• pfsense Netgear GS308T VLAN help needed

    3
    1 Votes
    3 Posts
    871 Views
    K
    Finally I fixed this issue. It turns out I need to enable VLAN on the NIC in ESXi. After that, everything just works
  • Why don't i have any connection to PfSense interface/internet

    2
    0 Votes
    2 Posts
    200 Views
    CodeNinjaC
    After 3 days of testing and experimenting i found out that one of the cables is not 100%. After putting a new cable between PfSense and the switch everything works with the configuration like described in my question. This means the problem is solved!
  • Trunking between a Cisco switch and Cisco router

    6
    0 Votes
    6 Posts
    1k Views
    L
    Thank you for your answer
  • firewall rule not being applied

    5
    0 Votes
    5 Posts
    563 Views
    M
    Thanks, It was driving me crazy.
  • How to trunk the OPT interface on SG-1100.

    10
    0 Votes
    10 Posts
    2k Views
    DerelictD
    If you do not need 4092 on switchport 1 (OPT) it can be removed. 4090 and 4091 are the untagged VLANs for the WAN and LAN ports. You probably want to leave them alone.
  • SG-3100 & Unifi Switch on Vlan

    4
    0 Votes
    4 Posts
    558 Views
    JKnottJ
    @jerricho1422 Turn it on, on both. 802.1q is the only way you're going to get VLANs working between the 2. Both have to be configured with the same VLANs.
  • WAN not getting IP

    39
    0 Votes
    39 Posts
    4k Views
    DaddyGoD
    Have a nice weekend :-)
  • iperf3: Slower transfer speeds between VLANs vs same VLAN

    30
    0 Votes
    30 Posts
    5k Views
    S
    @JKnott cool, thanks for your insight. I'll experiment when I have some time to bring my network down and set everything up.
  • Netgate SG-4860 Performance

    24
    0 Votes
    24 Posts
    2k Views
    A
    Yeah I guess so too. They are doing a great job and I really like pfSense as a firewall solution.
  • Implementing VLAN

    15
    0 Votes
    15 Posts
    867 Views
    JKnottJ
    @yupq6wlc79ts said in Implementing VLAN: @JKnott said in Implementing VLAN: @yupq6wlc79ts First off, if you're using that Asus router as an AP, make sure you connect to the LAN side, not WAN. However, given you have the other AP, why are you using that one? Yes, that setup is working fine. Asus router is connected to LAN (of course), as well as additional Ubiquiti AP. Using it to cover the WiFi gap areas. Also, proper access points, such as the Ubiquiti, support multiple SSIDs and VLANs. You create VLANs in pfSense and configure matching VLANs in the AP, with SSIDs assigned to the appropriate VLAN. In pfSense, you'll also have to configure the DHCP server on each VLAN, according to the desired address range. You'll also have to configure the routing and firewall rules so that you can reach what you need from the VLANs. So I think I am following you: Create VLANs entries in pfSense as desired (VLAN1, VLAN2, etc.) -> Interfaces - VLANs - Add Yes Configure matching VLANs in the AP -> I can create separate VLANs in the Ubiquiti Portal (https://demo.ui.com/manage/site/default/settings/networks/list) and match it with VLANs? Yes Configure DHCP Server on each VLAN in the pfSense -> Where in pfSense? Under Services > DHCP Server. On that page, each interface, including VLANs should be listed. Routing and Firewall rules -> Firewall - Rules? Yes
  • Can a VLAN interface be assigned as the LAN interface

    8
    0 Votes
    8 Posts
    1k Views
    T
    @dotdash It worked out very well and pfSense is running the network smoothly. Thank you again for your help with this.
  • VLAN setup with more than enough physical network ports

    15
    0 Votes
    15 Posts
    1k Views
    M
    Well, as the main question is pretty much sorted - I will have separate VLANs without tagging on separate interfaces and separate switches - could you help me out on some structuring, please? So that's how it would be: [image: 1587396388870-vlan_07.jpg] Should I just create one more VLAN on my spare LAN port and call it WIFI and move the Unifi AP from the LAN switch to there? And then I can create two or three separate WiFi VLANs on the Unifi controller? Question is if I did that should I rather create those WiFi VLANs on that spare LAN port with tagging?!? Is the Kodi box and the printer okay on crap network? I think I can create a firewall rule to access the printer from the LAN and that's fairly straightforward. But what about the kodi box? If I create a rule for the kodi box to access the file server (and only the fileserver) then is there any way to restrict it to only access the media dataset and nothing else on the FreeNAS box?
  • Question about ssh port forwarding within VLAN

