Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can VLANs on a Cisco AP work with PFSense?

    Scheduled Pinned Locked Moved General pfSense Questions
    13 Posts 6 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      Dave R2
      last edited by

      On my (home) Pfsense firewall, I have port 80 and 443 traffic routed to a VPN provider. Some services (like Etsy) make it a real PITA to use with a VPN. Naturally, people get upset that they can't get to Etsy.

      I've tried a few things but they end up sucking air. Is it possible to setup a Cisco 3702 AP with two SSIDs, with two separate VLANs, and then tell Pfsense that stuff on (for instance) vlan_100 should bypass the VPN completely and everything else (on vlan_200) would just be routed over the VPN as usual? I have an HP 2560 switch (does VLANs) that the 3702 (and pfsense) would be jacked into.

      My Cisco knowledge is thin. I'm not sure where to start on this but I do have a 3702 sitting here for a wifi upgrade anyway so thinking wth.

      JKnottJ 1 Reply Last reply Reply Quote 0
      • NogBadTheBadN
        NogBadTheBad
        last edited by NogBadTheBad

        Depends exactly what the model is, is it a standalone AP or does it require a wireless controller?

        It's been ages since I've touched a standalone Cisco AP, it should just be a matter of configuring ethernet0, ethernet0.100, ethernet0.200 and then associate the dot11radio interfaces.

        Then have the uplink pass the native, 100 & 200 vlans.

        https://www.cisco.com/c/en/us/td/docs/wireless/access_point/15-3-3/configuration/guide/cg15-3-3.html

        You may be better configuring it via the web interface.

        https://www.youtube.com/watch?v=krSDfvRbWX0

        Andy

        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

        D 1 Reply Last reply Reply Quote 1
        • D
          Dave R2 @NogBadTheBad
          last edited by

          @nogbadthebad Standalone. The AP is model AIR-AP3702I-UXK9 running ap3g2-k9w7-xx.153-3.JA4 firmware.

          Thanks for the link. I found that video over the weekend and started following along at the CLI. Just wasn't sure this would all work with PFSense. Also, a warning to anyone who hasn't watched this video -- the volume of the terminal bell is 11 while his mic is at 5.

          Maybe I can skip around the video and get more out of. If the VLAN traffic is compatible then I'll keep going.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @Dave R2
            last edited by

            vlans are vlans are vlans.. Anything that supports vlans should work with any other device that supports vlans..

            Its a standard.. unless you were doing something with cisco proprietary vlan stuff - say VTP then there should be any problems. Or their ISL..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 1
            • bingo600B
              bingo600
              last edited by

              I'm running 6 SSID's of several Cisco AP's (Non CAPWAP)

              /Bingo

              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

              pfSense+ 23.05.1 (ZFS)

              QOTOM-Q355G4 Quad Lan.
              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

              1 Reply Last reply Reply Quote 1
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Yes, this should absolutely be possible.

                And in fact you will probably get much better results if you route everything over the VPN from one SSID and nothing on the other. All or nothing will break far fewer things. šŸ˜‰

                Steve

                D 1 Reply Last reply Reply Quote 1
                • D
                  Dave R2 @stephenw10
                  last edited by

                  @stephenw10 I'll give it a whirl then. Thanks everyone!

                  NogBadTheBadN 1 Reply Last reply Reply Quote 0
                  • NogBadTheBadN
                    NogBadTheBad @Dave R2
                    last edited by NogBadTheBad

                    @dave-r2

                    I'd be tempted to test it on an unused pfSense interface if you have one, then move the ap to the HP switch once its working, if you have a spare one and a poe injector.

                    Andy

                    1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                    D 1 Reply Last reply Reply Quote 1
                    • JKnottJ
                      JKnott @Dave R2
                      last edited by

                      @dave-r2

                      Think of VLANs as physically separate interfaces and ask your question again. If the answer is yes, then it will still be yes with VLANs. All you have to do is match VLAN IDs. Incidentally, here I have pfsense connected to a Cisco switch, connected to a Unifi AP and have a guest WiFi connected via VLAN. I just made sure that they all were configured for the same VLAN ID.

                      BTW, if you have 2 SSIDs, you'd normally have 1 VLAN and the main LAN, unless you have specific reasons for not putting your main WiFi on the main LAN.

                      PfSense running on Qotom mini PC
                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                      UniFi AC-Lite access point

                      I haven't lost my mind. It's around here...somewhere...

                      D 1 Reply Last reply Reply Quote 1
                      • D
                        Dave R2 @NogBadTheBad
                        last edited by Dave R2

                        @nogbadthebad said in Can VLANs on a Cisco AP work with PFSense?:

                        I'd be tempted to test it on an unused pfSense interface if you have one

                        @nogbadthebad That's a great idea. If I run into snags which the HP switch I'll keep this in mind.

                        1 Reply Last reply Reply Quote 0
                        • D
                          Dave R2 @JKnott
                          last edited by

                          @jknott

                          @jknott said in Can VLANs on a Cisco AP work with PFSense?:

                          BTW, if you have 2 SSIDs, you'd normally have 1 VLAN and the main LAN,

                          Hmm now that makes sense. The HP switch has a "Default" VLAN which, I guess, is everything that isn't on a specific VLAN. If I create a second VLAN for the bypass SSID, I essentially have two VLANs but really it's only one since all LAN traffic is on the "Default"

                          Now that I'm thinking this through a little more, how does PFsense see traffic from the "bypass" VLAN? Can I use a VIP on the LAN interface, or do I need to have a PHY?

                          JKnottJ 1 Reply Last reply Reply Quote 0
                          • JKnottJ
                            JKnott @Dave R2
                            last edited by

                            @dave-r2

                            If you're using VLANs, you create one on a physical interface. For example, I created VLAN3 on my LAN interface for my guest WiFi. I then configured my switch to pass VLAN3 on the ports connected to pfsense and my AP and then configured VLAN3 and 2nd SSID on my AP.

                            PfSense running on Qotom mini PC
                            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                            UniFi AC-Lite access point

                            I haven't lost my mind. It's around here...somewhere...

                            D 1 Reply Last reply Reply Quote 1
                            • D
                              Dave R2 @JKnott
                              last edited by

                              @jknott

                              @jknott said in Can VLANs on a Cisco AP work with PFSense?:

                              If you're using VLANs, you create one on a physical interface.

                              Ok I see. When I created VLAN 200 in pfsense, it ended up assigned to my LAN interface as em1.200. I was experimenting a couple weekends ago and didn't catch it was a virtual nic. It's making more sense now, thanks.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.