Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Setting up a VLAN part 2

    General pfSense Questions
    3
    110
    37.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      @tomdlgns:

      this gets better and better

      :D

      @tomdlgns:

      where is 192.168.2.x coming from? and now another NIC?

      192.168.2.X is just a subnet I invented to be the extra interface used for admin access.
      There are still only 3 NICs but there are two VLANs on re1.

      @tomdlgns:

      -i'd like to setup a VLAN so i can work/test with it
      what i planned on was this:

      re0-WAN
      re1- VLAN100 10.10.10.x
      re2- my regular lan 192.168.1.x

      Ok, we can aim for this. This will use three NICs at the end where as originally you wanted to use just two.

      @tomdlgns:

      what i wanted to do was then use my hp switch to work with the pfsense box

      ports 1-4 would run the 192.168.1.x network and ports 5-8 would be tagged ports on vlan 100.  i assumed that doing it this way would allow anything plugged into ports 5-8 would work on the vlan100 network.

      later on, if i introduced a second vlan, vlan200 i THOUGHT i would be able to untag ports 7.8 and tag those in vlan 200 to work on another subnet.

      Yes that's what we will do except that you will need 2 of the ports on your switch to connect to the pfSense box so you will only have 6 left for connecting clients (or other switches).

      @tomdlgns:

      apparently i am wrong in how vlans work, but i thought that was the entire point of VLANS… separate networks on the same physical switch.

      You are right, that's exactly what they're for.

      Here is the switch config I would expect to work for your current setup:

      
      port:        1 2 3 4 5 6 7 8 
      vlan1:       E E E E U U U U
      vlan100:     T U U U E E E E
      
      

      In which port 1 is connected to re1 and port 8 is connected to re2.
      This will give you 10.10.10.x on ports 2-4 and 192.168.1.X on ports 5-7.

      Are all your NICs identical?

      Steve

      1 Reply Last reply Reply Quote 0
      • ?
        A Former User
        last edited by

        @stephenw10:

        @tomdlgns:

        this gets better and better

        :D

        @tomdlgns:

        where is 192.168.2.x coming from? and now another NIC?

        192.168.2.X is just a subnet I invented to be the extra interface used for admin access.
        There are still only 3 NICs but there are two VLANs on re1.

        @tomdlgns:

        -i'd like to setup a VLAN so i can work/test with it
        what i planned on was this:

        re0-WAN
        re1- VLAN100 10.10.10.x
        re2- my regular lan 192.168.1.x

        Ok, we can aim for this. This will use three NICs at the end where as originally you wanted to use just two.

        @tomdlgns:

        what i wanted to do was then use my hp switch to work with the pfsense box

        ports 1-4 would run the 192.168.1.x network and ports 5-8 would be tagged ports on vlan 100.  i assumed that doing it this way would allow anything plugged into ports 5-8 would work on the vlan100 network.

        later on, if i introduced a second vlan, vlan200 i THOUGHT i would be able to untag ports 7.8 and tag those in vlan 200 to work on another subnet.

        Yes that's what we will do except that you will need 2 of the ports on your switch to connect to the pfSense box so you will only have 6 left for connecting clients (or other switches).

        @tomdlgns:

        apparently i am wrong in how vlans work, but i thought that was the entire point of VLANS… separate networks on the same physical switch.

        You are right, that's exactly what they're for.

        Here is the switch config I would expect to work for your current setup:

        
        port:        1 2 3 4 5 6 7 8 
        vlan1:       E E E E U U U U
        vlan100:     T U U U E E E E
        
        

        In which port 1 is connected to re1 and port 8 is connected to re2.
        This will give you 10.10.10.x on ports 2-4 and 192.168.1.X on ports 5-7.

        Are all your NICs identical?

