Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN works only one direction?

    Scheduled Pinned Locked Moved Routing and Multi WAN
    54 Posts 7 Posters 16.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      bennyc
      last edited by

      @magnifico:

      The problem with ping wasn in WiFi router, there was firmware upgrade before…..

      Right. No vlan bug??  :o
      Oh well… Good thing is you didn't had to make a drawing...  ::)

      4x XG-7100 (2xHA), 1x SG-4860, 1x SG-2100
      1x PC Engines APU2C4, 1x PC Engines APU1C4

      1 Reply Last reply Reply Quote 0
      • M Offline
        magnifico
        last edited by

        @bennyc:

        @magnifico:

        The problem with ping wasn in WiFi router, there was firmware upgrade before…..

        Right. No vlan bug??  :o
        Oh well… Good thing is you didn't had to make a drawing...  ::)

        Yes, there wasnt needed drawing.

        1 Reply Last reply Reply Quote 0
        • johnpozJ Online
          johnpoz LAYER 8 Global Moderator
          last edited by

          "f it is connected to other L3 switches or networks for which pfSense is NOT doing the routing (there are more subnets to reach on those interfaces), that would be needed."

          That would not be a "gateway" that would be a ROUTE you set to the specific network..  When you add a gateway to an interface it becomes a WAN interface..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 25.07.1 | Lab VMs 2.8.1, 25.07.1

          1 Reply Last reply Reply Quote 0
          • M Offline
            magnifico
            last edited by

            @johnpoz:

            "f it is connected to other L3 switches or networks for which pfSense is NOT doing the routing (there are more subnets to reach on those interfaces), that would be needed."

            That would not be a "gateway" that would be a ROUTE you set to the specific network..  When you add a gateway to an interface it becomes a WAN interface..

            No, it doent become WAN interface. What is exactly "WAN" interface? What is WAN? Do you mean Internet? No, I example dont have any internet in pFsense, Internet is long-long away from pFsense, there is only LAN, bottomless LAN with no edge….....In pfsense wiki (altough its no any documentation, its crap) I was readed that when I want to use policy routing, then I must put gateway address into interface where this gateway locates. First I tried without this, not worked, then readed about that and then worked. Second rule is when you want use reply-to, then rule must be set in interface tab, not floating tab. Of course all those requirements are only bad GUI implementation. Not at all all peole know this without first experiment and read about it. Its just big mess and not at all good practice to make administration interface. Those requirements are stupid, all this can be mede automatic and no more mess, forums questions and misunderstandings. ...p.s. Switch are usually L2, not L3

            1 Reply Last reply Reply Quote 0
            • D Offline
              doktornotor Banned
              last edited by

              @magnifico:

              there is only LAN, bottomless LAN with no edge….....

              Pretty much explains it. Thanks for wasting everyone's time and no need to come back any time soon.

              P.S. The WAN is the interface with default GW. You cannot have a pfSense box without one.  ::)

              1 Reply Last reply Reply Quote 0
              • M Offline
                magnifico
                last edited by

                @doktornotor:

                @magnifico:

                there is only LAN, bottomless LAN with no edge….....

                Pretty much explains it. Thanks for wasting everyone's time and no need to come back any time soon.

                Or you mean "WAN" not Internet but instead outbound-destination direction related to connection state. So, this should be bad restriction when router can work only one direction.

                1 Reply Last reply Reply Quote 0
                • D Offline
                  doktornotor Banned
                  last edited by

                  RTFM. Ktnxbye.

                  1 Reply Last reply Reply Quote 0
                  • B Offline
                    bennyc
                    last edited by

                    @magnifico:

                    Or you mean "WAN" not Internet but instead outbound-destination direction related to connection state. So, this should be bad restriction when router can work only one direction.

                    WAN equals Wide Area Network. LAN = Local Area Network. Basic terminology, if you are doing such stuff with pfSense that should not be a secret to you. Not going into detail here, google it if it is not clear.

                    @johnpoz:

                    That would not be a "gateway" that would be a ROUTE you set to the specific network..

