• How do I allow pfSense to access WAN subnet?

    5
    0 Votes
    5 Posts
    373 Views
    N

    @viragomann

    Thanks.. I followed the following and it made sense to me.
    Other than what's in the link I also allowed ANY/ANY access on private network interface
    https://yhf8377.medium.com/replace-aws-nat-gateway-with-pfsense-vm-5454066585c2

    all works

  • Impossible to reach gateway using VLAN

    4
    0 Votes
    4 Posts
    449 Views
    johnpozJ

    @Dave07186 if you want to use vlans in your VM setup, you wouldn't actually set the tag on the virtual interface - you would set it up in the virtual switch or port group on the vswitch etc. I have not played with virtualbox in a really long time, but end devices almost never have need for actually doing the tag themselves.

    I have to assume virtual box has a way to allow VMs to be on a vlan..

  • No Internet on Vlan - pfSense Router with UniFi Switch and AP

    2
    0 Votes
    2 Posts
    199 Views
    No one has replied
  • Improving LAN Speed with 1 Gbps and 2.5 Gbps LAN Connections

    1
    0 Votes
    1 Posts
    181 Views
    No one has replied
  • How do I allow pfSense to access WAN subnet?

    1
    0 Votes
    1 Posts
    127 Views
    No one has replied
  • pfSense port Aggregation onto Unifi 24port (1Gb) / port

    1
    0 Votes
    1 Posts
    177 Views
    No one has replied
  • LAGG/LACP tunable on 2.7 version

    2
    0 Votes
    2 Posts
    215 Views
    empbillyE

    Any idea?

  • Wifi/VLans/Unifi

    2
    0 Votes
    2 Posts
    1k Views
    dotdashD

    @cnanoharman
    I can't tell what you did and what you pasted from some random wiki.
    Here's a rough workflow of adding a couple of new networks for wireless and guest on Unifi/pfSense.
    I used vlan 100 for the wireless network, and vlan 200 for the guest in this example. The LAN is assumed to be native. I used foo0 for the network adapter, which isn't a real thing. Substitute igb0, or your lagg, or whatever. I didn't go into details on configuring the interfaces, rules and such. I'm assuming you know how to do that.

    Unifi controller-
    settings, networks
    create new (type vlan only/third party gateway)
    name wireless
    vlan id 100

    create new
    name guest
    vlan id 200

    settings, wifi
    name corpssid, password, etc
    network- wireless (old version vlan 100)

    name guestssid, password, etc
    network- guest (old version vlan 200)

    You can leave the switchports the APs are in set to 'All'
    The port connecting to pfSense should be set to 'All'

    pfSense-
    interfaces, assignments, vlans, add
    select parent interface (usually LAN)
    vlan tag 100
    description wireless
    save
    add
    select parent interface (usually LAN)
    vlan tag 200
    description guest
    save

    back to interface assignments-
    Available network ports: vlan 100 on foo0 (wireless) [add]
    do the same for vlan 200 (guest)

    Now, interfaces, OPTx (foo0.100)
    configure interface with unique subnet, etc

    Now, interfaces, OPTy (foo0.200)
    configure interface with unique subnet, etc

    services, dhcp, enable and configure on OPTx and OPTy

    firewall, rules, configure rules for the two new interfaces

    firewall, nat, outbound. If you're not using automatic outbound nat, add rules for the new subnets

  • Switch+routing is impossible, except in netgate?

    9
    0 Votes
    9 Posts
    540 Views
    T

    @johnpoz
    I'm not in this forum to argue choices. My opinion why I started my question: home labs and networking should be fun and exiting. Not hindered by opinions but learned through experimenting based on knowledge and curiosity. IT constantly changes, what was impossible yesterday is the standard of today.

    And I understand that one can get tired of all those fools that are trying to find solutions to experiment with. But I didn't ask for my use case to be solved, just to explore ways that would work and could create more fun.

    So yes, I would like to experiment with my idea and find out where I'm wrong. I would like to play around. And I would like to do that with curious people who also love making fun with networking. Why would I otherwise get pfsense, could have gone for refurbished cisco as well (but that is less fun).
    And a good starting point to me is: join the community and build a group of people that share the curiosity and perhaps are steps ahead.

    Does that make sense or should I explain myself better?

  • Transparent Firewall not passing traffic

    3
    1 Votes
    3 Posts
    256 Views
    M

    I figured it out.

    My any any * * ipv4 rule did not include icmp so my pings (which I was using to determine if traffic was flowing) were being blocked.

    Now I know IPv4 * does not include IPV4 ICMP

  • Static IP issues

    18
    0 Votes
    18 Posts
    1k Views
    P

    @rcoleman-netgate

    Finally got a chance to play around a little more and its working as it should so all I can assume is that Im an idiot and after looking at the screen so long the other day I was misstyping and couldnt see it.

    4 devices all set with their static IP's on the Home VLAN.
    They can ping between each other, can ping 8.8.8.8 and can ping www.google.com

    Next time I get a chance to play around, I'll start trying t set up some better (more secure) firewall rules and other general security tweaks.