        Steve

        thanks steve.  i didnt realize, until after i posted, that you were using the same nic for the other vlan, my bad on that.

        i have 3 nics now and i wanted to only use 2 until it was brought up that carrying multiple vlan traffic over 1 wire/nic might not work if the nic isnt vlan compatible, that is when the second LAN NIC (3rd NIC if you count WAN) was introduced.

        i realize i will only have 6 ports to use for devices, but what i was getting at was that 1-4 was for 1 subnet and 5-8 was for another subnet (or did i mess up again)? 1 and 5 would be used for the respective NICs on pfsense.

        my main goal is to

        -incorporate a vlan
        -not lock myself out of anything

        i want to keep my existing 192.168.1.x network as is (for the other devices on it) and i want to be able to manage pfsense from any 192.168.1.x computer

        knowing all of that, do you still suggest i connect/configure my network with what your last posted stated?

        i dont mind a little redesign, but i want to make sure we are talking about the same stuff when i begin to implement this

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Yes try my last suggestion. It should work, then again I thought that before!  ::)

          Steve

          1 Reply Last reply Reply Quote 0
          • ?
            A Former User
            last edited by

            @stephenw10:

            Yes try my last suggestion. It should work, then again I thought that before!  ::)

            Steve

            ok thanks, will try that

            can you explain why only 1 port is Tagges on vlan100?

            port:        1 2 3 4 5 6 7 8
            vlan1:      E E E E U U U U
            vlan100:    T U U U E E E E

            why isnt vlan100: T T T T E E E E

            i understand why vlan1 is E E E E (those ports are for vlan100) and U U U U on vlan100 are untagged packets for the 192.168.1.x network, correct?

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              The three different port modes are like this as I understand it, though I don't actually have an HP switch:

              E - Exclude this port from VLANX. I.e. any packets arriving on the port from outside tagged VLANX will be disgarded and any packets inside the switch tagged VLANX will not switched to this port.

              U - Untagged port. I.e. packets in the switch tagged VLANX can be switched to this port and will have tags removed when leaving. Untagged packets arriving on this port will be tagged VLANX upon entering the switch.

              T - Tagged port. Packets tagged VLANX inside the switch can be switched to this port and leave the switch still tagged. Packets arriving at the switch tagged VLANX are allowed to enter.
              Confusingly this this port type is also referred to as a trunk port because it can be a member of many vlans carrying all traffic to your router.

              In the switch configuration packets arriving at ports 2, 3 or 4 will be tagged VLAN100 as they enter the switch. They can then be switched to any other port participating in VLAN100 (1-4). If the packet is addressed to the internet somewhere it will be switched to port 1 where it leaves the switch still tagged and arrives at re1 where the pfSense VLAN100 interface is setup to receive it and route it appropriately.

              Returning packets are sent to the switch from pfSense tagged VLAN100. Port 1 allows them to enter the switch and they are switched to the correct port. On leaving the port (2-4) the VLAN tagging removed so that the pakets arrive back at the client untagged and able to received.

              Steve

              1 Reply Last reply Reply Quote 0
              • ?
                A Former User
                last edited by

                @stephenw10:

                The three different port modes are like this as I understand it, though I don't actually have an HP switch:

                E - Exclude this port from VLANX. I.e. any packets arriving on the port from outside tagged VLANX will be disgarded and any packets inside the switch tagged VLANX will not switched to this port.

                U - Untagged port. I.e. packets in the switch tagged VLANX can be switched to this port and will have tags removed when leaving. Untagged packets arriving on this port will be tagged VLANX upon entering the switch.

                T - Tagged port. Packets tagged VLANX inside the switch can be switched to this port and leave the switch still tagged. Packets arriving at the switch tagged VLANX are allowed to enter.
                Confusingly this this port type is also referred to as a trunk port because it can be a member of many vlans carrying all traffic to your router.

                In the switch configuration packets arriving at ports 2, 3 or 4 will be tagged VLAN100 as they enter the switch. They can then be switched to any other port participating in VLAN100 (1-4). If the packet is addressed to the internet somewhere it will be switched to port 1 where it leaves the switch still tagged and arrives at re1 where the pfSense VLAN100 interface is setup to receive it and route it appropriately.

