Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    Networking Noob needs help connecting SG300 to pfSense

    Routing and Multi WAN
    5
    17
    2215
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Y
      yield101 last edited by

      Hey guys, first, many thanks to the pfSense community for all the posts & tutorials in building a pfSense firewall.  So far, I am loving it.  But I need some more help…I've tried researching & experimenting this but given my novice level experience and getting easily confused, any direct tips would be helpful.  In addition, when I figure all this out, I'm going to create a write up of this so that your entry level noob can do this too.

      So here is what I'm trying to accomplish:  Modem to pfSense to SG300-10.  I would like to setup my SG300 to let it be the VLAN's brain so I can get them to talk to each other later on if I want...  I've created VLANs but cannot get this to communicate with my pfSense.  I would also like the switch to handle auto DHCP assignments for vlan devices directly plugged in.

      pfsense layout:
      WAN- eth0
      LAN - eth1 (192.168.1.1/24) plugged into port 1 of the SG300
      eth2 & 3 unused.

      SG300:
      VLAN 1 (default) (192.168.1.199)
      VLAN 10 (192.168.10.1) Management
      VLAN 20 (192.168.20.1) Primary
      VLAN 30 (192.168.30.1) Gaming

      I would like port 1 to be the main line between the pfsense and sg300
      port 5 for VLAN 10
      Port 6 for VLAN 20
      Port 7 for VLAN 30

      So this is where I'm stuck at... any tips?  Many, MANY thanks!!!!

      1 Reply Last reply Reply Quote 0
      • Derelict
        Derelict LAYER 8 Netgate last edited by

        Do you want the swutch to route between the VLANs or do you want it to essentially be a layer 2 switch and let pfSense do the routing between VLANs? Or a combination of both?


        Chattanooga, Tennessee, USA
        The pfSense Book is free of charge!
        DO NOT set a source port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • Y
          yield101 last edited by

          @Derelict:

          Do you want the swutch to route between the VLANs or do you want it to essentially be a layer 2 switch and let pfSense do the routing between VLANs? Or a combination of both?

          I want the switch to do all the routing… at some point, I may need to do a combo for a VPN connection but to not overcomplicate things, I'll just choose not to do it at this point.

          1 Reply Last reply Reply Quote 0
          • Derelict
            Derelict LAYER 8 Netgate last edited by

            Then the transit network is what you want. Just one interface to the switch. That image should have everything you need.

            Chattanooga, Tennessee, USA
            The pfSense Book is free of charge!
            DO NOT set a source port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • Y
              yield101 last edited by

              @Derelict:

              Then the transit network is what you want. Just one interface to the switch. That image should have everything you need.

              Exactly…how do I get there?  This is where I'm getting lost...  So just my LAN port is enough to connect the VLANs? I cannot currently get VLANs to access the internet

              1 Reply Last reply Reply Quote 0
              • Derelict
                Derelict LAYER 8 Netgate last edited by

                Look at all of the comments. Everything you need to do is there.

                Impossible to say what you have missed out of everything that needs to be done unless you start posting more information about what you have done.

                Chattanooga, Tennessee, USA
                The pfSense Book is free of charge!
                DO NOT set a source port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • Derelict
                  Derelict LAYER 8 Netgate last edited by

                  And if you plan on putting hosts on LAN you don't want to use LAN as your transit network. Use a small transit network with no other hosts on it to get between the switch and the firewall. Just like in the diagram.

                  Chattanooga, Tennessee, USA
                  The pfSense Book is free of charge!
                  DO NOT set a source port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • jahonix
                    jahonix last edited by

                    Best bet: Did you put your switch in L3 (router) mode already and assigned IPs? Factory setting is L2 (switch) mode.

                    …hope I didn't steal the learning curve, though.

                    1 Reply Last reply Reply Quote 0
                    • Y
                      yield101 last edited by

                      In L3 mode… And in my original plan, I wasn’t planning on other hosts on the LAN…

                      This stuff is getting really complex for me despite being usually able to figure this stuff out.  Again, total noob with all this.  I googled how to setup transit network with pfsense but I was given a lot of hard to understand forum posts.

                      In my first post, I explained to the best of my ability of what I’m trying to accomplish.  Not trying to be difficult but I've reread all the comments and I'm still confused.  I really appreciate all the responses but what other information can I give you to get a more clearer understanding of how to proceed.

                      Or if there is some better step-by-step suggestions you could point me too, that would help! Many thanks.

