Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Routing between VLANs not working on SG2100

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    12 Posts 4 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bp81
      last edited by

      This problem is almost certainly related to the fact that I'm using a Netgate SG2100 in one of my locations, and it has one of those integrated Marvell switches. The integrated Marvell switch massively complicates running a network with VLANs; I have an identical setup in other locations where my Netgate devices don't have an integrated switch and everything works perfectly.

      The problem is that hosts in the Main vlan can't communicate with hosts in the IoT vlan. Firewall rules allow this and the log records the rules allowing the traffic. More generally, traffic trying to move from one vlan to another simply does not work, even when firewall rules allow it, though my specific use case here is getting traffic to route from the main lan to the IoT lan.

      Here's the setup

      I have four vlans running. The default vlan (management vlan / untagged / default), vlan 2 (Main), vlan 11 (IoT devices), vlan 50 (guest wifi). I have an interface assigned for each vlan. I am using 802.1q tagging. The default vlan is set to untagged for every switch port on the Marvell switch, including the parent / uplink. Each other vlan is set to tagged on every switch port, including the parent / uplink. I'm including a screen cap:

      98a1d103-16d7-448c-9674-b943eb89ca8b-image.png

      In Interface -> Assignments -> VLANs I have vlans 2, 11, and 50 configured on mvneta1. I have enabled interfaces in Interface -> Assignments -> Interface Assignments, one for each vlan:

      ee80b8a1-4253-42e0-ab21-2770b9d82580-image.png

      I have confirmed that firewall rules are not blocking my traffic. This works more or less as long as hosts in one vlan don't need to talk to hosts in another. I am also noticing, as a side effect of whatever is wrong here, that hosts in the main lan can't even ping the interface of the vlan they are a member of (firewall also allow this).

      Something clearly is wrong, and after reviewing the Netgate documentation for the models with a Marvell switch built in, I am not seeing what the issue is.

      R J 2 Replies Last reply Reply Quote 0
      • R
        rcoleman-netgate Netgate @bp81
        last edited by

        @bp81 What does the Firewall->Rules interface tabs for each VLAN interface say?

        Ryan
        Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
        Requesting firmware for your Netgate device? https://go.netgate.com
        Switching: Mikrotik, Netgear, Extreme
        Wireless: Aruba, Ubiquiti

        B 1 Reply Last reply Reply Quote 0
        • J
          Jarhead @bp81
          last edited by

          @bp81 Why would you tag all vlans on all ports?
          Are you connecting each port to a separate switch or the same?
          Are those switchports tagged properly?

          B 1 Reply Last reply Reply Quote 0
          • B
            bp81 @rcoleman-netgate
            last edited by

            @rcoleman-netgate said in Routing between VLANs not working on SG2100:

            @bp81 What does the Firewall->Rules interface tabs for each VLAN interface say?

            IoT (vlan 11) rules:

            184851dc-05f4-4664-8c1c-ce10aba05da1-image.png

            The alias 'PrivateIPv4Subnets' contains all Class A, B, C and private IP addresses. These rules block IoT network hosts from initiating connections to hosts in any other vlan but still allows outbound connections to internet destinations

            MAIN (vlan 2) rules:

            c2078cdf-3a56-4d2e-bc31-c3ec6dbcad0f-image.png

            Outbound connections to the guest network are blocked, but other connections are allowed.

            J S 2 Replies Last reply Reply Quote 0
            • B
              bp81 @Jarhead
              last edited by

              @jarhead said in Routing between VLANs not working on SG2100:

              @bp81 Why would you tag all vlans on all ports?
              Are you connecting each port to a separate switch or the same?
              Are those switchports tagged properly?

              I am essentially not using the integrated switch as a switch. I have a Ubiquiti Unifi switch downstream from the integrated switch. Essentially I have port 1 on the integrated switch attached to Port 8 on my Ubiquiti switch. On the Ubiquiti switch, Port 8 is a trunk port, passing all traffic with vlan tags intact. I don't really NEED the switch on the pfsense box, a single LAN interface would've sufficed. I don't want the switchport doing anything to the traffic's tags, it needs to accept traffic from any vlan and pass it to the uplink into the router for routing as needed.

              1 Reply Last reply Reply Quote 0
              • J
                Jarhead @bp81
                last edited by Jarhead

                @bp81 So you're blocking IoT from private addresses, then you're allowing to anything except private networks.
                See the problem?

                Why not set the rules to allow any between the 2 networks and see if it works?
                Whenever someone says "Ubiquiti switch" I always go right there as the cause of any networking issues and it's usually the case. Take pfSense out of the equation by allowing all traffic, then go from there.

