F5F Stay Refreshed Power Users Networks PFSense VLAN problems (ARP and DHCP not working)

PFSense VLAN problems (ARP and DHCP not working)

PFSense VLAN problems (ARP and DHCP not working)

Pages (3): 1 2 3 Next
L
Lucadagreat
Member
236
03-08-2020, 05:35 AM
#1
This article discusses an unusual problem we’ve never seen before, intended for those who appreciate the odd. If you have any insights, please let me know. We’ve already deemed this matter unworthy of extra effort. The firewall in question is a pre-existing model with 579 days of continuous operation. Initially running version 2.3.2, it was upgraded to 2.4.4_1 during troubleshooting. The setup includes a Supermicro C2758 server with four network interfaces and PFSense running directly on the hardware.

We attempted to add new VLANs to the firewall’s LAN port, configured interfaces, static IPs, and applied basic allow rules. However, accessing devices in the subnets failed. We verified that VLAN tags were correct on switches and that devices appeared on the expected IPs. Pings worked within subnets but not through the firewall, while the firewall couldn’t reach them. ARP and DHCP functions operated normally, suggesting a firewall rule issue. After resetting the firewall settings and reapplying rules, we still faced problems. The existing VLANs functioned properly, but new ones consistently encountered this obstacle.

Our only option now is to back up, reset, and reinstall—though we lack both budget and time for that. We’re told this situation will persist until the customer decides to upgrade their network, which would require a new firewall. This is especially concerning since PFSense (including NetGate appliances) isn’t approved by Starwood.

We hope this case sparked some laughter and curiosity.
L
Lucadagreat
03-08-2020, 05:35 AM #1

This article discusses an unusual problem we’ve never seen before, intended for those who appreciate the odd. If you have any insights, please let me know. We’ve already deemed this matter unworthy of extra effort. The firewall in question is a pre-existing model with 579 days of continuous operation. Initially running version 2.3.2, it was upgraded to 2.4.4_1 during troubleshooting. The setup includes a Supermicro C2758 server with four network interfaces and PFSense running directly on the hardware.

We attempted to add new VLANs to the firewall’s LAN port, configured interfaces, static IPs, and applied basic allow rules. However, accessing devices in the subnets failed. We verified that VLAN tags were correct on switches and that devices appeared on the expected IPs. Pings worked within subnets but not through the firewall, while the firewall couldn’t reach them. ARP and DHCP functions operated normally, suggesting a firewall rule issue. After resetting the firewall settings and reapplying rules, we still faced problems. The existing VLANs functioned properly, but new ones consistently encountered this obstacle.

Our only option now is to back up, reset, and reinstall—though we lack both budget and time for that. We’re told this situation will persist until the customer decides to upgrade their network, which would require a new firewall. This is especially concerning since PFSense (including NetGate appliances) isn’t approved by Starwood.

We hope this case sparked some laughter and curiosity.

V
Velizar06
Posting Freak
865
03-08-2020, 07:30 AM
#2
Consider disabling and re-enabling it to check its status. It seems DHCP is functioning despite that. Verify if the VLAN interfaces have local IP addresses reachable from the firewall. Test whether devices in other VLANs can reach those new IPs.
V
Velizar06
03-08-2020, 07:30 AM #2

Consider disabling and re-enabling it to check its status. It seems DHCP is functioning despite that. Verify if the VLAN interfaces have local IP addresses reachable from the firewall. Test whether devices in other VLANs can reach those new IPs.

K
Kaasmeneer01
Junior Member
42
03-08-2020, 10:05 AM
#3
Typically, when you set up a new interface—whether VLAN or standard—without adding any firewall rules, DHCP should function correctly. This is just one of PFSense's oddities. Your other inquiries are solid, and I'll check them out today.
K
Kaasmeneer01
03-08-2020, 10:05 AM #3

Typically, when you set up a new interface—whether VLAN or standard—without adding any firewall rules, DHCP should function correctly. This is just one of PFSense's oddities. Your other inquiries are solid, and I'll check them out today.

D
Dr_Apophis
Junior Member
43
03-10-2020, 10:54 AM
#4
Confirming your request. I'm ready to proceed.
D
Dr_Apophis
03-10-2020, 10:54 AM #4

Confirming your request. I'm ready to proceed.

I
iDoNotEvenLift
Posting Freak
936
03-12-2020, 06:37 AM
#5
Your DHCP settings apply to each interface individually, not just the newly created ones. Devices will initially use the default interface before switching to the new VLANs. I can provide a screenshot of the interfaces and their firewall configurations if needed.
I
iDoNotEvenLift
03-12-2020, 06:37 AM #5

Your DHCP settings apply to each interface individually, not just the newly created ones. Devices will initially use the default interface before switching to the new VLANs. I can provide a screenshot of the interfaces and their firewall configurations if needed.

