Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PC Engines APU2 with 4 ethernet cards

    Scheduled Pinned Locked Moved Hardware
    19 Posts 8 Posters 6.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      repne
      last edited by

      Hello.

      I'm upgrading my home network with PC Engines APU2C4. It has three NIC's that will be used for specific purposes, but I find myself one card short. I noticed there are two Mini-PCIe expansion slots available, but the board also has internal USB on header J11. So it's either a Mini-PCIe NIC or a USB NIC. Since I'm not very up-to-date with driver support on BSD/pfSense I'm wondering what would be the best solution here. There won't be much traffic on this card so 10/100 should suffice.

      Some Mini-PCIe cards I've found (these are all gigabit though):

      • StarTech ST1000SMPEX

      • MEC-LAN-M001

      • Commell MPX-210

      • Commell MPX-574D

      • LogicSupply 8111ME

      Personally I'd go for an USB one, but I can't find any barebone USB NIC's for a custom laser-cut APU2 enclosure.

      ~rep

      1 Reply Last reply Reply Quote 0
      • jahonixJ
        jahonix
        last edited by

        I don't know about the mini-PCIe cards at all so I won't comment on those.
        However, it is not advisable to use USB NICs since most of the time they don't work well or just don't work at all.

        Could you share one physical NIC with two VLANs and a managed switch or is the amount of local traffic between VLANs prohibiting this? But an APU2 board doesn't have the power to route at line-speed anyways.

        1 Reply Last reply Reply Quote 0
        • R
          repne
          last edited by

          @jahonix:

          However, it is not advisable to use USB NICs since most of the time they don't work well or just don't work at all.

          Aah, thanks. That's the kind of comment I wanted to hear. I found no decent USB NIC hardware anyway, so I'm considering to go with a Mini-PCIe card. I reckon one with an Intel or at least a Realtek 8111 chipset should work fine. There are some threads online where people use these, but no reports whether they work or not. I'll guess I'll see after I order one.

          I'm not sure whether a VLAN is a good solution in this case since I don't possess any managed switches. I was planning to use one NIC for WAN and the other two to physically separate my network into segments like LAN and DMZ. I need another NIC for a third isolated low-traffic segment.

          rep

          1 Reply Last reply Reply Quote 0
          • jahonixJ
            jahonix
            last edited by

            Please report back on the mini-PCIe NIC you'll be using, interests me as well.

            1 Reply Last reply Reply Quote 0
            • L
              lra
              last edited by

              @repne:

              @jahonix:

              Could you share one physical NIC with two VLANs and a managed switch

              I'm not sure whether a VLAN is a good solution in this case since I don't possess any managed switches. I was planning to use one NIC for WAN and the other two to physically separate my network into segments like LAN and DMZ. I need another NIC for a third isolated low-traffic segment.

              I second the suggestion from @jahonix and use a VLAN for your 3rd isolated LAN.

              You can find reasonably good 5 or 8 port web managed switches for $50 USD or less, probably about what you would pay for a mini-PCIe card, and you know it will work, no BIOS issues, no driver issues, and other potential problems.

              Keep it simple to start, only connect the small web managed switch to one of your APU2 interfaces and configure a mix of the untagged APU2 interface and VLAN as untagged going out to your network.  Learning the switch will be the most effort.

              If VLAN's are new to you, this is a perfect time to learn about VLAN's.

              1 Reply Last reply Reply Quote 0
              • R
                repne
                last edited by

                Hi!

                Well I've already ordered a Mini-PCIe NIC from ebay so I guess it's testing time when it arrives.

                True, I'm new to VLAN's. Honestly I'm a bit scared to use them because I also plan to run some other things like traffic shaper (QoS), Suricata IPS and maybe even Radius on the APU2. I have no idea how they are going to play along, and I don't want to make the setup more complicated than it already is. How secure are VLAN's on the same physical ethernet port i.e. how easy is it to jump from one subnet to another?

