• 0 Votes
    1 Posts
    587 Views
    No one has replied
  • Hybrid routed and NAT'ed network

    Routing and Multi WAN public ips routing vlan
    2
    0 Votes
    2 Posts
    659 Views
    lifeboyL
    I have now added a VLAN to the LAN port in proxmox and created a bridge from that. This I have added to pfSense with the first address of the ip subnet which will act as gateway for the /29 addresses from the guests/hosts on the network. So far so good.
  • VLAN Routing with UniFi APs

    L2/Switching/VLANs netgear unifi vlan
    12
    17
    0 Votes
    12 Posts
    3k Views
    bingo600B
    @johnpoz Luckily i'm in a controlled environment where only PC's and Desktop Phones approved by (me) are allowed to have access via WiFi. No phones or personal devices are allowed on that segment. /Bingo
  • 0 Votes
    1 Posts
    1k Views
    No one has replied
  • 0 Votes
    2 Posts
    964 Views
    johnpozJ
    @charles_moody said in Trunk/LAGG problem / pfSense UniFi 24-250W PoE Switch and VLANs: Can anyone tell me how to get the switch to adopt So this is crux of your issue? That has nothing to do with pfsense.. Your controller and switch need to be on the same L2 network for adoption... Or you need to use L3 adoption.. This has everything to do with unifi, and not related to pfsense at all. https://help.ui.com/hc/en-us/articles/204909754-UniFi-Device-Adoption-Methods-for-Remote-UniFi-Controllers behind that about 10 smart-managed Netgear switches This seems nuts - are they all in closets somewhere.. How big is this house? If you were running cable - why would all your cables not just home run back to your core switching area? Curious where exactly all these switches are? want LAN just for troubleshooting and because it’s often stated that LAN will strip of the VLAN tags from the traffic Huh? You can run vlans on lan just like any other interface.. So not sure what your thinking with this statement... Sure you can use lan interface as your management interface.. But it can run vlans on it as well if you want.
  • 0 Votes
    5 Posts
    1k Views
    VivoAzzurroV
    @JKnott I tend to heir on the side of caution when it comes to using terminology I'm not 100% familiar with, but I have the basics down that's for sure. Regardless, after some extensive troubleshooting I got rid of the Aruba switch and swapped it out with a Ubiquiti. Had my network infrastructure team troubleshoot the Aruba... nobody could get it working. They let me know about how others have not been able to use Aruba equipment in the past, so i chalked it up to the switch.
  • VLAN connectivity Issue