                    I disagree, a LAN can also have a gateway. You call it a route, fine. In pfSense, that is anyway a gateway. And then you need routes for each subnet or supernet. Without defining that as a gateway, where do you think pfSense is going to send its data to when it needs to answer on receives packets from other subnets? It is also the key for using PBR, or at least to my knowledge.
                    But if you know different ways of doing this with pfSense, please enlighten (or correct) me, always open to learn new things  ;)

                    4x XG-7100 (2xHA), 1x SG-4860, 1x SG-2100
                    1x PC Engines APU2C4, 1x PC Engines APU1C4

                    1 Reply Last reply Reply Quote 0
                    • H Offline
                      heper
                      last edited by

                      gateways should, imho, never be used for known networks …. then you use routes (even if you have to add a lot / or use a routing protocol to handle them)

                      pbr (ie policy based routing) is not even required when dealing with plain routes as pfSense doesn't support multiple routes towards the same destination. you can failover when using a routing protocol.

                      the only reason where you would want to mess with gateways for "known networks' is when you'd want to loadbalance .... but honestly http is almost the only protocol that doen't give issue's with loadbalancing, everything else fails miserably (including https/smb/ftp/....)

                      1 Reply Last reply Reply Quote 0
                      • M Offline
                        magnifico
                        last edited by

                        @heper:

                        gateways should, imho, never be used for known networks …. then you use routes (even if you have to add a lot / or use a routing protocol to handle them)

                        pbr (ie policy based routing) is not even required when dealing with plain routes as pfSense doesn't support multiple routes towards the same destination. you can failover when using a routing protocol.

                        the only reason where you would want to mess with gateways for "known networks' is when you'd want to loadbalance .... but honestly http is almost the only protocol that doen't give issue's with loadbalancing, everything else fails miserably (including https/smb/ftp/....)

                        Loadbalance is completely different story. Yes gateways are always needed when you make policy routing. This is not "default gateway", its just also route like other routes in table, but difference is in that in routing table you can set only destination but in policy routing you can also filter by source and ports. Its more accurate, dynamic. Default gateways are anyway only one, regardless how much gateways you set in interfaces. Default gateways are more than one only when you set gateway group. This is for loadbalance. Settings in pfsense are little confusing. Example in new R77 CheckPoint there is also policy routing, but you can set in policy route rule any IP as gateway and for every rule any IP as gateweay. I dont know why in pfsense there is only one gateway for interface. Maybe in next version there is different story. Also policy routings are completely different types. In CheckPoint and in most firewalls policy routes are all stateless. In pfsense they are statefull. This is that so called "reply-to", to remember where to route reply packets. This is very good and powerful feature, thanks to FreeBSD. But should be nice when pfsense example in next version put also stateless policy routing rules additionally to stateful rules. As more features than more powerful and nice software to compete with rivals. Never know when you need some feature. And also must note that usula routing table is also stateless stuff. This is also reason why to use pfsense policy routing instead of routing table.

                        1 Reply Last reply Reply Quote 0
                        • H Offline
                          heper
                          last edited by

                          Loadbalance is completely different story. Yes gateways are always needed when you make policy routing. This is not "default gateway", its just also route like other routes in table, but difference is in that in routing table you can set only destination but in policy routing you can also filter by source and ports. Its more accurate, dynamic. Default gateways are anyway only one, regardless how much gateways you set in interfaces. Default gateways are more than one only when you set gateway group.

                          what? why? when? how? wth?

                          it seems to me everyone has been helpful and giving you pointers …. yet you appear to know everything better and don't wish to accept any advice that gets thrown your way.

                          fine ... enjoy your stay

                          1 Reply Last reply Reply Quote 0
                          • B Offline
                            bennyc
                            last edited by

                            @heper:

                            gateways should, imho, never be used for known networks …. then you use routes (even if you have to add a lot / or use a routing protocol to handle them)

                            Ok, I guess here is the clue. Totally agree, when it is a known network you don't want a gateway.
                            But (it might not been have clear all the time) I am talking about addressing networks not direclty known to pfSense. Without gateway, there is no routing possible towards those networks? Wetter you do this by static or routing protocol, you need a gateway.
                            You go and try to add a route in pfSense. (System:Routing:Routes)
                            There are 2 mandatory entries, I'll leave it open for discovery for every reader of this topic what those are.

                            @heper:

                            pbr (ie policy based routing) is not even required when dealing with plain routes as pfSense doesn't support multiple routes towards the same destination. you can failover when using a routing protocol.

                            No going to step in here about the need, IMHO that is outside the scope of the topic. I don't even understand what his setup is or what he's trying to acomplish (gave up after a while)…

                            @heper:

                            the only reason where you would want to mess with gateways for "known networks' is when you'd want to loadbalance …. but honestly http is almost the only protocol that doen't give issue's with loadbalancing, everything else fails miserably (including https/smb/ftp/....)

                            Is that so? Haven't needed it up-to now, but seems good to know. Tnx for sharing…

                            4x XG-7100 (2xHA), 1x SG-4860, 1x SG-2100
                            1x PC Engines APU2C4, 1x PC Engines APU1C4

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.