Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to make use of VLANs

    General pfSense Questions
    4
    12
    1.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      there is bunch of discussion in another thread heard about the tplink switches and a hack to remove the vlan 1 nonsense.

      But I would suggest you get a different switch the dsg1100 from dlink is same price point and handles vlans correctly.

      I have lack of confidence that the tp-link AP handles vlans correctly either.  I would suggest another AP, the unifi line handles vlans correctly.  And very reasonable priced.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott
        last edited by

        Another possibility is the D-Link DAP-2660.  While I haven't used this AP, I trust D-Link, more than I do TP-Link, to handle VLANs properly.
        http://ca.dlink.com/products/access-points/wireless-ac1200-simultaneous-dual-band-poe-access-point/

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        1 Reply Last reply Reply Quote 0
        • K
          kcallis
          last edited by

          Thanks for the suggestions… I have just did a factory reset and for the time I will just use the TL-Link as a simple AP until I move over to something else.

          1 Reply Last reply Reply Quote 0
          • K
            kcallis
            last edited by

            @johnpoz:

            there is bunch of discussion in another thread heard about the tplink switches and a hack to remove the vlan 1 nonsense.

            But I would suggest you get a different switch the dsg1100 from dlink is same price point and handles vlans correctly.

            I have lack of confidence that the tp-link AP handles vlans correctly either.  I would suggest another AP, the unifi line handles vlans correctly.  And very reasonable priced.

            The issue is not with the switch (which is a Netgear GS108E) which working fine, it seems to be an issue with the TL-Link AP and it's poor understanding of VLANS.

            1 Reply Last reply Reply Quote 0
            • JKnottJ
              JKnott
              last edited by

              The issue is not with the switch (which is a Netgear GS108E) which working fine, it seems to be an issue with the TL-Link AP and it's poor understanding of VLANS.

              While your issue may be about the AP, the overall point is that TP-Link should be avoided when VLANs are going to be used.  As I mentioned, they don't seem to understand them.  Regardless, when you get an AP that properly supports VLANs, you will still have to configure the switch with trunk ports for both pfSense and the AP.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              1 Reply Last reply Reply Quote 0
              • K
                kcallis
                last edited by

                @JKnott:

                You have to set up a trunk port on the switch to connect to the AP and also pfSense.  This will allow it to carry all VLANs.  You then configure pfSense with VLANs.  However, I have that same AP and it doesn't handle VLANs/SSIDs well.  TP-Link doesn't seem to understand the concept of VLANs and how they're supposed to be logically separate.  As I result, traffic from the native LAN will be mixed in with the VLAN.  After much frustration, I gave up on the idea of VLANs & multiple SSIDs on it.

                BTW, I had a lot of discussion with first level support about this issue and that person insisted it was normal.  It was only the person at 2nd level support who understood the problem, but there was no fix forthcoming.

                What I was able to do was to more or less replicated port 1 that is the trunk back to the OPT1 and did the same on port 2 with the TL-Link AP connected. At first, everything was moving along well, VLAN 15 (My wireless access to the net) gave out an address and the same is true with VLAN 50 (which are my streaming devices). I was able to see the SSIDs so it looked like a win. I have been banging around with the firewall rules because not a single rule seems to be working. For instance, I am able to get a receive an address and I am able to ping each of the gateway of each interface, but as for as pinging other devices, it is a no go. I am also not able to route through the WAN, so no internet for me right now.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  Lets see your rules..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  1 Reply Last reply Reply Quote 0
                  • K
                    kcallis
                    last edited by

                    @johnpoz:

                    Lets see your rules..

                    I have attached what I am working with…

                    guest_rules.PNG
                    guest_rules.PNG_thumb
                    wan_rules.PNG
                    wan_rules.PNG_thumb

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      You are passing all traffic from the Guest network. If your Layer 2 is good, you have good DHCP, good DNS, and have good outbound NAT it should be working.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • K
                        kcallis
                        last edited by

                        Thanks for all of the pointers from everyone. I decided to forgo the VLAN multi SSID feature of the TL-Link AP and move it over to the LAN. I do have a Ubiquiti NanoStation loco M2 that I thought that I would swap with the TL-Link, but until I can understand the VLAN process, I will save that for another time.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.