• have I configured the VLAN correctly?

    8
    0 Votes
    8 Posts
    1k Views
    johnpozJ
    @swemattias while I would agree with you on the mini its a bit off. Switches are switches are switch, vlans are vlans are vlans. The vlan is either tagged or it isn't.. When you connect a end user device to a port on a switch is is almost always untagged.. Unless you have gone into the OS of that device and specifically set it to understand a tag.. Almost always a end user device will be untagged on a switch port, with the port in that vlan, and the pvid set on the port that you want the traffic to be in.
  • Sending LAN back over WAN port

    5
    0 Votes
    5 Posts
    830 Views
    C
    @johnpoz Yep, brand new smart switch. Thank you for your time!
  • Daisy Chaining Switches w/ VLAN's

    2
    0 Votes
    2 Posts
    901 Views
    J
    @sledge As long as your switches are managed you would just trunk the uplinks and they'll carry the vlans with no problem.
  • Configuring Netgate W/ Dedicated Switch

    8
    0 Votes
    8 Posts
    1k Views
    C
    @steveits Thanks for the help Steve! Bridge worked :)
  • Another DHCP issue with VMs

    3
    0 Votes
    3 Posts
    583 Views
    D
    I've finally managed to get this fixed, thanks to a kind soul found on the Internet. I basically got schooled(again!) on layer 2 traffic and having an extra pair of eyes go through the firewall config, I found out what the problem was. I was basically trying to shoehorn VLAN traffic through the switch and causing a loop(even with loop prevention turned off). However, this was not affecting my regular traffic which made me continue to troubleshoot and assume that my configuration was correct. Considering my requirement has been that VMs talk to each and gets update over the internet and nothing outside of these VLANs, I added another interface to pfsense(trunk port) and in pfsense, changed the VLANs to be going through the new interface, rather than still pushing it through the physical LAN which I was trying to do. I now get DHCP AND the machines are able to reach out to the internet. Once I added the trunk network interface as an additional NIC, it showed up as a 3rd interface on pfsense which showed as vmx2 [image: 1660456338025-ef00ec88-22ea-4b6e-a5cb-a5cd24c95b2e-image.png] I used the third NIC to pass my VLAN traffic [image: 1660456478092-97e9f5c0-4b2a-4482-8320-999d1e4bbdaf-image-resized.png] Earlier, I had configured VLAN to be going vmx1, by letting the traffic go out through the LAN/Trust interface and then trying to get it back through the same port (since I didn't have another NIC free on ESXi). Now, all my VMs are getting the correct IP address range
  • View bridge MAC table

    3
    0 Votes
    3 Posts
    604 Views
    F
    Well I would have preferred not to go in the « advanced user only » box on my first day but sometimes you gotta run before you can walk: ifconfig bridge0 addr
  • [solved] Bridge not working

    8
    0 Votes
    8 Posts
    1k Views
    Bob.DigB
    @fgervais Thanks! Than my problem is probably related to the Hyper-V vSwitch I was using.
  • Vlan stuck on interface

    2
    0 Votes
    2 Posts
    559 Views
    DerelictD
    @jarhead Are you actually seeing a problem or just a few counters and only when you reboot? Lots of things happen when a system is rebooted and not just on the pfSense side. Assuming you're connected to a switch which also will run through some link up/link down procedures. If I was only seeing a few error counters on reboot and then no further incrementing or problems, I would personally move on to something else. You'll likely need to send screen shots of the interface assignment page and detail exactly what you are doing to attempt to reassign the VLAN to the physical if.
  • Parent Interface Config for VLANs

    10
    0 Votes
    10 Posts
    2k Views
    M
    @martywise have you tried to reconfigure the native lan for the port connected to your pfsense box. You could make the native lan of the switch trunk port different than the rest of the switch so it doesn't pass data other ports having same native vlan
  • Question about LAGG

    8
    0 Votes
    8 Posts
    1k Views
    NogBadTheBadN
    @bigups43 Yes. The big advantage of stackable switches that that you have redundancy as you can run a single LAGG over multiple switches.
  • Pfsense CE maximum network throughput

    2
    0 Votes
    2 Posts
    569 Views
    GertjanG
    @soheil-amiri Max throughput can be reached on a bare bone system. A VM will always add overhead. What has been done with pfSense : see one of the many Youtube videos. I guess it can't up-scale forever, and thats why TNSR was created.
  • No IP on Vlan, J4125 4 port firewall

    9
    0 Votes
    9 Posts
    1k Views
    A
    Now it works, solutions were as you wrote not to use vlan but lan on j4125 firewall. Thanks @bingo600 and the rest of you for the help.
  • Unable to edit/delete VLAN: 504 Gateway Time-out

    6
    0 Votes
    6 Posts
    936 Views
    lindheL
    @rcoleman-netgate As I said, I had not assigned VLAN 128 to any interface, but thanks for the advice. Getting 504 would still be a pretty bugged out way in that case though. The issue is gone for me now. I tried rebooting before posting here, and it didn't help. But now I rebooted again and it seems to have gone away. ¯\_(ツ)_/¯
  • PC On VLAN Can't Talk to PC On LAN?

