Setup for trunk via OPT1 port of SG-3100
-
No it doesn't since you said you were going to put 4082 on opt1.. But you have it listed in your switch.
-
I am lost a bit. So there is no need to enable 802.1q ? What should it look like then?
-
Dude if your running vlan 4082 on your opt1 interface how are you also going to run that on your switch? Are you planning on bridging opt1 into your switch - WHY?
We went over this in my first post!
-
johnpoz - I have no networking background - just learning here. will appreciate if you point me in the right direction. Some guides I read did something like this whilst sending their traffic to the unifi switch.
-
Opt1 is a normal interface - its is not a switch port... The only way to connect a interface to another interface or switch is to create a BRIDGE... Which make no sense for your scenario..
You can use say vlan 4080 on opt1 if you want... But you can not use vlan 4082 on opt1 and on your switch at the same time... Without creating a bridge... Which WHY would you want/need to do that??
How many different networks/vlans do you want or need? Why does opt1 need to be in 4082? When your other vlans only have 1 port... If you need multiple ports in some specific vlan on pfsense device then use switch ports for those vlans. And your vlan where you only need 1 port since your going to have your other devices in your switch then use the opt1 interface for that..
I would be happy to explain the best way to do this if had some clue to what your actually wanting to accomplish... Can you draw up your network and how you want everything connected and we can discuss the best way to accomplish that... And if running a bridge on pfsense is the best way... I will freaking donate 10$ to your favorite charity ;)
-
johnpoz:
I went back to reassess everything. I think i'd like to take a different approach now due to your input. heres what I'd like to do on the sg-3100.
- WAN
- OPT1 ( use for management interface).
- LAN1 ( discrete port : main home network)
- vlan 10 - hardwired items
- vlan 11 ( wireless clients)
- LAN2 (discrete port with : fios)
- vlan 20 all fios boxes
- LAN3 (discrete port for iot)
- vlan 30 ( secure iot devices )
- vlan 31 (insecure iot devices)
- LAN4 (discrete port :dmz)
- vlan40 ( guest network)
So i will have a separate connection on each of these ports to my unifi switch with similar vlans setup on that end.
My qeustions:
-
is the above a good setup on the sg-3100 ?
-
lf it is, can you guide on exactly how to setup things on /interfaces/switches /vlans page? what is tagged and what is not tagged ?
-
will it be possible to get devices on one network to talk to others - like home wireless clients (172.20.11.0/24) browsing stuff on the fios boxes on 172.20.20.0/24 ? What are the rules to enable that?
this should get me to where i wanted to go in the first place. jsut got mixed up trying to send everything down one pipe. thx
-
So you want to run all of these ports to your switch.. So you are using them as router interfaces and not switch ports. Why would you get the 3100 and not a model with discrete interfaces..
How much traffic are you using between these vlans... Why are you breaking them out?
Why are you putting your main home network devices on 2 vlans? Curious.
Secure iot and insecure iot? I doubt there is such a thing as secure iot ;) hehehehe
What exactly are you going to be dongi witht he opt1 interface? Your interfaces with only 1 vlan on them do not need to be tagged. The interfaces with 2, 1 could be tagged the other could be native untagged.
As to that being a good setup for the 3100.. Off the top I would say no to be honest... The point of the 3100 is comes with switch ports.. And you don't seem to be using for that - you want to seem to leverage them all for uplinks..
As to browsing from 1 vlan to another.. Sure you can allow for access... Simple rule to allow the port you want to allow.. But "browsing" if you mean discovery or a broadcast then no.. They are 2 different layer 2 networks. So if you want to say use SSDP to find a box on another vlan then no its not going to work... Or like windows network neighborhood discovery shit.. No doesn't work like that. You can allow for some multicast discover with avahi package..
But if you have devices that "require" layer 2 discovery you might want to determine if easier to just put them on the same layer 2.
Example of this... My printer - for airprint to work it is easier for it to be on the same layer 2 as devices that will use airprint to print to it. This is my secure wireless vlan.. Which is a eap-tls secured network.. My wired devices on my normal lan and such that need to print can just point to the printers IP they do not need to use discovery to find the printer, etc. But my tablet my phones and such its just easier for them to use the airprint discovery.