                      1 Reply Last reply Reply Quote 0
                      • Derelict
                        Derelict LAYER 8 Netgate last edited by

                        Create a gateway for the switch. System > Routing, Gateways

                        Route the networks behind the switch to that gateway. System > Routing, Static Routes

                        Make pfSense the default gateway for the switch. Switch configuration ip route 0.0.0.0 0.0.0.0 192.168.1.1

                        Make sure the LAN rules pass the traffic sourced from all of the downstream networks (the same networks that are routed to the switch). Firewall > Rules, LAN

                        Make sure outbound NAT will NAT the traffic out WAN for the downstream networks. Firewall > NAT, Outbound

                        (This is all the same information in the boxes in that image. It really is that simple.)

                        Chattanooga, Tennessee, USA
                        The pfSense Book is free of charge!
                        DO NOT set a source port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • johnpoz
                          johnpoz LAYER 8 Global Moderator last edited by

                          I use a sg300, be happy to post up the actual configs you would use, etc..

                          But lets be clear.. You want to do L3 on sg300.. You want it to route between the vlans?  This removes pfsense ability to firewall between segments.  Unless you need the switch bandwidth between the vlans I would not suggest you do this.  Just let pfsense do all the firewall and routing and just use sg300 as Layer 2 switch.  Even if you have it in L3 mode you can still just use it as L2..

                          I use mine as just L2 I have not need for downstream router.. Pfsense provides more than enough bandwidth between my segments..  And its running on a old hp n40l as a VM.. I see about 400mbps between segments..

                          So why is you want L3??  If that is really want you want I can draw up some hold my hand follow the bouncing ball instructions with pictures..  But if you are new to networking and just want the ease of being to firewall and route all on pfsense I would do it as L2.

                          You could then either just multiple interfaces on pfsense for uplinks this will increase your available and possible bandwidth between your vlans vs vlans on the same physical interface if you have the ports available on your switch.  Or you could just trunk everything on 1 port between pfsense and sg300..

                          Let me know and be happy to draw up – this is how you do it with picture how too ;)

                          The one thing missing out of Derelicts drawing is the L2 and multiple segments..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 23.01 | Lab VMs CE 2.6, 2.7

                          1 Reply Last reply Reply Quote 0
                          • N
                            NetworkGuy last edited by

                            SG300: Port 1: Trunk, PVID1, Port VLAN Membership 1UP,10T,20T,30T
                            SG300: Port 5: Trunk, PVID10
                            SG300: Port 6: Trunk, PVID20
                            SG300: Port 7: Trunk, PVID30
                            "Trunk" is the Default setting. You can noodle with this, but Trunk always works….
                            SG300: DHCP: The SG300 manual has a pretty good writeup
                            SG300 Routing: The SG300 manual has a pretty good writeup

                            With the PVID set to 10, for example, any untagged packet ingressing port 5, will be tagged with VLAN 10. This is the KISS way. Keep-It-Stupid-Simple.  However, if your end devices are VLAN-aware, and they can send VLAN tagged packets, you can alternatively leave the PVID at 1 and add Port VLAN Membership of 10T and remove 1UP. All your devices attached to port 5 will need to be configured to tag their packets with VLAN10, and untagged packets will be dropped in this configuration.

                            pfSense: Interface: LAN: it looks like you already have this set, this is your Next Hop router or Gateway for your SG300
                            pfSense: VLAN: add VLAN10, 20 and 30 to the LAN interface
                            pfSense: add the new interfaces under Interface Assignments
                            pfSense: Enable but don't add IP addresses and particulars to the new interfaces with the Interface hyperlink, as the SG is handling L3 duties in your scenario

                            With 90% confidence, if something isn't working, the problem is the routing/forwarding setup in the Cisco. Troubleshoot the 2 components, SG300 and pfSense, separately.

                            You can test to see if pfSense is working by simply assigning your workstation with a 192.168.1.2/24, GW of 192.168.1.1 and 8.8.8.8 as the DNS, and plug it directly into the LAN interface of pfSense. You can also tag your workstation to make sure VLANs work, with the appropriate IP settings and tagging on your workstation and pfSense. pfSense in your desired config is doing very little.

                            I agree with johnpoz. You're giving up a lot of pfSense functionality if the SG300 is doing all the heavy lifting in your network. I have a lot of SG300-10s, 20s and 28s in my network, all of them L2, mostly as an access devices for TVs, game consoles, Sonos, Tivo devices, labs, etc. spread throughout my home. I aggregate all the SG300s with an HP stackable and use some of it's L3 functionality, mostly multicast routing, since pfSense doesn't do that so well. L3 on the SG300 works just fine, but the forwarding performance (the only benefit I can imagine) doesn't outweigh the convenience of a single view, flexibility and management of your network that pfSense can provide. Plus, with the proper application of CPU clock speed, you won't be able to tell the difference between the SG and pfSense packet forwarding performance.

