Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Assistance with vlans on a dell switch and pfsense

    Scheduled Pinned Locked Moved General pfSense Questions
    14 Posts 6 Posters 6.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T Offline
      Trel
      last edited by

      @heper:

      what you probably want todo:

      on the switch:

      • set 1 port with all your vlans (T)agged | connect this to pfsense

      • set 1 port to vlan "a" on (U)ntagged | also change the PVID for that port to "a" (i think you can find it in "port settings" on a dell switch

      • set all remain ports  vlan "b" on  (U)ntagged | also change the PVID for all them ports to "b" (i think you can find it in "port settings" on a dell switch

      Do note that VLANS are allways addressed as numbers, so for example "a"=10 ; "b"=20

      on pfSense:

      • goto interfaces–>assign-->VLANS | add vlan "a" & "b" to your LAN parent-interface (em0,dc0,...?)

      • goto interfaces–>assign-->interface assignments | add a new interface and select the VLAN from the drop-down box

      After that you can setup the interface the same way you allways would / you also have to add some firewall rules to it, to allow some traffic to flow

      done

      If you have more questions, let us know

      Wow, I'm sorry, I forgot I posted this.

      I think I'm misunderstanding the terminology or I was not clear on what I'm trying to do.

      For this example I have a 24 port switch, pfsense is in port 1.

      What I want to do is
      Port 1: vlan 1 and 5
      Port 2-23: vlan 1
      Port 24: vlan 5

      I'm not really understanding the terminology on the switch which seem to be tagged/untagged egress, not a member, filter ingress, admit tagged, admit all.

      (I'm extremely new to anything with vlans on a switch.  I've only worked with it from the firewall end with an existing setup where I was told that vlan 1 is this, vlan 5 is this, etc)

      1 Reply Last reply Reply Quote 0
      • dotdashD Offline
        dotdash
        last edited by

        @Trel:

        Wow, I'm sorry, I forgot I posted this.

        I think I'm misunderstanding the terminology or I was not clear on what I'm trying to do.

        For this example I have a 24 port switch, pfsense is in port 1.

        What I want to do is
        Port 1: vlan 1 and 5
        Port 2-23: vlan 1
        Port 24: vlan 5

        I'm not really understanding the terminology on the switch which seem to be tagged/untagged egress, not a member, filter ingress, admit tagged, admit all.

        (I'm extremely new to anything with vlans on a switch.  I've only worked with it from the firewall end with an existing setup where I was told that vlan 1 is this, vlan 5 is this, etc)

        I'm working off memory, so the switch instruction might not be 100%, but you'd do something like-
        Log into the switch. Switching, vlans. create vlan 5. Click on vlan membership (or somesuch). open vlan 5, set port 1 as tagged, port 24 untagged.
        Expand vlan 1, set port 1 as tagged. (You may get an error- I never use vlan 1, it's the default vlan)
        Go into the advanced vlan options, the third choice and set the pvid for port 24 to vlan 5.

        1 Reply Last reply Reply Quote 0
        • T Offline
          Trel
          last edited by

          @dotdash:

          I'm working off memory, so the switch instruction might not be 100%, but you'd do something like-
          Log into the switch. Switching, vlans. create vlan 5. Click on vlan membership (or somesuch). open vlan 5, set port 1 as tagged, port 24 untagged.
          Expand vlan 1, set port 1 as tagged. (You may get an error- I never use vlan 1, it's the default vlan)
          Go into the advanced vlan options, the third choice and set the pvid for port 24 to vlan 5.

          It looks like I can't use my switch for vlans with this setup.  It doesn't not allow me to modify vlan1 in any way.

          I need to see about upgrading my switch.  Apparently this is a limitation of the Dell web managed switches.

          1 Reply Last reply Reply Quote 0
          • DerelictD Offline
            Derelict LAYER 8 Netgate
            last edited by

            Lots of switches don't let you modify vlan 1.  Doesn't matter as long as vlan 1 isn't assigned to any ports.

