• 0 Votes
    6 Posts
    461 Views
    johnpozJ

    @fhegedus said in What is the best approach to have the same iprange on different interfaces including LAGG:

    why it needs to have legs in every vlan

    Defeats the whole purpose segmentation to be honest.. Why do you think it needs a leg in every network? If your going to put devices in all networks - just run 1 flat network.

  • link aggregate to fortigate HA Pair

    1
    0 Votes
    1 Posts
    131 Views
    No one has replied
  • ping is working over vlan after deny rule

    8
    0 Votes
    8 Posts
    403 Views
    H

    @oren1031 might be good to show screenshots of 'everything'

  • Assist with setting up Pfsense VLAN with TPlink manage swtich

    3
    0 Votes
    3 Posts
    313 Views
    O

    on the switch you also need to tag port 3 and also tag it to 3 on 802.1Q VLAN PVID Setting

  • Need help to configure pfsense + Cisco switch + vlans

    24
    0 Votes
    24 Posts
    2k Views
    D

    @johnpoz said in Need help to configure pfsense + Cisco switch + vlans:

    @dvb for one you have the pvid on port 8 as 1, that should be 10.. Or no nothing is ever going to work.. laptop sends traffic and port puts it on vlan 1..

    Also your firewall rules - you don't need that rule from address to net.. Rules are only evaluated as traffic enters the internet from the network..

    I tried one untagged vlan per port, all is working perfect :

    text alternatif

    Thank you very much for your support and advice !

  • LAGG With PfSense Dev 2.7 Fan Via 2x Intel i225/i226 2.5G Lan Connections

    1
    0 Votes
    1 Posts
    158 Views
    No one has replied
  • 0 Votes
    1 Posts
    190 Views
    No one has replied
  • Multiple PPPoE WAN over vlans

    5
    0 Votes
    5 Posts
    590 Views
    M

    @viragomann said in Multiple PPPoE WAN over vlans:

    ly get equal IPs on both, this will never work, even not on

    pfsense.PNG

  • How should I understand about switch port5? What is port#5?

    7
    0 Votes
    7 Posts
    958 Views
    E

    @rcoleman-netgate Thank you very much. I realized that all I need to do is adding a LAN (in my case, LAN port#1) and uplink port (LAN port#5) to have a correct VLAN (VLAN4052). All my LAN ports are able to communicate with PC-A.

  • IoT - Thermastat communication

    7
    0 Votes
    7 Posts
    651 Views
    DigiguyD

    @johnpoz Kinda what I was thinking in regards to the dumb switch and the age of the wifi. Didn't break the bank ($7) so I could play around with it or just throw it away even. Again I appreciate the advice/suggestions!

  • PFSENSE Cluster add new vlan on existing used physical interface

    6
    0 Votes
    6 Posts
    598 Views
    P

    @jknott said in PFSENSE Cluster add new vlan on existing used physical interface:

    I wouldn't expect an outage to be very long, if at all. Of course, you also have to configure the switches to pass the VLANs. You might want to schedule a maintenance window to do this, or at least let the users know. Of course, TCP is designed to survive brief interruptions.

    Hello ok thank you for your answer @JKnott. Yes of course, we have already configure the switches to pass the vlans. To understand steps please, if we add new vlan on existing used network card on pfsense master, primary pfsense switch automatically from master to backup and secondary pfsense switch automatically from backup to master ? would there be a micro network cut during the time of the switchover ?

    Thank you very much for your time

  • Disable filtering on LAN bridge

    1
    0 Votes
    1 Posts
    251 Views
    No one has replied
  • Cant access Site-to-Site network from VLAN

    3
    0 Votes
    3 Posts
    281 Views
    Z

    Thanks! You where right on both problems! I was pulling my hair out :)

  • VLAN cannot access private network behind another router

    3
    0 Votes
    3 Posts
    325 Views
    johnpozJ

    @sho1sho1sho1 said in VLAN cannot access private network behind another router:

    -router WAN IP is 192.168.20.11 dynamically assigned by pfsense VLAN 20 dhcp server
    -router LAN IP is 10.0.0.1

    So if your wan of pfsense is rfc1918 this 192.168.20 address. And you want to get to 10.0.0.x on pfsense lan, if pfsense is doing nat.. Yes you would have to setup a port forward.

    Also you would have to disable the block rfc1918 rule on pfsense wan. This rule blocks source IPs of rfc1918, which I would assume your client your trying to ssh to this 10.box is on..

  • VLAN computer not pulling correct ip address

    11
    0 Votes
    11 Posts
    2k Views
    T

    @johnpoz said in VLAN computer not pulling correct ip address:

    @thewaterbug not sure what to tell you - but its not possible.. You have no layer 2 connection to the dhcp server running on lan - so there is no way it could of pulled an IP from that dhcp server.

    And your saying it never had a 0.138 address... I just don't see how it was possible without a layer 2 connection. Your saying you saw in the logs dhcp? Is that not a different physical interface? You show it on the drawing as a different interface - you don't have them bridged? Its not a vlan, where maybe the switch didn't tag something?

    Ah, shoot. I didn't think to check the logs on the DHCP server, and now it's been over-written.

    I saw it on the client.

    Correct, it was on a different physical interface (OPT1), with no bridging in place, and the problem fixed itself just by my power-cycling the unmanaged switch.

    I don't know what to say, either, other than that stranger things have happened.

  • ixl - VLAN tagging does not work

    1
    0 Votes
    1 Posts
    320 Views
    No one has replied
  • VLANS and Ports

    3
    0 Votes
    3 Posts
    538 Views
    R

    @jasonreg said in VLANS and Ports:

    I would like to set up the 10GB ports to feed my switches on ix0 (Needs all VLANs) and ix1 (only needs a single VLAN) respectively. My question is, do I need to add the VLAN interfaces to those ports as well assuming I am using them as trunk ports or does it all feed through the LAN interface?

    If the VLAN is controlled by pfSense and it has to pass the port it must be tagged on the interface it is going out. And your destination switch must be trunked or otherwise configured to handle each tagged VLAN -- note that the term "trunk" is one to limited platforms, most notably Cisco. Most other platforms just deal with tagged and untagged VLANs by name.

  • VLAN on Cisco SG 200+ PFsense

    5
    0 Votes
    5 Posts
    577 Views
    johnpozJ

    @harjpanesar great, glad you got it sorted..

  • Access the same VLAN on two physical interfaces?

    10
    0 Votes
    10 Posts
    1k Views
    NightlySharkN

    @jblackburn A bridge is a medium that allows two different types of networking protocols to communicate (ether and virtual, WiFi ether switch and router... etc) at the layer 2 level.

    The intended use of a bridge is:

    Physical iface (Ether, WiFi, DSL...) <-> 2.Specific VLAN tag traffic iface (on the physical NIC) <-> 3. Switch <-> 4.Bridge <-> 5. Other iface

    A switch is different in that it is an actual electronic switching circuit. A bridge doesn't switch anything by itself, it needs software to forward packets.

  • Best practice for controlling VLAN traffic?

    7
    0 Votes
    7 Posts
    458 Views
    J

    @viragomann Got it, thank you very much for your help.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.