Would this do well as a managed switch to create vlans from?
-
It will work. Actually it is pretty good switch.
-
Opt for the 1800-24G instead. Same interface, but giga all the way.
-
Opt for the 1800-24G instead. Same interface, but giga all the way.
It says +1000 mb/s, is that +1000 mb/s not really 1000 mb/s or something?
-
?????? I dont understand ???
Opt for the 1800-24G instead. Same interface, but giga all the way.
It says +1000 mb/s, is that +1000 mb/s not really 1000 mb/s or something?
-
That means that only a select number of ports are giga (likely two or four ports), the rest are 10/100.
-
Major difference between 1700 and 1800 is that 1700 has 22 100Mb/s ports and 1800 has 22 1000Mb/s ports.
-
Exactly :)
-
One more thing, could I just use this? I have no use for 24ports.
http://www.newegg.com/Product/Product.aspx?Item=N82E16833316053Also on that link I posted previously, how many 1000port switches does it have? I don't plan to use yucky 100 mb/s.
I would look at that 1800-24 except, newegg does not sell it, and I just want to only buy from newegg (don't complain :P)Reason I am being so naggy is, is because I want everything to be 100% compatible, as in I really REALLY don't want to be trouble shooting with pfsense + networked switches.(+ people yelling at me for network down)
Also how would port forwarding work on vlans? Since here is how I plan to do it:
modem plugins into managed switch, pfsense plugins one ethernet cable to the managed switch, one switch with all my computers plug into the managed switch(standard consumer), and then one seperate computer that I want isolated from my network, plugged into the managed switch. Then I would manage the connections from the managed switch with pfsense right?
One more thing, I have an untangle box that blocks viruses and spyware. I have that plugged in after my router, how would that go in with a managed switch?
To be more clear on what I plan to do: Setup a network with 2 vlans, one is where all my computers are, and the other one is for a single computer that I want isolated from the rest of the network. I also want the untangle box coming in to block viruses and spyware. I am new to vlans so don't hate D:
-
how many ports do you need? i am using a dell switch that is managed, 8-port, all gig and vlan capable.
-
how many ports do you need? i am using a dell switch that is managed, 8-port, all gig and vlan capable.
Just going to be about 4-5 things plugged into it, and 2 of them will be vlans.
Since I am an absolute noob tbh on vlans, I wouldn't cry if I had to leave behind untangle. -
more clear on what I plan to do: Setup a network with 2 vlans, one is where all my computers are, and the other one is for a single computer that I want isolated from the rest of the network. I also want the untangle box coming in to block viruses and spyware. I am new to vlans so don't hate D:
I would set up pfSense with three interfaces: wan, lan and one interface for as many vlans as you wish.
If you are new to vlans, just learn it, it's pretty simple - L2 switching, nothing fancy. -
more clear on what I plan to do: Setup a network with 2 vlans, one is where all my computers are, and the other one is for a single computer that I want isolated from the rest of the network. I also want the untangle box coming in to block viruses and spyware. I am new to vlans so don't hate D:
I would set up pfSense with three interfaces: wan, lan and one interface for as many vlans as you wish.
If you are new to vlans, just learn it, it's pretty simple - L2 switching, nothing fancy.I could do that, but I was thinking of having everything plugged into the managed switch so it would see everything as an interface? I know what vlans are suppsoed to do, but there are a lot of different ways to setup them up.
So if I did it the way you're saying:
Modem > (wan)pfsense router(lan) > managed switch. Then all my computers connected in a standard consumer switch into one port on the managed switch. And then the isolated computer computer on another port on the vlan.
This seems like it would work. Do you guys agree?
Also is there a way to incorporate untangle into this? It's not a neccesity, and I would save the headaches if it would be complicated to setup that up.
-
Then you would have to route between the seperate Vlans via seperate routers???
If Pfsense doesnt Vlan and your switch does, you need routers….. If ypu Vlan Pfsense, then, in theory, you only need one interface.
By all means correct me if I'm wrong...:)
-
Then you would have to route between the seperate Vlans via seperate routers???
If Pfsense doesnt Vlan and your switch does, you need routers….. If ypu Vlan Pfsense, then, in theory, you only need one interface.
By all means correct me if I'm wrong...:)
Untangle doesn't have to be a router, just inspecs things and marks them if they contain viruses, or spyware or w/e. It can be configured as a router, I am not.
However I am alright with leaving untangle behind, though it would be a plus if it worked.
So if I did it the "normal" way without pfsense, with that 8 port managed siwtch. So I would configure the vlans from pfsense right?
-
I wasnt commenting on untangle….
-
I wasnt commenting on untangle….
Oh then I am missing something.
What would you personally think is a workable setup for what I want to do? Because I am getting mixed feedback :?
-
Vlans on the switch compared til vlans on one interface in Pfsense….....
-
For your config no additional smart switches needed.
Modem > (wan)pfsense(lan) > old switch with all user |(opt1) V One server in DMZ
-
For your config no additional smart switches needed.
Modem > (wan)pfsense(lan) > old switch with all user |(opt1) V One server in DMZ
Wait, so if I got another card in my router, that runs on subnet 10.10.10.0 and my main stuff runs on 192.168.1.0 they can't communicate? I thought they would be able to, and that's what the point of the vlan is. Atleast I think that's what you're saying?
Even if that would work theoritically, I want to use a manged switch, someone is buying me one for free ;D As long as I give them 24/7 remote access to a computer. (That is why I want it separated).
Also I don't want it dmz'd just want a few ports open.
-
All communcation between interfaces (subnets) will be managed by pfSense. If you wish you can allow everything between these interfaces, or conversly - disable any communication allowing everybody access to Internet. What is your point of separation?