Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to make use of VLANs

    General pfSense Questions
    4
    12
    1.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kcallis
      last edited by

      I am using a Netgate APU with both the LAN and OPT1 interface connected to a Netgear GS108E. Also connected to the switch is connected a TL-Link WA901ND Access Point which I setup with 4 separate SSID and VLAN tagging. For the most part, I use only wireless at the house so I thought I would setup my wireless AP using the layout found at https://nguvu.org/pfsense/pfsense-baseline-setup/, but seemed to be setup with a wired deployment. Reading https://nguvu.org/pfsense/pfsense-router-on-a-stick-with-netgear-gs108/ only added more confusion to the issue.

      Under my pfsense configuration, I created 4 VLAN interfaces using the re0 as parent. I have setup DHCP servers for all of the interfaces, and started working for rules, etc. On the TL-Link AP, I have setup 4 SSID and tagged each with a VLAN tag. I have setup under the GS108 I have setup VLANs 1, 20, 50, 100 on port 2 where the AP is connected, with VLAN 1 untagged, and 20, 50, 100 tagged. So do I need to setup port 1 on the switch to also be setup like port 2 (with VLANs 1, 20, 50 and 100) since I have port 1 connected to the OPT1 port or should I just connect the AP to OPT1? But if I plug the AP into the OPT1, would I be able to use the other ports to access the VLANs that I created?

      1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott
        last edited by

        You have to set up a trunk port on the switch to connect to the AP and also pfSense.  This will allow it to carry all VLANs.  You then configure pfSense with VLANs.  However, I have that same AP and it doesn't handle VLANs/SSIDs well.  TP-Link doesn't seem to understand the concept of VLANs and how they're supposed to be logically separate.  As I result, traffic from the native LAN will be mixed in with the VLAN.  After much frustration, I gave up on the idea of VLANs & multiple SSIDs on it.

        BTW, I had a lot of discussion with first level support about this issue and that person insisted it was normal.  It was only the person at 2nd level support who understood the problem, but there was no fix forthcoming.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          there is bunch of discussion in another thread heard about the tplink switches and a hack to remove the vlan 1 nonsense.

          But I would suggest you get a different switch the dsg1100 from dlink is same price point and handles vlans correctly.

          I have lack of confidence that the tp-link AP handles vlans correctly either.  I would suggest another AP, the unifi line handles vlans correctly.  And very reasonable priced.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • JKnottJ
            JKnott
            last edited by

            Another possibility is the D-Link DAP-2660.  While I haven't used this AP, I trust D-Link, more than I do TP-Link, to handle VLANs properly.
            http://ca.dlink.com/products/access-points/wireless-ac1200-simultaneous-dual-band-poe-access-point/

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            1 Reply Last reply Reply Quote 0
            • K
              kcallis
              last edited by

              Thanks for the suggestions… I have just did a factory reset and for the time I will just use the TL-Link as a simple AP until I move over to something else.

              1 Reply Last reply Reply Quote 0
              • K
                kcallis
                last edited by

                @johnpoz:

                there is bunch of discussion in another thread heard about the tplink switches and a hack to remove the vlan 1 nonsense.

                But I would suggest you get a different switch the dsg1100 from dlink is same price point and handles vlans correctly.

                I have lack of confidence that the tp-link AP handles vlans correctly either.  I would suggest another AP, the unifi line handles vlans correctly.  And very reasonable priced.

                The issue is not with the switch (which is a Netgear GS108E) which working fine, it seems to be an issue with the TL-Link AP and it's poor understanding of VLANS.

                1 Reply Last reply Reply Quote 0
                • JKnottJ
                  JKnott
                  last edited by

                  The issue is not with the switch (which is a Netgear GS108E) which working fine, it seems to be an issue with the TL-Link AP and it's poor understanding of VLANS.

                  While your issue may be about the AP, the overall point is that TP-Link should be avoided when VLANs are going to be used.  As I mentioned, they don't seem to understand them.  Regardless, when you get an AP that properly supports VLANs, you will still have to configure the switch with trunk ports for both pfSense and the AP.

                  PfSense running on Qotom mini PC
                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                  UniFi AC-Lite access point

                  I haven't lost my mind. It's around here...somewhere...

                  1 Reply Last reply Reply Quote 0
                  • K
                    kcallis
                    last edited by

                    @JKnott:

                    You have to set up a trunk port on the switch to connect to the AP and also pfSense.  This will allow it to carry all VLANs.  You then configure pfSense with VLANs.  However, I have that same AP and it doesn't handle VLANs/SSIDs well.  TP-Link doesn't seem to understand the concept of VLANs and how they're supposed to be logically separate.  As I result, traffic from the native LAN will be mixed in with the VLAN.  After much frustration, I gave up on the idea of VLANs & multiple SSIDs on it.

                    BTW, I had a lot of discussion with first level support about this issue and that person insisted it was normal.  It was only the person at 2nd level support who understood the problem, but there was no fix forthcoming.

                    What I was able to do was to more or less replicated port 1 that is the trunk back to the OPT1 and did the same on port 2 with the TL-Link AP connected. At first, everything was moving along well, VLAN 15 (My wireless access to the net) gave out an address and the same is true with VLAN 50 (which are my streaming devices). I was able to see the SSIDs so it looked like a win. I have been banging around with the firewall rules because not a single rule seems to be working. For instance, I am able to get a receive an address and I am able to ping each of the gateway of each interface, but as for as pinging other devices, it is a no go. I am also not able to route through the WAN, so no internet for me right now.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Lets see your rules..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • K
                        kcallis
                        last edited by

                        @johnpoz:

                        Lets see your rules..

                        I have attached what I am working with…

                        guest_rules.PNG
                        guest_rules.PNG_thumb
                        wan_rules.PNG
                        wan_rules.PNG_thumb

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          You are passing all traffic from the Guest network. If your Layer 2 is good, you have good DHCP, good DNS, and have good outbound NAT it should be working.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • K
                            kcallis
                            last edited by

                            Thanks for all of the pointers from everyone. I decided to forgo the VLAN multi SSID feature of the TL-Link AP and move it over to the LAN. I do have a Ubiquiti NanoStation loco M2 that I thought that I would swap with the TL-Link, but until I can understand the VLAN process, I will save that for another time.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.