                            Your VLAN plan of record is sound, and similar to mine. The fact of the matter is VLANs create an isolated broadcast domain and nothing more. I want to keep my individual VLAN broadcast domains separate UNTIL absolutely required, meaning, until I need to forward a packet from my LAN segment to my Management segment, for example. Otherwise I want all my LAN traffic to stay on my LAN segment without interacting with anything else. The switch in your scenario, is doing the same thing as pfSense - there's really no difference from a functional perspective.

                            In my scenario, with pfSense at the core of the network, I can now firewall/filter any packet that shouldn't traverse LAN>MGMT. I have a single DHCP console to manage all DHCP or static IP addressing and don't have to muck around with DHCP on the switch or DHCP Relay. For a GUEST network, which you'll appreciate at some point in time, I can set firewall/DHCP parameters and direct all traffic away for my internal resources. Lots more goodies, flexibility and ease of use advantages with pfSense versus any switch. For example, sadly, a lot of consumer specific devices still utilize UPnP, like it or not. With PfSense, you can at least control where that crap goes, same with Avahi and Zeroconf/Bonjour.

                            1 Reply Last reply Reply Quote 0
                            • johnpoz
                              johnpoz LAYER 8 Global Moderator last edited by

                              ^ well stated.. When you use a downstream router or L3 switch doing routing then you move the core to that device vs having your edge and core on the same device (pfsense).

                              When you let pfsense handle the edge (lan(s) to internet) and all your intervlan traffic you greatly ease the management of all aspects of your network.  As networkguy mentions if you just use pfsense as your edge all of your dhcp will have to be one on your sg300 or some other dhcp server since pfsense can not provide dhcp vs relay.  It has to have an interface in the L2 its going to provide dhcp too.

                              Creating rules between your vlans is going to be much harder to do then just simple firewall rules on pfsense - ACLs are way more complicated to setup then how easy it is to do on pfsense.

                              While there are plenty of advantages to letting pfsense do all your routing in your network, I really can not think of any reason to use a downstream router (L3) in any sort of smb or home network/lab..  When your talking 1000's of devices on hundreds of vlans then sure this is normally when you would use a L3 switch to handle the heavy lifting of that.. In such a scenario you most often route the traffic of vlans that need some sort of control between them to your firewall vs having handle off that sort of stuff with complicated ACLs on the L3..

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 23.01 | Lab VMs CE 2.6, 2.7

                              1 Reply Last reply Reply Quote 0
                              • Y
                                yield101 last edited by

                                @johnpoz:

                                I use a sg300, be happy to post up the actual configs you would use, etc..

                                But lets be clear.. You want to do L3 on sg300.. You want it to route between the vlans?  This removes pfsense ability to firewall between segments.  Unless you need the switch bandwidth between the vlans I would not suggest you do this.  Just let pfsense do all the firewall and routing and just use sg300 as Layer 2 switch.  Even if you have it in L3 mode you can still just use it as L2..

                                I use mine as just L2 I have not need for downstream router.. Pfsense provides more than enough bandwidth between my segments..  And its running on a old hp n40l as a VM.. I see about 400mbps between segments..

                                So why is you want L3??  If that is really want you want I can draw up some hold my hand follow the bouncing ball instructions with pictures..  But if you are new to networking and just want the ease of being to firewall and route all on pfsense I would do it as L2.

                                You could then either just multiple interfaces on pfsense for uplinks this will increase your available and possible bandwidth between your vlans vs vlans on the same physical interface if you have the ports available on your switch.  Or you could just trunk everything on 1 port between pfsense and sg300..

                                Let me know and be happy to draw up – this is how you do it with picture how too ;)

                                The one thing missing out of Derelicts drawing is the L2 and multiple segments..

                                @johnpoz:

                                ^ well stated.. When you use a downstream router or L3 switch doing routing then you move the core to that device vs having your edge and core on the same device (pfsense).

                                When you let pfsense handle the edge (lan(s) to internet) and all your intervlan traffic you greatly ease the management of all aspects of your network.  As networkguy mentions if you just use pfsense as your edge all of your dhcp will have to be one on your sg300 or some other dhcp server since pfsense can not provide dhcp vs relay.  It has to have an interface in the L2 its going to provide dhcp too.

                                Creating rules between your vlans is going to be much harder to do then just simple firewall rules on pfsense - ACLs are way more complicated to setup then how easy it is to do on pfsense.

