• Server gets DHCP IP not from the VLAN it should

    2
    0 Votes
    2 Posts
    249 Views
    L
    Update: This may not be a misconfiguration on pfSense side. I connected the isolated server directly to the pfSense port and created a VLAN2 on the server. It successfully got IP from VLAN2 DHCP server. So maybe the problem is how I configured the managed switch? Completely no clue Update 2: Solved! I forgot to set the PVID. It should match the VLAN ID on the port. Explained by ChatGPT: When a frame comes into a port without a VLAN tag, the switch needs to know what VLAN that traffic should belong to. The PVID is the mechanism that does this. When the switch receives untagged traffic on a port, it assumes that the traffic belongs to the VLAN specified by the PVID for that port.
  • Camera not detected by BI on VLAN

    7
    0 Votes
    7 Posts
    549 Views
    C
    @Jarhead that would be my next step. For now, I moved that one camera to VLAN1 and it's working. I think I'll worry about it down the road.
  • No DHCP on pfSense VLAN with Cisco Smart Switch

    147
    0 Votes
    147 Posts
    112k Views
    M
    @Cannondale Yeah, you're right the other one is an ET card. It adds support for SR-IOV and IPSec offload over VT card.
  • Pfsense 3100 and multiple ddwrt access points

    vlan guest wifi
    2
    0 Votes
    2 Posts
    223 Views
    JKnottJ
    @Tommyboy You will have to use a VLAN for the guest WiFi. You set up a VLAN on pfSense, but I can't help with the ddwrt, as I've never used it. Here are my rules, which allow access only to the Internet and pinging the VLAN interface. [image: 1685449274252-b281058e-8165-4a58-bb40-a1d7d6b92c58-image.png]
  • Suddenly Loss Routing Between L2 Segements

    6
    0 Votes
    6 Posts
    822 Views
    C
    @jlw52761 I solved my problem. I had my L3 switch gateway defined with lower case letters. I blew away my static maps, deleted the gateway and set it all up using all upper case letters. I set my default gateway on the WAN interface. It all works now. I have turned off IPv6 on the WAN gateway. I am now on 23.05.
  • vLan for IoT stuff(s) - no DHCP

    2
    0 Votes
    2 Posts
    420 Views
    S
    @SkippyTheMagnificent My apologies... disregard this entire thread... I'm such a dumbass!!! I had a typo in my PSK that was preventing anything from associating with the APs!
  • 0 Votes
    1 Posts
    252 Views
    No one has replied
  • Unifi AP-AC lite clients getting wrong VLAN IP

    12
    0 Votes
    12 Posts
    2k Views
    RobbieTTR
    @johanl79 Ok, you have a UniFi set-up issue and we probably should have had this conversation on their forum. UniFi has no issues running with pfSense and some make this their default business model (see Tom Lawrence as an example). What you originally enquired about was your VLANs, something easily managed with pfSense and your UniFi equipment. It's taken a while to even understand your equipment and network topology but I think we all understand that now. You have set your mind on purchasing different equipment rather than adjusting your current settings on your new VM-based controller in order to fix your original stated issue. ️
  • Access Point doesn't like to be managed from outside subnet/VLAN

    9
    0 Votes
    9 Posts
    705 Views
    GPinzoneG
    @johnpoz Yes. it's in AP mode. That option shuts off a lot of the typical router functions and requires the pfsense DHCP server to give it an IP. I think the device has some kind of hardcoded security "feature" or the web server code is just buggy. Knowing Netgear, it's probably the latter, but it could be some kind of ham-handed way to add some friction to hackers or nosy users. I have no idea. It's not a routing issue since the problem is only with the web-based administrator interface. I can telnet and ping the device without the NAT translation.
  • What should I do?

    7
    0 Votes
    7 Posts
    593 Views
    johnpozJ
    @sysadminfromhell yeah - the only time pfsense needs to know about a "vlan" if it needs to understand tagging. if you just setup native networks on your interfaces.. You can isolate them on your switch by just putting them in different vlans on the switch. To pfsense its no different than if the ports were connected to 2 different physical switches. Your just creating 2 "virtual" switches by putting specific ports into different vlans on the switch. This is the whole point of vlan capable switch.. Traffic being tagged is only used when you need to carry more than 1 vlan over the same physical wire. The tag allows either the router or AP or other switch to know this traffic is network X, this other traffic is network Y.. If you don't plan on running more than one "vlan" over the same physical wire you can still put different ports on your switch into different "vlans" and isolate them from other vlans on the switch, etc.
  • 0 Votes
    5 Posts
    880 Views
    U
    If it'll help, some further details about my setup, everything is connected by Unifi switches that are vlan capable, but not all of the ports are specifically configured to be on a vlan. I've been doing fping tests just to see what can be seen through a few different systems, and below is my findings. From a system that is connected to a port designated with vlan 3220 [10.32.2.0 network]: uquevedo@ubence-air-wired ~ % fping -ga 10.32.40.1 10.32.40.254 10.32.40.1 10.32.40.10 From the VM itself that is configured with the bridge interface to vlan 3240: uquevedo@kea-testing:~$ fping -qga 10.32.40.1 10.32.40.254 10.32.40.1 10.32.40.10 From a system that is connected to a port designated with vlan 3230 [10.32.3.0 network]: [uquevedo@fedora-system ~]$ fping -ga 10.32.40.1 10.32.40.254 10.32.40.1 10.32.40.10 From the actual RHEL9.2 host system, which of course can ping the IP address: [uquevedo@rh-vm01 ~]$ fping -ga 10.32.40.1 10.32.40.254 10.32.40.1 10.32.40.9 10.32.40.10 There are many bridged interfaces on the host system connecting to various vlan tagged interfaces: [image: 1684333278736-screenshot-2023-05-17-at-7.13.36-am.png] The bridge0 interface is a non-vlan tagged interface [vlan1?] and is accessible to all systems on the network. I was under the assumption that if a network interface was tagged with vlan information that it would be accessible to other systems that are part of that same vlan? Another thing about my setup is that these vlans are configured on a pfSense box for lab purposes, they are not configured on my main pfSense box [which I don't think matters]. So even though the opt ports of this system are technically on their own network, they are connecting to my main network.
  • Bridging 4095

