Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PC Engines APU2 with 4 ethernet cards

    Scheduled Pinned Locked Moved Hardware
    19 Posts 8 Posters 6.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      lra
      last edited by

      @repne:

      @jahonix:

      Could you share one physical NIC with two VLANs and a managed switch

      I'm not sure whether a VLAN is a good solution in this case since I don't possess any managed switches. I was planning to use one NIC for WAN and the other two to physically separate my network into segments like LAN and DMZ. I need another NIC for a third isolated low-traffic segment.

      I second the suggestion from @jahonix and use a VLAN for your 3rd isolated LAN.

      You can find reasonably good 5 or 8 port web managed switches for $50 USD or less, probably about what you would pay for a mini-PCIe card, and you know it will work, no BIOS issues, no driver issues, and other potential problems.

      Keep it simple to start, only connect the small web managed switch to one of your APU2 interfaces and configure a mix of the untagged APU2 interface and VLAN as untagged going out to your network.  Learning the switch will be the most effort.

      If VLAN's are new to you, this is a perfect time to learn about VLAN's.

      1 Reply Last reply Reply Quote 0
      • R
        repne
        last edited by

        Hi!

        Well I've already ordered a Mini-PCIe NIC from ebay so I guess it's testing time when it arrives.

        True, I'm new to VLAN's. Honestly I'm a bit scared to use them because I also plan to run some other things like traffic shaper (QoS), Suricata IPS and maybe even Radius on the APU2. I have no idea how they are going to play along, and I don't want to make the setup more complicated than it already is. How secure are VLAN's on the same physical ethernet port i.e. how easy is it to jump from one subnet to another?

        1 Reply Last reply Reply Quote 0
        • jahonixJ
          jahonix
          last edited by

          @repne:

          How secure are VLAN's on the same physical ethernet port i.e. how easy is it to jump from one subnet to another?

          There's no difference in pfSense whether it's a physical or virtual NIC. All interfaces are handled identically.

          If you follow some basic VLAN rules then tagged traffic along a trunk is as secure.

          • Don't mix tagged and untagged traffic on the same interface.
          • Do not use VLAN ID1 for anything else but nothing. (It's default in most devices and can hardly be changed - if at all).

          That's it basically.

          1 Reply Last reply Reply Quote 0
          • R
            repne
            last edited by

            UPDATE: I've just received the Mini-PCIe NIC I've ordered. It's a cheap one from ebay with a realtek RTL8111E chipset. I've inserted it into the slot mPCIe 1, and the system detects it just fine. The three native interfaces on APU2 appear as igb0, igb1 and igb2 while the realtek is marked as "re0". I'll see, if I can get it running. Currently I'm having trouble accessing the interface from my PC, but it's the same story with another existing NIC on APU2, so I'm pretty sure it's a firewall issue.

            EDIT: Yay, fixed it. The mPCIe wired interface now works properly. I now have 4 physical NIC's on APU2C4!

            1 Reply Last reply Reply Quote 0
            • X
              Ximulate
              last edited by

              I'm in the same boat, but would prefer to go the VLAN route

              @Ire: Can you recommend $50 or less 5 to 8 port managed switch?

              @repne: What enclouse did you use for this?

              1 Reply Last reply Reply Quote 0
              • M
                ManuCH
                last edited by

                @repne:

                UPDATE: I've just received the Mini-PCIe NIC I've ordered. It's a cheap one from ebay with a realtek RTL8111E chipset. I've inserted it into the slot mPCIe 1, and the system detects it just fine. The three native interfaces on APU2 appear as igb0, igb1 and igb2 while the realtek is marked as "re0". I'll see, if I can get it running. Currently I'm having trouble accessing the interface from my PC, but it's the same story with another existing NIC on APU2, so I'm pretty sure it's a firewall issue.

                EDIT: Yay, fixed it. The mPCIe wired interface now works properly. I now have 4 physical NIC's on APU2C4!

                I'm curious: how did you solve the problem with the case? The apu2 comes with a 3-ethernet case. Did you drill/cut out an additional hole yourself? Or did you buy a different case?

                1 Reply Last reply Reply Quote 0
                • K
                  kapara
                  last edited by

                  I would just go with a supermicro solution.  Great celeron and atom based solutions!

                  Skype ID:  Marinhd

                  1 Reply Last reply Reply Quote 0
                  • ?
                    Guest
                    last edited by

                    @Ximulate:

                    I'm in the same boat, but would prefer to go the VLAN route

                    @Ire: Can you recommend $50 or less 5 to 8 port managed switch?

                    @repne: What enclouse did you use for this?