W
Waca_Boy
Junior Member
5
03-12-2020, 12:24 PM
#6
Devices in the updated VLANs receive IP addresses from the correct DHCP server for that VLAN/subnet, not from the original default server. Their MAC addresses appear in the firewall’s ARP table alongside the assigned IPs, with an additional ARP entry for the firewall’s local IP within each VLAN. The firewall also acknowledges ARP requests from clients in the same VLAN. I won’t be taking screenshots, but I’m confident based on my previous posts that I understand how to configure a new VLAN in PFSense. We’ve already removed these new VLANs from the system, so there’s no need to invest further time on this matter—many engineers, including one from a partner using only PFSense, have reviewed it.
W
Waca_Boy
03-12-2020, 12:24 PM #6

Devices in the updated VLANs receive IP addresses from the correct DHCP server for that VLAN/subnet, not from the original default server. Their MAC addresses appear in the firewall’s ARP table alongside the assigned IPs, with an additional ARP entry for the firewall’s local IP within each VLAN. The firewall also acknowledges ARP requests from clients in the same VLAN. I won’t be taking screenshots, but I’m confident based on my previous posts that I understand how to configure a new VLAN in PFSense. We’ve already removed these new VLANs from the system, so there’s no need to invest further time on this matter—many engineers, including one from a partner using only PFSense, have reviewed it.

T
teddybear116
Member
232
03-12-2020, 08:20 PM
#7
They are typically trunks, not access ports.
T
teddybear116
03-12-2020, 08:20 PM #7

They are typically trunks, not access ports.

M
MrEv15425
Member
122
03-12-2020, 09:55 PM
#8
All switches use HP switches, which means there aren’t access or trunk ports. Each new VLAN was set up on the switches first before the firewall. We transferred the configuration of a comparable VLAN to the new one. On the links connecting switches and to PFSense’s LAN, every VLAN is tagged. We’re confident the VLAN settings on the switches are correct since ARP is working properly.
M
MrEv15425
03-12-2020, 09:55 PM #8

All switches use HP switches, which means there aren’t access or trunk ports. Each new VLAN was set up on the switches first before the firewall. We transferred the configuration of a comparable VLAN to the new one. On the links connecting switches and to PFSense’s LAN, every VLAN is tagged. We’re confident the VLAN settings on the switches are correct since ARP is working properly.

R
ReD_T1000
Member
168
03-15-2020, 07:55 PM
#9
Not necessarily. If you can't reach the VLAN interface on the switch from the firewall's VLAN side, there might be a VLAN configuration problem. I'm not very familiar with HP switches, but I understand their tagging setup is unusual—tagging each port individually by VLAN. -Could the two VLAN interfaces communicate? -Would it be possible to ping the firewall's VLAN interface from a device in the same VLAN using Wireshark and see if an ARP reply appears?
R
ReD_T1000
03-15-2020, 07:55 PM #9

Not necessarily. If you can't reach the VLAN interface on the switch from the firewall's VLAN side, there might be a VLAN configuration problem. I'm not very familiar with HP switches, but I understand their tagging setup is unusual—tagging each port individually by VLAN. -Could the two VLAN interfaces communicate? -Would it be possible to ping the firewall's VLAN interface from a device in the same VLAN using Wireshark and see if an ARP reply appears?

S
spidertailsfox
Junior Member
43
03-16-2020, 02:33 AM
#10
We all have significant experience with HP equipment and confirmed the VLAN configurations on the switches were accurate. Regarding the firewall, we understand it has an entry in its ARP table for a MAC address assigned statically (not via DHCP), and similarly, it learns the router’s MAC address. This exchange happens without any additional protocols since it's not an IPv6 network. We also observed this pattern with downstream devices such as a wireless controller. In a new VLAN, two devices other than the firewall can communicate by pinging each other. Pings to or from the firewall in another VLAN stop working. We lack the capability to capture packets from non-firewall endpoints (no remotely accessible client machine), but the described behavior suggests ARP responses are functioning correctly.
S
spidertailsfox
03-16-2020, 02:33 AM #10

We all have significant experience with HP equipment and confirmed the VLAN configurations on the switches were accurate. Regarding the firewall, we understand it has an entry in its ARP table for a MAC address assigned statically (not via DHCP), and similarly, it learns the router’s MAC address. This exchange happens without any additional protocols since it's not an IPv6 network. We also observed this pattern with downstream devices such as a wireless controller. In a new VLAN, two devices other than the firewall can communicate by pinging each other. Pings to or from the firewall in another VLAN stop working. We lack the capability to capture packets from non-firewall endpoints (no remotely accessible client machine), but the described behavior suggests ARP responses are functioning correctly.

Pages (3): 1 2 3 Next