Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bridged Ports Are not Acting like a Switch

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    12 Posts 4 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      Lonnie
      last edited by Lonnie

      On a Netgate 6100, I've bridged the two physical ports that would normally be LAN3 and LAN4.

      Basically, I'm wanting those two ports to act like a 2 port switch, but its not acting that way.

      I can access all devices downstream from both of these bridged ports, and all devices downstream from both ports have static IP addresses that are on the same subnet.

      The issue is that no devices on one of the bridged-ports can talk to any of the devices on the other bridged-port. I can access everything from another LAN, and public services can be accessed via port-forwards going to devices downstream from both ports.

      However, (from any device downstream of one of these bridged-ports) I cannot even ping devices on the same subnet if they're down stream from the opposite port of the bridge.

      Apparently there is more to bridging than I know. I thought that after I bridged the two ports together, that they'd basically act like one logical port, and that all device could be plugged into either of those ports and communicate with each other on this single subnet.

      I've written firewall rules on the bridge interface that are very permissive, telling the interface that any device on the subnet can talk to any other device on that same subnet (yet typically you wouldn't expect to have to permit traffic on the same subnet). These rules have no effect, even though all devices, plugged into the two ports, are on the same subnet, if a device is downstream from one port, it cannot talk to a device that's down stream from the other port in the bridge.

      I have no rules set for LAN3 or LAN4, I'm surprised that the firewall even shows me those sub-firewalls after bridging LAN3 and LAN4 together. To even see them there as an interface, after bridging them, is a point of confusion for me.

      So, what steps I'm I likely missing that will ultimately reach my goal of making these two bridged ports act like a switch for all devices on the subnet?

      dotdashD S 2 Replies Last reply Reply Quote 0
      • dotdashD
        dotdash @Lonnie
        last edited by

        @lonnie
        It's been a while since I've messed with bridging in pfSense, but IIRC, the default is to apply the rules on the member ports and not the bridge interface. Check the tunables for the net.link.bridge entries. Alternatively, create rules on the member interfaces to allow the traffic. Or, make things easy and buy a five port switch. You can get one for like $25.

        L 2 Replies Last reply Reply Quote 1
        • S
          SteveITS Galactic Empire @Lonnie
          last edited by

          @lonnie I have not needed a bridge, but did you find the Hangout video where Netgate discusses it? Slides 16+.
          https://www.netgate.com/resources/videos-wireless-access-points-with-pfsense

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote 👍 helpful posts!

          L 1 Reply Last reply Reply Quote 1
          • L Lonnie referenced this topic on
          • L
            Lonnie @dotdash
            last edited by Lonnie

            @dotdash I had a unused switch (like you're recommending) an arm's length away when I bridged these two ports together, but it seemed wasteful to me to power a switch when all I needed was one additional port for this subnet. I figured it would be more efficient to utilize an available port on the 6100 instead. It works great except for the fact that all devices on the same subnet cannot communicate with devices on the opposite port of the bridge.

            I'll try setting rules on the "member interfaces", as you suggest, and will report back if that worked.

            1 Reply Last reply Reply Quote 0
            • L
              Lonnie @SteveITS
              last edited by

              @steveits I searched through that hour+ video on access points you provided. I did see some mention of bridging, but nothing that revealed what I'm doing wrong.

              1 Reply Last reply Reply Quote 0
              • L
                Lonnie @dotdash
                last edited by

                @dotdash Adding permissive rules to the "member interfaces" of these bridged ports had no effect. Those member interfaces do not even have an ip address associated with them. Only the bridge interface has an ip address. I'm not even sure how I was allowed to add firewall rules to those member interfaces, because they have an IPv4 Configuration Type of "None".

                So for now this remains unsolved. I'd have better luck getting these devices to communicate with each port being on a separate subset (than the luck I'm having getting these bridged ports to allow communication between each other).

                1 Reply Last reply Reply Quote 0
                • L
                  Lonnie
                  last edited by Lonnie

                  Related: https://forum.netgate.com/topic/31265/

                  1 Reply Last reply Reply Quote 0
                  • L
                    Lonnie
                    last edited by

                    I'm currently reading the documentation here:
                    https://docs.netgate.com/pfsense/en/latest/bridges/index.html

                    The ARP Table doesn't even show a device I have plugged into a bridge port. I can access that device from other LANs, but devices on the other bridge port (on the same subnet) cannot.

                    1 Reply Last reply Reply Quote 0
                    • L
                      Lonnie
                      last edited by

                      Well, I give up on bridging ports with pfSense.

                      Making multiple logical interfaces act like ports on a switch, apparently cannot be transparently achieved as easily as I assumed.

                      My conclusion matches how I've been advised. I'll either install a real switch, or split my devices into one subnet per port.

                      dotdashD 1 Reply Last reply Reply Quote 0
                      • dotdashD
                        dotdash @Lonnie
                        last edited by

                        @lonnie
                        I did something similar years ago with a site consisting only of the firewall and two access points. I think I assigned the bridge as the LAN interface and changed the tuneable to filter on the bridge, not the member interfaces. There are limitations, but a fairly simple configuration should work.

                        1 Reply Last reply Reply Quote 2
                        • L Lonnie referenced this topic on
                        • L
                          Lonnie
                          last edited by

                          I discovered that the type of bridging I was attempting is called internal bridging, the documentation even says it is more efficient to actually use a real switch for that:

                          https://docs.netgate.com/pfsense/en/latest/bridges/index.html#internal-bridges

                          I didn't realize the overhead involved.

                          R 1 Reply Last reply Reply Quote 0
                          • R
                            rcoleman-netgate Netgate @Lonnie
                            last edited by

                            @lonnie Yeah, that's one of the reasons we don't typically recommend bridges.

                            Ryan
                            Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                            Requesting firmware for your Netgate device? https://go.netgate.com
                            Switching: Mikrotik, Netgear, Extreme
                            Wireless: Aruba, Ubiquiti

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.