                    1. Why?
                    2. Netgear GS105E, GS108E & GS108Tv2 (~$25, ~$35, ~$69)
                    3. Here is a nice one that comes with additional RJ45 breakout holes.
                    PC Engines APU1/APU2 case with HDD, WiFi + 2 LAN Ports - Black 35 Euro plus tax.

                    Here is a reported miniPCIe dual NIC that is working well with pfSense.APU2C4 with 5 LAN Ports

                    1 Reply Last reply Reply Quote 0
                    • gtjG
                      gtj
                      last edited by

                      Hello everyone.

                      I got a new APU2C4 and have installed pfSense and running it with no issues.
                      I know that it might be obvious but I want to utilise all 3 NICs of the board.
                      In the meantime I only use igb0 as WAN and igb1 as LAN.
                      I want to use the third one (igb2) as LAN too but not with a different gateway and subnet mask.
                      In short, I want igb2 to be in the same network with LAN (igb1).
                      I tried to bridge these 2 interfaces but still can't get the igb2 to provide internet access to the connected devices.

                      Can anyone please let me know how am I going to make the 2 LAN NICs to act as one?

                      Any help will be much appreciated

                      1 Reply Last reply Reply Quote 0
                      • ?
                        Guest
                        last edited by

                        I got a new APU2C4 and have installed pfSense and running it with no issues.

                        Which version you have installed?

                        I know that it might be obvious but I want to utilise all 3 NICs of the board.
                        In the meantime I only use igb0 as WAN and igb1 as LAN.
                        I want to use the third one (igb2) as LAN too but not with a different gateway and subnet mask.

                        Ok you can do that with ease.

                        In short, I want igb2 to be in the same network with LAN (igb1).
                        I tried to bridge these 2 interfaces but still can't get the igb2 to provide internet access to the connected devices.

                        Why, bridging is often a dead end road.

                        Can anyone please let me know how am I going to make the 2 LAN NICs to act as one?

                        Configure a LAG (LACP) if you switch is supporting it right now. If not a small Netgear GS108Tv2 will
                        do the job for ~$70 newish or for ~$40 refurbished on ebay.

                        1 Reply Last reply Reply Quote 0
                        • gtjG
                          gtj
                          last edited by

                          Thanks for your time and kind reply.

                          Eventually I got to set the 2 NICs to act as ONE LAN interface following the guide below.
                          I'm posting it here for future reference as well as for anyone who wants to achieve the same thing.
                          I couldn't imagine a simple requirement like this would need such a complex configuration. However it works now.

                          https://mtu.net/~engstrom/configure-pfsense-bridge-over-multiple-nics-as-lan/

                          1 Reply Last reply Reply Quote 0
                          • ?
                            Guest
                            last edited by

                            By the way, the mini PCIe cards do suck quite often, mostly because or poor space constrained design. Most of the cards I tried are RT 8111 based, and die within a year, even fir active airflow. In half the cases it was the on-board DC-DC, in the other cases it was the network chip itself. Bit of a mixed bag so far…

                            Going with the VLAN option would would out best.

                            1 Reply Last reply Reply Quote 0
                            • ?
                              Guest
                              last edited by

                              Most of the cards I tried are RT 8111 based,

                              Must not be. NISK300LAN Kit
                              NISK300LAN Kit with universal I/O bracket is specifically designed with NISE300 and NISE 4000/NIFE 4000 models for network connectivity expansions. It provides dual Intel® Gigabit Ethernet ports with latest I210IT controllers, which gives great network connectivity and less power consumption compared to the previous generation Intel® 82574L controllers. The dual LAN ports on NISK300LAN Kit supports WoL, PXE and teaming functions for managing network activities.

                              1 Reply Last reply Reply Quote 0
                              • jahonixJ
                                jahonix
                                last edited by

                                @gtj:

                                Eventually I got to set the 2 NICs to act as ONE LAN interface …

                                You know that bridging two interfaces in software is far from being a switch?
                                Each 10$ 5-port switch is way better siuted for such a task than sending each packet through the software stack down to the kernel and back up again. A switch usually does that in hardware or at least in a dedicated ASIC or FPGA highly specialized for such a task.
                                And do not expect wirespeed from your bridge.

                                Just saying.

                                1 Reply Last reply Reply Quote 0
                                • jahonixJ
                                  jahonix
                                  last edited by

                                  The guide you were following misses one point and that is correct filtering.

                                  Usually you filter on each interface individually.
                                  There's an advanced option at System Tunables where you can set pfSense to filter on the bridge instead.
                                  net.link.bridge.pfil_member Set to 0 to disable filtering on the incoming and outgoing member interfaces. | default (1)
                                  net.link.bridge.pfil_bridge Set to 1 to enable filtering on the bridge interface | default (0)

                                  Better than using an interface group and way easier to understand when doing changes in 7 months or so.

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.