• SG1100 - OPT port no WAN connection when LAN port device powered off

    4
    0 Votes
    4 Posts
    744 Views
    S

    @priext What does a traceroute out from OPT show?

    The 1100 is one switch with three ports. Very wild guess but the last paragraph of that doc caught my eye: "With both the LAN and OPT switch ports using the same VLAN on the switch (4091), the firewall will receive traffic from either port on its mvneta0.4091 interface, which is assigned as LAN by default." It sounds like LAN is detected as down and that prevents access from OPT.

    What happens if you swap them and put your PC on OPT?

  • new 7100 1U

    7
    0 Votes
    7 Posts
    965 Views
    R

    @publictoiletbowl You can make it whatever you want. I have some VLANs on the LAGG set to dedicated untagged ports on the switch, and some as tagged trunks.

  • VLAN traffic blocked on LAN

    5
    0 Votes
    5 Posts
    1k Views
    T

    @johnpoz Thanks again for your help and input!

    Wanted to give an update:
    I did receive my 16-port Unifi Switch Lite 16, swapped it in and moved some switches around. Doing so, I was able to take out two Ubiquiti Edge Router X's (in VLAN Switch mode) and a simply unmanaged switch. Now the only brand of switch I am using is Unifi switches.

    After taking out the Edgerouters, things started to work as expected. I'm very familiar with the Unifi switches, but a little less so with the Edgerouters. Despite my best attempts to set them up properly with the correct VID's and PVID's for my different VLANS, ports, and trunks downstream from my primary switch, I must have still gotten something wrong and been creating some sort of STP issue.

    As I said, now that I am using only Unifi switches, things are working as expected, so we seem to be all clear! Thanks again for all of your help and input!

  • Assign network value to VLAN

    4
    0 Votes
    4 Posts
    712 Views
    J

    @jarhead appreciate the quick reply. I’ll check that out. Thanks again

  • Problem with VOIP communication between VLANs

    1
    0 Votes
    1 Posts
    307 Views
    No one has replied
  • Proxmox, VMs and VLANs

    4
    0 Votes
    4 Posts
    836 Views
    J

    @creationguy You don't typically untag more than one vlan on a port. While vlan 20 'should' work on that port, the others definitely won't as the device plugged in wouldn't be tagged so all egress traffic would go out on vlan 20 (pvid).

    Just think it through, Trunk ports carry vlans to where you need them.
    Access Ports let you use those vlans.
    Have to assume port 24 goes to pfSense, then just untag the ports as you need them with just the vlan needed.
    If you need to carry the vlans to another device, use a trunk and tag the vlans needed on it, then untag ports that will use each specific vlan.

  • TP-Link VLAN assistance

    10
    0 Votes
    10 Posts
    1k Views
    N

    @jarhead said in TP-Link VLAN assistance:

    @natharas
    Switchports that connect to a device should be untagged.
    Tag the interface in switch one going to pfSense.
    make sure both vlans in pfSense are on the same interface.
    Then tag port one in both switches with both vlans.
    all other ports are untagged.

    pfSense to switch one, tagged with both vlans.
    sw1 port1, tagged with both vlans.
    sw2 port 1, tagged with both vlans.

    All others untagged with appropriate vlans as needed.

    Thank you so much that has work, I really appreciate your advise and taking the time to help me.
    What is the best way to move Proxmox to VLAN 50, it is still on my existing DHCP range of 192.168.1.x? Would it be best to VLAN aware linux bridge VMBR0 or should it be done via Shell?

  • NETGATE 4100 LAN port configuration

    4
    0 Votes
    4 Posts
    2k Views
    A

    @miracullix So just bridge the ports together and give it a try. You can always "undo" what you setup - go in reverse order to tear it all apart.

    Under Interfaces, select the Bridge button. In there, click the Add button. In there add the 2 ports you want together (use the shift key on the keyboard to select multiple ports) and then click the Save button. Keep in mind, the only interfaces you can add to a bridge are "enabled" interfaces. In other words, they have to be active. I think the 4100 comes with all interface ports enabled.

