Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Simple VLAN setup

    Scheduled Pinned Locked Moved Routing and Multi WAN
    12 Posts 3 Posters 1.2k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J Offline
      johntucker
      last edited by

      Thanks,

      The only reason I used VLAN 1 for the switch is Netgear recommends exactly that.

      1 Reply Last reply Reply Quote 0
      • johnpozJ Online
        johnpoz LAYER 8 Global Moderator @kiokoman
        last edited by johnpoz

        @kiokoman said in Simple VLAN setup:

        never ever use VLAN 1 !

        If he was in a corp setup, or a dod or something ok sure.. But in a home setup this is nothing wrong with using the default vlan..

        But something is not right here, your lan is untagged I take it - so this would be vlan 1 on your switch.. Are you then trying to tag admin as vlan 1? That would be a nono..

        Use a different ID for tagging your admin network.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 25.07 | Lab VMs 2.8, 25.07

        1 Reply Last reply Reply Quote 0
        • kiokomanK Offline
          kiokoman LAYER 8
          last edited by

          of course it is wrong even at home, i was referring to the admin vlan1, the switch doesn't know if you are at home or in a corp. the native vlan of the switch is 1 ... if you don't change it 😌

          ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
          Please do not use chat/PM to ask for help
          we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
          Don't forget to Upvote with the 👍 button for any post you find to be helpful.

          1 Reply Last reply Reply Quote 0
          • johnpozJ Online
            johnpoz LAYER 8 Global Moderator
            last edited by johnpoz

            Oh yeah that is wrong... I thought you meant to not use it at all ;) For example I have default vlan set to 9 on my switches vs vlan 1 ;) But that is just so many years of not using the default vlan 1.

            But in a home setup there is nothing wrong with using vlan 1 on your switch as the default vlan.. But no you can not also then tag some other vlan as 1 ;)

            Depending on the level of "smart" they are using - it might not even support changing the default vlan.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 25.07 | Lab VMs 2.8, 25.07

            1 Reply Last reply Reply Quote 0
            • J Offline
              johntucker
              last edited by

              Greetings,

              Things are mostly working now, I guess that the sleep helped the firewall/router as much as I.

              The issue now is that the server on the PRIVATE net can't ping its gateway. It can successfully ping the LAN gateway and other devices on the PRIVATE net but not 192.168.10.1.

              This is nuts.

              1 Reply Last reply Reply Quote 0
              • johnpozJ Online
                johnpoz LAYER 8 Global Moderator
                last edited by

                And what rules did you put on that interface?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 25.07 | Lab VMs 2.8, 25.07

                1 Reply Last reply Reply Quote 0
                • J Offline
                  johntucker
                  last edited by

                  Here are screen snaps of all of the rules:

                  d26d49bc-14d9-448b-ae01-6e0c72ba0bb9-image.png

                  4e3683ad-c84a-4346-ae2a-09926df97725-image.png

                  61715762-ac68-4d33-9b01-d7a62749d9b2-image.png

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ Online
                    johnpoz LAYER 8 Global Moderator
                    last edited by johnpoz

                    yeah those are ALL wrong ;) When would source lan net ever be inbound source to your wan?

                    I think you have a basic misunderstanding of how rules are evaluated.
                    https://docs.netgate.com/pfsense/en/latest/firewall/firewall-rule-processing-order.html

                    Where in your rules do you allow private net to ping say private address (pfsense IP on private net)

                    I would suggest you read how rules are evaluated, and if you have any questions ask... But you would never have wan net as source of traffic inbound to private net..

                    Rules are evaluated as traffic enters the interface from the network its attached too.. First rule to trigger wins, no other rules are evaluated. So its just plain impossible that wan net source would ever be inbound into private interface.

                    Also just so clear - wan net is NOT internet, wan net is just that - the network attached to wan.

                    edit: here an example of a setup for say a vlan that is restricted to only internet
                    example.png

                    First rule allow test network to ping pfsense IP in test network.
                    2nd rule allows test net to use pfsense IP for dns
                    3rd rule allows test net to use pfsense for NTP
                    4th rule blocks all access to any IP of pfsense.. Wan, test, lan, etc..
                    5th rule blocks all access to any other vlans/networks that are local... The alias contains the rfc1918 space (10/8,192.168/16,172.16/12)
                    6th rule allow clients on test net to go anywhere else (internet)

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 25.07 | Lab VMs 2.8, 25.07

                    1 Reply Last reply Reply Quote 0
                    • J Offline
                      johntucker
                      last edited by

                      Thank you, Thank you!

                      Your example has informed me greatly. I now understand and that is a very good thing.

                      This is my first direct experience with firewalls (other than the frustration they cause at work) I have been around TCP/IP networks since around 1985 and this is the first time that I have run across problems ping'ing within a subnet. I guess that is due to my avoidance of Microsoft Windows and using only MacOS, Unix & Linux with their rare use of internal/device firewalls. I assumed to much!

                      Again, I appreciate the time you have taken to provide this example and I have learned a lot from it.

                      adios,
                      jt

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ Online
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        What we are here for - any other questions just ask..

                        When you have your rules adjusted - post them and we can discuss.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 25.07 | Lab VMs 2.8, 25.07

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.