                1 Reply Last reply Reply Quote 0
                • jahonixJ
                  jahonix
                  last edited by

                  @repne:

                  How secure are VLAN's on the same physical ethernet port i.e. how easy is it to jump from one subnet to another?

                  There's no difference in pfSense whether it's a physical or virtual NIC. All interfaces are handled identically.

                  If you follow some basic VLAN rules then tagged traffic along a trunk is as secure.

                  • Don't mix tagged and untagged traffic on the same interface.
                  • Do not use VLAN ID1 for anything else but nothing. (It's default in most devices and can hardly be changed - if at all).

                  That's it basically.

                  1 Reply Last reply Reply Quote 0
                  • R
                    repne
                    last edited by

                    UPDATE: I've just received the Mini-PCIe NIC I've ordered. It's a cheap one from ebay with a realtek RTL8111E chipset. I've inserted it into the slot mPCIe 1, and the system detects it just fine. The three native interfaces on APU2 appear as igb0, igb1 and igb2 while the realtek is marked as "re0". I'll see, if I can get it running. Currently I'm having trouble accessing the interface from my PC, but it's the same story with another existing NIC on APU2, so I'm pretty sure it's a firewall issue.

                    EDIT: Yay, fixed it. The mPCIe wired interface now works properly. I now have 4 physical NIC's on APU2C4!

                    1 Reply Last reply Reply Quote 0
                    • X
                      Ximulate
                      last edited by

                      I'm in the same boat, but would prefer to go the VLAN route

                      @Ire: Can you recommend $50 or less 5 to 8 port managed switch?

                      @repne: What enclouse did you use for this?

                      1 Reply Last reply Reply Quote 0
                      • M
                        ManuCH
                        last edited by

                        @repne:

                        UPDATE: I've just received the Mini-PCIe NIC I've ordered. It's a cheap one from ebay with a realtek RTL8111E chipset. I've inserted it into the slot mPCIe 1, and the system detects it just fine. The three native interfaces on APU2 appear as igb0, igb1 and igb2 while the realtek is marked as "re0". I'll see, if I can get it running. Currently I'm having trouble accessing the interface from my PC, but it's the same story with another existing NIC on APU2, so I'm pretty sure it's a firewall issue.

                        EDIT: Yay, fixed it. The mPCIe wired interface now works properly. I now have 4 physical NIC's on APU2C4!

                        I'm curious: how did you solve the problem with the case? The apu2 comes with a 3-ethernet case. Did you drill/cut out an additional hole yourself? Or did you buy a different case?

                        1 Reply Last reply Reply Quote 0
                        • K
                          kapara
                          last edited by

                          I would just go with a supermicro solution.  Great celeron and atom based solutions!

                          Skype ID:  Marinhd

                          1 Reply Last reply Reply Quote 0
                          • ?
                            Guest
                            last edited by

                            @Ximulate:

                            I'm in the same boat, but would prefer to go the VLAN route

                            @Ire: Can you recommend $50 or less 5 to 8 port managed switch?

                            @repne: What enclouse did you use for this?

                            1. Why?
                            2. Netgear GS105E, GS108E & GS108Tv2 (~$25, ~$35, ~$69)
                            3. Here is a nice one that comes with additional RJ45 breakout holes.
                            PC Engines APU1/APU2 case with HDD, WiFi + 2 LAN Ports - Black 35 Euro plus tax.

                            Here is a reported miniPCIe dual NIC that is working well with pfSense.APU2C4 with 5 LAN Ports

                            1 Reply Last reply Reply Quote 0
                            • gtjG
                              gtj
                              last edited by

                              Hello everyone.

                              I got a new APU2C4 and have installed pfSense and running it with no issues.
                              I know that it might be obvious but I want to utilise all 3 NICs of the board.
                              In the meantime I only use igb0 as WAN and igb1 as LAN.
                              I want to use the third one (igb2) as LAN too but not with a different gateway and subnet mask.
                              In short, I want igb2 to be in the same network with LAN (igb1).
                              I tried to bridge these 2 interfaces but still can't get the igb2 to provide internet access to the connected devices.

