Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Wrong assigned address

    Scheduled Pinned Locked Moved DHCP and DNS
    12 Posts 2 Posters 5.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F Offline
      fluca1978
      last edited by

      I found in the logs something that could help understanding what is going wrong:

      kernel: arp: 192.168.44.180 is on rl0 but got reply from 00:17:f2:07:68:1b on nfe0
      

      rl0 is the network card attached to the 192.168.44.0 network, while nfe0 is the one 192.168.4.0 network. The message says that, even if the address is registered (mapped) on the network 192.168.44.0 the interface of the other network is going to reply to the DHCP request.
      Is there something I can do about this?

      1 Reply Last reply Reply Quote 0
      • GruensFroeschliG Offline
        GruensFroeschli
        last edited by

        Did you plug two NICs into the same switch?
        If yes and you're actually running 2 DHCP servers on the same broadcast domain, you're just asking for trouble.
        Get another switch and separate your subnets.

        We do what we must, because we can.

        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

        1 Reply Last reply Reply Quote 0
        • F Offline
          fluca1978
          last edited by

          Ops…yeah I realized it after I post the message: wrong vlan configuration. Now it seems to work having separated well the switch ports.

          1 Reply Last reply Reply Quote 0
          • GruensFroeschliG Offline
            GruensFroeschli
            last edited by

            If you're using a VLAN switch you could create a trunk to the pfSense and create tagged virtual interfaces on the pfSense.
            Like this you could make sure that the traffic going to the switch certainly lands in the correct VLAN.

            We do what we must, because we can.

            Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

            1 Reply Last reply Reply Quote 0
            • F Offline
              fluca1978
              last edited by

              @GruensFroeschli:

              If you're using a VLAN switch you could create a trunk to the pfSense and create tagged virtual interfaces on the pfSense.

              Sorry,it is not clear to me what the benefits of this could be. Can you explain me better or point to some documentation about?

              1 Reply Last reply Reply Quote 0
              • GruensFroeschliG Offline
                GruensFroeschli
                last edited by

                The benefit is, that you need only one physical interface for as many interfaces as you need.
                you create as many VLANs as you need on this parent interface.
                Each VLAN apears on the pfSense as if it were a real interface.
                You then have only one cable to the switch.
                The VLAN configuration on the switch takes care that each VLAN interface can communicate only with the member ports of the same VLAN.

                IMO its just clearer to only have one trunk to the pfSense and separate traffic via configuration, than putting many NICs and connect multiple cables.

                I'll have to search the forum for documentation/howtos.
                (writing currently from iPhone).

                We do what we must, because we can.

                Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                1 Reply Last reply Reply Quote 0
                • F Offline
                  fluca1978
                  last edited by

                  But using one interface on the firewall will physically limit the bandwith for both the VLANs, while having it managed thru the switch plus two NICs will have a better backplane speed, isn't it? So I believe if possible the solution with a separate NIC for each network will give better performance.

                  1 Reply Last reply Reply Quote 0
                  • GruensFroeschliG Offline
                    GruensFroeschli
                    last edited by

                    Depends.
                    When i have such a setup i usually use a Netgear FS726T.
                    They have 2 Gbit port and 24 10/100 Mbit ports.
                    Using a Gbit port to the pfSense leaves much bandwidth free for additional VLANs.
                    But yes if you're just connecting a single 100 Mbit port you will probably be better off with 2 interfaces.

                    We do what we must, because we can.

                    Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                    1 Reply Last reply Reply Quote 0
                    • F Offline
                      fluca1978
                      last edited by

                      Having difficulties to get the two networks working (see http://forum.pfsense.org/index.php/topic,24454.0.html), could it be better to get pfsense manage vlans on a single nic instead of two nics? I have a switch with a gigabit port to use for the pfsense network card. In the case I use pfsense to manage the vlans should I have the switch to work in tagged or untagged mode?

                      1 Reply Last reply Reply Quote 0
                      • GruensFroeschliG Offline
                        GruensFroeschli
                        last edited by

                        When working with VLANs:

                        • If you assign a VLAN on a parent interface, DON'T assign the interface itself.
                          (ie: vlan100 on rl0, vlan200 on rl0, vlan300 on rl0, rl0 itself NOT assigned).

                        • Traffic leaving the pfSense is always tagged.
                          The switch should be apropriatly configured
                          –>accept only tagged traffic from the port going to the pfSense. Drop/block untagged traffic.
                          Traffic going to the pfSense should be tagged as well.
                          We dont assign the parent interface itself so untagged traffic will be dropped on the pfSense side too.

                        I dont see any problem with having VLANs on different parent interfaces.

                        We do what we must, because we can.

                        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.