    Firewalling vlan cisco switch
    4
    6
    0 Votes
    4 Posts
    866 Views
    johnpozJ
    While captive portal could be blocking.. You clearly have issue there with only allowing tcp.. Unless your client is doing doh or dot there is now way he could get any dns.. DNS runs on UDP 53.. You can see right there in your block 53 to 8.8.8.8 was blocked.
  • 1 Votes
    7 Posts
    3k Views
    G
    @The-Party-of-Hell-No Listo amigo ya quedo, lo que pasa es que tenia dns asignados a la vlan dejando el nativo se soluciono
  • 0 Votes
    1 Posts
    922 Views
    No one has replied
  • 0 Votes
    12 Posts
    3k Views
    JKnottJ
    @CalTommo I don't know how, if you've set up DHCP. It just works. Configuring DHCP on a VLAN is no different than on an Ethernet port. Do you have a computer you can configure for VLAN 80? If so, just plug it into the LAN side of the pfSense box and see what happens.
  • 0 Votes
    21 Posts
    5k Views
    GrimetonG
    @xyzzyz said in VLAN question for noob moving from Cisco ASA: My question: On my pfSense replacement for the ASA, is there any advantage to setting up a VLAN for the WAN port? No.
  • 0 Votes
    5 Posts
    2k Views
    NogBadTheBadN
    Trunk your VLANs on a single pfSense interface. The Netgear docs suck big time. https://community.netgear.com/t5/Smart-Plus-Click-Switches/Port-trunking-on-GSS108E/td-p/1353948
  • 0 Votes
    3 Posts
    3k Views
    PARNP
    Bonjour, Alors moi aussi je suis en train de faire ce setup avec comme but de garder Livebox , TV et phone de coté. Donc je regarde cette doc : https://wiki.csnu.org/index.php/Fibre_orange_en_DHCP_avec_routeur_pfsense J'ai acheté un switch microtik 260gs, parce que je suis un geek et que c'est bien foutu ces switch pour pas chère :) Bref en attendant d'avancer sur ce setup j'ai ma solution intermédiaire pour la partie TV Sur un switch qui supporte les vlan je créé un vlan spécial ou je branche et j'isole du reste de mon réseau la livebox et la box tv. Bien entendu j'ai du tirer un câble de mes serveurs vers ma tv mais je suis bien content du résultat. Après je n'ai rien inventé j'ai suivi l'idée de la doc ci dessus : "Enfin, dans le cas ou vous ne pourriez pas brancher directement le port LAN de la livebox à votre décodeur, il est possible (à condition que le switch gérant votre lan soit manageable et supporte les VLANs) de brancher le port LAN de la livebox directement à votre switch de LAN et d'y taguer les paquets sur un VLAN (666 dans cet exemple). Cela impose d'avoir un second switch sur votre lan, qui sera, lui, directement connecté au décodeur et qui doit être lui aussi manageable afin de détaguer du VLAN 666 les paquets pour le décodeur. " Tous ça pour dire que je pense que virtualiser pfsense dans proxmox peut ajouter plus de complication que de solution. Mais c'est intéressant de monter ce setup Quand j’aurais le temps d’avancer sur ce setup j'ajouterais des infos. @+
  • Non local gateway IPv6

    IPv6 ovh ipv6 vlan gateway
    25
    0 Votes
    25 Posts
    6k Views
    JKnottJ
    @Overclock said in Non local gateway IPv6: I let you inform about OVH response. Ask them how SLAAC is supposed to work with a /56. You may be able to get a single /64 to work, but the other 255 will be unusable.
  • Problem Vlan with Vmware

    L2/Switching/VLANs vmware vlan
    1
    0 Votes
    1 Posts
    585 Views
    No one has replied
  • 1 Votes
    16 Posts
    4k Views
    johnpozJ
    Dick? Really? Calling you out on calling yourself a ccie when clearly everyone knows that is not even close to true is not being a dick... That is just calling someone out on their BS! So what was the problem, only tcp for the rule? Wrong source? Maybe you had policy route on the rule? But that wouldn't of stopped ping to pfsense IP? Only ping to other lan.. That is another common mistake.
  • 0 Votes
    4 Posts
    1k Views
    stephenw10S
    No, no reboot required.
  • NAT VLAN through VPN Troubles

    NAT nat vlan vpn headers
    5
    1
    0 Votes
    5 Posts
    956 Views
    P
    @Pippin Thank you for the reply. I went into VPN -> OpenVPN -> Clients and edited my client's configuration. Under Advanced Configuration I put into the custom options "ns-cert-type server; persist-tun; persist-key; mssfix 1400" and then saved. I then reloaded the VPN by going to Status -> OpenVPN. I did the usual ping/nmap verification checks to confirm connectivity. However this does not seem to have done anything. Below is a picture of the wireshark output (with the TCP stream from the browser being currently selected) and below that is the capture file. [image: 1564770848390-untitled.png] mssfix1400_full_cap.pcapng
  • 0 Votes
    1 Posts
    582 Views
    No one has replied
  • 0 Votes
    6 Posts
    2k Views
    jimpJ
    I have not been able to reproduce the problem here, but I can see how it might happen. I opened https://redmine.pfsense.org/issues/9582 to track it and committed a fix: https://github.com/pfsense/pfsense/commit/45f95753963e497b5ce14493f9cca05336d75c7b You can install the System Patches package and then create an entry for 45f95753963e497b5ce14493f9cca05336d75c7b to apply the fix. Alternately, you can use viconfig to edit the config and remove that <vlans></vlans> line, or download a backup, edit it out, then restore.