Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can someone explain this warning

    General pfSense Questions
    4
    8
    555
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      Ryu945
      last edited by

      https://www.youtube.com/watch?v=mPXMnSDOE8U&t=4m33s

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        That is an old video and an outdated warning. It's no longer relevant.

        There is still some slight security benefit to not mixing tagged and untagged traffic on an interface but there isn't any technical reason you can't do that on a current version of pfSense. Once upon a time it caused problems with captive portal and maybe something else that I can't remember.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • R
          Ryu945
          last edited by

          @jimp:

          That is an old video and an outdated warning. It's no longer relevant.

          There is still some slight security benefit to not mixing tagged and untagged traffic on an interface but there isn't any technical reason you can't do that on a current version of pfSense. Once upon a time it caused problems with captive portal and maybe something else that I can't remember.

          If I want one normal lan network and one vlan netowrk.  Should I set both up as vlans?  Essentially, have my three ports that were going to be lan ports as vlan 1 and set up the last port I intended to setup as a vlan as  vlan 2.  Then assign no ports to the lan network.

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            In a perfect world, yes they should all be tagged, but you don't have to.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • M
              moikerz
              last edited by

              As far as traffic stats go, the untagged LAN will show the cumulative totals of LAN + any VLANs hanging off the LAN port. For example, on traffic graphs, when there's a spike on the VLAN, you'll see the same spike on the LAN graph. For IDS, all VLAN traffic will show up on the LAN traffic when viewing the LAN traffic (but if just viewing VLAN traffic you'll only get VLAN traffic).

              This is enough of a reason for me to move my LAN to a VLAN, for statistical segregation.

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                I think Derelict is the big fan of all tagged.. While you can do it that way - I really don't see the point..  I run native/naked network on the interface that is untagged, then vlans on top of that.

                Its all how you want to skin that specific cat..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 0
                • R
                  Ryu945
                  last edited by

                  @johnpoz:

                  I think Derelict is the big fan of all tagged.. While you can do it that way - I really don't see the point..  I run native/naked network on the interface that is untagged, then vlans on top of that.

                  Its all how you want to skin that specific cat..

                  What exactly are these slight security benefits to using all vlan?

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    There isn't one if you ask me - ask Derelict he is the fan all tagged, no native or untagged on interface ;)

                    I am not aware of any security issue with running tagged or untagged on same interface.  As long as you don't try and run multiple untagged vlans on the same interface there is no problem.

                    moikerz point about the stats would be the only reason I could see of putting all vlans vs native and vlans… Because he is right the native interface will show total stats for the untagged and all tagged traffic... While your stats for your vlan interfaces will only show you stats for that specific vlan.. So if that is your concern, then that would be the reason you skin the cat that way vs the other way ;)

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.