Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    XG7100-1U Multiple WAN to Multiple LAN

    Scheduled Pinned Locked Moved Official Netgate® Hardware
    13 Posts 4 Posters 1.5k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S Offline
      SenseiNYC
      last edited by

      I have an XG7100-1U and I apparently am having a difficult time with configuring the switchports. I've been using pfSense for years and I've used quite a few Netgate appliances, but this is the first XG7100-1U with the switchports. This is what I would like to accomplish:

      Eth1 - WAN#1 (ISP#1, Primary ISP for Eth2-LAN)
      Eth2 - LAN#1 (Corporate LAN)
      Eth3 - LAN#2 (Guest LAN)
      Eth7 - WAN#2 (ISP#2, Primary ISP for Eth3-LAN)
      Eth8 - WAN#3 (ISP#3, Failover for either WAN#1 or WAN#2)

      Part of me wishes I opted for the Netgate SG-4860 but we need a 1U appliance and the Netgate SG-4860-1U is EoL and replaced by the XG7100-1U, so here I am. The Netgate SG-4860 was easy enough for me as I wasn't feeling so confused by the switchports but I am going to have to learn to use the switchports. The VLANs are not what is confusing me, it's more the interoperation between lagg0 and the VLANs and understanding how to map them to the actual physical Ethernet ports.

      I have spent quite a bit of time reading The XG7100-1U Switch Overview and for some reason my brain is not able to untangle the information correctly so I apologize for that.

      So if anyone has any questions as to why I specified those ports mentioned above? It's arbitrary really, just for example for the scenario. If anyone has any familiararity with the XG7100-1U and mapping the switchports and can help by providing valuable advise, I would deeply appreciate it. Thanks in advance.

      1 Reply Last reply Reply Quote 0
      • RicoR Offline
        Rico LAYER 8 Rebel Alliance
        last edited by

        https://www.netgate.com/resources/videos/configuring-netgate-appliance-integrated-switches-on-pfsense-244.html

        -Rico

        S 1 Reply Last reply Reply Quote 0
        • stephenw10S Offline
          stephenw10 Netgate Administrator
          last edited by

          Please open a ticket with us at https://go.netgate.com if you are still having problems with that.

          If you have an existing configuration we can help you convert that. We also have an alternative default config we can provide with all the port pre-configured as separate interfaces.

          Steve

          S 1 Reply Last reply Reply Quote 0
          • S Offline
            SenseiNYC @Rico
            last edited by

            @Rico We've watched the video a number of times and while it seems informative, its not instructional on various configuration options.

            1 Reply Last reply Reply Quote 0
            • S Offline
              SenseiNYC @stephenw10
              last edited by

              @stephenw10 Thank you I believe this will need to be our course of action.

              1 Reply Last reply Reply Quote 0
              • M Offline
                madapter
                last edited by

                If you have something like a white paper or FAQ on how to do this type of configuration, I'd be interested in it as well. The switch port is presenting some challenges here as well, almost looks like we should have ordered the the PCIe network card at this point.

                1 Reply Last reply Reply Quote 0
                • stephenw10S Offline
                  stephenw10 Netgate Administrator
                  last edited by

                  If you're configuring from scratch I'd first restore this config that will configure the switch and VLANs in pfSense to have all the ports separately assigned. Then you can treat them like individual interfaces.

                  If you have existing VLANs things get more complex but as I said above if you open a ticket with us we can help you with that. We've done lots of these conversions with numerous different configurations.

                  Steve

                  7100-8-port-config.xml

                  1 Reply Last reply Reply Quote 0
                  • S Offline
                    SenseiNYC
                    last edited by

                    Hi @stephenw10 thank you again for helping with this the other day. I am sorry to bother but I have a question based on your prior assistance.

                    Eth1 4081 - WAN1
                    Eth2 4082 - LAN1
                    Eth3 4083 - WAN2
                    Eth6 4086 - LAN2
                    Eth7 4087 - WAN3
                    Eth8 4088 - LAN3

                    Now I want to have each LAN # route outbound using the corresponding WAN # (eg; LAN1 to WAN1, LAN2 to WAN2, LAN3 to WAN3). I was able to get the config to the point where it's usable for our needs with regards to IPSEC tunnels and all, but as each WAN is a different ISP and each LAN is a different VLAN tag on the switches (the LAN ports are ACCESS to the switches ports where the switches then carry the traffic internally over the tagged VLAN's).

                    Is the best way to route the LAN's to the appropriate WAN's to use rules (eg; Rule - LAN1 / Rule - LAN2 , etc) or is there a better way to do this?

                    Thanks again.

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S Offline
                      stephenw10 Netgate Administrator
                      last edited by

                      Yes, use policy routing rules on the incoming LAN interfaces to route traffic via the correct gateway.

                      You may want to add rules above that on each interface to allow traffic to the pfSense DNS and NTP services on the LAN interface itself if they are using that.

                      Steve

                      1 Reply Last reply Reply Quote 0
                      • S Offline
                        SenseiNYC
                        last edited by SenseiNYC

                        Here is what I have so far, not sure if this was done correctly. Showing in order of work performed:

                        Interface Assignments

                        Switch Ports

                        0Switch port VLANs

                        LAN_Corporate (Main LAN) Rules

                        LAN_POS Rules

                        LAN_Guest Rules

                        Gateway Groups

                        Thanks again.

                        1 Reply Last reply Reply Quote 0
                        • S Offline
                          SenseiNYC
                          last edited by SenseiNYC

                          And to be clear, we do not yet know if it is working, we wish to go live next week and are hoping to get the configuration correct from the start.

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S Offline
                            stephenw10 Netgate Administrator
                            last edited by

                            Yeah that looks OK but you will probably want rules above those policy routing rules to allow clients there to access DNS and NTP on the firewall. Otherwise all traffic matched by the policy rule will be forced to leave via the gateway group including dns and ntp. You might also want a rule to prevent devices access the GUI on the WAN IP.
                            Something like:

                            Selection_611.png

                            Steve

                            1 Reply Last reply Reply Quote 1
                            • S Offline
                              SenseiNYC
                              last edited by

                              @stephenw10 you really are awesome! that is exactly what i did yesterday. Thank you so much!

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.