Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN internet access plus routing issue - Cisco SG300 & ESX 6.5

    Scheduled Pinned Locked Moved General pfSense Questions
    24 Posts 4 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      SubX
      last edited by

      Johnpoz,

      Thanks. Attached please find the diagram as well as the VLAN layout below.
      VLAN 1 - 172.16.0.x (172.16.0.6 is router ip / gateway)
      VLAN 8 - 172.16.8.x (172.16.8.6 is router ip / gateway)
      VLAN 18 - 172.16.18.x (172.16.18.6 is router ip / gateway)
      VLAN 88 - 172.16.88.x (172.16.88.6 is router ip / gateway)
      VLAN 99 - 192.168.99.x /29 (192.168.99.1 on SG300, 192.168.99.2 on pfSense) - this is transit network

      I add static route to allow VLAN 1 and VLAN 8 to route to VLAN 99 next hop = 192.168.99.2 (screenshoot)

      Now from 172.16.0.10 can ping VLAN 1, 8, 18, 88 OK. Ping 192.168.99.1 OK.
      Ping 192.168.99.2 failed.
      From within SG300, I can ping internet host such as google.com, cnn.com etc..

      Is it beacuse of VLAN 1 & VLAN 8 route to 192.168.99.2 is inactive? How to activate those two routes?

      Thanks,

      pfSense_L3R.png
      pfSense_L3R.png_thumb
      SG300-inactive-static-route.JPG
      SG300-inactive-static-route.JPG_thumb
      SG300-TransitNetwork-cant-Ping-pfSense.JPG
      SG300-TransitNetwork-cant-Ping-pfSense.JPG_thumb

      1 Reply Last reply Reply Quote 0
      • S
        SubX
        last edited by

        jahonix,

        Thanks for the note regarding J9100 limitation.

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          "VLAN 99 - 192.168.99.x /29 (192.168.99.1 on SG300, 192.168.99.2 on pfSense) - this is transit network"

          How is this setup on pfsense?  On what interface is this sitting?  Your physical lan interface as a vlan or just native network?

          What is the sg300 config on this port?  It would just be an access port in vlan 99 on the switch..  Pfsense would not have any need to understand this vlan ID.  Or any of the other vlan IDs.

          What are you routes on pfsense?  What does your outbound nat look like… What does the firewall rules look like on the 192.168.99 network?

          If your trying to ping pfsense IP on the transit network.. Pfsense has to know how to get back to that downstream network.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • S
            SubX
            last edited by

            Thanks!!!

            pfSense setup only WANpppoe (connect through pppoe directly to internel, gateway becomes dynamic gateway) and LAN (no VLANs) just native.

            Port 28 on SG300 as Access, untagged VLAn 99. pfSense doesn't know about any VLAN ID.

            Under pfSense routing, there is a WANpppoe gateway (default), follow other post, there is no LAN gateway. Nothing under static route, should I add something here?

            Outbound NAT by default, screenshot attached. Firewall rules - WANpppoe allow any to any, LAN allow source 192.168.99.1 > desti 192.168.99.2 , also any to any.

            How to config to allow pfSens know how to get back to the downstream network. I setup static route rules in SG300 (screenshot see previous reply), it seems that those two routes are inactive. Or should I set it up in pfSense instead, please show me how to.

            Thanks,

            PPPoE-n_LAN.JPG
            PPPoE-n_LAN.JPG_thumb
            WANpppoe.JPG
            WANpppoe.JPG_thumb
            LAN1.JPG
            LAN1.JPG_thumb
            LAN2.JPG
            LAN2.JPG_thumb
            TransitNetwork-SG300-port-AccessPort.JPG
            TransitNetwork-SG300-port-AccessPort.JPG_thumb
            Routing-GW-WANpppoe1.JPG
            Routing-GW-WANpppoe1.JPG_thumb
            Routing-GW-WANpppoe2.JPG
            Routing-GW-WANpppoe2.JPG_thumb
            Routing-StaticRoute-nothing.JPG
            Routing-StaticRoute-nothing.JPG_thumb
            FireWall-NAT-Auto.JPG
            FireWall-NAT-Auto.JPG_thumb
            FireWall-Rules-WANpppoe-default.JPG
            FireWall-Rules-WANpppoe-default.JPG_thumb
            FireWall-Rules-LAN.JPG
            FireWall-Rules-LAN.JPG_thumb

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              "Nothing under static route, should I add something here?"

              How is pfsense suppose to know to get to your networks downstream of your sg300 if you do not have routes?

              Once you have created the gateway, not on the interface but in the routing section and create the routes to your downstream network using that gateway it should auto update your outbound nat to include your downstream networks that it can nat outbound.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • S
                SubX
                last edited by

                Can you be more specific,
                Is it like below?
                Destination - 172.16.0.0  Gateway - WANpppoe Gateway (or should I create a LAN Gateway 192.168.99.2 ?)
                Destination - 172.16.8.0  Gateway - WANpppoe Gateway

                Thanks,

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Yes you need to create a gateway under gateways.  Then create routes under static routes to use that gateway to get to your downstream networks.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • S
                    SubX
                    last edited by

                    just created LAN gateway and two route one for VLAN 1 and one for VLAN 8.

                    Now, device from both VLAN 1 and 8 can log in to pfSense (192.168.99.2) , how ever CAN'T ping 192.168.99.2. Check firewall rules, rules allow any port.

                    What should I check next?

                    Thanks,

                    Routing-GW-LAN.JPG_thumb
                    Routing-GW-LAN.JPG
                    Routing-StaticRoute-VLAN1&8.JPG
                    Routing-StaticRoute-VLAN1&8.JPG_thumb
                    Login-But-Cannt-Ping-from-172.16.8.x-device.JPG
                    Login-But-Cannt-Ping-from-172.16.8.x-device.JPG_thumb

                    1 Reply Last reply Reply Quote 0
                    • S
                      SubX
                      last edited by

                      Add two more firewall rules in LAN  - one to allow VLAN 1 to access LAN, one to allow VLAN 8.

                      Now VLAN 1 & 8 CAN access internet.

                      So far, everything is fine now. Just wait to see if Bell Hub 3000 will reboot frequently or not. Keep finger cross.

                      Thanks Johnpoz for all the help !!!! A Big Thank You to you and others who give me a hand !!!

                      1 Reply Last reply Reply Quote 0
                      • S
                        SubX
                        last edited by

                        Bad news, this setup works for around 1 hour before Bell Hub 3000 start to reboot. The same symptom returned when I switched to Bell FTTH service. Before the old DSL modem works without any problem.

                        Any suggestion here, I will go with pfSense +  L2 Switch option where pfSense acts as router to see if the same issue will emerge.

                        For the pfSense + L2 Switch setup, I will start another post to seek help.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.