Trying to load balance 10x DSL connections through Vlans
-
How do you get from the 10 Wan-VLANs to the 10 ADSL modems?
-
How do you get from the 10 Wan-VLANs to the 10 ADSL modems?
Through a Cisco 2960S managed switch. Why?
-
Why? Because that's probably where your problem is.
One trunk to the switch and each VLAN untagged to it's dedicated modem?How do you want to solve the "multiple WANs all with the same getaway" problem later on? Is this confirmed to be an active feature of pfSense now? I just read the opposite but I might be wrong.
-
I´m sorry jahonix, but I dunno what do you mean by “One trunk to the switch and each VLAN untagged to it's dedicated modem?“ we hadn't worked with Vlans before.
We Just assigned 1 Vlan per each ADSL connection and assigned static-ports for those Vlans in the cisco switch. We didn't assign a static ip to those ports, nor dhcp either. We´re planning to turn the modems into routers, so we can have different IP addresses for each connection and never have a “Same Gateway“ Issue. But we´re kinda stuck here at the moment due to the lack of knowledge in managing vlans in the switch.
In the PF box we assigned a tag for each vlan, so we have tag 1 for vlan1, tag 2 for vlan 2, and so on… So when you talk about VLAN untagged to its dedicated modem, what do you mean? Isn´t it supposed to every Vlan should be tagged so it could match the tag on the PF Box? Sorry for my ignorance here if I´m wrong.
Another question: What should we do with the WAN interface itself? Should we disable it? I mean, we have 11 interfaces now beside LAN interface (1 physical, 10 virtual), but only 10 DSL connections. And I guess we can't disable one of the Vlans because every DSL connection is a Vlan in the switch itself.
Any thoughts?
TVM in advance!
-
I do not believe there is such a thing as tagged VLAN 1. You might want to use something else.
What are the WAN configurations from the ISP for these?
-
Well, I´m not quite sure if it is the right thing to say that we configured a tagged VLAN 1, all I said was that in the PF box we set the number 1 in the TAG field in the VLAN configuration page, for the first VLAN we created; number 2 in the TAG field for the second VLAN, and so on… As stated earlier, we´re pretty newbies in VLANs configurations, as a matter of fact, this is our first time experimenting with VLANs.
As for the WAN configurations, we get public IPs from each modem, so they act as a bridge from factory, but we can change those settings and make them work in routing mode so we can avoid possible “WANs with the same gateway“ issue in any given time.
Any thoughts in what can we use for this project with the equipment we already have?
TVM in advance!
-
Static? DHCP? PPPoE? Something else?
-
All modems get their IP from the ISP via DHCP, and they work in “bridged“ mode from factory, that´s why we have different public IPs on our end every few days. Yet we´re planning to change these settings and make them work as a router, and although the IP addresses are gonna be different every few days for each connection, the PF box will manage every Interface as a static one;
eg: 10.0.1.1/255.255.255.252 For DSL 1 / WAN 1
10.0.2.1/255.255.255.252 For DSL 2 / WAN 2
10.0.3.1/255.255.255.252 For DSL 3 / WAN 3And so on…
-
C´mon, Anyone?
-
Hi @Skid,
This kind of setup really requires a good understanding of VLANs, how they work and how to configure them. I get the impression you are not so familiar? Go online, read up on access ports and trunk ports, tagged and untagged, VLAN IDs - different vendors vary the terminology a bit but it's all the same stuff!
I've just returned from doing a temporary event with a very similar setup - only five ADSL connections on the WAN side but they were dotted all over site and had to pass through multiple switches to get to the router (a pfsense VM on a DL380).
You need to define a few bits first:
1. Assign a VLAN ID to each WAN (eg. 51, 52 … 60).
2. Create untagged (access) ports on the cisco switch which connect to each modem.
3. Create a trunk (tagged) port on the cisco switch which passes all those VLAN IDs (ie. 51..60). Connect that port to you r pfsense router and configure each VLAN on it's own interface in pfsense.
4. Don't use DHCP of PPPoE on the WAN connections, I had major issues doing it this way when a connection went offline. Configure them all in their own subnets as you describe and set a static IP address for each WAN interface in pfsense.
5. Configure load balancing / traffic shaping in the pfsense router.You also need to create and configure a LAN connection - ideally via a physically separate network port but this could be a VLAN too, of course you'll need a suitably sized subnet and DHCP scope to cope with the number of users.
What's your location? I might be happy to help you with this.