Avatar of dericktrucks
dericktrucks
 asked on

Windows DHCP Server and pfsense RElay

I am trying to setup windows server with dhcp and vlans. I have my scopes setup in my dhcp server and using a pfsense dhcp relay. I am able to get the ip address for the corresponding vlan, how ever it keeps saying "eth0 doesn't have a valid ip configuration". This only happens when it's not my core vlan. On the core vlan i get ip address, able to get internet. But on any other vlans i am not able to. Has anyone had this issue?

Windows OSDHCP* PFSense

Avatar of undefined
Last Comment
Craig Beck

8/22/2022 - Mon
Craig Beck

how ever it keeps saying "eth0 doesn't have a valid ip configuration"
What keeps saying that?
dericktrucks

ASKER
the network card on the clients computer
Craig Beck

Ok, on the DHCP server you only have one IP address, yes? That should be on the core VLAN and using default gateway pointing at pfSense.

Can you post a screenshot of the following from pfSense please?...

  1. An interface for one of the VLANs
  2. DHCP Relay config for one of the VLAN interfaces

All of life is about relationships, and EE has made a viirtual community a real community. It lifts everyone's boat
William Peck
dericktrucks

ASKER
yes on the server i only have one ip address and its on the core vlan (192.168.5.6) and GW is pfsense 192.168.5.3.
Craig Beck

Thanks.

If you give a client on VLAN3 a static IP, can it ping pfSense if you add an ICMP allow rule?
dericktrucks

ASKER
i have a feeling i have a wrong setting: i For the scope setting, the router is suppose to be pointed to the vlan interface correct?

I am able to ping the vlan interface on pfsense (192.168.30.3)
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
David Johnson, CD

how is your network setup?

internet <> pfsense - eth0 <wan>
                    pfsense - eth1 - vlan1 - Server - AD/DNS/DHCP
                    pfsense - eth2 - Switch - to rest of network
dericktrucks

ASKER
internet <> pfsense - eth0 <wan>
                    pfsense - eth1 - vlan1 (core) - Server - AD/DNS/DHCP
                    pfsense - eth2 - Vlan3 - Switch - to rest of network  
Lan and Vlan 3 is connect to the switch and all ports are tagged for core and vlan3
Craig Beck

It looks like you have the scopes configured correctly.

Untick the "Append Circuit ID" box on the relay and see what happens.
This is the best money I have ever spent. I cannot not tell you how many times these folks have saved my bacon. I learn so much from the contributors.
rwheeler23
dericktrucks

ASKER
ok, so I had the vlan 3 scope router pointing to 192.168.5.3 which i switched to 192.168.30.3, now I'm getting "The dns server isnt responding" The dns is pointed to pfsense 192.168.5.3. (When i pointed the dns to the server (192.168.5.6) i couldn't get out to internet because it's not using its own ISP connection and there's a firewall i don't have access to this which was blocking me from getting out to the internet until i pointed it to my pfsense router )
dericktrucks

ASKER
It looks like you have the scopes configured correctly.

Untick the "Append Circuit ID" box on the relay and see what happens.


I did this and nothing would happen.
ASKER CERTIFIED SOLUTION
Craig Beck

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
dericktrucks

ASKER
That worked!
Now for the next part: I'm having a bit of trouble understanding what rules to use/set.
I need vlan 3 to be able to access my core vlan which has AD, printers, file storage.
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
Craig Beck

You need to understand what ports/protocols your clients use to reach the devices in your core VLAN. You can do this by creating a deny all rule on the VLAN3 interface. Enable logging on this rule then try to access resources. Review the logs to see what was attempted, then you can use the EasyRule feature to add particular log entries as rules.