I just showed you how it is possible.There are default block rules without "quick", so they match last and block all traffic in those vlans that don't have an allow rule. They're the default deny rules:@10 block drop in log on ! vlan0.160 inet from 10.10.60.0/24 to any@13 block drop in log on ! vlan0.190 inet from 10.10.90.0/24 to anyAnd there has to be a user generated "allow rule" in the GUI with "quick", so it matches before the block rules:@147 pass in quick on vlan0.190 inet all flags S/SA keep state label "33bdb49cf3ed631fee86930d96e7e374"Due to this rule, any client in vlan0.190 can ping anywhere.The rule has to be either in:Firewall: Rules: vlan0.190orFirewall: Rules: Floating
Can you list your interface definitions? What do you have assigned to WAN and LAN? What is the parent interface for each VLAN?
Can you tell me if in Firewall: Settings: Advanced"Disable Firewall" - "Disable all packet filtering" is enabled?
My only guess left would be that the hosts can find themselves directly via layer 2. Maybe the vlan setup isnt working right.The arp table would be interesting. Interfaces: Diagnostics: ARP TableAlso the arp tables and mac address of both clients so it can be seen if they prefer a direct route.EDIT: Thats really grasping at straws though, I'm not that firm at layer 2. So I give up here at this point.
Are you are running opnsense virtualized?I think you have your Virtual Host configured incorrectly to support vlans. Either that or your external smart switch is incorrectly set up. The symptoms you are describing is exactly what happens when vlans are not configured correctly on the external switch and they are getting combined. This is external to opnsense.