Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    One L3 per VLAN across 2+ interfaces

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    19 Posts 5 Posters 3.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      braveben
      last edited by

      Hi guys,

      I use pfSense quite a bit with great success (often in a VM bridged to my NIC as a 'host' firewall). However I'd like to do something I've managed on a Juniper/Watchguard appliance before, but unsure on pfSense.

      I have a single server running pfsense with 4 nics. 1 for WAN and 3 for managed switches (cisco 2950). Each switch/interface will carry the same VlANS. The building is maxed, so i figure why add an extra hop with a distribution switch when there's no chance of expansion and stacks are not required.

      I haven't needed to handle VLANS with pfsense outside of Virtual environments, so i'm not sure of the best way to do this. I'm looking to essentially associate an IP (with DHCP) with a VLAN, and then tag that VLAN on 3 interfaces - I have multiple VLANS to do this with.
      I've looked at creating the same VLAN per interface, After enabling the VLAN interface(s) I cannot configure DHCP without an IP assigned. Im looking to keep the same Gateway IP per VLAN across all physical interfaces.

      Any suggestions on achieving this would be most appreciated

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        Huh? You want 3 connections to 3 different switches but all the same vlans?

        Confused what that gets you? Can you draw up what your wanting to do.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • B
          braveben
          last edited by braveben

          Yeah, That might seem strange - Typically I'd go [Firewall > Distribution Switch > Access Switches]. In this case, the number of Ethernet client devices is <50, although stretched out.

          It may be easier to re-spec "Rack Switch 1" to handle the minimal patching required and distribution - only it introduces another hop & its demise would have greater impact.

          0_1527944524966_Network_topology.png

          I'm looking to keep pfSense the gateway for all networks, hence the 3 'Trunk' interfaces terminating at the firewall.

          The way I've done this before on other devices (and I might be asking too much here) would be something like:

          L3 Virtual interface 1:
          IP: 192.168.10.1/24
          DHCP: Yes
          alias: L3net1

          L3 Virtual interface 2:
          IP: 192.168.20.1/24
          DHCP: Yes
          alias: L3net2

          VLAN: 10
          Interface: L3net1

          VLAN:20
          Interface: L3net2

          eth0
          Mode: Trunk
          VLAN TAGS: 10,20

          eth1
          Mode: Trunk
          VLAN TAGS: 10,20

          Zone Trusted
          Interface: L3net1
          Allow: DHCP

          Zone DMZ
          Interface: L3net2
          Allow: DHCP

          Really, I'd like to treat each VLAN with its own firewall/routing/service rules despite the traffic coming from a different physical (although tagged) interface.

          I hope this makes my goal a bit clearer,

          thank you in advance!

          1 Reply Last reply Reply Quote 0
          • jahonixJ
            jahonix
            last edited by

            We just had a lengthy discussion about this two weeks or so ago.
            Interfaces in pfSense are router ports, what you need are switch ports.

            You cannot and don't want to use the same VLANs on multiple interfaces in pfSense. Distribute VLANs with a core switch where it belongs.
            Creating a software bridge is far from being two switch ports.

            1 Reply Last reply Reply Quote 1
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by johnpoz

              I thought it sounded familiar... What @jahonix said..

              You distribute your vlans via your switching environment.. Pfsense is not a "switch" If you need a switch and want it to sit in the same box as your pfsense.. Then get say the sg3100 that comes with 4 port switch built in. Or say the XG-7100 which as 8 port switch built in.

              And adding a core or distribution layer switch DOES NOT add a "hop"

              Looks like vlan 50 is pretty much isolated to rack 2 switch 2 Why not uplink that on its own to pfsense interface. Then run a connection for vlan 100 to your rack 1, and your other rack 3 switch could just connect into rack 1 switch.

              If you want to leverage your router ports - then your vlans that have larger intervlan traffic should sit on those physical interfaces.. Or do a lacp setup from your 2 interfaces you have to your rack 1 switch for all your vlans other than 50.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 1
              • B
                braveben
                last edited by braveben

                @jahonix @johnpoz Thank you both for your input, from reading and testing I thought this might be the solution.

