Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PFSense with Cisco 3560 VLAN Setup

    Scheduled Pinned Locked Moved Routing and Multi WAN
    19 Posts 4 Posters 6.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      winet
      last edited by

      Hello, just looking for some input.
      I have the network setup in the attached diagram.

      With the configurations displayed, should my Client 10.110.110.1 / 24 be able to connect to the Internet?
      If yes - note that in my environment it does not - Why?
      If no - What am I missing?

      Going on Cisco's application on Inter Vlan Routing, this should work (with port connecting to to gateway set to "no Switch-port"), but alas it does work in my environment.

      Any ideas?

      Thanks

      ![WinetWireless Net Logic 01232015.jpg](/public/imported_attachments/1/WinetWireless Net Logic 01232015.jpg)
      ![WinetWireless Net Logic 01232015.jpg_thumb](/public/imported_attachments/1/WinetWireless Net Logic 01232015.jpg_thumb)
      ![WinetWireless Net Logic 01232015.jpg](/public/imported_attachments/1/WinetWireless Net Logic 01232015.jpg)
      ![WinetWireless Net Logic 01232015.jpg_thumb](/public/imported_attachments/1/WinetWireless Net Logic 01232015.jpg_thumb)

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        Instead of using generic terms like "connect to the internet" be more specific.

        Can 10.110.110.1 ping 10.110.110.254?  192.168.20.254?  8.8.8.8?

        Do the rules on pfSense LAN allow traffic from your 10.110.110.0/24 network?

        Did you add manual NAT rules in pfSense for 10.110.110.0/24 out WAN?

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • W
          winet
          last edited by

          Appreciate the feedback Derelict,

          10.110.110.1 is able to ping 10.110.110.254

          10.110.110.1 is not able to ping 192.168.20.254

          L3 switch, is able to ping 192.168.20.254 and 8.8.8.8

          I will review the LAN allow and NAT rules, I added and pull these out as I tested different configuration scenarios including creating matching Vlans and Vlan Interfaces on the PFSense box to reflect that on the L3 switch.

          Reviewing configs, appreciate the insight.

          1 Reply Last reply Reply Quote 0
          • W
            winet
            last edited by

            Hello Derelict and all,

            Appreciate the feedback and would like to share my success.

            I now have full functionality and below are the steps I needed to take to get to that functionality.

            Note that this piece of the configs is dependent on the configurations pointed out in this conversation and on the attached network diagram already being in place.

            I will update the diagram and potentially share that at a later date.

            On PFSense Box

            Creat Vlan 100 on X10
            Assigned interface (Opt3) to Vlan 100
            Assigned Opt3 IP address in Vlan 100 (192.168.20.3 / 24)
            Setup Opt3 as a Gateway and specify Gateway IP of 192.168.20.4 / 24 - Remember this gateway IP is the Vlan 100 interface IP on 3560 switch
            Setup Static route to networks 10.110.0.0 /16 via Opt3
            Add Outbound Nat Rule on all WAN interfaces (WAN, Opt1, Opt2) for networks 10.110.0.0 / 16
            Added Firewall Rule on Interface LAN to permit networks 10.110.0.0 /16
            Select (turn on) “Disable Mac Filtering” in Captive Portal Options

            It works well and I am able to leverage the Captive Portal to continue to authenticate clients across all Vlans.

            Now, I need to apply some access-lists to leverage security.

            Thanks again all

            1 Reply Last reply Reply Quote 0
            • W
              winet
              last edited by

              Just an update.

              I continue to see good functionality across all sub-nets except Vlan100 (192.168.20.0 / 24).

              Captive portal on that sub-net stop being enforced, no clients are being presented with the Login page.
              Not a huge problem as I can simply restrict that Vlan to administrative use and not serve public clients there.

              I does present a challenge where the need to turn off "Mac Filtering" on the PF box and not being to provide clients free access to the Internet via their Mac address limits the use of devices as ChromeCast, which do not at this time provide an Interface for login to Captive Portal type environments, on all Vlans other than Vlan 100.

              Any feedback?

              I am not very keen on placing a next PF box inline at this time.

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                pfSense has no way of knowing what the MAC addresses are on that VLAN.  There's a router between the clients and pfSense.

                Sorry. That's just the way layers 2 and 3 work.

                I think all you can do in that case is turn off the MAC address filtering and CP only by IP address. Disable MAC filtering checkbox in the CP instance.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • M
                  marvosa
                  last edited by

                  OP, my setup is nearly identical to yours and working.  You didn't need any of that extra work on PFsense… all you needed was a routed port with an IP address of 192.168.20.254 and you were home free.

                  Of course you would need to either change the IP range of VLAN 100 or... change the LAN subnet on PFsense, assign your routed port an IP in the PFsense LAN and modify your default route accordingly.

                  1 Reply Last reply Reply Quote 0
                  • W
                    winet
                    last edited by

                    marvosa, I appreciate the insight.
                    You highlighted o my my primary challenges with this setup.
                    Vlan 100 is a production network, service clients and hosts servers.
                    An outage for entire reconfig is not permissible at  this time, so I am attempting to bring functionality without interruption in service.