  • Vlan and Dell Switch X1052

    2
    0 Votes
    2 Posts
    1k Views
    B

    Edit3: Finally the things have worked. What I did based on @jasonlitka post on another thread. I open up the cli to check the running config file on the ports 3 and 36. I have cleaned all the configurations on each port. So the configurations are below:

    Switch01 Core(config)#do show running-config interface GigabitEthernet1/0/03 interface gigabitethernet1/0/3 description "Live Esquerda" switchport access vlan 10 ! Switch01 Core(config)#do show running-config interface GigabitEthernet1/0/36 interface gigabitethernet1/0/36 switchport mode general switchport general allowed vlan add 10 tagged switchport general allowed vlan add 1 untagged !

    And bang! Machine is addressed and working.

  • Netgate 2100 & Router on a stick configuration / VLAN Gests

    1
    0 Votes
    1 Posts
    180 Views
    No one has replied
  • How Netgate 6100s handle VLANs & "Default VLAN"

    2
    0 Votes
    2 Posts
    369 Views
    R

    @vlandrummer said in How Netgate 6100s handle VLANs & "Default VLAN":

    Do the discrete LAN ports on the 6100 act as a trunk port would on a switch?

    The ports on the 6100 are no different than any other ethernet device -- they work on the vlan you assign to it. Not having a VLAN tagged on the interface means it's "native".

    368af759-9814-4fdf-a196-1a328dd275c1-image.png

    CORE is native.

    The others are tagged on LAGG1. Substitute igc0-3 for your interface ports on the 6100.

  • Shared Firewall for Voip Service

    10
    0 Votes
    10 Posts
    875 Views
    M

    @halter_joel
    Once you are connected physically, assign a /30 network to the link.
    So for example you will be 10.1.1.1/30 and they will be 10.1.1.2/30

    Once you got that transit in place, create your static route. They will need one for you as well.
    After that apply firewall rules on that new interface/transit link and thats it.

  • 0 Votes
    2 Posts
    181 Views
    N8LBVN

    It works just fine.
    I spent 4 hours scratching my head and troubleshooting almost everything technical about this and not seeing the VLAN tagging packets coming from What I thought was the otehr end of a cable on the LAN interface.
    This because I was trusting which very obvious and only cable of its color was feeding the uplink port on the main switch.
    I even drove a couple hours and back to go grab another server (different hardware) that I knew was working.
    Just as I went to rack and connect the different server, I could see that we had been on the wrong cable all along SMH.
    Heat and dehydration were factors and just trying stuff trying to figure it out totally trusting the information I was given about the cable feeding the switch.
    Which is usually a solid accurate and trusted source on a normal day :)
    Sorry for the false alarm.
    I really need to kick myself harder this time.
    No excuse for this crap. I'm usually better than that.

  • DNS settings for Vlan

    12
    0 Votes
    12 Posts
    3k Views
    johnpozJ

    @tigerT well I checked what happens when you don't have a specific host override set for one pfsense vlan interfaces..

    > server 192.168.3.253 Default Server: [192.168.3.253] Address: 192.168.3.253

    Which makes sense when you think about it. I prob going to start changing my stuff to reflect new home.arpa domain.

    > server 192.168.3.253 Default Server: sg4860.dmz.home.arpa Address: 192.168.3.253
  • pfsense to usg unable to ping lan devices

    6
    0 Votes
    6 Posts
    689 Views
    eliteharbinger42E

    Hi,

    I have had another look at this but am getting nowhere, probably my lack of knowledge.

    Did find this post which seems similar and have tried to follow the suggested resolution but dont think I have got that right:

    https://forum.netgate.com/topic/152523/pfsense-and-ubiquiti-usg-working-together

    The suggested resolution was:

    ***stephenw10 Netgate Administrator
    Aug 11, 2020, 1:13 AM

    You don't. You need a route from pfSense to the USG LAN. Otherwise pfSense has no idea how to reach it and traffic that it gets for a client in the USG LAN will not be routed correctly. If you don't have a statuc route back to the USG LAN the NAT allows it work by translating all the traffic to the USG WAN address which pfSense does know how to reach.

    1x NAT is better so add the static route to pfSense. Disable NAT on the USG.

    Steve

    stephenw10 Netgate Administrator
    Aug 11, 2020, 1:41 AM

    The static route has to be on pfSense itself. You have to add a static route via a gateway so first go to System > Routing > Gateways and add a new gateway.

    Set the USG WAN IP as a gateway and on the pfSense LAN interface which will be in the same subnet.
    Now go to the static routes tab. Add a new static route to the USG LAN subnet via the new gateway you just added.

    With that in place pfSense can reach the clients without the USG having to NAT.

    Steve***

    So the IP's I have are:
    pfSense 192.168.2.1
    USG WAN from pfSense 192.168.2.10
    USG LAN 192.168.1.1 Providing DHCP to LAN Clients

    This is what I have tried:
    Screenshot 2023-08-03 161807.png

    Screenshot 2023-08-03 161933.png

    Screenshot 2023-08-03 162031.png

    Any help wpuld be really appreciated.

  • Guest VLAN with Unifi

    4
    0 Votes
    4 Posts
    329 Views
    Austin 0A

    @orangehand Without more info the best I can do is suggest that you watch this video. https://youtu.be/WMyz7SVlrgc

    I followed this to setup VLANs on my pfsense and unifi equipment. Note that is you have a SG-1100 or SG-2100 there are extra steps.

  • Is it possible to log all ARP events?

    2
    0 Votes
    2 Posts
    158 Views
    S

    After some research, I found out about arpwatch.

    Sorry.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.