Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Networking Noob needs help connecting SG300 to pfSense

    Scheduled Pinned Locked Moved Routing and Multi WAN
    17 Posts 5 Posters 2.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      And if you plan on putting hosts on LAN you don't want to use LAN as your transit network. Use a small transit network with no other hosts on it to get between the switch and the firewall. Just like in the diagram.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • jahonixJ
        jahonix
        last edited by

        Best bet: Did you put your switch in L3 (router) mode already and assigned IPs? Factory setting is L2 (switch) mode.

        …hope I didn't steal the learning curve, though.

        1 Reply Last reply Reply Quote 0
        • Y
          yield101
          last edited by

          In L3 mode… And in my original plan, I wasn’t planning on other hosts on the LAN…

          This stuff is getting really complex for me despite being usually able to figure this stuff out.  Again, total noob with all this.  I googled how to setup transit network with pfsense but I was given a lot of hard to understand forum posts.

          In my first post, I explained to the best of my ability of what I’m trying to accomplish.  Not trying to be difficult but I've reread all the comments and I'm still confused.  I really appreciate all the responses but what other information can I give you to get a more clearer understanding of how to proceed.

          Or if there is some better step-by-step suggestions you could point me too, that would help! Many thanks.

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            Create a gateway for the switch. System > Routing, Gateways

            Route the networks behind the switch to that gateway. System > Routing, Static Routes

            Make pfSense the default gateway for the switch. Switch configuration ip route 0.0.0.0 0.0.0.0 192.168.1.1

            Make sure the LAN rules pass the traffic sourced from all of the downstream networks (the same networks that are routed to the switch). Firewall > Rules, LAN

            Make sure outbound NAT will NAT the traffic out WAN for the downstream networks. Firewall > NAT, Outbound

            (This is all the same information in the boxes in that image. It really is that simple.)

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              I use a sg300, be happy to post up the actual configs you would use, etc..

              But lets be clear.. You want to do L3 on sg300.. You want it to route between the vlans?  This removes pfsense ability to firewall between segments.  Unless you need the switch bandwidth between the vlans I would not suggest you do this.  Just let pfsense do all the firewall and routing and just use sg300 as Layer 2 switch.  Even if you have it in L3 mode you can still just use it as L2..

              I use mine as just L2 I have not need for downstream router.. Pfsense provides more than enough bandwidth between my segments..  And its running on a old hp n40l as a VM.. I see about 400mbps between segments..

              So why is you want L3??  If that is really want you want I can draw up some hold my hand follow the bouncing ball instructions with pictures..  But if you are new to networking and just want the ease of being to firewall and route all on pfsense I would do it as L2.

              You could then either just multiple interfaces on pfsense for uplinks this will increase your available and possible bandwidth between your vlans vs vlans on the same physical interface if you have the ports available on your switch.  Or you could just trunk everything on 1 port between pfsense and sg300..

              Let me know and be happy to draw up – this is how you do it with picture how too ;)

              The one thing missing out of Derelicts drawing is the L2 and multiple segments..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              1 Reply Last reply Reply Quote 0
              • N
                NetworkGuy
                last edited by

                SG300: Port 1: Trunk, PVID1, Port VLAN Membership 1UP,10T,20T,30T
                SG300: Port 5: Trunk, PVID10
                SG300: Port 6: Trunk, PVID20
                SG300: Port 7: Trunk, PVID30
                "Trunk" is the Default setting. You can noodle with this, but Trunk always works….
                SG300: DHCP: The SG300 manual has a pretty good writeup
                SG300 Routing: The SG300 manual has a pretty good writeup

                With the PVID set to 10, for example, any untagged packet ingressing port 5, will be tagged with VLAN 10. This is the KISS way. Keep-It-Stupid-Simple.  However, if your end devices are VLAN-aware, and they can send VLAN tagged packets, you can alternatively leave the PVID at 1 and add Port VLAN Membership of 10T and remove 1UP. All your devices attached to port 5 will need to be configured to tag their packets with VLAN10, and untagged packets will be dropped in this configuration.

                pfSense: Interface: LAN: it looks like you already have this set, this is your Next Hop router or Gateway for your SG300
                pfSense: VLAN: add VLAN10, 20 and 30 to the LAN interface
                pfSense: add the new interfaces under Interface Assignments
                pfSense: Enable but don't add IP addresses and particulars to the new interfaces with the Interface hyperlink, as the SG is handling L3 duties in your scenario

                With 90% confidence, if something isn't working, the problem is the routing/forwarding setup in the Cisco. Troubleshoot the 2 components, SG300 and pfSense, separately.

