Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Hardware for using pfsense as a managed switch?

    Scheduled Pinned Locked Moved Hardware
    42 Posts 12 Posters 13.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jahonixJ
      jahonix
      last edited by

      This discussion has gone far from the topic starter's question, hasn't it?

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        They always morph into "what should I do instead.?"

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • B
          Billyboy
          last edited by

          I need it on the WAN side to connect 3 VDSL Router. The existing VDSL Router have built in switches, actually directly connected to a Firebox, but it seems like they are causing trouble with the CARP failover. So, VLAN and spanning Tree, configurable ARP timer would be good. Did I forgot something? Do I need anything for CARP/VRRP support?

          @Derelict:

          Are cheap and stackable the only requirements?

          (Note that those terms are usually mutually-exclusive. You might also need to define the term cheap)

          1 Reply Last reply Reply Quote 0
          • ?
            Guest
            last edited by

            I think getting a bridged modem is a better option. CARP/VRRP is problematic if it happens too often since most providers do MAC throttling to prevent draining the lease pool too quickly.

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              CARP on WAN generally does not play nice with residential-type WAN connections.

              You need a static /29 there. You can usually get away with a static /32 on the secondary WAN but it is sub-optimal.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • B
                Billyboy
                last edited by

                @johnkeates:

                I think getting a bridged modem is a better option. CARP/VRRP is problematic if it happens too often since most providers do MAC throttling to prevent draining the lease pool too quickly.

                A CARP failover happens very seldom, maybe once a month, but it has to work.
                What do you mean with bridged modem? PPPoE? Does this play with CARP?
                Actually, I am using a private IP net only as transfer net between the PFSense und the router, doing double NAT (in the PFSense as well as in the router) . No, I am not using SIP ;-)
                Would probably a OpenWRT routers (without an extra switch) work better, as far as I know, you can configure ARP timeout with OpenWRT?

                1 Reply Last reply Reply Quote 0
                • B
                  Billyboy
                  last edited by

                  @Derelict:

                  CARP on WAN generally does not play nice with residential-type WAN connections.

                  You need a static /29 there. You can usually get away with a static /32 on the secondary WAN but it is sub-optimal.

                  I know that´s sub optimal, but that is the use case. We are replacing expensive company Internet lines with low cost residential VDSL lines, plus adding additional HA with LTE lines (LTE is not available together with public IP in Germany).

                  So I am doing double NAT, with a private IP net between pfsense and the router. Shouldn't that work, it is pretty much the same as on the LAN side?

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    Yes. If you want to do double NAT and put a bunch of potential points of failure in front of the firewalls it will work fine.

                    As long as both primary and secondary can access the internet while the CARP VIPs are in the BACKUP state it should work.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • ?
                      Guest
                      last edited by

                      @nktech1135:

                      Hello all.
                      I'm not sure how practical this is. I am looking for a managed switch for vlans and such and was wondering if pfsense could do this? I'm already using pfsense in a routing capasity but baught a prebuilt hardware solution for that. This time i'd like to build my own.
                      The questions i have are this.
                      1, is it a practical use of pfsense to use it as a managed switch OS?
                      2, if so, what would you guys recommend for an 8 port box? It should be future proofed for updates and be under $200 if possible.
                      The switch will be on the lan side so should have full gigabit speeds.

                      Thoughts?

                      At first get a switch that owns 8 GB LAN Ports! And if you need Layer3 Routing, VLANs, LAGs (LACP)
                      CLI and a real serial console port get a Cisco SG300-10 or Cisco SG350-10. They are often able to
                      get at amazon.com for ~$110 (SG300-10) or ~$200 (SG350-10) if more ports and other things such
                      SFP/SFP+ Ports or 10 GBit/s abillity is another point you will be fine with a  D-Link DGS1510-20 for
                      around ~$270 but with much more power and ports. They are also other solutions out!

                      Netgear Layer2
                      Netgear GS108E
                      Netgear GS108Tv2
                      Netgear GS110T

                      Cisco Layer2 & Layer3
                      Cisco SG200-08
                      Cisco SG300-10
                      Cisco SG350-10

                      Layer3 more ports
                      D-link DGS1510-20

                      1 Reply Last reply Reply Quote 0
                      • jahonixJ
                        jahonix
                        last edited by

                        @Billyboy:

                        We are replacing expensive company Internet lines with low cost residential VDSL lines, plus adding …

                        What the hell does this have to do with "using pfsense as a managed switch"? Create a new thread for your topic.

                        1 Reply Last reply Reply Quote 0
                        • N
                          nktech1135
                          last edited by

                          Hi all.
                          Thanks for all the thoughts. This just goes to show how inexperienced i am that i even asked the question. I like tinkering and i figured that if i could find something with 4 to 8 ethernet ports i could load an OS on it and away i go. Guess such hardware isn't available the way this sounds.
                          Anyway, my origional question was answered. I baught the (TL-SG108E) before reading this so will work with it and see if i run into issues. Someone mentioned a possible vlan issue with this unit. Could you elaborate? Do vlans not work at all? or just certain types?
                          I'm new with vlans so will probably struggle a bit once i get this configured but that's fine, i like a good challenge.
                          As for the cli, I am familiar with junos, but nothing much else. I'd love to buy a junipor switch but they're to expensive for what i'm doing.
                          Curious, does pfsense have a good cli? The one time i logged in via ssh i didn't see one but i may have missed something.

