Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Devices on VLAN can't access the internet

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    20 Posts 4 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      @jarhead said in Devices on VLAN can't access the internet:

      Those switches are a bit odd to configure.

      Depending on the model - those switches can just be bad as well, where they do not allow you to remove vlan 1.. There are multiple threads around here and about the net in general about it, there is some firmware posted that can correct it, etc.

      If you can not remove vlan 1, you run into the problem where you could have multiple untagged networks - say one of your vlans and vlan 1 untagged etc..

      here is an old thread talking about it

      https://forum.netgate.com/topic/107152/tp-link-tl-sg108e-vlan-1

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • N
        NilocRetep @heper
        last edited by

        @heper
        Ok, here are some photos of my setup.
        Interfaces.jpg
        IoT DHCP.jpg
        LAN DHCP.jpg
        Outbound NAT.jpg
        IoT Rules.jpg QVLAN config.jpg
        PVID setting.jpg

        So far in my setup, I'm running ethernet from my Pfsense to my TL-SG1088E on port#1.
        Ideally I'd like to pass VLAN10, VLAN20, VLAN30 and LAN to port1
        Port 2: Will be going to another Switch that will have LAN and VLAN10 devices
        Port 3: Blank
        Port 4: LAN only to a Wireless Access Point
        Port 5: Blank
        Port 6: To Powerline that will have LAN and VLAN10 devices
        Port 7: VLAN10 only Wireless Access Point
        Port 8: To another Switch that will need VLAN10, VLAN20, VLAN30 and LAN.

        I'd like to make sure I can get Internet access to Port7 before moving on with anything else. At this point I'm just attempting to get it working with a laptop before I add a Wireless Access Point.
        Thanks

        J 1 Reply Last reply Reply Quote 0
        • J
          Jarhead @NilocRetep
          last edited by Jarhead

          @nilocretep
          So then port 1 on the switch will be the trunk.
          vlan 1 will stay untagged, all others need to be tagged on port 1.

          Port 2 will be vlan 1 untagged and vlan 10 tagged.

          port 4 vlan 1 untagged.

          port 6 same as port 2.

          port 7 vlan 10 untagged.

          port 8 another trunk with same as port 1.

          Do that in 802.1q vlan config.

          Then in PVID config,
          Ports 1, 2, 4, 6 and 8 will be pvid 1.
          Port 7 will be pvid 10.

          You have most of it correct but go over it again and you'll find the errors.

          N 1 Reply Last reply Reply Quote 0
          • N
            NilocRetep @Jarhead
            last edited by

            @jarhead
            So with Port 7....should I leave VLAN 1 as untagged or Not Member? I believe I've tried both settings and had the same results...

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @NilocRetep
              last edited by

              @nilocretep if port 7 is going to be vlan 10 only.. then it vlan 1 should not be a member.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              N 1 Reply Last reply Reply Quote 0
              • N
                NilocRetep @johnpoz
                last edited by

                @johnpoz

                Yeah that's what I figured. Even with that setting I still can't get out. I just hooked up a laptop, it gave me an IP of 192.168.179.111.

                I can ping 192.168.178.1 (Pfsense router) successfully. Should it be able to do that? Or is because I haven't really implemented any rules for VLAN10?

                J johnpozJ 2 Replies Last reply Reply Quote 0
                • J
                  Jarhead @NilocRetep
                  last edited by Jarhead

                  @nilocretep
                  Post pics of your rules on all interfaces.

                  And did you fix the vlans?
                  Cancel that, looked again, and vlan 1 is 1-6, I thought it was 1 and 6.
                  Switch looks good.

                  N 2 Replies Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @NilocRetep
                    last edited by johnpoz

                    @nilocretep said in Devices on VLAN can't access the internet:

                    Or is because I haven't really implemented any rules for VLAN10?

                    If you didn't put any rules on your interface - you wouldn't be able to ping. So your either pinging something else on the network with that IP or you have rules that allowing ping on your vlan 10 interface in pfsense.

                    When you create new interfaces, they don't have any rules - and no traffic would be allowed inbound into the interface..

                    If you want something on a new vlan your creating to access internet, you would have to allow for that in the rules - you would also need to allow for dns (internet isn't very good without that) and your outbound nat would have to account for this new vlan you created. This is normally done auto, unless you messed with the outbound nat rules and took it off automatic?

                    Why are you setting a manual IP on this device your using for testing - is dhcp not working. That points to connectivity issue in general if dhcp is enabled on this interface - when you enable dhcp server on an interface, pfsense auto creates rules to allow for dhcp even if you have no other rules on the interface. Your 2 mentioned IPs are different networks - so your using a /23 mask not /24?

                    Is it possible you setup /24 on pfsense, and your client you setup /23 - this could be a reason why outbound nat or other rules you setup are not working? etc.. There are always lots of pieces to any puzzle.. Without the details - its hard to tell what piece of the puzzle is missing to find the problem.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • N
                      NilocRetep @Jarhead
                      last edited by

                      @jarhead
                      WAN rules.jpg
                      LAN rules.jpg
                      IoT Rules.jpg
                      camera rules.jpg
                      WorkDevices rules.jpg

                      J 1 Reply Last reply Reply Quote 0
                      • J
                        Jarhead @NilocRetep
                        last edited by

                        @nilocretep
                        With those rules you would be able to ping the LAN gateway and should also be able to get out to the internet.
                        Is outbound NAT set to auto?
                        Did the IoT network get added to it?

                        1 Reply Last reply Reply Quote 0
                        • N
                          NilocRetep @Jarhead
                          last edited by

                          @jarhead
                          I didn't put on a manual IP on the laptop. It was assigned one via dhcp from VLAN10. So at least that portion is working. All interfaces (LAN, VLAN 10, 20, and 30) all have a setup of /24.

                          What configuration would I need to do for DNS?

                          J johnpozJ 2 Replies Last reply Reply Quote 0
                          • J
                            Jarhead @NilocRetep
                            last edited by

                            @nilocretep
                            DNS would already work with those rules.
                            Just noticed you already posted outbound NAT and it's fine too.

                            Do a packet capture on the WAN and try to get out from the IoT.
                            Do you see the packets leaving?

                            N 1 Reply Last reply Reply Quote 0
                            • N
                              NilocRetep @Jarhead
                              last edited by

                              @jarhead
                              Sorry for my ignorance; but how would I do that?
                              I can ping 8.8.8.8 successfully from my IoT laptop. If that helps.

                              N 1 Reply Last reply Reply Quote 0
                              • N
                                NilocRetep @NilocRetep
                                last edited by

                                @nilocretep

                                I'm starting to think this might be a part of the problem. I first implemented this when I setup Pfsense: https://arkojoardar.com/adguard-on-pfsense/

                                J 1 Reply Last reply Reply Quote 0
                                • J
                                  Jarhead @NilocRetep
                                  last edited by

                                  @nilocretep Yup, I bet you're right.
                                  Disable it and see what happens.

                                  N 1 Reply Last reply Reply Quote 0
                                  • N
                                    NilocRetep @Jarhead
                                    last edited by

                                    @jarhead
                                    Yep, that was it.
                                    Thanks for all your help!

                                    1 Reply Last reply Reply Quote 1
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @NilocRetep
                                      last edited by johnpoz

                                      @nilocretep said in Devices on VLAN can't access the internet:

                                      all have a setup of /24.

                                      well why are you pinging 198.168.178.1 from 192.168.179.111 - why would you not ping the IP of pfsense on that interface? but yeah if that was another IP on pfsense rules allow it then sure you could ping it.

                                      Also you rules for security cameras never going to allow anything - you have the source as the securitycamera address not the net.

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.