Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cannot add VLAN interface

    Scheduled Pinned Locked Moved Routing and Multi WAN
    12 Posts 3 Posters 817 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bingo600B
      bingo600 @Cool_Corona
      last edited by

      @cool_corona

      Don't use /16 on the LAN interface , if you want to use 10.1.x.x on the new Vlan interface.

      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

      pfSense+ 23.05.1 (ZFS)

      QOTOM-Q355G4 Quad Lan.
      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

      Cool_CoronaC 1 Reply Last reply Reply Quote 1
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @Cool_Corona
        last edited by

        @cool_corona said in Cannot add VLAN interface:

        I have interfaces added on 2.4.5P1 no issues.

        With that /16 mask? Pfsense has prevented overlapping IPs for as long as I can remember..

        As @bingo600 correctly stated - don't use overlapping networks on your interfaces. It is not a valid configuration..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        Cool_CoronaC 1 Reply Last reply Reply Quote 0
        • Cool_CoronaC
          Cool_Corona @bingo600
          last edited by

          This post is deleted!
          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @Cool_Corona
            last edited by

            Overlapping is overlapping - you can not do that..

            If its just a parent interface with vlans on it - why are you even setting an IP on it? If you want native network on the parent, with vlans on it - they still can not overlap..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • Cool_CoronaC
              Cool_Corona @johnpoz
              last edited by

              This post is deleted!
              johnpozJ bingo600B 2 Replies Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @Cool_Corona
                last edited by johnpoz

                its BORKED!! How is pfsense to know where an IP is at if has same network on 2 interfaces.

                IP address xyz could be on the parent or the vlan..

                Be it you think it worked ok before, and if pfsense lets you do from cmd line (where no code to check) is besides the point. Such a configuration is just plan BORKED!!

                Such a configuration would not allow your native network clients to ever talk to vlans - because it would think that IP is suppose to be on its local network, and it would just arp for it, vs sending to the gateway.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 1
                • bingo600B
                  bingo600 @Cool_Corona
                  last edited by bingo600

                  @cool_corona

                  It couldn't (shouldn't) have worked if you had comms from lan to vlan.
                  Lan would due to the /16 just have "arp'ed" for any "vlan ip" , and never used the gateway , aka. routed the package via L3. So no comms ought to be possible.

                  You might have been saved by some kind of "Proxy Arp" , but i wouldn't have expected a FW to do proxy arp - (Don't know pfSense inners that good)

                  Hmm : JP beat me to it 😊
                  /Bingo

                  If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                  pfSense+ 23.05.1 (ZFS)

                  QOTOM-Q355G4 Quad Lan.
                  CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                  LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                  Cool_CoronaC 1 Reply Last reply Reply Quote 1
                  • Cool_CoronaC
                    Cool_Corona @bingo600
                    last edited by

                    This post is deleted!
                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @Cool_Corona
                      last edited by johnpoz

                      Be it you think it works, or worked for your scenario is again besides the point... It is a completely and utterly borked setup..

                      It is networking 101 and basic common sense. You can not expect it to work if you put the same network on more than 1 interface.. It is borked, will always be borked..

                      Correct your setup. How can you think such a setup is valid?

                      How does a device on parent /16 network get to a device on a vlan - when that vlan IP is on its own /16.. Unless you don't actually have vlan isolation there is no way this /16 network device could arp for an IP that is he believes should be on his network.. So how would he ever talk to said device.

                      The only possible this could ever work is your not actually isolating your vlans.. Also borked!

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      Cool_CoronaC 1 Reply Last reply Reply Quote 0
                      • Cool_CoronaC
                        Cool_Corona @johnpoz
                        last edited by

                        This post is deleted!
                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @Cool_Corona
                          last edited by johnpoz

                          Dude I don't know what else to tell you.. Its BORKED!

                          Fix your setup.. There is nothing for pfsense to do here.. what you are trying to do is wrong - no matter how you look at it, or want to think you should be able to do it..

                          Even the most basic grasp of how networking works tells you how you have it setup is just plain borked..

                          edit:

                          When a client wants to talk to an IP.. Is that IP suppose to be on my network.. Does it fall inside the IP space of my address and mask. Oh its on my network - ARP!! for it.. Ok device with mac address abc, answered for IP 123.. Send the traffic to that mac..

                          In no scenario does the client say - oh no answer for arp, send it to my gateway... The only scenario where it "could" work is if the gateway (pfsense) was doing proxy arp and answer for any IP that doesn't answer arp.. Which there is no such thing - there is a way to do proxy arp for VIPs..

                          So if you have some device on your /16, and it wants to talk to a an IP that is on one of your vlans that falls under this /16 block.. How would it know where to send the traffic.. So either your L2 are not actually isolated. Or you have pfsense doing proxy arp for every single IP under the /16 that is not actually on the /16 L2..

                          You can not expect your setup to ever function correctly.. Pfsense will clearly warn you - as it did that what your trying to do is wrong, ie the overlapping networks warning. But how can it warn you from a cmd line setup? Pfsense can try and keep users from shooting themselves in the foot.. But it can not protect you from every scenario of shooting yourself.

                          Setup your networks on pfsense be them native or vlans so they do not overlap..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.