            Some switches don't let you set a management IP address on anything but vlan1.  That can be worked into your design, even though it totally sucks.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • T Offline
              Trel
              last edited by

              @Derelict:

              Lots of switches don't let you modify vlan 1.  Doesn't matter as long as vlan 1 isn't assigned to any ports.

              Some switches don't let you set a management IP address on anything but vlan1.  That can be worked into your design, even through it totally sucks.

              It not only doesn't let me modify vlan1, but it also won't let me include vlan1 in a trunk.  That's what's killing my proposed setup.

              1 Reply Last reply Reply Quote 0
              • DerelictD Offline
                Derelict LAYER 8 Netgate
                last edited by

                @Trel:

                @Derelict:

                Lots of switches don't let you modify vlan 1.  Doesn't matter as long as vlan 1 isn't assigned to any ports.

                Some switches don't let you set a management IP address on anything but vlan1.  That can be worked into your design, even through it totally sucks.

                It not only doesn't let me modify vlan1, but it also won't let me include vlan1 in a trunk.  That's what's killing my proposed setup.

                You can't trunk VLAN1.  It is, by design, untagged.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • T Offline
                  Trel
                  last edited by

                  @Derelict:

                  @Trel:

                  @Derelict:

                  Lots of switches don't let you modify vlan 1.  Doesn't matter as long as vlan 1 isn't assigned to any ports.

                  Some switches don't let you set a management IP address on anything but vlan1.  That can be worked into your design, even through it totally sucks.

                  It not only doesn't let me modify vlan1, but it also won't let me include vlan1 in a trunk.  That's what's killing my proposed setup.

                  You can't trunk VLAN1.  It is, by design, untagged.

                  I know.  The problem is this switch ONLY allows administration via the web interface and ONLY on vlan1.  Which means to set up the network, I need to cut off my access to the switch, unless I could have included vlan1 in the trunk.

                  1 Reply Last reply Reply Quote 0
                  • J Offline
                    jasonlitka
                    last edited by

                    @Trel:

                    @Derelict:

                    @Trel:

                    @Derelict:

                    Lots of switches don't let you modify vlan 1.  Doesn't matter as long as vlan 1 isn't assigned to any ports.

                    Some switches don't let you set a management IP address on anything but vlan1.  That can be worked into your design, even through it totally sucks.

                    It not only doesn't let me modify vlan1, but it also won't let me include vlan1 in a trunk.  That's what's killing my proposed setup.

                    You can't trunk VLAN1.  It is, by design, untagged.

                    I know.  The problem is this switch ONLY allows administration via the web interface and ONLY on vlan1.  Which means to set up the network, I need to cut off my access to the switch, unless I could have included vlan1 in the trunk.

                    Set all user ports to Access mode with the appropriate PVID (do NOT use 1).

                    Set the uplink port for your pfSense box to General (not Trunk) with a PVID of 1 and allow tagged packets from the VLANs you created above.

                    Create however many tagged VLAN interfaces are needed in your pfSense box, including one untagged for the native VLAN, and then use firewall rules to determine which of your computers are allowed to access each network.

                    I can break anything.

                    1 Reply Last reply Reply Quote 1
                    • dotdashD Offline
                      dotdash
                      last edited by

                      It's a bit of a hack, but I think you can get it to work if you leave LAN assigned to the interface and add an OPT for VLAN 5.
                      Your other option is to change LAN to VLAN 10 or something instead of 1 and accept that you won't be able to get into the switch unless you plug into a trunk port. I've done test setups like this before- if you're not going to need to modify the switch config very often, it works fine.

                      1 Reply Last reply Reply Quote 0
                      • T Offline
                        Trel
                        last edited by

                        @Jason:

                        Set all user ports to Access mode with the appropriate PVID (do NOT use 1).

                        Set the uplink port for your pfSense box to General (not Trunk) with a PVID of 1 and allow tagged packets from the VLANs you created above.

                        Create however many tagged VLAN interfaces are needed in your pfSense box, including one untagged for the native VLAN, and then use firewall rules to determine which of your computers are allowed to access each network.

                        I'll see if that works when I get home tonight, thanks.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.