    4
    0 Votes
    4 Posts
    838 Views
    M
    I've just done a write up about the challenges of debugging these scenarios for reference: https://www.contradodigital.com/2022/07/25/how-to-troubleshoot-ping-icmp-not-working/
  • interface - switches option missing

    4
    0 Votes
    4 Posts
    1k Views
    R
    @mc-amz "switches" only shows up on Netgate hardware that has a switch built in... such as the 1100, 2100, 3100 and 7100 systems. My 7100: [image: 1658705935532-a2df6481-6062-4d6c-9b55-1659260d39ea-image.png]
  • Managed switch not distributing other VLAN addresses

    36
    0 Votes
    36 Posts
    3k Views
    M
    @johnpoz
  • VLAN Interfaces not responding to arp who has traffic

    3
    0 Votes
    3 Posts
    759 Views
    N
    @aidanlw505 said in VLAN Interfaces not responding to arp who has traffic: urrent workaround is just running it on the WAN interface since it doesn't have V Are you on 22.05?
  • Trying to get OPT1 VLAN connecting to the Internet (LAN Works)

    3
    0 Votes
    3 Posts
    478 Views
    M
    @jarhead Omg... Thanks sir should've checked the IP table before.. It's working correctly on the correct subnet now! You made my day sir.
  • Vlan not getting access to internet

    13
    0 Votes
    13 Posts
    4k Views
    T
    @tyler-0 said in Vlan not getting access to internet: @the-other @rcoleman-netgate Thank you both for the responses! I'm a noob when it comes to networking, more of a noob when it comes to firewalls and rules lol. So heres what i've changed and decided I want to accomplish. Ultimately, I would like to do L3 on the switch, but after reading more on different posts, it seemed easiest just to let PFSense do DHCP Instead of the switch. Instead of Vlan 10 being the lan IP, I changed it to vlan 50. Heres ideally what I want to accomplish. This is what I had setup previously with my Cisco ASA. But I ditched the ASA, sort of, it's still in my rack, but I wanted to try PFSense lol. What I had setup before and what I would like to do, just unsure how to achieve it properly. ASA Config - Inside Interface Vlan 50 192.168.50.1 Outside DHCP Switch Config - Switch Port 24 connected to the ASA (inside) tagged with Vlan 50. Vlan 50 IP On the switch was 192.168.50.2. I then had a static route 0.0.0.0 0.0.0.0 192.168.50.1 to the inside interface of the ASA. My Cisco Switch was set to Layer 3 on all Vlans. Management 10, Wired Devices, 5, IoT 6, Guest 7. I've since moved to meraki access points and am letting Meraki do DHCP for the guest network, so really I only need 3 vlan. 10 (mgt) 5 (wired) 6 (IoT). I realized I had it all wrong when I set PFSense to be 192.168.10.10. I don't want PFsense to sit on the mgt Vlan, i feel like that's wrong..? Let me know how I can best and easiest do this. If i need to scratch DHCP via L3 on the switch, I can set it up via PFSense. Would I then still need to put an IP on the vlan on the switch side if I choose for PFSense to do DHCP? I believe we're good now actually. I made PFSense Lan 192.168.50.1, my switch I created vlan 50 and gave it IP 50.2. I then fixed vlan 5 correctly to what was stated, I can now access the internet on the vlan 5 for wired devices. I've got ProxMox itself on vlan 10 for management. The only issue i'm having now is vlans seeing each other. For example my PC is sitting on vlan 5, but unable to ping the gateway 192.168.10.1 for vlan 10, therefore I cannot get to my proxmox server on that Vlan. It's going to take me a bit to tinker with the rules to figure it out. I also don't want my management vlan to have access to the Internet. I assume that's the point of the 'lan net' rule. I plan to create a DMZ Network for my VM's to sit on that need Internet access.
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    7 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.