Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Vlan with pfsense

    Scheduled Pinned Locked Moved Firewalling
    5 Posts 3 Posters 14.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • U
      umbala
      last edited by

      Hi everyone

      My network topology
                                        servers(vlan1)
                                          |
      vlan2–--------                |
      vlan3----------cisco 3550----(vlan1-nic1)pfsense(nic2)-----internet
      vlan4----------
      On switch cisco. divided vlan 2, 3,4, ip route default-gateway nic1(pfsense)
          From vlan 2,3,4 I can access,ping to server pfsense
      On pfsense
          Rule--Lan: permit range ip from vlan 1 to vlan 4 out internet
          Nat on outbound interface nic2 for vlan1, vlan 2,vlan 3, vlan 4
      Result:
          From servers I can access internet but from vlan2, vlan3,vlan4 I can not access internet
      I don't know I configured wrong from where. Please help me

      Thank you very much

      1 Reply Last reply Reply Quote 0
      • M
        Monoecus
        last edited by

        Did you specify the other vlans 2-4 on the nic in pfsense?

        1 Reply Last reply Reply Quote 0
        • H
          hoba
          last edited by

          Are you talking of portbased vlans or tagged vlans? Your drawing doesn't make too much sense to me because it looks like none of the vlans should be able to communicate with each other imo.

          1 Reply Last reply Reply Quote 0
          • U
            umbala
            last edited by

            I thought that vlan tag on pfsense for trunking only. I have switch cisco 3550 belong switch layer3. I don't think it need trunking. It's right. Moreover, I can ping PC belong vlans different, and ping nic1(vlan1) of pfsense. So I thought that no problem about routing.

            thanks

            1 Reply Last reply Reply Quote 0
            • H
              hoba
              last edited by

              I'm not sure if you really know what you want to setup here or how you have to set it up. I guess you want to have seperation between the vlans (firewall them against each other). For this you have to create a vlan trunk to the pfSense. The switchport on the cisco, that links to the pfSense has to tag traffic (IEEE 802.1Q, not the cisco vlan protocol) and has to have all the other vlans enabled (vlan1, vlan2, vlan3, vlan4). At the pfSense you have to create all the vlans as well and assign each vlan as interface. The additional ports on the cisco should be portbased (untagged or "native" like cisco calls it iirc) vlanmembers of only the vlan they belong to (so either vlan1 or vlan2 or vlan3…). I have that exact setup at the office with 7 vlans. This way all the segments will be routed and firewalled by the pfSense.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.