    4
    0 Votes
    4 Posts
    454 Views
    GertjanG
    OMG. Was using 127.0.0.1 so questions like 'What is this Firewall" wouldn't pop up ...
  • Need help setting up VLANs (pfsense router, unifi switch, AP-AC-PRO WAP)

    8
    0 Votes
    8 Posts
    940 Views
    V
    @codybadger said in Need help setting up VLANs (pfsense router, unifi switch, AP-AC-PRO WAP): so would that be a duplicate of my fifth (from top) NAT rule, but for 192.168.55.x instead of 44? I did try that, but it didn't seem to work for me either. This is for outgoing over the WAN. If it should also work when the OpenVPN client is connected (assuming it's the default gateway then) you need an additional rule for OpenVPN like the sixth one. However, it's recommended to assign an interface to the OpenVPN client instance first and add the outbound NAT rule to this specific interface, cause OpenVPN is an interface group which covers all OpenVPN instances you're running, i.e. all clients and all servers.
  • SG-3100 VLAN Help

    1
    0 Votes
    1 Posts
    264 Views
    No one has replied
  • Help with VLANS

    12
    0 Votes
    12 Posts
    1k Views
    A
    @vlan2 I would do it like this: VLAN10 (192.168.10.0/24) - Main LAN with servers, laptops, workstations, and ALL printers VLAN20 (192.168.20.0/24) - VOIP network VLAN30 (192.168.30.0/24) - Guest network I typically use a 2 digit VLAN tag scheme, some switches and other network gear use some of the single digit, like "VLAN1" as management access and cant be changed. That gear really shouldn't be used, but it is what it is. If you make the 3rd octet in your addresses the same number as the tag, it's really easy to spot and identify what's coming and going, and from where, in your firewall logs or GUI screens. If you've got anybody VPN'ing into the network, throw them on a 192.168.40.0/24 network. Then you've got no overlapping of addresses, most likely. Now, with a setup like above, you can set static DHCP leases for all the printers and copiers, easily add them to an alias, then create firewall rules to pass printing traffic to them, across your VLAN's. Jeff
  • Setup VLANs and DHCP not working.

    13
    0 Votes
    13 Posts
    1k Views
    JKnottJ
    @Bob-Dig In that post, I was referring to other than the main LAN to the Internet. However, it would hold for other subnets. The general rule for firewalls is to block by default and then create exceptions for what you need. So, if you find something doesn't work, then firewall rules are a good place to start looking.
  • Trying to setup Guest VLAN but not working

    vlan vlan interface dhcp vlan to lan
    12
    0 Votes
    12 Posts
    3k Views
    JKnottJ
    @CalTommo I don't know how, if you've set up DHCP. It just works. Configuring DHCP on a VLAN is no different than on an Ethernet port. Do you have a computer you can configure for VLAN 80? If so, just plug it into the LAN side of the pfSense box and see what happens.
  • Need advice for my home LAN

    3
    0 Votes
    3 Posts
    388 Views
    S
    You don't bridge VLANs. That would be defeating the purpose of them. Give them their own subnets and let pfSense do the routing and filtering as required. Well, there will be a firewall between the vlans, with block/deny by default, and in that way seperate them. But the real reason why Im talking about bridging vlans, is because it is absolutely essential to have multicast/unicast traverse the vlans. (sonos and alot of iot depends on that protocoll...) But if the community give me good reasons to strongly evade from that idea, I need to come up with something else, like seperate subnets with igmp proxy or pimd, if any of those is known to work.
  • [RESOLVED] pfSense config when using VLAN routing on an L3 switch

    7
    0 Votes
    7 Posts
    886 Views
    S
    @johnpoz sorry for the late reply. I did scroll thru the web and found that you are correct. With that in mind, I will not enable Inter-VLAN routing on my switch. Thank you both for your knowledge and insight.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.