Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Routing Traffic Between Two vLANS

    Scheduled Pinned Locked Moved Routing and Multi WAN
    20 Posts 5 Posters 41.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      eliteassassin07
      last edited by

      Here is what I did to correct everything…

      So I configured the VLANs on the switch as follows:

      Using 802.1Q I configured a total of 4 VLANs…
      VLAN 1 >> This is the default VLAN on the switch and is not being used at this time
      VLAN 100 >> Used for all local devices that are not included in the following two VLANs
      VLAN 200 >> Used for iSCSI traffic
      VLAN 300 >> Used as part of an “isolated” network

      VLAN 300,
      For this VLAN I “tagged” ports 1 and 9…
      Member Ports >> 1 and 9
      Tagged Ports >> 1 and 9
      Untagged Ports >> NONE

      VLAN 200,
      For this VLAN I “untagged” ports 8 and 12…
      Member Ports >> 8 and 12
      Tagged Ports >> NONE
      Untagged Ports >> 8 and 12
      Note, I could not use “tagged” ports here as it appears that one of the NICs in my server is not VLAN aware. However since this VLAN is only used internally and does NOT need to communicate with the firewall this is really not an issue.  I also changed the PVID settings for ports 8 and 12 to 200.

      VLAN 100,
      For this VLAN I “untagged” ports 1-7, 9-11, and 13-16
      Member Ports >> 1-7, 9-11, and 13-16
      Tagged Ports >> NONE
      Untagged Ports >> 1-7, 9-11, and 13-16
      Note, I changed the PVID settings for ports 1-7, 9-11, and 13-16 to 100.

      Note port 1 is the uplink/trunk port on the switch that goes back to pfSense

      pfSense configuration:

      Since VLAN 100 is now where all of my local traffic (for desktops , laptops, and mobile devices) is located  and the traffic is all untagged and using PVID 100 I did not need to change anything on pfSense as it just all routed through the default LAN interface. Only thing that I did do here is on the LAN interface under rules I created a rule that blocked all traffic from LAN to OPT1(VLAN 300).

      Since VLAN 200 does not need to communicate with the firewall or internet there was nothing that needed to be configured on pfSense.

      Since VLAN 300 needed to be able to communicate with the firewall and the internet I went ahead and created a VLAN on pfSense so that this could take place. I then created a rule for the OPT1 (VLAN 300) interface that blacked all traffic from OPT1 to LAN.

      The above configuration appears to have effectively separated  all of the network traffic like I wanted and allows me to create rules to only allow certain traffic to pass between VLAN 100 and VLAN 300.

      Thanks everyone for the information!

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        your not getting it are you??

        you only need tagged on the port going to pfsense.. All of the vlans would be tagged here other than the native vlan, ie your physical interface.  be this 1 or 100, or 200 whatever.

        All your other ports would be in the 1 vlan you want on that port as untagged.

        "VLAN 300,
        For this VLAN I “tagged” ports 1 and 9…"

        if port 1 is connected then that is fine.. But why do you have it tagged on port 9??  Is that an uplink to another switch?

        How is vlan 200 getting to pfsense if its not tagged on port 1??

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          This would be:

          em1_vlan100 LAN
          em1_vlan200 WAN
          em1_vlan300 GUEST, DMZ, etc.

          VLAN-pfSense.png
          VLAN-pfSense.png_thumb

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • E
            eliteassassin07
            last edited by

            @johnpoz:

            your not getting it are you??

            you only need tagged on the port going to pfsense.. All of the vlans would be tagged here other than the native vlan, ie your physical interface.  be this 1 or 100, or 200 whatever.

            All your other ports would be in the 1 vlan you want on that port as untagged.

            "VLAN 300,
            For this VLAN I “tagged” ports 1 and 9…"

            if port 1 is connected then that is fine.. But why do you have it tagged on port 9??  Is that an uplink to another switch?

            How is vlan 200 getting to pfsense if its not tagged on port 1??

            I feel like something is getting lost in translation here…

            For VLAN 300 I tagged port 1 which is the uplink port on the switch and tagged port 9 which is connected to my ESXi host. Port 1 has to be tagged so that pfSenese VLAN Interface can see the traffic correctly. Then on the ESXi host I have configured the virtual switch to VLAN 300 as well... So yes in a since port 9 is connected to another switch.. Probably should not have left that information out.. Sorry

            As far s VLAN 200 goes... That VLAN does not need to communicate with pfSense (really I dont want it to communicate with pfSense). The only thing on that VLAN is iSCSI traffic from a FreeNAS Server to an ESXi Host, both of which are connected to the same switch and use statically assigned IPs.