                Returning packets are sent to the switch from pfSense tagged VLAN100. Port 1 allows them to enter the switch and they are switched to the correct port. On leaving the port (2-4) the VLAN tagging removed so that the pakets arrive back at the client untagged and able to received.

                Steve

                i am going to read that over a few times.  at first glance i am pretty confident that your explanation was very good, it makes sense.  i wish you posted that on page 1.

                ;D

                1 Reply Last reply Reply Quote 0
                • ?
                  A Former User
                  last edited by

                  @stephenw10:

                  Yes try my last suggestion. It should work, then again I thought that before!  ::)

                  Steve

                  so far so good, we are making progress.

                  192 PCs are working and my laptop, plugged into port 2 with port 1 going to re1 like you said is giving out a 10.10.10.x ip address.

                  however, we are not done yet.

                  the pc on the 10.10.10.x network cant hit the internet.

                  do i need to write a firewall rule for that?

                  EDIT- ok, i decided to add another port, port 4, away from vlan100 and into vlan1 (the default VLAN).

                  i marked it as U in vlan 1 and E in vlan100 and saved…no issues, works well. :)

                  i finally feel like i am making some progress being able to get this somewhat working and seeing it physically plugged in.

                  once i get some more help (fingers crossed) regarding the 10.10.10.x PC not being able to hit the internet, i am going to document this setup so i know what it takes to get it up.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    If your PC on the VLAN100 port is receiving DHCP then you're 99% there.  :)

                    Yes you need to put a firewall on the VLAN100 interface (OPT1 or whatever you have called it) to allow access to the internet.
                    You can use the default rule on LAN as a template but bare in mind that's a very open rule.

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • ?
                      A Former User
                      last edited by

                      @stephenw10:

                      If your PC on the VLAN100 port is receiving DHCP then you're 99% there.  :)

                      Yes you need to put a firewall on the VLAN100 interface (OPT1 or whatever you have called it) to allow access to the internet.
                      You can use the default rule on LAN as a template but bare in mind that's a very open rule.

                      Steve

                      thanks.

                      how about ping?  my pc grabbed 10.10.10.210, the first ip in the range, but i couldnt ping 10.10.10.0 or .1 do i need to write a rule for that?  i had another PC on vlan100 and i couldnt ping it.

                      however, from a 192.168.1.x computer, i was able to ping 10.10.10.210 i was happy to see replies, but i expected to get 0 replies from the start w/o writing rules for that stuff.

                      EDIT- FINALLY ONLINE WITH A PC ON THE VLAN…..YESSSSSSSSSSSS

                      EDIT- now that the wide open rules are open (* everywhere) i can ping 10.10.10.1.  as i stated in the post below, i believe it is all firewall rules at this point.  obviously i dont want VLANs talking to each other.  some, maybe, but not all.

                      1 Reply Last reply Reply Quote 0
                      • ?
                        A Former User
                        last edited by

                        my LAN rule is

                        protocol- *
                        source- LAN net
                        port- *
                        destination- *
                        port- *
                        gate- *
                        queue- none

                        that is the default rule for LAN.  since there are no rules to deny vlan subnets is that why i can ping?

                        now that i made rules for VLAN, i can ping 192 addresses from the 10 network.

                        i assume this is all firewall rules at this point?

                        1 Reply Last reply Reply Quote 0
                        • ?
                          A Former User
                          last edited by

                          @stephenw10:

                          The three different port modes are like this as I understand it, though I don't actually have an HP switch:

                          E - Exclude this port from VLANX. I.e. any packets arriving on the port from outside tagged VLANX will be disgarded and any packets inside the switch tagged VLANX will not switched to this port.

                          U - Untagged port. I.e. packets in the switch tagged VLANX can be switched to this port and will have tags removed when leaving. Untagged packets arriving on this port will be tagged VLANX upon entering the switch.