                B 1 Reply Last reply Reply Quote 0
                • S
                  SteveITS Galactic Empire @bp81
                  last edited by

                  @bp81 said in Routing between VLANs not working on SG2100:

                  These rules block IoT network hosts from initiating connections to hosts in any other vlan but still allows outbound connections to internet destinations

                  Note you haven't allowed from IoT to the pfSense port 53 (TCP+UDP) for DNS. (assuming the pfSense LAN is not a public IP)

                  Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                  When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                  Upvote 👍 helpful posts!

                  B 1 Reply Last reply Reply Quote 0
                  • B
                    bp81 @Jarhead
                    last edited by

                    @jarhead said in Routing between VLANs not working on SG2100:

                    @bp81 So you're blocking IoT from private addresses, then you're allowing to anything except private networks.
                    See the problem?

                    Why not set the rules to allow any between the 2 networks and see if it works?
                    Whenever someone says "Ubiquiti switch" I always go right there as the cause of any networking issues and it's usually the case. Take pfSense out of the equation by allowing all traffic, then go from there.

                    That's not how that has worked elsewhere. The firewall rules on IoT disallow connections outbound from hosts inside the IoT vlan to other vlans. That rule does not prevent connections from other vlans to hosts in IoT. I'm running this exact configuration in 5 other locations and it works perfectly.

                    I will do the test as you suggested just to confirm, but this is not the issue.

                    J 1 Reply Last reply Reply Quote 0
                    • B
                      bp81 @SteveITS
                      last edited by

                      @steveits said in Routing between VLANs not working on SG2100:

                      @bp81 said in Routing between VLANs not working on SG2100:

                      These rules block IoT network hosts from initiating connections to hosts in any other vlan but still allows outbound connections to internet destinations

                      Note you haven't allowed from IoT to the pfSense port 53 (TCP+UDP) for DNS. (assuming the pfSense LAN is not a public IP)

                      The DHCP server for the IoT vlan is giving out a public DNS server for clients in that network. Opening port 53 for clients in the IoT vlan is not necessary, as those devices do not require internal dns resolution services and aren't setup to use it anyway.

                      1 Reply Last reply Reply Quote 0
                      • J
                        Jarhead @bp81
                        last edited by

                        @bp81 said in Routing between VLANs not working on SG2100:

                        @jarhead said in Routing between VLANs not working on SG2100:

                        @bp81 So you're blocking IoT from private addresses, then you're allowing to anything except private networks.
                        See the problem?

                        Why not set the rules to allow any between the 2 networks and see if it works?
                        Whenever someone says "Ubiquiti switch" I always go right there as the cause of any networking issues and it's usually the case. Take pfSense out of the equation by allowing all traffic, then go from there.

                        That's not how that has worked elsewhere. The firewall rules on IoT disallow connections outbound from hosts inside the IoT vlan to other vlans. That rule does not prevent connections from other vlans to hosts in IoT. I'm running this exact configuration in 5 other locations and it works perfectly.

                        I will do the test as you suggested just to confirm, but this is not the issue.

                        You missed the point. Both rules do exactly the same thing and are unnecessary. You can make the destination on the allow an ANY since privates are already blocked.
                        Plus, it'll help with the DNS problem you're gonna have since the IoT gateway is a private address also.

                        B 1 Reply Last reply Reply Quote 0
                        • B
                          bp81 @Jarhead
                          last edited by

                          @jarhead said in Routing between VLANs not working on SG2100:

                          @bp81 said in Routing between VLANs not working on SG2100:

                          @jarhead said in Routing between VLANs not working on SG2100:

                          @bp81 So you're blocking IoT from private addresses, then you're allowing to anything except private networks.
                          See the problem?

                          Why not set the rules to allow any between the 2 networks and see if it works?
                          Whenever someone says "Ubiquiti switch" I always go right there as the cause of any networking issues and it's usually the case. Take pfSense out of the equation by allowing all traffic, then go from there.

                          That's not how that has worked elsewhere. The firewall rules on IoT disallow connections outbound from hosts inside the IoT vlan to other vlans. That rule does not prevent connections from other vlans to hosts in IoT. I'm running this exact configuration in 5 other locations and it works perfectly.

                          I will do the test as you suggested just to confirm, but this is not the issue.

                          You missed the point. Both rules do exactly the same thing and are unnecessary. You can make the destination on the allow an ANY since privates are already blocked.
                          Plus, it'll help with the DNS problem you're gonna have since the IoT gateway is a private address also.

                          I temporarily set all interfaces (except WAN) to allow all traffic. No change.

                          J 1 Reply Last reply Reply Quote 0
                          • J
                            Jarhead @bp81
                            last edited by

                            @bp81
                            So then the problem is the ubiquiti.
                            Show pics of the config.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.