                You can test to see if pfSense is working by simply assigning your workstation with a 192.168.1.2/24, GW of 192.168.1.1 and 8.8.8.8 as the DNS, and plug it directly into the LAN interface of pfSense. You can also tag your workstation to make sure VLANs work, with the appropriate IP settings and tagging on your workstation and pfSense. pfSense in your desired config is doing very little.

                I agree with johnpoz. You're giving up a lot of pfSense functionality if the SG300 is doing all the heavy lifting in your network. I have a lot of SG300-10s, 20s and 28s in my network, all of them L2, mostly as an access devices for TVs, game consoles, Sonos, Tivo devices, labs, etc. spread throughout my home. I aggregate all the SG300s with an HP stackable and use some of it's L3 functionality, mostly multicast routing, since pfSense doesn't do that so well. L3 on the SG300 works just fine, but the forwarding performance (the only benefit I can imagine) doesn't outweigh the convenience of a single view, flexibility and management of your network that pfSense can provide. Plus, with the proper application of CPU clock speed, you won't be able to tell the difference between the SG and pfSense packet forwarding performance.

                Your VLAN plan of record is sound, and similar to mine. The fact of the matter is VLANs create an isolated broadcast domain and nothing more. I want to keep my individual VLAN broadcast domains separate UNTIL absolutely required, meaning, until I need to forward a packet from my LAN segment to my Management segment, for example. Otherwise I want all my LAN traffic to stay on my LAN segment without interacting with anything else. The switch in your scenario, is doing the same thing as pfSense - there's really no difference from a functional perspective.

                In my scenario, with pfSense at the core of the network, I can now firewall/filter any packet that shouldn't traverse LAN>MGMT. I have a single DHCP console to manage all DHCP or static IP addressing and don't have to muck around with DHCP on the switch or DHCP Relay. For a GUEST network, which you'll appreciate at some point in time, I can set firewall/DHCP parameters and direct all traffic away for my internal resources. Lots more goodies, flexibility and ease of use advantages with pfSense versus any switch. For example, sadly, a lot of consumer specific devices still utilize UPnP, like it or not. With PfSense, you can at least control where that crap goes, same with Avahi and Zeroconf/Bonjour.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  ^ well stated.. When you use a downstream router or L3 switch doing routing then you move the core to that device vs having your edge and core on the same device (pfsense).

                  When you let pfsense handle the edge (lan(s) to internet) and all your intervlan traffic you greatly ease the management of all aspects of your network.  As networkguy mentions if you just use pfsense as your edge all of your dhcp will have to be one on your sg300 or some other dhcp server since pfsense can not provide dhcp vs relay.  It has to have an interface in the L2 its going to provide dhcp too.

                  Creating rules between your vlans is going to be much harder to do then just simple firewall rules on pfsense - ACLs are way more complicated to setup then how easy it is to do on pfsense.

                  While there are plenty of advantages to letting pfsense do all your routing in your network, I really can not think of any reason to use a downstream router (L3) in any sort of smb or home network/lab..  When your talking 1000's of devices on hundreds of vlans then sure this is normally when you would use a L3 switch to handle the heavy lifting of that.. In such a scenario you most often route the traffic of vlans that need some sort of control between them to your firewall vs having handle off that sort of stuff with complicated ACLs on the L3..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  1 Reply Last reply Reply Quote 0
                  • Y
                    yield101
                    last edited by

                    @johnpoz:

                    I use a sg300, be happy to post up the actual configs you would use, etc..

                    But lets be clear.. You want to do L3 on sg300.. You want it to route between the vlans?  This removes pfsense ability to firewall between segments.  Unless you need the switch bandwidth between the vlans I would not suggest you do this.  Just let pfsense do all the firewall and routing and just use sg300 as Layer 2 switch.  Even if you have it in L3 mode you can still just use it as L2..

                    I use mine as just L2 I have not need for downstream router.. Pfsense provides more than enough bandwidth between my segments..  And its running on a old hp n40l as a VM.. I see about 400mbps between segments..

                    So why is you want L3??  If that is really want you want I can draw up some hold my hand follow the bouncing ball instructions with pictures..  But if you are new to networking and just want the ease of being to firewall and route all on pfsense I would do it as L2.

                    You could then either just multiple interfaces on pfsense for uplinks this will increase your available and possible bandwidth between your vlans vs vlans on the same physical interface if you have the ports available on your switch.  Or you could just trunk everything on 1 port between pfsense and sg300..

                    Let me know and be happy to draw up – this is how you do it with picture how too ;)

                    The one thing missing out of Derelicts drawing is the L2 and multiple segments..