    So, now that you have a bridge added, you have to enable it and set it up. Be careful here, I think you could inadvertently lose your LAN connection and the IP address range you already had on it.

    Long story short, I don't believe you can simply click a couple of buttons and add another available interface to a bridge. There's a little bit of setup, and some pretty good setting tweaks. And, obviously the performance hit. So, that's why it's said to just add a switch to keep it simple.

    Hope that helps...

  • Managed switch question.

    26
    0 Votes
    26 Posts
    2k Views
    R

    @aaronouthier said in Managed switch question.:

    there are 3 routers and an 8-port ethernet switch within a 2 ft. Sq. Area

    Shorter ethernet cables helps in this. I have a bunch of 12" cables for just that reason on my cabinet.

  • Inter VLAN - Can't reach some devices

    3
    0 Votes
    3 Posts
    595 Views
    CreationGuyC

    @jarhead said in Inter VLAN - Can't reach some devices:

    @creationguy So you can access them from the same vlan but not from others. Sounds like a gateway. Do you have the correct gateway set in the cameras?

    I think you nailed it there. While I do have DHCP static set up in pfsense, I manually applied the IP in the camera, leaving the gateway blank, just in case DHCP messed up. I'll add it in and see.

  • DHCP not giving the right IP on 2nd VLAN

    16
    0 Votes
    16 Posts
    2k Views
    E

    @johnpoz Ok I understand now, I didn't get it when reading the tutorial. I feel stupid now, sorry about that.

  • VLANs have no DNS

    14
    0 Votes
    14 Posts
    1k Views
    NogBadTheBadN

    @natethegreat21 I'd be looking on ebay for some Cisco small business switches that support vlans & POE.

  • Proper FW rules for PVLAN

    15
    0 Votes
    15 Posts
    1k Views
    J

    @johnpoz said in Proper FW rules for PVLAN:

    @jt40 said in Proper FW rules for PVLAN:

    if I want to block the traffic from VLAN1 to VLAN2, shall I write a block rule from VLAN1?

    Correct the rule would go on the vlan1 interface, you block traffic before it enters pfsense.. Why would you allow traffic into your house and then stop them from leaving your house.

    Here is an analogy I like... Someone knocks at your front door and says hey can I go to your back yard.. Do you let them into the house and let them walk through your living room with their dirty shoes and then stop them as they try and leave out your backdoor. Or do you just not let them in the front door in the first place ;)

    With this, I'll never forget it :D

    @johnpoz said in Proper FW rules for PVLAN:

    @jt40 said in Proper FW rules for PVLAN:

    I could prove that L2 isolation from Ubiquity works only for certain devices

    No idea what that is suppose to mean, I have unifi AP and had no issues with L2 isolation. So not sure what your doing or asking about.

    Your talking about devices connected to the same SSID/vlan not able to talk to each other? Are they both wireless, is one wireless and other wired?

    Are you trying to stop a wireless client from talking to wired client on the same L2? Or a wired client on the same L2 from talking to the wireless client on that L2.

    Pfsense has zero to do with devices on the same L2 network from talking to each other - there is no way pfsense could do that, unless you setup device A on one side of bridge and client B was on the other side of the bridge.

    I mean that by default, L2 isolation is not behaving in the way I expect, it should block the traffic between the 2 SSIDs I have, but it doesn't completely, some device is able to ping the other one, some not.
    Plus, the same story is between the SSID VLAN and another "wired" VLAN, which comes from the switch, nothing to do with the AP.

    Anyway, I've been testing a lot and I can see that nothing major changed.

    These below are the most remarkable scenarios:

    I create a rule to stop the traffic from one VLAN to all the others.
    How did I do it? I created an alias with the correct IP range of all the VLANs, obviously is much more extensive but it's fine.
    It doesn't work unfortunately, or it's intermittent, it's not the first time that I end up in this situation in Pfsense, not even a system reboot helped. On the fly, I also tried to clear the DHCP leases, reset the filter table, reset the state table etc, no positive result.

