Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bridged Ports Are not Acting like a Switch

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    12 Posts 4 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      SteveITS Galactic Empire @Lonnie
      last edited by

      @lonnie I have not needed a bridge, but did you find the Hangout video where Netgate discusses it? Slides 16+.
      https://www.netgate.com/resources/videos-wireless-access-points-with-pfsense

      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
      Upvote 👍 helpful posts!

      L 1 Reply Last reply Reply Quote 1
      • L Lonnie referenced this topic on
      • L
        Lonnie @dotdash
        last edited by Lonnie

        @dotdash I had a unused switch (like you're recommending) an arm's length away when I bridged these two ports together, but it seemed wasteful to me to power a switch when all I needed was one additional port for this subnet. I figured it would be more efficient to utilize an available port on the 6100 instead. It works great except for the fact that all devices on the same subnet cannot communicate with devices on the opposite port of the bridge.

        I'll try setting rules on the "member interfaces", as you suggest, and will report back if that worked.

        1 Reply Last reply Reply Quote 0
        • L
          Lonnie @SteveITS
          last edited by

          @steveits I searched through that hour+ video on access points you provided. I did see some mention of bridging, but nothing that revealed what I'm doing wrong.

          1 Reply Last reply Reply Quote 0
          • L
            Lonnie @dotdash
            last edited by

            @dotdash Adding permissive rules to the "member interfaces" of these bridged ports had no effect. Those member interfaces do not even have an ip address associated with them. Only the bridge interface has an ip address. I'm not even sure how I was allowed to add firewall rules to those member interfaces, because they have an IPv4 Configuration Type of "None".

            So for now this remains unsolved. I'd have better luck getting these devices to communicate with each port being on a separate subset (than the luck I'm having getting these bridged ports to allow communication between each other).

            1 Reply Last reply Reply Quote 0
            • L
              Lonnie
              last edited by Lonnie

              Related: https://forum.netgate.com/topic/31265/

              1 Reply Last reply Reply Quote 0
              • L
                Lonnie
                last edited by

                I'm currently reading the documentation here:
                https://docs.netgate.com/pfsense/en/latest/bridges/index.html

                The ARP Table doesn't even show a device I have plugged into a bridge port. I can access that device from other LANs, but devices on the other bridge port (on the same subnet) cannot.

                1 Reply Last reply Reply Quote 0
                • L
                  Lonnie
                  last edited by

                  Well, I give up on bridging ports with pfSense.

                  Making multiple logical interfaces act like ports on a switch, apparently cannot be transparently achieved as easily as I assumed.

                  My conclusion matches how I've been advised. I'll either install a real switch, or split my devices into one subnet per port.

                  dotdashD 1 Reply Last reply Reply Quote 0
                  • dotdashD
                    dotdash @Lonnie
                    last edited by

                    @lonnie
                    I did something similar years ago with a site consisting only of the firewall and two access points. I think I assigned the bridge as the LAN interface and changed the tuneable to filter on the bridge, not the member interfaces. There are limitations, but a fairly simple configuration should work.

                    1 Reply Last reply Reply Quote 2
                    • L Lonnie referenced this topic on
                    • L
                      Lonnie
                      last edited by

                      I discovered that the type of bridging I was attempting is called internal bridging, the documentation even says it is more efficient to actually use a real switch for that:

                      https://docs.netgate.com/pfsense/en/latest/bridges/index.html#internal-bridges

                      I didn't realize the overhead involved.

                      R 1 Reply Last reply Reply Quote 0
                      • R
                        rcoleman-netgate Netgate @Lonnie
                        last edited by

                        @lonnie Yeah, that's one of the reasons we don't typically recommend bridges.

                        Ryan
                        Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                        Requesting firmware for your Netgate device? https://go.netgate.com
                        Switching: Mikrotik, Netgear, Extreme
                        Wireless: Aruba, Ubiquiti

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.