                          Thanks again for all the help.

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            250-post thread here:

                            https://forum.pfsense.org/index.php?topic=76022.0

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • W
                              whosmatt
                              last edited by

                              @Inxsible:

                              I'd prefer working in the CLI too. Most times I go the CLI route even if a GUI is available.

                              Ditto.  I've found most easy to get around in.  If you're familiar with the cli in a Cisco switch it's hardly a jump at all to manage a Dell switch, for example. They're that close.

                              1 Reply Last reply Reply Quote 0
                              • DerelictD
                                Derelict LAYER 8 Netgate
                                last edited by

                                For some little edge switch, I really don't care as long as the web interface actually does what you tell it to do. A proper management VLAN capability for the web interface is also nice.

                                CLI all the way for real work.

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • W
                                  whosmatt
                                  last edited by

                                  @Derelict:

                                  as long as the web interface actually does what you tell it to do

                                  And just as important is that it's clear that what you think you're doing is what you're actually doing.  I've never really dealt with the web interface in a fully managed switch, always used the CLI, but in the "prosumer" (I hate that term, but it actually seems applicable here) realm the hardest part IMO (for someone otherwise comfortable managing a switch) is that translating what the interface says to what is actually happening can be less than intuitive.  Obviously it's not rocket science, but I don't fault anyone for not initially realizing that "PVID" = "native VLAN" for example.

                                  1 Reply Last reply Reply Quote 0
                                  • DerelictD
                                    Derelict LAYER 8 Netgate
                                    last edited by

                                    Right - and that is specifically one of the areas the switch in question falls on its face - the PVID.

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    1 Reply Last reply Reply Quote 0
                                    • W
                                      whosmatt
                                      last edited by

                                      @Derelict:

                                      Right - and that is specifically one of the areas the switch in question falls on its face - the PVID.

                                      I know.  I have two of them.  They'll get replaced pretty soon but it's mostly because I need more ports.  For my uses they've actually been fine, and the PVID issue that has been discussed extensively is largely academic for me in my home environment.

                                      1 Reply Last reply Reply Quote 0
                                      • W
                                        whosmatt
                                        last edited by

                                        @nktech1135:

                                        I baught the (TL-SG108E) before reading this so will work with it and see if i run into issues. Someone mentioned a possible vlan issue with this unit. Could you elaborate? Do vlans not work at all? or just certain types?

                                        I use 2 of these at home right now and the PVID issue aside, they work fine.

                                        In a nutshell, the issue is that no matter how you assign VLANs, VLAN1 is always available on any given port and that leads right to the management IP. That's a big no-no for the office, but in real world home use, it won't affect how the switch actually works with VLANs.  If you already have it, use it.  It's fine for home use.  All the VLAN stuff that you would want with pfSense will work.

                                        1 Reply Last reply Reply Quote 0
                                        • N
                                          nktech1135
                                          last edited by

                                          @whosmatt:

                                          I use 2 of these at home right now and the PVID issue aside, they work fine.

                                          In a nutshell, the issue is that no matter how you assign VLANs, VLAN1 is always available on any given port and that leads right to the management IP. That's a big no-no for the office, but in real world home use, it won't affect how the switch actually works with VLANs.  If you already have it, use it.  It's fine for home use.  All the VLAN stuff that you would want with pfSense will work.

                                          Thanks for the explanation.
                                          For me here, having access to vlan 1 isn't a problem, I get why you say it would be a problem in larger office networks though, although, if i was working on such a network i'd not use home equipment at all which kind of takes care of that.

                                          1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator
                                            last edited by

                                            "if i was working on such a network i'd not use home equipment at all which kind of takes care of that."

                                            You would be surprised on the VAST amount of "home" line equipment you find in a "office"…  It really just blows my mind... You see an office running some linksys home router for their wifi and or even internet connection router/firewall.. Cheap dumb switches all over the place, etc.

                                            To be honest the tp-link even with its horrific vlan 1 issue and the errors they show on tagged traffic in their counters, etc.  Would be a major upgrade for some "offices" I have seen over the years ;)

                                            I picked up one of these tplinks awhile back - saw it on sale, and lots of thread here it comes up. So wanted want to play with to be able to validate what people were saying/asking/etc  I think I got the 8 porter for like $25 to the door..  Its sitting on the floor in my computer room with a few pi's connected to it, and the smarthub for my garage door connected in the iot vlan while the pi's are in the dmz vlan.. I have zero worries about someone plugging into a port and getting to the management of the switch.. So yeah as others have said for such a use, its CHEAP and you can tag vlans with it..

                                            But if you have a few extra bucks to spend there are far better options... Next on my list of play switches that I have been seeing lots of questions on (mostly other forums) is the zyxel 1900 line, which is very reasonable priced.. And has way more of a feature set than bottom of the line tp-link switches.  I hear the "business" line is way better, etc.

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.