• Strange VLAN icmp thing on hyper-v (only pfsense not replying)

    17
    0 Votes
    17 Posts
    2k Views
    ?

    i just saw this, maybe related?:

    @kiokoman said in Allowing ICMP/Ping From WAN to Machine On LAN for Ptunnel:

    i tested it and it work for me, what machine is it? windows?
    if it's windows maybe you need to do this
    https://forum.netgate.com/post/895254

  • Questions regarding VLANs

    24
    0 Votes
    24 Posts
    1k Views
    S

    Okay so it was actually an issue with the windows PC, its now all working.

    I now have 4 networks:
    LAN 10.0.0.0/24
    IOT 10.0.50.0/24
    PRIV 10.0.60.0/24
    GUEST 10.0.70.0/24

    Its working as intended across ethernet & wifi, and I can configure firewall rules to allow/block traffic between the nets. I've even managed to get mDNS/Apple Airplay from PRIV to IOT network working.

    However, the last remaining issue is with the VPN. I've set up an IPSec VPN a while ago, and while it still works, it lets me only access LAN (10.0.0.0/24), but none of the VLANs. I tried googling for a solution, however nothing I've tried seems to work. I tried adding a second phase 2 with the IOT network, however it does not work.

    This is the VPN config overview:
    alt text

    And in the firewall I have:

    What do I have to do in order to reach 10.0.50.0/24 from a mobile IPSec client?

  • What's the best network setup for a group of devices?

    19
    0 Votes
    19 Posts
    1k Views
    johnpozJ

    What do you mean you can't add them.. .Sure you can.. Post up the screen where you trying to add them, and what errors or whatever that is keeping you from posting them..

    Here.. example
    rules.jpg

  • Separate IPTV from WAN

    2
    0 Votes
    2 Posts
    473 Views
    ?

    i ran into something slightly similar with usg (before moving to pfsense) -

    the ISP had given us one of those combo units, and the TV worked through MoCA (not sure if this is what you mean by IPTV)
    was entirely not compatible with USG (at that time).

    got a dedicated modem, no wifi, usg was still gateway after that for a while (until i started wanting more funtionality that unifi just does not offer)

    to my point, our cable tv would not work after switching to modem only. we ended up having to replace the cable boxes as they entirely relied on MoCA (edit additional - new modem did not have MoCA)

    im guessing you want to add vlan tags to pfsense interfaces to get it to pass-thru in a sense?

    my knowledge on VLAN specifically isn't that high up, but from what I understand, you'd likely want that vlan tagged to be allowed on wan, and also on the port supplying connecting facing your unifi?

    i feel like i missing something, but hope this helps

  • Traffic blocked on bridge interface

    1
    0 Votes
    1 Posts
    101 Views
    No one has replied
  • pfsense vm VLAN Unifi AP - Not getting IP

    1
    0 Votes
    1 Posts
    194 Views
    No one has replied
  • Device not getting IP from DHCP - VLAN miscoonfiguration or what?

    16
    0 Votes
    16 Posts
    2k Views
    johnpozJ

    It's not being used as tag.. Its what you set in esxi to let it know not to strip tags where you set the vlan id in the switch... It just puts it in a special trunk mode.. You don't actually use the tag anywhere else.

  • no DHCP on VLAN

    2
    0 Votes
    2 Posts
    348 Views
    C

    the logs also show dhcp discover and offer (on the correct vlan) but then loops over again and again - it never gets the request or ack.

  • 0 Votes
    3 Posts
    768 Views
    JKnottJ

    @detox

    If I'm reading your description right, you've got only VLAN 10 going to the AP. You need a trunk port that carries all VLANs. Also, I don't see how you could get staff to work on the AP, as you don't seem to have a connection for the native LAN to the AP.

    BTW, some TP-Link switches have problems with VLANs and I believe the fault may allow the native LAN to get through where it's not supposed to. This may be how the staff LAN is getting through.

  • 0 Votes
    23 Posts
    4k Views
    B

    @mohkhalifa said in pfSense on ESXi | Best Practices:

    problem SOLVED after "Disabling hardware checksum offload"

    Awesome. I poked around on a few of mine and didn't find any with that enabled. Mostly Dell hardware here. Good find.