                    With the setup I outlined, I was bale to service clients on all Vlan and ironed out the issues with devices as Chromecast on any Vlan, however I have not been able to permit the pass through of servers and services that required access prior to Captive Portal Login, say for example a server that provided clients the opportunity to create and account so that they are able to use said account to in turn login to Captive Portal.

                    I attempted an alternate configuration consistent with the PFsense 2.1 guide and having some functionality issues, please review below and let me know what you think.

                    On the PFsense Box

                    WAN - bge0 - Interface WAN - 192.168.1.254 /24
                              LAN - xl0 - Interface LAN - 192.168.20.254
                              Other Interface - xl1 - In not assigned an interface

                    Vlans
                              Vlan 10 0n xl1 - 10.110.110.254 / 24
                              Vlan 11 0n xl1 - 10.110.111.254 / 24
                              Vlan 12 0n xl1 - 10.110.112.254 / 24

                    DHCP, DNS, Captive Portal configured for all interfaceswith the exception of bge0 and xl1.

                    According to the guide, the parent interface refers to the physical interface where the VLANs reside, such as em0 or bge0, in my case (xl1).
                              When you configure VLANs on pfSense, each is assigned a virtual interface, starting with vlan0 and incrementing by one for each additional VLAN configured.
                              You should not assign your parent interface to any interface on pfSense — its sole function should be as the parent for the defined VLANs.

                    On Cisco 3560

                    VTP Database - Vlan 10, Vlan 11, Vlan 12

                    Interface Vlan10 - 10.110.110.253 /24
                                Interface Vlan11 - 10.110.111.253 /24
                                Interface Vlan12 - 10.110.112.253 /24
                                The guide did not specify the need for these interfaces, I created them to be able to access core switch from respective vlans.

                    Interface Fast 0/24 - Switchport mode trunk, switchport trunk dot1q, permit vlan all.
                                Interface Fast 0/8 - switchport access Vlan 10
                                Interface Fast 0/9 - switchport access Vlan 11

                    Here is the challenge I face, clients are able to successfully engage DHCP services and are provided an IP address in the respective Vlan when connected to that vlan's associated port.

                    From the PFsense box, I am able to ping the clients with no challenge, everything appears to work well.

                    From the client, I am not able to ping the PFsense box at all.
                    The clients are pointed to their respective vlan interface IP address as their default gateway  (10.110.110.254 and 10.110.111.254 respectively).

                    I have read and read read the guide and also drew on other configurations examples and challenges outlined on the web, I have not yet found something that will help me resolve this challenge.

                    Do you have any pointers?

                    Appreciated.

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      I'm confused why you think you need layer3 interfaces on the switch AND pfSense.  When do you route traffic to 10.110.111.253, for instance?  But it's pretty harmless I guess.

                      Do you have the necessary firewall rules on the vlan11 and vlan12 interfaces on pfSense allowing the traffic into the interfaces?  The rules allowing DHCP are automatically and transparently entered for you when you enable the DHCP server.  Rules allowing all other traffic are not.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • W
                        winet
                        last edited by

                        Thanks Derelict, in response to you feedback,

                        I'm confused why you think you need layer3 interfaces on the switch AND pfSense.
                        I do not think I need the L3 interfaces on the switch, I configured them as a means to get connectivity to the switch from every Vlan , say ssh for example.

                        When do you route traffic to 10.110.111.253, for instance?
                        I do not route any traffic through these interfaces, I intend to use these to simply initiate connects to the switch as and when necessary from respective Vlans.

                        Do you have the necessary firewall rules on the vlan11 and vlan12 interfaces on pfSense allowing the traffic into the interfaces?
                        Yes, I enabled a allow all rule on all Interfaces to ensure these were not getting in my way. All interfaces configured with a pass any any rule.

                        Appreciate your support.

                        1 Reply Last reply Reply Quote 0
                        • W
                          winet
                          last edited by

                          I neglected to point out this bit of info in my last representation of the configurations.

                          Interface Fast 0/24 - Switchport mode trunk, switchport trunk dot1q, permit Vlan all - Fast 0/24 is connected directly to xl1 interface on PFsense box.

                          Thanks

                          1 Reply Last reply Reply Quote 0
                          • W
                            winet
                            last edited by

                            Just an update for anyone reading this post while looking for help.
                            My challenge with not being able to ping or communicate with respective Vlan gateways was as a result of incorrectly specified firewall rules.
                            I permitted traffic from anyone to anyone however that traffic was still specified as TCP in the protocol field.
                            Once the rule is update to Any protocol, from any network to any network I was able to successfully get out to the Internet using a host on any Vlan.

                            I continue to iron out one challenge which, going on all the documentation I have seen appears to be hardware related.
                            Using a X1(4) interface with long frame support, but not Vlan hardware support appears to be inhibiting my ability to communicate to other hosts on the home network other than the default gateway.

                            1 Reply Last reply Reply Quote 0
                            • B
                              blackbrayn
                              last edited by

                              In my opinion , the c3560 should be used just as a switch and you can configure all the L3 interfaces on the pfsense box.
                              It would be more flexible , and there si no need to do static routing for every new subnet.
                              Not to mention -  if problems occur , you can tcpudmp on the selected vlan straight from the pfsense box , not on all the L3 trafic + you are able to dump  L2 trafic that you can't directly see from the current setup.