    2
    0 Votes
    2 Posts
    219 Views
    JKnottJ
    @senseivita You're not supposed to use 4095. It's reserved.
  • cheeky ACL for IPv6 multi-cast DNS help request

    3
    0 Votes
    3 Posts
    501 Views
    4
    @jknott i don't need to replace the tplinks. i can simply put an ipv6 ACL on the ports of the netgear that connect to it and my purpose is solved. My trouble is, i don't know what i need to put in the config screen i posted
  • Private LAN setup with Server NICs

    6
    0 Votes
    6 Posts
    960 Views
    ipeetablesI
    @tonydutt you're welcome!
  • Troubles with qinq

    1
    0 Votes
    1 Posts
    191 Views
    No one has replied
  • LACP trunking Vlans constantly increased I/O errors

    2
    0 Votes
    2 Posts
    370 Views
    B
    +++ missing details: laggash on lacp vs tp link swicht (errored interface) is l2 laggash on lacp vs edgerouter is l3+l4
  • Mikrotik Hotspot and Vlan

    6
    0 Votes
    6 Posts
    968 Views
    V
    @kanuns With the example configuration I gave above, pfSense can only get an IP in one of the VLANs. However, as of your description of the purpose it I'm wondering if you really need the VLANs to terminate on the Mikrotik. If not you can remove them from there and configure a simply transit network between the Mikrotik and pfSense. This could be tagged or not. Then route the VLANs to the pfSense IP. On pfSense you can configure the VLANs on the NIC for the AP. I think, this setup is easier and more reliable.
  • Installed intel 520 10g sfp+ card but no internet

    2
    0 Votes
    2 Posts
    279 Views
    B
    Are you positive the modules you're using in the X520 are coded for Intel part numbers? Most X520 cards will not pass traffic unless your optics are Intel coded. You might get link lights, but the driver won't bring the port online.
  • Virtual IP on QinQ interface

    2
    0 Votes
    2 Posts
    242 Views
    Z
    Did a bit more testing. Setup facing switch (qfx5100) to push/pop the stag so I could setup only one tag since it' worked on another interface. Unfortunately it doesn't work in this scenario either. The difference here is I see arp requests from pfsense on a tcpdump of the interface, nothing comes back from the far end. Primary interface ip works fine and BGP is up. Unsure of what to test next.
  • VLAN 1 Best Practices?

    13
    1 Votes
    13 Posts
    6k Views
    johnpozJ
    @uplink PVST+ and RPVST+ which are cisco and can be tagged.. A native vlan is any untagged vlan, not just vlan 1. From one of the cert exam books for cisco "Although maintenance protocols such as Cisco Discovery Protocol (CDP), Port Aggregation Protocol (PAgP), and Dynamic Trunking Protocol (DTP) normally are carried over the native VLAN of a trunk, they will not be affected if the native VLAN is removed or manually pruned from the trunk. They still will be sent and received on the native VLAN as a special case even if the native VLAN ID is not in the list of allowed VLANs." Any untagged frame is native.. If you want to take something away from that it should be this. " It is generally the best practice to keep that internal traffic isolated from data traffic." So put your switches and AP management on a vlan not used for normal user traffic.. This is sometimes called an infrastructure vlan. But then again you have to work with the functionality of your infrastructure devices.. But even if your devices have to be managed with untagged - you don't have to use that vlan for user traffic.. So yes it best to isolate management of your network from user traffic ;) But here is the thing - you can not really disable untagged traffic like that from being sent, you can keep it from being passed on, etc.. Here I have a dummy vlan 10, the vlan is disabled - it doesn't go anywhere.. I set the native vlan, because you can not really remove it from a port, cisco doesn't let you.. If you remove native vlan from a trunk in cisco it will just send it out what default vlan you have set on the switch.. which will be "untagged" [image: 1682573143457-sniff.jpg] that is sniff on pfsense on a port connected to switch interface that is in trunk, where native is set to a disabled vlan, notice still see stp and cdp traffic on this port.. If your worried about someone plugging into a port, again the best thing to do is disable and put into a vlan not using, like my vlan 10, But if the port is active and you have cdp or stp enabled - there will be that traffic on that port untagged.. Your causing yourself added config and and work for no real good reason.. And again any port connected to a device is going to be native, ie untagged in some vlan be it the default vlan 1, or some other vlan you put that port in. Even if you told all your devices to do tags, iot devices, printers etc are unlikely to be able to do that, etc. And even if you setup a port to only be tagged, info like stp and cdp is still going to go out that port.. depending on your switch, you may be able to disable stp on specific ports, or stuff like cdp or lldp (non cisco kind of cdp).. But most lower end smart switches are not going to be able to do that, etc.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.