  • tunneling VLAN trunk help needed

    11
    0 Votes
    11 Posts
    985 Views
    JKnottJ

    @jpyeron said in tunneling VLAN trunk help needed:

    I remember the all the different gateways. Thats cool, sounds like you got in to things a bit before me.

    Yep, I was working with LANs before there was such a thing as Ethernet. I worked on a Time Division Multiplexing network in a Rockwell Collins 8500C computer system, that was part of the Air Canada reservation system. This was late '70s - mid '80s. The various devices, such as tape drives and disk drives connected to the CPU over a tri-axial cable at 8 Mb/s. This system was the communications front end for the Univac computers at the heart of the system.

  • Help for interconnecting firewall and multiple switches

    2
    0 Votes
    2 Posts
    340 Views
    R

    Update:
    I have decided to use LAGG to distribute traffic from the XG to the first switch, HPE 1920S-48G.

    Would it be recommended to continue using LAGG from the HPE 1920 to my second switch, HPE OfficeConnect 1820 24G? Can I simply tag a port with VLANs needed for switch two? Bandwidth needs are minimal for the VLANs dedicated on this second switch.

    Thanks.

  • VLAN question for noob moving from Cisco ASA

    21
    0 Votes
    21 Posts
    4k Views
    GrimetonG

    @xyzzyz said in VLAN question for noob moving from Cisco ASA:

    My question: On my pfSense replacement for the ASA, is there any advantage to setting up a VLAN for the WAN port?

    No.

  • [Solved] One-way traffic?

    7
    0 Votes
    7 Posts
    1k Views
    M

    It was just the rules that were wrong - all sorted now.

    Thanks everyone for the quick responses!

  • Setting up VLAN with Quad NIC & Netgear GSS116E

    5
    0 Votes
    5 Posts
    1k Views
    NogBadTheBadN

    Trunk your VLANs on a single pfSense interface.

    The Netgear docs suck big time.

    https://community.netgear.com/t5/Smart-Plus-Click-Switches/Port-trunking-on-GSS108E/td-p/1353948

  • pfsense 2.4.4 multiple LAN segments

    6
    0 Votes
    6 Posts
    1k Views
    Y

    @dotdash Thank you Sir,

    So, the routes went in nicely, but didn't work.
    The issue I ran into was in Firewall Rules, for what ever reason, I saw the LAN net and LAN address, but missed completely network, which would allow me to define a segment and allow it access to the firewall's LAN.

    So then I could create a rule for 192.168.212.0 / 24 to any, one for tcp/upd and one for icmp, once I could ping, all the apps on that segment were able to function properly. Did the same for 192.168.39.0/24 and 192.168.14.0/24. All working now,

    Thank you for your time and information.

    Jon

  • [SOLVED] Setup guest wifi on my DD-WRT WAP with pfSense

    7
    0 Votes
    7 Posts
    1k Views
    S

    @kevdog Lol yes that is my conclusion. Made things a lot easier. Trying to set it up in DD-WRT was a bit convoluted. Following the tutorial in my OP was perfect, except I changed up the way I connected the main wifi and the guest wifi to my switch.

  • Replacing VLAN switch in router on a stick configuration

    23
    0 Votes
    23 Posts
    2k Views
    K

    @airlab

    Yikes -- like a I said I've only had mine for 6 months. I'm hopeful that in another year and a half this doesn't happen to me -- or maybe I just won't apply firmware updates.

  • Seperate VLAN for VoIP and Data?

    3
    0 Votes
    3 Posts
    1k Views
    I

    HIPAA only requires that you make reasonable accommodations for security. This may not be a requirement to separate traffic, but I would recommend you do so anyway as this isn't something that end users would see. This can also help or hurt future troubleshooting depending on the issue.

    Personally, I'd separate the traffic.

  • SG-1100: extend the OPT1 network out the LAN port as a tagged VLAN

    1
    0 Votes
    1 Posts
    249 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.