                              Can anyone please let me know how am I going to make the 2 LAN NICs to act as one?

                              Any help will be much appreciated

                              1 Reply Last reply Reply Quote 0
                              • ?
                                Guest
                                last edited by

                                I got a new APU2C4 and have installed pfSense and running it with no issues.

                                Which version you have installed?

                                I know that it might be obvious but I want to utilise all 3 NICs of the board.
                                In the meantime I only use igb0 as WAN and igb1 as LAN.
                                I want to use the third one (igb2) as LAN too but not with a different gateway and subnet mask.

                                Ok you can do that with ease.

                                In short, I want igb2 to be in the same network with LAN (igb1).
                                I tried to bridge these 2 interfaces but still can't get the igb2 to provide internet access to the connected devices.

                                Why, bridging is often a dead end road.

                                Can anyone please let me know how am I going to make the 2 LAN NICs to act as one?

                                Configure a LAG (LACP) if you switch is supporting it right now. If not a small Netgear GS108Tv2 will
                                do the job for ~$70 newish or for ~$40 refurbished on ebay.

                                1 Reply Last reply Reply Quote 0
                                • gtjG
                                  gtj
                                  last edited by

                                  Thanks for your time and kind reply.

                                  Eventually I got to set the 2 NICs to act as ONE LAN interface following the guide below.
                                  I'm posting it here for future reference as well as for anyone who wants to achieve the same thing.
                                  I couldn't imagine a simple requirement like this would need such a complex configuration. However it works now.

                                  https://mtu.net/~engstrom/configure-pfsense-bridge-over-multiple-nics-as-lan/

                                  1 Reply Last reply Reply Quote 0
                                  • ?
                                    Guest
                                    last edited by

                                    By the way, the mini PCIe cards do suck quite often, mostly because or poor space constrained design. Most of the cards I tried are RT 8111 based, and die within a year, even fir active airflow. In half the cases it was the on-board DC-DC, in the other cases it was the network chip itself. Bit of a mixed bag so far…

                                    Going with the VLAN option would would out best.

                                    1 Reply Last reply Reply Quote 0
                                    • ?
                                      Guest
                                      last edited by

                                      Most of the cards I tried are RT 8111 based,

                                      Must not be. NISK300LAN Kit
                                      NISK300LAN Kit with universal I/O bracket is specifically designed with NISE300 and NISE 4000/NIFE 4000 models for network connectivity expansions. It provides dual Intel® Gigabit Ethernet ports with latest I210IT controllers, which gives great network connectivity and less power consumption compared to the previous generation Intel® 82574L controllers. The dual LAN ports on NISK300LAN Kit supports WoL, PXE and teaming functions for managing network activities.

                                      1 Reply Last reply Reply Quote 0
                                      • jahonixJ
                                        jahonix
                                        last edited by

                                        @gtj:

                                        Eventually I got to set the 2 NICs to act as ONE LAN interface …

                                        You know that bridging two interfaces in software is far from being a switch?
                                        Each 10$ 5-port switch is way better siuted for such a task than sending each packet through the software stack down to the kernel and back up again. A switch usually does that in hardware or at least in a dedicated ASIC or FPGA highly specialized for such a task.
                                        And do not expect wirespeed from your bridge.

                                        Just saying.

                                        1 Reply Last reply Reply Quote 0
                                        • jahonixJ
                                          jahonix
                                          last edited by

                                          The guide you were following misses one point and that is correct filtering.

                                          Usually you filter on each interface individually.
                                          There's an advanced option at System Tunables where you can set pfSense to filter on the bridge instead.
                                          net.link.bridge.pfil_member Set to 0 to disable filtering on the incoming and outgoing member interfaces. | default (1)
                                          net.link.bridge.pfil_bridge Set to 1 to enable filtering on the bridge interface | default (0)

                                          Better than using an interface group and way easier to understand when doing changes in 7 months or so.

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.