                I'm inheriting this network, it's currently using no VLAN's and has 50+ devices over 10+ switches (mix of desktop and rack, although has the correct patch capabilities) in a single broadcast domain. The only thing I was going to keep was the pfSense firewall (re-configured its perfect for them), I believe its on netgate hardware but I need to verify what exactly.

                I'm trying to keep the cost reasonable to not scare off the bean counters. Typically I'd have a firewall cluster and stacked switches, justifying it for this business is tricky - although I really hear what you're saying! Perhaps bazaar logic, we may have found the one redeeming quality for juniper's SRX appliances (I still hate working on them though) :P

                You're completely right regarding the 'hop' - Its L2 only. What I really meant was that if that first switch or the firewall dies, so do others . Whereas if the firewall is trunked to each switch, only the Firewall failing would bring all of them down.

                I'l give Rack Switch 2 an uplink from pfSense, and 'daisy chain' 1 & 3. There's some more complicated stuff going on with the servers (hyper-visors and container clusters) but the advice stands true.

                I could have a use case for both XG-7100 and SG3100, out of curiosity what would the configuration steps look like to achieve what i'm looking for?

                Thank you both for your help, I truly appreciate it.

                jahonixJ 1 Reply Last reply Reply Quote 0
                • jahonixJ
                  jahonix @braveben
                  last edited by

                  @braveben said in One L3 per VLAN across 2+ interfaces:

                  we may have found the one redeeming quality for juniper’s SRX appliances

                  The fact that you can live without the functionality of a core switch? Come on, that's chicken shit.

                  @braveben said in One L3 per VLAN across 2+ interfaces:

                  out of curiosity what would the configuration steps look like to achieve what i’m looking for

                  Sorry, I can't follow you here. Can you re-phrase the question, please.
                  (I never had one of those units so my input might be limited. johnpoz IMHO has such a device around)

                  1 Reply Last reply Reply Quote 1
                  • B
                    braveben
                    last edited by braveben

                    @jahonix said in One L3 per VLAN across 2+ interfaces:

                    The fact that you can live without the functionality of a core switch? Come on, that’s chicken shit.

                    C'mon, where's your sense of humour? There's no way to justify a 4th 'enterprise' switch just to distribute to 3 other switches in this setup. There are use-cases for assigning Virtual L3 interfaces to a VLAN for tagging across interfaces, especially in smaller networks.

                    Justifying to finance two boxes for the same or similar cost to 1 box that achieves the same is harder than it may sound, no matter how much of a PITA that second blue box is to configure.

                    @jahonix said in One L3 per VLAN across 2+ interfaces:

                    Sorry, I can’t follow you here. Can you re-phrase the question, please.

                    I'm curious on what configuration steps would be recommended to achieve the setup in my topology, using the devices mentioned:

                    @johnpoz said in One L3 per VLAN across 2+ interfaces:

                    If you need a switch and want it to sit in the same box as your pfsense… Then get say the sg3100 that comes with 4 port switch built in. Or say the XG-7100 which as 8 port switch built in.

                    Essentially then, should redundancy become an issue: "Buy 3x switches + firewall" is a much easier sell than "buy 4x switches + firewall".

                    The following still stands true, your conformation that this should at least be the interim solution is greatly appreciated.

                    @braveben said in One L3 per VLAN across 2+ interfaces:

                    It may be easier to re-spec “Rack Switch 1” to handle the minimal patching required and distribution - only it introduces another hop & its demise would have greater impact

                    Thanks again

                    jahonixJ 1 Reply Last reply Reply Quote 0
                    • jahonixJ
                      jahonix @braveben
                      last edited by

                      @braveben said in One L3 per VLAN across 2+ interfaces:

                      There’s no way to justify a 4th ‘enterprise’ switch just to distribute to 3 other switches in this setup.

