Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Home lab vlan config help

    Scheduled Pinned Locked Moved Routing and Multi WAN
    14 Posts 4 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      Actually, you probably want to leave the switch in layer 2 mode.

      If you had this on pfSense:

      LAN em0_vlan100
      DMZ em0_vlan200
      SRVRS em0_vlan300

      You would do something like this on the switch:

      int gig 0
      switchport mode trunk
      switchport trunk allowed vlan 100,200,300

      Then all your firewalling will be done with pfSense.

      Now if you want to use the switch in Layer 3 mode, creating virtual interfaces for the VLANs and using access lists, that's cool too.  I have never really looked at it but I don't think those switches are stateful firewalls.  Pretty much just packet filters.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • J
        justsomeone
        last edited by

        The reason I like the idea of L3 switching is for my NAS and ownCloud: because they are not accessible from and do not have access to the internet it seems to make more sense not to pass them through pfSense - an unneeded hop.

        "Bad shit happens to drunk people."

        1 Reply Last reply Reply Quote 0
        • jahonixJ
          jahonix
          last edited by

          Absolutely and the switch is routing at link speed whereas you have to throw a whole lot of hardware onto pfSense to have it routing 1Gb/s constantly.

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            That is a fine use for a layer 3 switch.

            Please share your ACLs when you get something working.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • J
              justsomeone
              last edited by

              Got the basic ACL's working, its pretty easy. I'll write a tutorial later.

              "Bad shit happens to drunk people."

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                I was just looking for the ACLs you used.  But if you want to write a tutorial, all the better.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • J
                  justsomeone
                  last edited by

                  Yeah I'm gonna write one so no one else has to reinvent the wheel. I'll include screenshots and CLI commands.

                  "Bad shit happens to drunk people."

                  1 Reply Last reply Reply Quote 0
                  • C
                    Cino
                    last edited by

                    good stuff! I've been eye'in a SG300 myself… Not sure if I need more then 10ports and if I want the PoE version. Only have 2 devices have could use.

                    1 Reply Last reply Reply Quote 0
                    • jahonixJ
                      jahonix
                      last edited by

                      The naming of those SG300 switches in regards to PoE capabilities is a bit … non-intuitive  (P, PP, MP)
                      Other than that, to supply PoE to two devices I'd shoot for the -10P switch with the smallest amount of available power. Saves you two inserters and probably two walwart PSUs as well...

                      1 Reply Last reply Reply Quote 0
                      • jahonixJ
                        jahonix
                        last edited by

                        @justsomeone:

                        Yeah I'm gonna write one so no one else has to reinvent the wheel. I'll include screenshots and CLI commands.

                        Can you hint it's availability in THIS thread, please. I'll get notified of it automatically then.
                        Thanks!

                        1 Reply Last reply Reply Quote 0
                        • J
                          justsomeone
                          last edited by

                          I'm still working on the MAC ACL used for the wireless connection.

                          Expect a full tutorial in a day or two.

                          "Bad shit happens to drunk people."

                          1 Reply Last reply Reply Quote 0
                          • J
                            justsomeone
                            last edited by

                            So I finally wrote a basic IPv4 ACL tutorial for the Cisco SG300 series (I've been busy with work).

                            It's really basic, it's a little guide for blocking traffic to 2 other VLANs and allowing all other traffic. With a little thinking someone could adapt it for more specific needs.
                            http://kb.the-pds.net/?p=66

                            When I get some more time I'll post the tutorial on here.

                            "Bad shit happens to drunk people."

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.