Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Netgate 2100 - setup question

    Scheduled Pinned Locked Moved Official Netgate® Hardware
    67 Posts 6 Posters 12.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      netboy @netboy
      last edited by

      @netboy From what you said.... the ports 2 and 3 in my example and all the switches connected to those ports including AP's will be "untagged" - My understanding of untagged is they will have only ONE VLAN - in my example VLAN10 - Am I correct. Sorry if I am asking the same question in a different way. I want to ensure I understand VLAN correctly.

      J 1 Reply Last reply Reply Quote 0
      • J
        Jarhead @netboy
        last edited by

        @netboy
        Ah, my mistake. I meant the switches ports, as in your HP switches, but I forgot the 2100 has a built in switch.
        Not really familiar with the 2100 but you would probably have to tag the 2100 ports and also the HP ports they connect to but you may want to wait for someone more familiar with the 2100 to be sure.
        Can those ports be separated as individual interfaces?

        R 1 Reply Last reply Reply Quote 0
        • R
          rcoleman-netgate Netgate @Jarhead
          last edited by

          @jarhead said in Netgate 2100 - setup question:

          @netboy
          Ah, my mistake. I meant the switches ports, as in your HP switches, but I forgot the 2100 has a built in switch.
          Not really familiar with the 2100 but you would probably have to tag the 2100 ports and also the HP ports they connect to but you may want to wait for someone more familiar with the 2100 to be sure.
          Can those ports be separated as individual interfaces?

          Untagged ports in the switch config that reflect a tag on the LAGG0 (mvneta) in the software would just be plain traffic going over the wire.

          By default your VLANs won't be able to talk to each other in pfSense on a L3 aspect (unless you mess up your switching and they can L2 with each other).

          Make sure you keep the 5th tagged port on all VLANs in the 2100 config.

          Ryan
          Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
          Requesting firmware for your Netgate device? https://go.netgate.com
          Switching: Mikrotik, Netgear, Extreme
          Wireless: Aruba, Ubiquiti

          N 1 Reply Last reply Reply Quote 0
          • N
            netboy @rcoleman-netgate
            last edited by

            @rcoleman-netgate Sorry I am not able to follow you....this shows my ignorance :-)

            R 1 Reply Last reply Reply Quote 0
            • R
              rcoleman-netgate Netgate @netboy
              last edited by rcoleman-netgate

              @netboy If you're following this guide you should be fine: https://docs.netgate.com/pfsense/en/latest/solutions/netgate-2100/switch-overview.html

              Ryan
              Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
              Requesting firmware for your Netgate device? https://go.netgate.com
              Switching: Mikrotik, Netgear, Extreme
              Wireless: Aruba, Ubiquiti

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                All VLAN tagged traffic would be internal to the 2100.

                The switches and all devices connected to them would appear to be on the expected VLAN interfaces in pfSense. Yes.

                If you needed to you probably could pass VLAN tagged traffic through those switches but you would need to test that to be sure. The only reason you might want to do that though is if you added a guess SSID to your Access Point(s) and wanted that traffic to be on a separate VLAN.

                Steve

                N 1 Reply Last reply Reply Quote 0
                • N
                  netboy @stephenw10
                  last edited by

                  @stephenw10
                  On another note supposing I configure as follows:

                  • LAN1 port in subnet 192.168.2.xxx and connect this to a "unmanaged switch" say switch2

                  • LAN2 port in subnet 192.168.3.xxx and connect this to a "unmanaged switch" say switch3

                  • Establish firewall rules such that LAN2 traffic can talk to LAN1 traffic and not vice versa

                  Will the above work with netgate 2100. The functionality is for me to use my "existing unmanaged switch" and isolate my iot and private network.

                  Can anybody chime in ......

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yes, that will work fine.

                    Steve

                    N 1 Reply Last reply Reply Quote 0
                    • N
                      netboy @stephenw10
                      last edited by

                      @stephenw10 Thanks for your response. Shall proceed with this setup

                      N 1 Reply Last reply Reply Quote 1
                      • N
                        netboy @netboy
                        last edited by netboy

                        @netboy Hey there I am about to buy netgate 2100 and this is what I have in mind. Please note that I DO NOT HAVE managed switch and will not create VLAN. Can I achieve the below functionality: (I would like LAN1 & LAN2 physical ports of netgate to be configured with IP 192.168.0.XXX and LAN3 & LAN4 physical ports configured with IP 172.16.0.XXX - NO VLANS), Not shown in picture is both 192.168.0.XXX & 172.16.0.XXX should be able to access the internet
                        netgate2100.jpg

                        S 1 Reply Last reply Reply Quote 0
                        • S
                          SteveITS Galactic Empire @netboy
                          last edited by

                          @netboy You can’t separate the ports without VLANs. However you don’t need a managed switch. The guide above explains how to do it. In the end, although internally it will be using VLANs, nothing else sees or knows about the VLANs since that’s all internal to the 2100. They become separate ports.