                          T - Tagged port. Packets tagged VLANX inside the switch can be switched to this port and leave the switch still tagged. Packets arriving at the switch tagged VLANX are allowed to enter.
                          Confusingly this this port type is also referred to as a trunk port because it can be a member of many vlans carrying all traffic to your router.

                          In the switch configuration packets arriving at ports 2, 3 or 4 will be tagged VLAN100 as they enter the switch. They can then be switched to any other port participating in VLAN100 (1-4). If the packet is addressed to the internet somewhere it will be switched to port 1 where it leaves the switch still tagged and arrives at re1 where the pfSense VLAN100 interface is setup to receive it and route it appropriately.

                          Returning packets are sent to the switch from pfSense tagged VLAN100. Port 1 allows them to enter the switch and they are switched to the correct port. On leaving the port (2-4) the VLAN tagging removed so that the pakets arrive back at the client untagged and able to received.

                          Steve

                          i have access to another HP switch (not the one i am using in this thread) and it looks a little more vlan friendly, these are the options and what they mean.

                          http://www.hp.com/rnd/device_help/help/hpwnd/webhelp/HPJ4813A/configuration_vlan.htm

                          that isnt for the specific switch i have, but the t/u/f/n list has to be the same…

                          The modes are:

                          Tagged - When a port is tagged, it allows communication among the different VLANs to which it is assigned.
                          Untagged - When a port is untagged, it can only be a member on one VLAN.
                          No - The port is not a member of that VLAN.
                          Forbid - The port is "forbidden" to join that VLAN.

                          am i right in assuming that No and Forbid can be used, loosely, if your main goal is to not allow a specific port(s) in a particular vlan?

                          i know this is more of an HP specific question, but figure it wouldn't hurt to get the opinion of people who are morre familiar with vlans.

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Congratulations!  ;D

                            I'm not sure what the difference might be between 'No' and 'Forbid'.  :-\ I'd have to read the manual to try and find out. What switch model is it?

                            The ping command uses the IGMP protocol. You can allow it specifically by setting a firewall rule with 'protocol - IGMP' or include it in a rule with 'protocol - *'.

                            Yes, it's all firewall rules at this point.  ;)

                            It's interesting that this worked and previous things didn't. It seems to confirm the fact that tagged and untagged packets on the same NIC can be a problem.
                            Are all your NICs exactly the same?

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • ?
                              A Former User
                              last edited by

                              @stephenw10:

                              Congratulations!  ;D

                              I'm not sure what the difference might be between 'No' and 'Forbid'.  :-\ I'd have to read the manual to try and find out. What switch model is it?

                              The ping command uses the IGMP protocol. You can allow it specifically by setting a firewall rule with 'protocol - IGMP' or include it in a rule with 'protocol - *'.

                              Yes, it's all firewall rules at this point.  ;)

                              It's interesting that this worked and previous things didn't. It seems to confirm the fact that tagged and untagged packets on the same NIC can be a problem.
                              Are all your NICs exactly the same?

                              Steve

                              mabye i wasnt tagging/untagging properly last time.  there was some back and forth between configuration, i might have been tagging/untagging for the wrong wiring configuration.

                              or maybe i was doing it right and the card isnt vlan friendly, not sure.

                              the on board NIC on the motherboard is probably different than the two NICs that i have in the PCI slots.  the two NICs in the PCI slots are identical (re1, re2).

                              i am not worried about the LAN rules being as open as they are, if anything this is a 'test' lab, but i am going to go and enforce some rules to deny traffic between networks.

                              i want to do two things now that i got this far:

                              1- figure out why vlan 100 was T U U U E E E E and not T T T T E E E E.  you wrote your your explanation, but i need to read it again.  this goes back to why vlans were confusing me.  i assumed the 4 ports i wanted on vlan100 would be tagged for vlan100, but for some reason it is only the port that talks to the pfsense vlan100 NIC.  the E's make sense in both vlan1 and 100.  Even the Us in vlan 1 make sense.