                              1 Reply Last reply Reply Quote 0
                              • M
                                marvosa
                                last edited by

                                @blackbrayn:

                                In my opinion , the c3560 should be used just as a switch and you can configure all the L3 interfaces on the pfsense box.
                                It would be more flexible , and there si no need to do static routing for every new subnet.
                                Not to mention -  if problems occur , you can tcpudmp on the selected vlan straight from the pfsense box , not on all the L3 trafic + you are able to dump  L2 trafic that you can't directly see from the current setup.

                                I disagree, it depends on your priorities.  His current setup is going to give him the best performance as all inter-vlan traffic will be handled by the switch and only routing internet traffic to PFsense.  Your suggestion would send inter-vlan traffic through PFsense, which could saturate that link and cause performance issues throughout the network.

                                The only thing you gain by terminating vlans on PFsense is the ability to have a firewall between vlans.

                                1 Reply Last reply Reply Quote 0
                                • W
                                  winet
                                  last edited by

                                  I appreciate both your inputs, very valid.
                                  blackbrayn approached this from a ease of setup perspective while marvosa more so from a functionality perspective.
                                  marvosa's point is exactly why I chose this setup, have the core switch manage all traffic local to the network and forward only traffic destined to the Internet to the PF box.

                                  I have also configured consistent with PF 2.1 manual, which instructs the use of an alternate interface which results in the creation of the Vlans on the PF box and also addresses the issue of potential bottle neck as the local network traffic remains on the alternate Interface.

                                  See the attached for diagram of that setup.

                                  Even with the PF recommended setup, I continue to experience a challenge where clients on respective Vlans are not able to communicate with hosts on the home network segment (LAN) other than the address of the LAN interface. Vlan clients can see out to the Internet, login to captive portal, but are not able to access production servers on the LAN network.

                                  My research so far points to my interface type not being able to handle Vlan hardware support, according to manual, routing between all locally created network on the PF box is automatic. Here is what the manual says about the adapters, I have one of the X1(4) adapters. Any ideas?

                                  If you encounter problems using one of the NICs listed under long frame support, trying an interface with VLAN hardware tagging support is recommended. We are not aware of any similar problems with NICs listed under VLAN hardware support.
                                  Ethernet interfaces with VLAN hardware support:
                                  bce(4), bge(4), cxgb(4), em(4), ixgb(4), msk(4), nge(4), re(4), stge(4), ti(4),
                                  txp(4), vge(4).

                                  Ethernet interfaces with long frame support:
                                  bfe(4), dc(4), fxp(4), gem(4), hme(4), le(4), nfe(4), nve(4), rl(4), sis(4), sk(4), ste(4), tl(4), tx(4), vr(4), xl(4)

                                  ![WinetWireless Net Logic Updated 02062015.jpg](/public/imported_attachments/1/WinetWireless Net Logic Updated 02062015.jpg)
                                  ![WinetWireless Net Logic Updated 02062015.jpg_thumb](/public/imported_attachments/1/WinetWireless Net Logic Updated 02062015.jpg_thumb)

                                  1 Reply Last reply Reply Quote 0
                                  • DerelictD
                                    Derelict LAYER 8 Netgate
                                    last edited by

                                    So are there SVIs on the switch or just VLANs?  Your diagram looks like the interface addresses are on pfSense.  Looks like even though the switch is in layer 3 mode you're using it as layer 2 which is fine.

                                    Are the comments at the bottom of your diagram how it's working or how you want it to work?

                                    There is no need for the clients behind the 3560 to be able to talk to the RADIUS server.  Only pfSense has to do that. if you want them to, you need the proper firewall rules on your pfSense interfaces to pass the traffic.

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    1 Reply Last reply Reply Quote 0
                                    • W
                                      winet
                                      last edited by

                                      Appreciate the feedback Derelict.
                                      Per the 2.1 manual, one only need to configure identical vlan info on the core switch and not necessarily an interface.

                                      I have been over the Firewall rules for some time and currently I pass any protocol, form any host, to any host on all interfaces other than the WAN.

                                      Regards connecting to the server, I require this functionality as the server also supports user services that may need to be accessed before the user can successfully login to the network, password reset for example.

                                      I appreciate the insight, I am looking these rules over again.

                                      1 Reply Last reply Reply Quote 0
                                      • W
                                        winet
                                        last edited by

                                        All to close up this post.
                                        The issue was one of routing, not on the PF box though.

                                        Going on the last net diagram, I had to make static entries to the respective Networks (Vlans, 10, 11, …) on the authentication server.
                                        Had to tell the server how to get traffic back to the VLans.

                                        With that in place, everything works nicely.

                                        Appreciates your insights.

                                        1 Reply Last reply Reply Quote 0
                                        • DerelictD
                                          Derelict LAYER 8 Netgate
                                          last edited by

                                          Hmm.  Seems a default route to pfSense would have been sufficient.

                                          Chattanooga, Tennessee, USA
                                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.