Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    What is best way to run 300 VLAN on network using PFSense.

    Scheduled Pinned Locked Moved General pfSense Questions
    21 Posts 7 Posters 4.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD Offline
      Derelict LAYER 8 Netgate
      last edited by

      @Roofus:

      "I have yet to see APs that understand private VLANs"
      There are many on the market that recognise VLAN's, we have one network using 5 VLANs so definitely can say our APs can (and using PFSense).

      Private VLANs are different. Google isolated community promiscuous private vlan

      "300 SSIDs might be an issue but I don't see a problem with 300 VLANs with dynamic VLAN assignment."
      You are correct about the Dynamic VLAN.  Only two SSID's, traffic over separated VLAN's

      Yeah that's not a problem. I have never used it. Do the APs intelligently broadcast traffic among users of the same dynamic VLAN and isolate from others? I would guess they do or it would be useless but I've never tested it. What are you using? Ruckus, Aruba, Cisco or ?

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • R Offline
        Roofus
        last edited by

        Hi.

        Not private VLAN, although that would have been interesting.

        We have networks with different AP hardware.  However, the Ruckus will probably be our test bed.

        Roofus

        1 Reply Last reply Reply Quote 0
        • G Offline
          GomezAddams
          last edited by

          If I had a layer 3 switch available (and it sound like you do), I'd use it to handle the VLANs. Put the pfsense inside interface on its own VLAN/subnet and let the layer 3 switch route between the VLANs and pfsens. Use ACLs on the switch to keep the various subnets from talking to each other.

          1 Reply Last reply Reply Quote 0
          • R Offline
            Roofus
            last edited by

            Gomez
            That is certainly an option to consider and with some appeal - It would help simplify the firewall rules etc.  Currently we are using Layer 2  switches that support POE + VLAN, so this would be an addition of around £1,000.  Cheaper if we could get PFSense to do it :)

            I do like the idea that a small Layer 3 switch feed multiple Layer 2 switches that span to the different AP units.

            Where would the DHCP come from in this instance as I assume PFSense would not be able to fulfill this role in this case?

            Roofus

            1 Reply Last reply Reply Quote 0
            • G Offline
              GomezAddams
              last edited by

              You should be able to put helper IP addresses (cisco terminology) on the VLAN interfaces in the layer 3 switch that forward DHCP requests to the pfsense box. I assume pfsense could be configured with a scope for each subnet. I've never tried that with pfsense, though.

              1 Reply Last reply Reply Quote 0
              • G Offline
                GomezAddams
                last edited by

                Since you have virtualization available, you might also consider using a virtual router to take the place of the layer 3 switch. I've never used anything other than Cisco routers, so I can't offer specific details, but I'd think it wouldn't be too difficult to create a virtual linux instance, trunk all 300 VLANs to it, set up routing in linux and use iptables for the ACLs.

                I seem to recall that someone has a linux distribution specifically created to be a router.

                1 Reply Last reply Reply Quote 0
                • DerelictD Offline
                  Derelict LAYER 8 Netgate
                  last edited by

                  @GomezAddams:

                  You should be able to put helper IP addresses (cisco terminology) on the VLAN interfaces in the layer 3 switch that forward DHCP requests to the pfsense box. I assume pfsense could be configured with a scope for each subnet. I've never tried that with pfsense, though.

                  Multiple scopes are not supported.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • S Offline
                    Sova
                    last edited by

                    Most L3 switches would support DHCP, you can also set a separate small Linux box to run dhcpd and then "ip helper" each VLAN to that IP.

                    1 Reply Last reply Reply Quote 0
                    • G Offline
                      GomezAddams
                      last edited by

                      If pfsense DHCP won't do multiple scopes, then you need something that will. It sounds like you need either a layer 3 switch that does DHCP, or a virtual router to do your layer 3 routing and hand out IP addresses.

                      Even if pfsense could be fixed to handle 300 VLANs, you still need something to run DHCP with a scope for each VLAN/subnet.

                      1 Reply Last reply Reply Quote 0
                      • DerelictD Offline
                        Derelict LAYER 8 Netgate
                        last edited by

                        pfSense will do multiple scopes just fine. It just can't be configured to accept helper requests from multiple subnets on one interface.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • G Offline
                          GomezAddams
                          last edited by

                          @Derelict:

                          pfSense will do multiple scopes just fine. It just can't be configured to accept helper requests from multiple subnets on one interface.

                          Well that's just silly.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.