                      If the investment for a $40 or so smart managed switch is too much then ... you can still get an SG-3100 or an XG-7100 which have managed switches built-in. No additional box required... 😜

                      1 Reply Last reply Reply Quote 1
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by johnpoz

                        I wouldn't say they have managed switches.. While there is a 4 port switch in the sg-3100 - and you can put an SVI on and vlan tags, etc. Its feature set doesn't compare to a full blown managed switch.. even a small business line like the cisco sg300.

                        As to the configuration steps... You create your vlans on the switch and plug in your downstream switches

                        If your all worried about failure - your racks still could fail.. I don't see how using one as your core and 1 switch downstream of it or even 2 is a problem.

                        What switches are you using now, what is the port density.. 24 ports, 48? Any fiber connections? 1 gig, 10gig?

                        if your going to redo it all - what is the budget?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 1
                        • B
                          braveben
                          last edited by braveben

                          @jahonix said in One L3 per VLAN across 2+ interfaces:

                          If the investment for a $40 or so smart managed switch is too much then ... you can still get an SG-3100 or an XG-7100 which have managed switches built-in. No additional box required... 😜

                          This is half of it, i'm trying to get them away from from just ramming another switch wherever. The other half is trying to keep consistent manageable (supportable) hardware, I don't think Cisco/Brocade do a CLI only L2 1Gbit managed switch for <$100 ;) If the netgate's can do the switchport magic - Id rather get new firewall hardware with 'switch' capabilities and access switches than just new switches.

                          @johnpoz I'm not sure if this weighs in at all - I'm not looking to do Inter-vlan switching before L3 routing, In fact the aim is for that only to occur should Firewall/routing allow for it. Pseudo diagram hopefully makes sense, its the simplest use case I can think of:

                          0_1528029823952_Security_architecture.png

                          @johnpoz said in One L3 per VLAN across 2+ interfaces:

                          and you can put an SVI on and vlan tags, etc

                          I can't find any reference to this - Is there an added CLI/GUI tool specifically for 'switchport' netgate devices?

                          @johnpoz said in One L3 per VLAN across 2+ interfaces:

                          What switches are you using now,

                          Currently Its a mess of un-managed Dlink, TPlink, HP and god knows what else. There's a 24 port switch sat between two 5 port desktop switches..... this is a much simplified example of whats going on:

                          0_1528065357538_spaghetti-with-meatballs-and-spicy-tomato-sauce-102298-1.jpeg

                          I hope you're not suggesting I don't burn this to the ground ;P

                          • Fix L2
                          • Fix L3
                          • Firewall everything.
                          • Add much desired Domain Controller/Servers

                          @johnpoz said in One L3 per VLAN across 2+ interfaces:

                          what is the port density… 24 ports, 48? Any fiber connections? 1 gig, 10gig?

                          Currently its looking like:
                          1x 48 Gbit Port (~300w POE)+ 2x 1GB SFP
                          1x 16 Gbit Port (~300w POE)+ 2x 1GB SFP
                          1x 16 Gbit Port + 2x 1GB SFP

                          Its all copper bar the 1 fibre up-link between building 1 & 2 - SFP's are most welcome in this case (10Gbit is un-necessary).

                          Most likely to be the L2 Cisco 2950 Series. With the lifetime warranty/next day replacement we can get thrown in outweighs the value of the SG300/500 & SF350 - although i''m happy to be proven wrong on this.
                          Most of the heavy-bandwidth actions will be contained within the servers, Mostly PXE booting Virtual Nodes for test environments.

                          @johnpoz said in One L3 per VLAN across 2+ interfaces:

                          if your going to redo it all - what is the budget?

                          Build a strong business case. They've been burned and are uneasy without clear design and business value/impact. Enterprises with 'growing pains' often don't understand (without some help) their work network cannot be like their home network anymore.

                          I can make a very strong business case with being able to say 'Buy one or the other of this firewall + X amount of (Cisco 2950 with N ports + N Poe)' in these medium/small size networks (Until redundancy or X amount of switches requirements change). It also makes it super easy to 'mimic' the environment at scale for satellite offices.