                    @johnpoz:

                    ^ well stated.. When you use a downstream router or L3 switch doing routing then you move the core to that device vs having your edge and core on the same device (pfsense).

                    When you let pfsense handle the edge (lan(s) to internet) and all your intervlan traffic you greatly ease the management of all aspects of your network.  As networkguy mentions if you just use pfsense as your edge all of your dhcp will have to be one on your sg300 or some other dhcp server since pfsense can not provide dhcp vs relay.  It has to have an interface in the L2 its going to provide dhcp too.

                    Creating rules between your vlans is going to be much harder to do then just simple firewall rules on pfsense - ACLs are way more complicated to setup then how easy it is to do on pfsense.

                    While there are plenty of advantages to letting pfsense do all your routing in your network, I really can not think of any reason to use a downstream router (L3) in any sort of smb or home network/lab..  When your talking 1000's of devices on hundreds of vlans then sure this is normally when you would use a L3 switch to handle the heavy lifting of that.. In such a scenario you most often route the traffic of vlans that need some sort of control between them to your firewall vs having handle off that sort of stuff with complicated ACLs on the L3..

                    Wow, thank you for feedback…  OK, you talked me into having pfSense handle the VLANs.  With this being the case, how should I proceed from here? Any noob friendly instructions and/or drawings is beyond appreciated.  Here is my updated VLAN plan:

                    pfsense layout:
                    WAN- eth0
                    LAN - eth1 (192.168.1.1/24) plugged into port 1 of the SG300
                    eth2 & 3 unused.

                    pfSense:
                    VLAN 10 (192.168.10.1/24) Management (Enabled & Setup with DHCP)
                    VLAN 20 (192.168.20.1/24) Primary (Enabled & Setup with DHCP)
                    VLAN 30 (192.168.30.1/24) Gaming (Enabled & Setup with DHCP)

                    SG300:
                    VLAN 1 (default) (192.168.1.199/24)
                    VLAN 10 (192.168.10.2/24) Management (Already setup)
                    VLAN 20 (192.168.20.2/24) Primary (Already setup)
                    VLAN 30 (192.168.30.2/24) Gaming (Already setup)
                    Port 1 for main connection to pfSense
                    port 5 for VLAN 10
                    Port 6 for VLAN 20
                    Port 7 for VLAN 30

                    Thank you!!!!

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      Remove all of the IP addresses from the VLANs on the switch. With those in place the switch will be layer 3 on those VLANs and will route traffic between them. You only need one management IP address on the switch.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        Your setup on your sg300 for the port that connects to lan (eth1) on your sg300 would be simple trunk port.

                        Example
                        interface gigabitethernet3
                        description "esxi wlan trunk"
                        switchport trunk allowed vlan add 100,200,300,500,600
                        switchport trunk native vlan 20

                        I am not using vlan 1 to this vlan interface in pfsense.  I am using vlan 20 as the native untagged vlan in my setup.  But you can use 1 there vs the 20 I have.

                        You also have ports unused on your pfsense, you could leverage them for vlans without having to tag.. As long as you have more ports open on your sg300 you could use for the uplinks to pfsense for those vlans/networks.

                        What are you going to use vlan 1 for exactly?  Is this going to be the vlan you use to manage your switch?  Why do you have 10/24 stated as being management?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        1 Reply Last reply Reply Quote 0
                        • Y
                          yield101
                          last edited by

                          @Derelict:

                          Remove all of the IP addresses from the VLANs on the switch. With those in place the switch will be layer 3 on those VLANs and will route traffic between them. You only need one management IP address on the switch.

                          Done.

                          @johnpoz:

                          Your setup on your sg300 for the port that connects to lan (eth1) on your sg300 would be simple trunk port.

                          Example
                          interface gigabitethernet3
                          description "esxi wlan trunk"
                          switchport trunk allowed vlan add 100,200,300,500,600
                          switchport trunk native vlan 20

                          I am not using vlan 1 to this vlan interface in pfsense.  I am using vlan 20 as the native untagged vlan in my setup.  But you can use 1 there vs the 20 I have.

                          You also have ports unused on your pfsense, you could leverage them for vlans without having to tag.. As long as you have more ports open on your sg300 you could use for the uplinks to pfsense for those vlans/networks.

                          What are you going to use vlan 1 for exactly?  Is this going to be the vlan you use to manage your switch?  Why do you have 10/24 stated as being management?

                          No idea…so if I get rid of VLAN 1, what IP address will I use to connect to the switch?  10/24 ins't the preferred method?  I'm going into this pretty much dumb as a mule. How do you have yours setup?

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.