Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN internet access plus routing issue - Cisco SG300 & ESX 6.5

    Scheduled Pinned Locked Moved General pfSense Questions
    24 Posts 4 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      "Just wonder if you can give me a hand on how to configure SG300 here to make it works?"

      Draw up what you did and be happy to..

      But lets be clear - downstream router via a transit would not be my suggestion.. As to how you would set it up on a sg300.. It would be just like any other layer 2 vlan.  Its just a connection from pfsense to whatever your downstream router is.. If this is the sg300.  Then its just a simple access port in whatever vlan you want to setup on on the sg300.  Connected to pfsense via native - non vlan interface.  Pfsense would not have any clue to what vlan IDs are connected downstream.

      It would just need to know what networks are downstream and route to them.. And its firewall rules and outbound nat would have to account for them.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • S
        SubX
        last edited by

        Johnpoz,

        Thanks. Attached please find the diagram as well as the VLAN layout below.
        VLAN 1 - 172.16.0.x (172.16.0.6 is router ip / gateway)
        VLAN 8 - 172.16.8.x (172.16.8.6 is router ip / gateway)
        VLAN 18 - 172.16.18.x (172.16.18.6 is router ip / gateway)
        VLAN 88 - 172.16.88.x (172.16.88.6 is router ip / gateway)
        VLAN 99 - 192.168.99.x /29 (192.168.99.1 on SG300, 192.168.99.2 on pfSense) - this is transit network

        I add static route to allow VLAN 1 and VLAN 8 to route to VLAN 99 next hop = 192.168.99.2 (screenshoot)

        Now from 172.16.0.10 can ping VLAN 1, 8, 18, 88 OK. Ping 192.168.99.1 OK.
        Ping 192.168.99.2 failed.
        From within SG300, I can ping internet host such as google.com, cnn.com etc..

        Is it beacuse of VLAN 1 & VLAN 8 route to 192.168.99.2 is inactive? How to activate those two routes?

        Thanks,

        pfSense_L3R.png
        pfSense_L3R.png_thumb
        SG300-inactive-static-route.JPG
        SG300-inactive-static-route.JPG_thumb
        SG300-TransitNetwork-cant-Ping-pfSense.JPG
        SG300-TransitNetwork-cant-Ping-pfSense.JPG_thumb

        1 Reply Last reply Reply Quote 0
        • S
          SubX
          last edited by

          jahonix,

          Thanks for the note regarding J9100 limitation.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            "VLAN 99 - 192.168.99.x /29 (192.168.99.1 on SG300, 192.168.99.2 on pfSense) - this is transit network"

            How is this setup on pfsense?  On what interface is this sitting?  Your physical lan interface as a vlan or just native network?

            What is the sg300 config on this port?  It would just be an access port in vlan 99 on the switch..  Pfsense would not have any need to understand this vlan ID.  Or any of the other vlan IDs.

            What are you routes on pfsense?  What does your outbound nat look like… What does the firewall rules look like on the 192.168.99 network?

            If your trying to ping pfsense IP on the transit network.. Pfsense has to know how to get back to that downstream network.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • S
              SubX
              last edited by

              Thanks!!!

              pfSense setup only WANpppoe (connect through pppoe directly to internel, gateway becomes dynamic gateway) and LAN (no VLANs) just native.

              Port 28 on SG300 as Access, untagged VLAn 99. pfSense doesn't know about any VLAN ID.

              Under pfSense routing, there is a WANpppoe gateway (default), follow other post, there is no LAN gateway. Nothing under static route, should I add something here?

              Outbound NAT by default, screenshot attached. Firewall rules - WANpppoe allow any to any, LAN allow source 192.168.99.1 > desti 192.168.99.2 , also any to any.

              How to config to allow pfSens know how to get back to the downstream network. I setup static route rules in SG300 (screenshot see previous reply), it seems that those two routes are inactive. Or should I set it up in pfSense instead, please show me how to.

              Thanks,

              PPPoE-n_LAN.JPG
              PPPoE-n_LAN.JPG_thumb
              WANpppoe.JPG
              WANpppoe.JPG_thumb
              LAN1.JPG
              LAN1.JPG_thumb
              LAN2.JPG
              LAN2.JPG_thumb
              TransitNetwork-SG300-port-AccessPort.JPG
              TransitNetwork-SG300-port-AccessPort.JPG_thumb
              Routing-GW-WANpppoe1.JPG
              Routing-GW-WANpppoe1.JPG_thumb
              Routing-GW-WANpppoe2.JPG
              Routing-GW-WANpppoe2.JPG_thumb
              Routing-StaticRoute-nothing.JPG
              Routing-StaticRoute-nothing.JPG_thumb
              FireWall-NAT-Auto.JPG
              FireWall-NAT-Auto.JPG_thumb
              FireWall-Rules-WANpppoe-default.JPG
              FireWall-Rules-WANpppoe-default.JPG_thumb
              FireWall-Rules-LAN.JPG
              FireWall-Rules-LAN.JPG_thumb

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                "Nothing under static route, should I add something here?"

                How is pfsense suppose to know to get to your networks downstream of your sg300 if you do not have routes?

                Once you have created the gateway, not on the interface but in the routing section and create the routes to your downstream network using that gateway it should auto update your outbound nat to include your downstream networks that it can nat outbound.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • S
                  SubX
                  last edited by

                  Can you be more specific,
                  Is it like below?
                  Destination - 172.16.0.0  Gateway - WANpppoe Gateway (or should I create a LAN Gateway 192.168.99.2 ?)
                  Destination - 172.16.8.0  Gateway - WANpppoe Gateway

                  Thanks,

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    Yes you need to create a gateway under gateways.  Then create routes under static routes to use that gateway to get to your downstream networks.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • S
                      SubX
                      last edited by

                      just created LAN gateway and two route one for VLAN 1 and one for VLAN 8.

                      Now, device from both VLAN 1 and 8 can log in to pfSense (192.168.99.2) , how ever CAN'T ping 192.168.99.2. Check firewall rules, rules allow any port.

                      What should I check next?

                      Thanks,

                      Routing-GW-LAN.JPG_thumb
                      Routing-GW-LAN.JPG
                      Routing-StaticRoute-VLAN1&8.JPG
                      Routing-StaticRoute-VLAN1&8.JPG_thumb
                      Login-But-Cannt-Ping-from-172.16.8.x-device.JPG
                      Login-But-Cannt-Ping-from-172.16.8.x-device.JPG_thumb

                      1 Reply Last reply Reply Quote 0
                      • S
                        SubX
                        last edited by

                        Add two more firewall rules in LAN  - one to allow VLAN 1 to access LAN, one to allow VLAN 8.

                        Now VLAN 1 & 8 CAN access internet.

                        So far, everything is fine now. Just wait to see if Bell Hub 3000 will reboot frequently or not. Keep finger cross.

                        Thanks Johnpoz for all the help !!!! A Big Thank You to you and others who give me a hand !!!

                        1 Reply Last reply Reply Quote 0
                        • S
                          SubX
                          last edited by

                          Bad news, this setup works for around 1 hour before Bell Hub 3000 start to reboot. The same symptom returned when I switched to Bell FTTH service. Before the old DSL modem works without any problem.

                          Any suggestion here, I will go with pfSense +  L2 Switch option where pfSense acts as router to see if the same issue will emerge.

                          For the pfSense + L2 Switch setup, I will start another post to seek help.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.