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              "which is connected to my ESXi host"

              Where did this esxi host come from??  Is pfsense running on your esxi host?  There was no mention of any esxi host in your first post or 2nd or 3rd..

              tagged ports are only used for uplink ports.. Like another switch, a router wth vlans on that interface, an AP that will have vlans on different SSIDs, sure an esxi host that will have vms that will use different tags connect to that same vswitch that physical nic is on..

              You only need to tag on ports that are going to carry more than 1 vlan.  Because those tags will be used on the device that is uplink to determine where that traffic should flow.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                Tag ports to devices that need to see the tag. It's that simple. That would be pfSense and ESXi.

                If you put an untagged port on VLAN 100 (LAN) and connect a device to it and it gets DHCP, can query DNS, etc your VLAN and switch and pfSense are configured fine and you can concentrate on your ESXi setup.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • E
                  eliteassassin07
                  last edited by

                  pfSense is running on its own hardware…

                  "Port 9" is connected to my ESXi Host...

                  So I think that what you are saying is finally settling in... been ridding the struggle bus here...

                  I now have it configured as follows...

                  VLAN 100,
                  Untagged Ports >> 1-7, 10-11, 13-16 (PVID for these ports set to 100)
                  Tagged Ports >> NONE

                  VLAN 200,
                  Untagged Ports >> 8 and 12 (PVID for these ports set to 200)
                  Tagged Ports >> NONE, Remember though I dont want this VLAN to connect to pfSense

                  VLAN 300,
                  Untagged Port >> 9 (PVID for this port set to 300)
                  Tagged Port >> 1

                  So with this set up the only thing that is tagged is Port 1 which is the uplink port.

                  I believe that this is now correct...

                  1 Reply Last reply Reply Quote 0
                  • E
                    eliteassassin07
                    last edited by

                    @Derelict:

                    Tag ports to devices that need to see the tag. It's that simple. That would be pfSense and ESXi.

                    If you put an untagged port on VLAN 100 (LAN) and connect a device to it and it gets DHCP, can query DNS, etc your VLAN and switch and pfSense are configured fine and you can concentrate on your ESXi setup.

                    Thanks…

                    Yes... currently anything that I connect to ports 1-7, 10-11, and 13-16 on the switch is receiving DHCP as it should from pfSense.. iSCSI traffic on ports 8 and 12 is working as it should... And the servers connected to port 9 on ESXi are also working.

                    I made some changes to the way the virtual switch was configured in ESXi so that port tagging was no longer needed except for on the up link port on the switch.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      esxi only needs tag if your going to use vms on different vlans, they your going to need multiple tags on that port.. If all your vms are going to be on the same vlan then you don't need tags..  Where is your vmkern is that he same physical nic.

                      Keep in mind if you want to use vlans on your vms you have to set the vswitch to 4095 so it will pass the tags on to your vms on that vswitch.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • E
                        eliteassassin07
                        last edited by

                        All of the VMs will be on the same VLAN.  :)

                        VMKern/Management is on its own NIC

                        Thank you for all of your help…. I am sure this has been as frustrating for you as it has been for me... lol

                        1 Reply Last reply Reply Quote 0
                        • W
                          whosmatt
                          last edited by

                          Hey, off topic i know, but does that 16 port TP-LINK switch have fans?

                          1 Reply Last reply Reply Quote 0
                          • E
                            eliteassassin07
                            last edited by

                            @whosmatt:

                            Hey, off topic i know, but does that 16 port TP-LINK switch have fans?

                            No, it is fan-less.

                            Although it really does not appear to get all of that hot and I am using almost all of the 16 ports on there.

                            1 Reply Last reply Reply Quote 0
                            • jahonixJ
                              jahonix
                              last edited by

                              @eliteassassin07:

                              I am sure this has been as frustrating for you as it has been for me…

                              Is it working now?

                              1 Reply Last reply Reply Quote 0
                              • E
                                eliteassassin07
                                last edited by

                                Yes, it is now working.

                                Thanks everyone!

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.