• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Connecting 2 LAN interfaces to same Switch (segmenting vlans)

Scheduled Pinned Locked Moved L2/Switching/VLANs
vlansinterfaces
4 Posts 3 Posters 265 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    moji
    last edited by Jul 14, 2024, 9:22 AM

    Good day!

    I'm new to vlans, definitely a noob but spending hours on forums trying to understand how to get this up and running.

    I'm configuring my Pfsense with vlans to separate iot traffic and implement gust networks. My setup is as follows: Internet --> Pfsense --> Managed Switch --> AP.

    By connecting the LAN port on my Pfsense to the Port 1 on my Switch, all vlans can access the internet (so just one interface on pfsense is being used).
    I am curious as to whether segmenting the guest network traffic to travel to the Pfsense via a different interface- OPT1, would improve security in any way. For that, I'll have to trunk the Guest vlan on different ports on both the switch and the Pfsense (so the OPT1 port on Pfsense and let's say Port 2 on the switch). And then I'd connect those 2 new ports so that my guest network traffic shares no medium with other vlan traffic.

    1- Is that improving anything?
    2- In case it does, what is the scenario that is being defended? Is it the chance that a faulty switch software or something would allow someone with physical access to manipulate vlan tags and thus suddenly access a different vlan? Or what else could make this useful?
    3- Doesn't that pose the risk of a loop since I have 2 ports on the Pfsense connecting to 2 ports on the same switch.

    Tried to make this concise, thanks, hopefully someone out there has gone through this before.

    D J 2 Replies Last reply Jul 14, 2024, 12:31 PM Reply Quote 0
    • D
      Derelict LAYER 8 Netgate @moji
      last edited by Jul 14, 2024, 12:31 PM

      @moji I would just use VLANs. "VLAN hopping" used to be a thing in certain cases but if your switch isn't completely defective, just tag the VLANs to pfSense and be done. There is no choice but to do so for things with only one ethernet port like Wireless APs, etc.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 1
      • J
        johnpoz LAYER 8 Global Moderator @moji
        last edited by Jul 14, 2024, 12:35 PM

        @moji

        1. using a different interface would/could improve bandwidth, vs sharing the bandwidth of the physical interface they have their own full physical interface bandwidth. Does this matter, would depend on your traffic flow requirements.

        I do both, some networks have their own physical interface, some vlans share the physical - these are my wifi networks that would never do full gig anyway, and don't talk to each other either so no hairpinning of traffic

        1. if you set up your networking correctly, wouldn't matter if someone change the tag on their traffic to try and jump vlans because the port they are connected to shouldn't allow tags.. Something jumping vlans would need to be plugged into a trunk that has multiple tags on it.. Say like an uplink to another switch, or port you plug in an AP that does multiple vlans.

        2. no if your interfaces are on different vlans on the switch you wouldn't have a loop.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        M 1 Reply Last reply Jul 15, 2024, 7:31 AM Reply Quote 1
        • M
          moji @johnpoz
          last edited by Jul 15, 2024, 7:31 AM

          @johnpoz

          Thanks a million, That's exactly what I was looking for!

          1 Reply Last reply Reply Quote 0
          3 out of 4
          • First post
            3/4
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
            This community forum collects and processes your personal information.
            consent.not_received