Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Routing between LAN and VLAN2

    Scheduled Pinned Locked Moved Routing and Multi WAN
    5 Posts 3 Posters 1.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C Offline
      caigeliu
      last edited by

      My LAN is 10.0.1.0/24 for data network,
      and my phone is 192.168.1.0/24 for voice network.
      All ports in switch are untagged for 10.0.1.0/24 (vlan1 and default vlan); tagged for 192.168.1.0/24 (vlan 2.)

      At pfsense, LAN is 10.0.1.0/24, and I created a vlan2 interface for 192.168.1.0/24.

      My question is:
      how to enable traffic between LAN and VLAN2? 
      i.e. a computer in LAN can access devices in VLAN2, or a device in VLAN2 can access a computer in LAN?

      Thanks very much for any suggestions and helpful links.

      1 Reply Last reply Reply Quote 0
      • B Offline
        bjaffe
        last edited by

        Assuming you already have rule on the LAN tab to allow ipv4 any protocol traffic from LAN net to any destination, you'll need a rule on the VLAN2 tab to allow traffic from source VLAN2 net to either destination "any" or "LAN net".

        1 Reply Last reply Reply Quote 0
        • C Offline
          caigeliu
          last edited by

          Thank bjaffe. I did as you said. Our LAN and VLAN2 is used the same network card.

          Now I can ping from any of LAN (10.0.1.0/24) to VLAN2 interface IP (192.168.1.10), cannot ping other hosts in VLAN2 (192.168.1.0/24).

          Also in ARP table of pfsense, it only shows only one VLAN2 interface IP, no other hosts in VLAN2 displayed.

          What should I do?

          @bjaffe:

          Assuming you already have rule on the LAN tab to allow ipv4 any protocol traffic from LAN net to any destination, you'll need a rule on the VLAN2 tab to allow traffic from source VLAN2 net to either destination "any" or "LAN net".

          1 Reply Last reply Reply Quote 0
          • C Offline
            caigeliu
            last edited by

            Is it that I have to create a VLAN1 for 10.0.1.0/24? Then enable interconnection between VLAN 1 and VLAN 3. Then in this way, my LAN interface is useless.

            Wish any suggestions with urgent.

            1 Reply Last reply Reply Quote 0
            • johnpozJ Offline
              johnpoz LAYER 8 Global Moderator
              last edited by

              "All ports in switch are untagged for 10.0.1.0/24 (vlan1 and default vlan); tagged for 192.168.1.0/24 (vlan 2.)"

              How do you have the ports set??  And how did you create your vlan.. You assigned this vlan to your physical lan interface right?  See attached, I have multiple vlans on em2, and it also has its native (untagged) network wlan..

              On the switch the port connected to em2 trunked where those the vlans are tagged and the native vlan is set to 20 (untagged).  Notice the ge10 interface is native or PVID is set to 20, ports that are directly connected to a device don't need to be tagged.  Only interface that connect to say another switch or interface with vlans on it need to have vlans tagged.  Ports that connect to end user device, say computer for example normally are set to be untagged in the vlan you want that port/device in.  If your tagging that traffic, then you would have to set the interface on that device to understand the tag.. Or its going to be using the untagged.. You stated that you have all ports untagged for vlan 1 (default vlan) and then also have tagged traffic on it..

              That is not how I would normally do it for sure..

              So in my case pfsense em2 is native on vlan 20, it then has the other vlan interfaces assigned to it 100,200,300  So any untagged traffic it sees is assume to be going to the physical interface.. Any traffic that is tagged will be seen with the vlan interface that its tagged for.

              As to connectivity between normal untagged traffic on interfaces and vlan interfaces be it on the same physical interface or different ones just require firewall rules to allow the traffic you want.  To be honest when first setting it up use of any any rules makes it easy that you actually have connectivity..  Keep in mind any software firewalls running on the different vlan/network segment most likely will be blocking traffic from another network.  Windows machines for example would block pings coming from a different network other than the network they are on.. So if they are on say 192.168.1.0/24 and you ping them 192.168.2.0/24 they would not answer until you setup their firewall to allow that.

              vlans.png
              vlans.png_thumb
              tagging.png
              tagging.png_thumb

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 25.07.1 | Lab VMs 2.8, 25.07.1

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.