Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfSense untagged VLAN for Unifi UAP management

    Scheduled Pinned Locked Moved General pfSense Questions
    5 Posts 2 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      A Former User
      last edited by

      I have some questions surrounding UAP AC Lite integration with my pfSense firewall.

      According to the below link, the "UniFi APs are only managed via an untagged VLAN."

      https://help.ubnt.com/hc/en-us/articles/219654087-UniFi-Using-VLANs-with-UniFi-Wireless-Routing-Switching-Hardware#device%20management

      I have assigned two interfaces on my pfSense box to two VLANs on igb2 (the parent interface). These virtual interfaces correspond to two SSIDs on my UAP. To manage the UAP I have assigned a 'MGMT' interface on my pfSense box to the igb2 port itself (no VLAN).

      Is this the only approach that will work? Is it smart/secure to have this MGMT interface assigned to the igb2 port, while the VLANs are treating it as the parent ID? How else would one create an 'untagged VLAN' on a pfSense box?

      Thanks.

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        It's fine. That's how you do it.

        With a managed switch you could tag all the VLANs between the switch and pfSense and tell the switch to send the management VLAN to the APs untagged along with the tagged SSID VLANs.

        How you have it will work fine.

        igb0 = untagged
        VLAN X on igb0 (igb0_vlanX) = tagged VLAN X on igb0

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • ?
          A Former User
          last edited by

          Thanks Derelict. I appreciate the suggestion.

          1 Reply Last reply Reply Quote 0
          • ?
            A Former User
            last edited by

            Derelict, would the switch need to be a layer 3 to unravel the management VLAN?

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              No. Just managed layer 2. Any "web smart" switch should do fine. As long as it properly supports 802.1q.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.