    If I enable the rule above only, it goes in that intermittent behaviour, but after it blocks the traffic (almost entirely), there is no way back...
    If I also add up a rule to stop the firewall access from that VLAN, it locks that too.
    It doesn't make much sense this behaviour because the filter rules are reloaded almost on the fly, I could have considered my IP range as an issue if it didn't happen in real time...

    There is one problem here, the gateway IP is in that range obviously, so, technically speaking, it makes sense to be locked out...
    There is one funny thing though, the ping to 8.8.8.8 works :D , and this is the second inconsistency that I find with Pfsense...
    The same ping to the modem/router works, which is out of range in that rule alias, but still, the Gateway IP is the first entry point and it should be blocked, so why it doesn't block everything...
    I mean, how did I reach the modem/router without passing from the default VLAN gateway, which should be blocked...

    Below I list more details:
    VLAN 1
    Gateway IP: 10.70.70.1 (this should be blocked)
    Machine IP: 10.70.70.2
    Modem/router: 192.168.0.1

    VLAN 2
    Gateway IP: 10.70.71.1 (this should be blocked)
    Machine IP: 10.70.71.2
    Modem/router: 192.168.0.1

    The funny story is always the same, if I create a rule to allow the traffic from the VLAN 1 network to ANY, everything works, but I need to block the traffic to the firewall IPs (usually set automatically as every VLAN gateway IP), plus I need to block the traffic to other VLANs.
    NOTE that what you said it's not valid in my box, Pfsense doesn't allow the traffic automatically everywhere, it blocks the traffic but not ping, so I need to create a dedicated rule to allow the traffic.

    I can do the extensive manual test to lock these things one by one, but there is already some weird behaviour, I don't think it will change much...
    I'll also try to act from other VLANs where I have other devices, in this VLAN used for testing, I smell Microsoft issues...

  • LAN + VLAN on same interface

    11
    0 Votes
    11 Posts
    1k Views
    NogBadTheBadN

    @terramoto said in LAN + VLAN on same interface:

    @johnpoz

    The tag, untag would have to be done at each powerline node.

    Nope it would be done off a switch the other side of the powerline device.

    Like this, just imaging the AP hanging off switch-3:-

    image.png

    Ah the powerline devices are doing the Wi-Fi as well, you need access-points.

  • Bridged Ports Are not Acting like a Switch

    12
    0 Votes
    12 Posts
    2k Views
    R

    @lonnie Yeah, that's one of the reasons we don't typically recommend bridges.

  • Bridge forwarding and firewall rules

    2
    0 Votes
    2 Posts
    426 Views
    V

    @fgervais
    Yes firewall rules on the interfaces or on the bridge or NAT rules affect this traffic.

    Also consider the values of the tuneables
    net.link.bridge.pfil_member
    net.link.bridge.pfil_bridge

  • Bridge not getting an ipv6 link-local address

    2
    0 Votes
    2 Posts
    372 Views
    F

    Interfaces/Assignments/Bridges/

    Edit

    IMG_1056.jpeg

  • have I configured the VLAN correctly?

    8
    0 Votes
    8 Posts
    998 Views
    johnpozJ

    @swemattias while I would agree with you on the mini its a bit off.

    Switches are switches are switch, vlans are vlans are vlans.

    The vlan is either tagged or it isn't.. When you connect a end user device to a port on a switch is is almost always untagged.. Unless you have gone into the OS of that device and specifically set it to understand a tag..

    Almost always a end user device will be untagged on a switch port, with the port in that vlan, and the pvid set on the port that you want the traffic to be in.

  • Sending LAN back over WAN port

    5
    0 Votes
    5 Posts
    827 Views
    C

    @johnpoz
    Yep, brand new smart switch.

    Thank you for your time!

  • Daisy Chaining Switches w/ VLAN's

    2
    0 Votes
    2 Posts
    899 Views
    J

    @sledge As long as your switches are managed you would just trunk the uplinks and they'll carry the vlans with no problem.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.