-
hello jonpoz
You are right, I dont need to split them up like that. I was following the guide in the video here : https://www.youtube.com/watch?time_continue=1&v=NgRy14rYhV8
Regarding devices talking to each other across subnets, I have:
- I will need access to the fios dvr from devices on the home lan but dont want fios to be on the same subnet.
- some of my iot designated devices ( nest hello ) will need access to my lan.
other than that, nothing complex. The netagte video I linked to got me confused about how to setup the ports. If the setup I am showing is not ideal, what do you recommend ? My goal is to simply create several vlans to segment off the traffic as shown above then use my unifi switch to connect all devices downstream. Thanks
-
You can split them up if you NEED too... But unclear on your actual NEED?
Sure its normally a good idea to isolate stuff like DVRs, TVs, etc.. But you need to understand the discovery or method of access if you want to access them from another network. You can for sure access them via a tcp or udp port from another network. But if your client is going to use some sort of broadcast or multicast discovery protocol your going to have problems - just so we are clear.
Why does your nest hello need access to your lan? I wouldn't think nest hello creates any sort of unsolicited access to something on your lan.. But I could see your lan devices access it. So you can view the video when someone rings the bell.. Do you have some NVR or something on your lan that the doorbell will be writing video too?
Are you going to connect devices directly to switch ports? Or just going to run all the ports to your switch? The point of the switch ports is more to leverage them for devices to directly connect to vs uplinking to a switch for vlans.. You could put say a couple of them in a lagg and use that as uplink to your switch.. Or depending on the amount of devices and bandwidth requirements between vlans you could just put all your vlans on 1 of them as uplink and put the other ports on vlans for devices directly connected that you want on vlan vs connecting to your switch.
If your only going to connect switch ports to pfsense, unless they have some high bandwidth requirements between the vlans doesn't seem optimal to use all of the switch ports as uplinks. Keep in mind that their is only 2.5gig uplink from the switch ports to the routing functions of pfsense..
-
@johnpoz said in Setup for trunk via OPT1 port of SG-3100:
But I could see your lan devices access it. So you can view the video when someone rings the bell..
Yep this is what I meant - lan devices accessing clients on the other subnets ( phone to nest hello, phone to fios dvr ).
My need is just to segment out my network into the parts below and put in appropriate rules, depending on which two vlans, to limit access .
Again, I got confused with that video because I assumed i had to setup vlans by using the 802.1q setup as shown. Otherwise my needs are pretty simple!
- lan / wired client
- lan wireless clients ( will do this with unifi ap )
- fios
- iot "secure"!
- iot "insecure"!
- guest wireless
Thats as complex as it gets! Maybe you can help me understand what was being done in that video and how it does not apply to what I am looking for .... thx again!!
-
You would need to use tagging to break out vlans into your network.. For the switch ports I am not sure if you can break them out in a port mode or have to use them with tagging to make them discrete to be 100% honest.. While I have 2 3100s I have not had need to break out any of the switch ports to other vlans as of yet.. Just using the as switch ports for lan and currently both devices only have switch connected to 1 port that vlan is on..
I count 5 networks there.. Your lan which is default on the switch I believe could all be on the switch ports if you have devices directly connected.
Then 1 of your other networks could be untagged on your opt1 interface 3 of your vlans tagged. Or they could all be tagged - that is up to you.
Only reason I could see breaking up the switch ports into their own interfaces is if need more speed between vlans for intervlan traffic. Keep in mind every vlan you put on a physical interface will be sharing the physical bandwidth of that port.
Do you plan on connecting any devices directly to the switch ports of your 3100... Will these devices need to be in different vlans? Will you be connecting an AP directly into one of these switch ports that will carry multiple vlans?
-
This seems overly complicated. Let the Ubi switch do switching (vlans) and let the pfsense do routing. Can you hookup everything to the Ubi switch instead?
Then, you only need 1 cable on the sg3100 lan to the switch. Put all vlans in that (trunk) port. LAN configs between the sg3100 & switch should then match.
Just my $0.02.