Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Home lab vlan config help

    Scheduled Pinned Locked Moved Routing and Multi WAN
    14 Posts 4 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      justsomeone
      last edited by

      I finally have most of the equipment I want for my home lab, and would appreciate some help with the vlan setup. I'm more than a little lost…I've tried reading different tutorials and posts but can't seem to get the configuration right.

      I'd like to have 4 different vlans: 1 for servers with internet access, 1 for servers with no internet access, 1 for clients (lan), and 1 for wireless (dd-wrt).

      I am running a pfSense 2.2 vm (ESXi) with a Cisco SG300 series switch, which I am assuming should be in L3 mode and have DHCP server enabled. I don't know whether the ports on the switch the clients/servers connect to should be access, trunk, general, or private vlan (i think access?) and be tagged or not; and I don't know whether the uplink port(s) should be set to trunk, general, or private vlan (i think trunk) and be tagged or not.

      I've included 2 basic diagrams of the intended network.
      network.jpg
      network.jpg_thumb
      network_2.jpg
      network_2.jpg_thumb

      "Bad shit happens to drunk people."

      1 Reply Last reply Reply Quote 0
      • J
        justsomeone
        last edited by

        I seem to have gotten it working, provided I can configure the ACL's correctly.

        "Bad shit happens to drunk people."

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          Actually, you probably want to leave the switch in layer 2 mode.

          If you had this on pfSense:

          LAN em0_vlan100
          DMZ em0_vlan200
          SRVRS em0_vlan300

          You would do something like this on the switch:

          int gig 0
          switchport mode trunk
          switchport trunk allowed vlan 100,200,300

          Then all your firewalling will be done with pfSense.

          Now if you want to use the switch in Layer 3 mode, creating virtual interfaces for the VLANs and using access lists, that's cool too.  I have never really looked at it but I don't think those switches are stateful firewalls.  Pretty much just packet filters.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • J
            justsomeone
            last edited by

            The reason I like the idea of L3 switching is for my NAS and ownCloud: because they are not accessible from and do not have access to the internet it seems to make more sense not to pass them through pfSense - an unneeded hop.

            "Bad shit happens to drunk people."

            1 Reply Last reply Reply Quote 0
            • jahonixJ
              jahonix
              last edited by

              Absolutely and the switch is routing at link speed whereas you have to throw a whole lot of hardware onto pfSense to have it routing 1Gb/s constantly.

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                That is a fine use for a layer 3 switch.

                Please share your ACLs when you get something working.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • J
                  justsomeone
                  last edited by

                  Got the basic ACL's working, its pretty easy. I'll write a tutorial later.

                  "Bad shit happens to drunk people."

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    I was just looking for the ACLs you used.  But if you want to write a tutorial, all the better.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • J
                      justsomeone
                      last edited by

                      Yeah I'm gonna write one so no one else has to reinvent the wheel. I'll include screenshots and CLI commands.

                      "Bad shit happens to drunk people."

                      1 Reply Last reply Reply Quote 0
                      • C
                        Cino
                        last edited by

                        good stuff! I've been eye'in a SG300 myself… Not sure if I need more then 10ports and if I want the PoE version. Only have 2 devices have could use.

                        1 Reply Last reply Reply Quote 0
                        • jahonixJ
                          jahonix
                          last edited by

                          The naming of those SG300 switches in regards to PoE capabilities is a bit … non-intuitive  (P, PP, MP)
                          Other than that, to supply PoE to two devices I'd shoot for the -10P switch with the smallest amount of available power. Saves you two inserters and probably two walwart PSUs as well...

                          1 Reply Last reply Reply Quote 0
                          • jahonixJ
                            jahonix
                            last edited by

                            @justsomeone:

                            Yeah I'm gonna write one so no one else has to reinvent the wheel. I'll include screenshots and CLI commands.

                            Can you hint it's availability in THIS thread, please. I'll get notified of it automatically then.
                            Thanks!

                            1 Reply Last reply Reply Quote 0
                            • J
                              justsomeone
                              last edited by

                              I'm still working on the MAC ACL used for the wireless connection.

                              Expect a full tutorial in a day or two.

                              "Bad shit happens to drunk people."

                              1 Reply Last reply Reply Quote 0
                              • J
                                justsomeone
                                last edited by

                                So I finally wrote a basic IPv4 ACL tutorial for the Cisco SG300 series (I've been busy with work).

                                It's really basic, it's a little guide for blocking traffic to 2 other VLANs and allowing all other traffic. With a little thinking someone could adapt it for more specific needs.
                                http://kb.the-pds.net/?p=66

                                When I get some more time I'll post the tutorial on here.

                                "Bad shit happens to drunk people."

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.