                              2- now that i got the vlan working, i want to test a second vlan on NIC re1 (2 vlans on 1 NIC.).  i am going to create vlan200 and see if i can get that working (but not until i focus more time on 1 to better understand the tagging/untagging.  if i dont get that figured out, there is no point in moving forward.

                              the switch with the No/Forbid is a HP ProCurve Switch 2810-24 G.

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                Ok, reading the relevant manual for that switch:
                                http://ftp.hp.com/pub/networking/software/2810-AdvTrafficMgmt-July2007-59914733.pdf

                                For static VLANs, which we are using here, No is equivalent to Exclude.
                                You would only use 'forbid' when using Dymanic VLANs (see GVRP). This is way beyond my experience is something that you're very unlikely to need.  ;)

                                Steve

                                1 Reply Last reply Reply Quote 0
                                • ?
                                  A Former User
                                  last edited by

                                  @stephenw10:

                                  Ok, reading the relevant manual for that switch:
                                  http://ftp.hp.com/pub/networking/software/2810-AdvTrafficMgmt-July2007-59914733.pdf

                                  For static VLANs, which we are using here, No is equivalent to Exclude.
                                  You would only use 'forbid' when using Dymanic VLANs (see GVRP). This is way beyond my experience is something that you're very unlikely to need.  ;)

                                  Steve

                                  yeah, i agree, i was going to stick with no.

                                  1 Reply Last reply Reply Quote 0
                                  • ?
                                    A Former User
                                    last edited by

                                    @stephenw10:

                                    The three different port modes are like this as I understand it, though I don't actually have an HP switch:

                                    E - Exclude this port from VLANX. I.e. any packets arriving on the port from outside tagged VLANX will be disgarded and any packets inside the switch tagged VLANX will not switched to this port.

                                    U - Untagged port. I.e. packets in the switch tagged VLANX can be switched to this port and will have tags removed when leaving. Untagged packets arriving on this port will be tagged VLANX upon entering the switch.

                                    T - Tagged port. Packets tagged VLANX inside the switch can be switched to this port and leave the switch still tagged. Packets arriving at the switch tagged VLANX are allowed to enter.
                                    Confusingly this this port type is also referred to as a trunk port because it can be a member of many vlans carrying all traffic to your router.

                                    In the switch configuration packets arriving at ports 2, 3 or 4 will be tagged VLAN100 as they enter the switch. They can then be switched to any other port participating in VLAN100 (1-4). If the packet is addressed to the internet somewhere it will be switched to port 1 where it leaves the switch still tagged and arrives at re1 where the pfSense VLAN100 interface is setup to receive it and route it appropriately.

                                    Returning packets are sent to the switch from pfSense tagged VLAN100. Port 1 allows them to enter the switch and they are switched to the correct port. On leaving the port (2-4) the VLAN tagging removed so that the pakets arrive back at the client untagged and able to received.

                                    Steve

                                    ok, if i am understanding this correct, will my next vlan look like this?

                                    vlan1- E E E E E E U U (re2) ports 7,8 operate on 192.168.1.x

                                    vlan 100- T U U U E E E E (re1) ports 1,2,3,4 operate on 10.10.10.x

                                    vlan 200- T E E E U U E E (re1) ports 5,6 operate on 172.10.10.x (new VLAN i will create)

                                    my only question (assuming i did it right) is…am i right in tagging port 1 in vlan100 and vlan200 since it shares the same cable/nic to pfsense?

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Yes looks good.  :)
                                      In this setup you will have only one port available for 192.168.1.X clients since the other is linked back to re2. This means you can still access the switch GUI on that subnet though.

                                      Steve

                                      1 Reply Last reply Reply Quote 0
                                      • ?
                                        A Former User
                                        last edited by

                                        @stephenw10:

                                        Yes looks good.  :)
                                        In this setup you will have only one port available for 192.168.1.X clients since the other is linked back to re2. This means you can still access the switch GUI on that subnet though.

                                        Steve

                                        ok good, i think i am picking up on vlans.