                          In your case if I followed you, you’d want two ports on the same VLAN.

                          Another option is to get a 5 port switch for $16 and isolate only one port on the 2100, and plug in the switch.

                          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                          Upvote 👍 helpful posts!

                          N 1 Reply Last reply Reply Quote 0
                          • N
                            netboy @SteveITS
                            last edited by

                            @steveits stephenw10 confirmed this can be done but you say not possible. I am totally confused. Can anybody chime in....

                            S N 2 Replies Last reply Reply Quote 0
                            • S
                              SteveITS Galactic Empire @netboy
                              last edited by

                              @netboy One can separate/isolate switch ports on a 2100. I have one and have done it (and, side note, undone it). You need to use VLANs as directed to do it. You’re trying to do an extra step and put two on the same VLAN. So something like:

                              Port 1 - unchanged
                              Port 2 - unchanged
                              Port 3 - VLAN 4093
                              Port 4 - VLAN 4093

                              Correct? Nothing you plug in needs to know about VLAN 4093.

                              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                              Upvote 👍 helpful posts!

                              1 Reply Last reply Reply Quote 0
                              • N
                                netboy @netboy
                                last edited by netboy

                                @netboy This is my understanding so far....

                                Define two VLANS

                                • VLAN1: 192.168.0.XXX (Range 192.168.0.50 to 192.168.0.100)

                                • VLAN2: 176.16.0.XXX (Range 176.16.0.50 to 176.16.0.100)
                                  LAN1 & LAN2

                                • Assign ports to VLAN1: For VLAN1 remove ports LAN3 & LAN4 but include and "UNTAG" ports LAN1 AND LAN2

                                • Assign ports to VLAN2: For VLAN2 remove ports LAN1 & LAN2 but include and "UNTAG" ports LAN3 AND LAN4

                                • Setup firewall rules so that VLAN1 traffic can flow to VLAN2 but not vice versa and ensure both VLAN1 and VLAN2 can access the internet

                                Have I understood the setup? Something similar to youtube video.

                                S 1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Yes. You can do that and you don't need any separate managed switches to do it. As Steve said the VLANs are all internal to the 2100 so no problem there.

                                  Steve

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    SteveITS Galactic Empire @netboy
                                    last edited by

                                    @netboy I'm not very well caffeinated yet, but you only want two networks, correct? So you only need one VLAN. The base-not-configured ports are all one interface out of the box because it's a switch. You're trying to separate two of them.

                                    Or if you follow Ryan's linked directions to the letter to isolate one port, and plug in a cheap 5 port switch, you'd have 3 ports +4 (1->4 remaining switch) ports.

                                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                    Upvote 👍 helpful posts!

                                    N 1 Reply Last reply Reply Quote 0
                                    • N
                                      netboy @SteveITS
                                      last edited by netboy

                                      @steveits
                                      Now I am trying to implement my idea and seek help.

                                      I have changed my default IP for router from 192.168.1.1. to 192.168.0.1.

                                      Can somebody show me screenshots to achieve the following:

                                      • Create 2 subnets 192.168.0.XXX & 172.16.0.XXX

                                      • Assign physical port LAN 1 & 2 to 192.168.0.XXX and assign physical port LAN 3 & 4 to 172.16.0.XXX

                                      Please note that I do not use VLAN's - The idea is to connect LAN 1 & 2 to unmanaged switches and so is LAN 3 & 4 to another set of unmanaged switches.

                                      I want to take baby steps as I go so that I can get help from this forum. Thanks

                                      S 1 Reply Last reply Reply Quote 0
                                      • N netboy referenced this topic on
                                      • S
                                        SteveITS Galactic Empire @netboy
                                        last edited by

                                        @netboy LAN is already assigned to 192.168.0.1 so ports 1 and 2 are done.

                                        If you follow https://docs.netgate.com/pfsense/en/latest/solutions/netgate-2100/configuring-the-switch-ports.html that will isolate port 4 and you can assign it 172.16.0.1. I would start with that, and worry about port 3 in a second step.

                                        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                        Upvote 👍 helpful posts!

                                        N 1 Reply Last reply Reply Quote 1
                                        • N
                                          netboy @SteveITS
                                          last edited by netboy

                                          @steveits Hey steveits, I have created the port 4 as per the url you provided. Now I want this to apply to port 3 as well. Can you kindly let me know how I go about doing this? Do I follow identical process for port 3 as well - I basically want port 3 and 4 on the same subnet 172.16.0.1/24

                                          N 1 Reply Last reply Reply Quote 0
                                          • N
                                            netboy @netboy
                                            last edited by netboy

                                            @netboy
                                            45e7ceaa-16a8-4aed-b2a2-1e94a385e078-image.png

                                            My guess is based on the screenshot above:

                                            • edit VLAN group 0 and REMOVE 3

                                            • edit VLAN group 1 and ADD 3

                                            Will the above work? The idea is to make 3 & 4 in subnet 172.16.0.1/24

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.