Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bridged VLAN Tagging between Two PF Sense over OpenVPN Tunnel

    Scheduled Pinned Locked Moved OpenVPN
    3 Posts 3 Posters 527 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      BarristonTech
      last edited by

      I am trying to find a way to have 2 pfSense units connect over the Internet with an OpenVPN and bridge the two networks together with Multiple VLANs.  I see a lot about configuring the switches (already know how to do that) but not much about the pfSense.  I need the LAN NIC on the pf to support tagging and I want to bridge that to the other side.  We have tried multiple ways to make this work.  It seems to want IP addresses.  We want a bridge not routing.  No IP needed.  We tried creating the VLANs as interfaces and assigning them to the NIC but this does not seem to work.  Is this something that Q in Q can resolve?  How do we use Q in Q of this.  We need a LAN extension supporting multiple VLANS.  Our switches support VLAN tagging and we are using tags within the network elsewhere.  See the drawing for our set up.  Has anyone done this?
      pfSenseVLANtoVLAN.jpg_thumb
      pfSenseVLANtoVLAN.jpg

      1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott
        last edited by

        I don't know that an OpenVPN tunnel supports VLANs.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          So in fact you only need two VLANs? Or is that just an example?

          If it really is only two you can just use two OpenVPN TAP tunnels on different ports. Bridge them to the VLAN interfaces at each end.

          That actually helps throughput in most cases by using two OpenVPN processes.

          Steve

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.