                                        actually, that one port plugs into a 16 port netgear switch, so anything on that switch is also 192 and will also be able to hit pfsense since it is on the 192.168.1.x subnet.

                                        EDIT- so for every additional vlan i create, port 1 will always be tagged, assuming the vlan connects back to the same NIC in pfsense?  i only bring it up because the other hp switch i have access to has 24 ports, so i can create more vlans and assign them to re1.  and if i did that, port 1 in every vlan would always be tagged, right?…..that is what i gathered after reading this:

                                        T - Tagged port. Packets tagged VLANX inside the switch can be switched to this port and leave the switch still tagged. Packets arriving at the switch tagged VLANX are allowed to enter.
                                        Confusingly this this port type is also referred to as a trunk port because it can be a member of many vlans carrying all traffic to your router.

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          @tomdlgns:

                                          ok good, i think i am picking up on vlans.

                                          Yep.  ;)

                                          @tomdlgns:

                                          actually, that one port plugs into a 16 port netgear switch, so anything on that switch is also 192 and will also be able to hit pfsense since it is on the 192.168.1.x subnet.

                                          Not a problem then.

                                          @tomdlgns:

                                          EDIT- so for every additional vlan i create, port 1 will always be tagged, assuming the vlan connects back to the same NIC in pfsense?  i only bring it up because the other hp switch i have access to has 24 ports, so i can create more vlans and assign them to re1.  and if i did that, port 1 in every vlan would always be tagged, right?

                                          Yes you always need to add the pfSense connection as a tagged port in order to allow VLAN tagged packets to make it back pfSense where it can be received by the VLAN interface.

                                          Assuming port1 is connected to re1, and that re1 has VLAN interfaces setup on it (as it is currently) then yes you would add this as tagged to every VLAN. (except VLAN1!)

                                          Once you have a good grip on this you can try something interesting like connecting your second switch to the first one. Then it's possible to send VLANs between the switches using tagged ports on the connecting cable. But one step at a time!  ;)

                                          Steve

                                          1 Reply Last reply Reply Quote 0
                                          • ?
                                            A Former User
                                            last edited by

                                            @stephenw10:

                                            @tomdlgns:

                                            ok good, i think i am picking up on vlans.

                                            Yep.  ;)

                                            @tomdlgns:

                                            actually, that one port plugs into a 16 port netgear switch, so anything on that switch is also 192 and will also be able to hit pfsense since it is on the 192.168.1.x subnet.

                                            Not a problem then.

                                            @tomdlgns:

                                            EDIT- so for every additional vlan i create, port 1 will always be tagged, assuming the vlan connects back to the same NIC in pfsense?  i only bring it up because the other hp switch i have access to has 24 ports, so i can create more vlans and assign them to re1.  and if i did that, port 1 in every vlan would always be tagged, right?

                                            Yes you always need to add the pfSense connection as a tagged port in order to allow VLAN tagged packets to make it back pfSense where it can be received by the VLAN interface.

                                            Assuming port1 is connected to re1, and that re1 has VLAN interfaces setup on it (as it is currently) then yes you would add this as tagged to every VLAN. (except VLAN1!)

                                            Once you have a good grip on this you can try something interesting like connecting your second switch to the first one. Then it's possible to send VLANs between the switches using tagged ports on the connecting cable. But one step at a time!  ;)

                                            Steve

                                            Assuming port1 is connected to re1, and that re1 has VLAN interfaces setup on it (as it is currently) then yes you would add this as tagged to every VLAN. (except VLAN1!)

                                            correct, vlan1 is untouched from what i have above.

                                            Once you have a good grip on this you can try something interesting like connecting your second switch to the first one. Then it's possible to send VLANs between the switches using tagged ports on the connecting cable. But one step at a time!  ;)

                                            this is exactly the next thing i was going to try once i got vlan200 setup.  i wont even ask my question until i can successfully get vlan200 up and online.

                                            thanks for the help.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.