                                While there are plenty of advantages to letting pfsense do all your routing in your network, I really can not think of any reason to use a downstream router (L3) in any sort of smb or home network/lab..  When your talking 1000's of devices on hundreds of vlans then sure this is normally when you would use a L3 switch to handle the heavy lifting of that.. In such a scenario you most often route the traffic of vlans that need some sort of control between them to your firewall vs having handle off that sort of stuff with complicated ACLs on the L3..

                                Wow, thank you for feedback…  OK, you talked me into having pfSense handle the VLANs.  With this being the case, how should I proceed from here? Any noob friendly instructions and/or drawings is beyond appreciated.  Here is my updated VLAN plan:

                                pfsense layout:
                                WAN- eth0
                                LAN - eth1 (192.168.1.1/24) plugged into port 1 of the SG300
                                eth2 & 3 unused.

                                pfSense:
                                VLAN 10 (192.168.10.1/24) Management (Enabled & Setup with DHCP)
                                VLAN 20 (192.168.20.1/24) Primary (Enabled & Setup with DHCP)
                                VLAN 30 (192.168.30.1/24) Gaming (Enabled & Setup with DHCP)

                                SG300:
                                VLAN 1 (default) (192.168.1.199/24)
                                VLAN 10 (192.168.10.2/24) Management (Already setup)
                                VLAN 20 (192.168.20.2/24) Primary (Already setup)
                                VLAN 30 (192.168.30.2/24) Gaming (Already setup)
                                Port 1 for main connection to pfSense
                                port 5 for VLAN 10
                                Port 6 for VLAN 20
                                Port 7 for VLAN 30

                                Thank you!!!!

                                1 Reply Last reply Reply Quote 0
                                • Derelict
                                  Derelict LAYER 8 Netgate last edited by

                                  Remove all of the IP addresses from the VLANs on the switch. With those in place the switch will be layer 3 on those VLANs and will route traffic between them. You only need one management IP address on the switch.

                                  Chattanooga, Tennessee, USA
                                  The pfSense Book is free of charge!
                                  DO NOT set a source port in a port forward or firewall rule unless you KNOW you need it!
                                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                  1 Reply Last reply Reply Quote 0
                                  • johnpoz
                                    johnpoz LAYER 8 Global Moderator last edited by

                                    Your setup on your sg300 for the port that connects to lan (eth1) on your sg300 would be simple trunk port.

                                    Example
                                    interface gigabitethernet3
                                    description "esxi wlan trunk"
                                    switchport trunk allowed vlan add 100,200,300,500,600
                                    switchport trunk native vlan 20

                                    I am not using vlan 1 to this vlan interface in pfsense.  I am using vlan 20 as the native untagged vlan in my setup.  But you can use 1 there vs the 20 I have.

                                    You also have ports unused on your pfsense, you could leverage them for vlans without having to tag.. As long as you have more ports open on your sg300 you could use for the uplinks to pfsense for those vlans/networks.

                                    What are you going to use vlan 1 for exactly?  Is this going to be the vlan you use to manage your switch?  Why do you have 10/24 stated as being management?

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 23.01 | Lab VMs CE 2.6, 2.7

                                    1 Reply Last reply Reply Quote 0
                                    • Y
                                      yield101 last edited by

                                      @Derelict:

                                      Remove all of the IP addresses from the VLANs on the switch. With those in place the switch will be layer 3 on those VLANs and will route traffic between them. You only need one management IP address on the switch.

                                      Done.

                                      @johnpoz:

                                      Your setup on your sg300 for the port that connects to lan (eth1) on your sg300 would be simple trunk port.

                                      Example
                                      interface gigabitethernet3
                                      description "esxi wlan trunk"
                                      switchport trunk allowed vlan add 100,200,300,500,600
                                      switchport trunk native vlan 20

                                      I am not using vlan 1 to this vlan interface in pfsense.  I am using vlan 20 as the native untagged vlan in my setup.  But you can use 1 there vs the 20 I have.

                                      You also have ports unused on your pfsense, you could leverage them for vlans without having to tag.. As long as you have more ports open on your sg300 you could use for the uplinks to pfsense for those vlans/networks.

                                      What are you going to use vlan 1 for exactly?  Is this going to be the vlan you use to manage your switch?  Why do you have 10/24 stated as being management?

                                      No idea…so if I get rid of VLAN 1, what IP address will I use to connect to the switch?  10/24 ins't the preferred method?  I'm going into this pretty much dumb as a mule. How do you have yours setup?

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post