 4 Port 2.5G with 2 SPF
Configuration > VLAN > 802.1Q VLAN
VLAN 60
Port 1 – Tagged – Goes back to Opnsense
Port 2 – Untagged – Goes to PC
Port 3 – Tagged – Goes to other switch
Port 4  - Tagged - Goes to TP-Link TL-SG108PE switch
Port 5 – Not Member – No SPF
Port 6 – Not Member – No SPF

VLAN 61
Port 1 – Tagged – Goes back to Opnsense
Port 2 – Not Member
Port 3 – Tagged – Goes to other switch
Port 4 Tagged - Goes to TP-Link TL-SG108PE switch
Port 5 – Not Member – No SPF
Port 6 – Not Member – No SPF

VLAN 62
Port 1 – Tagged – Goes back to Opnsense
Port 2 – Not Member
Port 3 – Tagged – Goes to other switch
Port 4 Tagged - Goes to TP-Link TL-SG108PE switch
Port 5 – Not Member – No SPF
Port 6 – Not Member – No SPF

TP-Link TL-SG108PE 8 Port
VLAN > 802.1Q VLAN
VLAN ID 60
Port 1 - Tagged
Port 8 – Untagged
VLAN ID 61
Port 1 -Tagged
Port 7 – Untagged
VLAN ID 62
Port 1 – Tagged
Port 6 – Untagged

VLAN > 802.1Q PVID Settings
Port 6 – 62
Port 7 – 61
Port 8 – 60