• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

PfSense & Cisco SG300 vlans w/ Fibre Optic Internet - proper routing?

Scheduled Pinned Locked Moved General pfSense Questions
4 Posts 2 Posters 3.4k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • T
    tuffcalc
    last edited by Nov 9, 2016, 7:18 PM

    Hoping someone can help out with similar equipment.  Here's my situation.

    I just had fibre optic internet installed at my home.  The internet comes down via PPPoE on the providers sagecom modem on vlan 35.  Inside that sagecom is a fibre SFP which I unplugged from the modem and plugged into the SFP port in my cisco switch.  Using pfsense, I have the WAN interface logging in with the PPPoE credentials.

    I want to make sure the internet vlan is completely controlled by pfsense so there is no risk to my internal network.  I'm getting confused with "tagged, untagged, access and general ports".  Here is what I would like to happen:

    1. Port 1 - Fibre internet (vlan 35, from provider) to Cisco SG300 (SG300 is being run in layer 2 mode).  Port 1 setup as follows:
    Vlan Management > Vlan Settings > Vlan table (includes vlan ID 35 for internet).
    Vlan Management > Interface Settings > Interface Settings Table > Port 1 set as "Trunk"
    Vlan Management > Interface Settings  > Port to Vlan > Vlan Membership Table > Port 1 set as "tagged"
    Vlan Management > Interface Settings  > Port Vlan Membership > Port Vlan Membership Table > Port 52 set as "trunk" as well as "1T" and "35T" as members.

    2. Port 2 - SG300 to pfSense router.  Exact same configuration as above on this port.

    3. Port 3 - Cisco Aironet 5508wlc to Cisco SG300. 
    Same configuration as above except for one change:
    Vlan Management > Interface Settings  > Port to Vlan > Vlan Membership Table > Port 3 set as "untagged".  If I set it to tagged, internet does not work and pfsense is unreachable.

    Does anyone have any idea if this is optimal … and could possibly explain exactly what's going on?

    Thanks in advance!

    1 Reply Last reply Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator
      last edited by Nov 9, 2016, 7:25 PM

      Are there other vlans coming in from your isp?

      What I would do is trunk the port this coming in from your isp on your sg300. The port that connects to pfsense would be in vlan 35 should not have not have to be tagged.

      If your going to run other vlans into pfsense lan for example that that port to pfsense would be trunked with with the vlans your going to use allowed on it.  Put your other ports that will have devices as access and they do not need to be tagged, just in the vlan you want that device to be in.

      You only need to tagged vlans on uplinks to other switches, or devices that will make use of the tags.  Like a pfsense interface with vlans on it.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • T
        tuffcalc
        last edited by Nov 9, 2016, 8:33 PM

        @johnpoz:

        Are there other vlans coming in from your isp?

        Yes, the ISP has other vlans coming in (34 for voip, 36 for TV), although I use neither right now, so I just want those vlan packets dropped/blocked.

        @johnpoz:

        What I would do is trunk the port this coming in from your isp on your sg300. The port that connects to pfsense would be in vlan 35 should not have not have to be tagged.

        Just so I'm clear, is the port from pfSense to SG300 (LAN) also trunked?

        Also, I'm using the main vlan (I guess vlan1) for my home network.  Since this vlan is untagged, and the trunk port to my ISP has "1U, 35T" as a member, does that mean the ISP connection can access the rest of my network unchecked?

        @johnpoz:

        If your going to run other vlans into pfsense lan for example that that port to pfsense would be trunked with with the vlans your going to use allowed on it.  Put your other ports that will have devices as access and they do not need to be tagged, just in the vlan you want that device to be in.

        You only need to tagged vlans on uplinks to other switches, or devices that will make use of the tags.  Like a pfsense interface with vlans on it.

        Ok, one more wrench.  I use vlan 20 for a guest wifi.  Works fine for now, but if I change the other ports to access as you suggest, how do I get some of those ports to see both vlan1 (untagged main vlan) and vlan 20 (Guest wifi) - since the cisco WLC is plugged into the same port.

        Thanks much

        1 Reply Last reply Reply Quote 0
        • J
          johnpoz LAYER 8 Global Moderator
          last edited by Nov 10, 2016, 8:13 PM

          "Just so I'm clear, is the port from pfSense to SG300 (LAN) also trunked? "

          why would it need to be if your not passing other vlans that pfsense would make use of?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          4 out of 4
          • First post
            4/4
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
            This community forum collects and processes your personal information.
            consent.not_received