                          This may sound a little over-enthusiastic, but this really level's the playing field for pfSense/Netgate against some of the more 'established enterprise' products. "Can pfSense do everything this blue box can do?" or "pfSense isn't really an enterprise ready appliance!" is getting easier to overcome.
                          Buying say a Super-Micro server with Switch ports and installing pfSense adds another layer of logistics/costs organisations don't want to deal with. Sure, this may seem like a bit of an edge-case; it's getting more common as security is being taken more seriously and becoming more accessible.

                          Appreciate you both 😘

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @braveben
                            last edited by

                            @braveben said in One L3 per VLAN across 2+ interfaces:

                            Most likely to be the L2 Cisco 2950 Series

                            You mean the series that has been EOL for years??

                            https://www.cisco.com/c/en/us/obsolete/switches/cisco-catalyst-2950-series-switches.html

                            Yeah I would burn that old shit down to the ground.. But not sure why you think you would have a hard time selling anyone the need for proper L2 switching environment and then L3 routing/firewalling..

                            Yes you can manage the switch on the sg-3100 and I would assume the newer xg-7100 but since I do not have that model I can not speak from experience on that one. Via cli {etherswitchcfg} and or gui.. I have not done much with it - but it does not have all the full featured fully managed features that the sg300 or 350 or 500 have.

                            https://www.freebsd.org/cgi/man.cgi?query=etherswitchcfg&sektion=8&apropos=0&manpath=FreeBSD%2B10.0-RELEASE

                            I would prob look at the SG500 which you can stack, if not for growth... What specific switches are you looking at - it can not be the 2950 line?? Also the smb line can do layer 3 if need be.. Again allows for growth from the company side even if explosive, etc.

                            While you can get a router/firewall with switch ports - they are never going to be as full featured as a real switch.. Your talking nickels and dimes to save what 2u in your rack?

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 1
                            • B
                              braveben
                              last edited by braveben

                              @johnpoz said in One L3 per VLAN across 2+ interfaces:

                              I would prob look at the SG500 which you can stack,

                              I don't want to be that guy, but both the SG300 and SG500 series of switches are EOL :
                              SG300 - https://www.cisco.com/c/en/us/products/collateral/switches/small-business-300-series-managed-switches/eos-eol-notice-c51-740542.html
                              SG500 - https://www.cisco.com/c/en/us/products/switches/small-business-500-series-stackable-managed-switches/index.html

                              The replacements would be:
                              350x - https://www.cisco.com/c/en/us/products/switches/350x-series-stackable-managed-switches/index.html
                              550x - https://www.cisco.com/c/en/us/products/switches/550x-series-stackable-managed-switches/index.html

                              @johnpoz said in One L3 per VLAN across 2+ interfaces:

                              You mean the series that has been EOL for years??

                              My mistake, correct answer:
                              (Probable) 2960-L range : https://www.cisco.com/c/en/us/products/switches/catalyst-2960-l-series-switches/index.html
                              (Likely un-necissary)2960-x/r for all the POE/L3: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-2960-x-series-switches/datasheet_c78-728232.html

                              Anyways, the exact switches don't really matter here:
                              'Enterprise' package / CLI based
                              Some POE
                              16/24/42 Gbit port options
                              L2 only
                              1Gbit SFP Uplinks are nice to have

                              If brocade weren't comparably priced to the Cisco kit i'd have no issue persuading them used instead. I will re-evaluate the 550x series though.

                              EDIT:
                              The SG350X-48P would probably be perfect as the 'largest' switch - although it not having full IOS may be a draw back... If they spring for 2960-L's we'd be living the dream.

                              @johnpoz said in One L3 per VLAN across 2+ interfaces:

                              Yes you can manage the switch on the sg-3100 and I would assume the newer xg-7100 but since I do not have that model I can not speak from experience on that one. Via cli {etherswitchcfg} and or gui… I have not done much with it - but it does not have all the full featured fully managed features that the sg300 or 350 or 500 have.

                              Honestly, If that's the case i'l look into the XG-7100 for onsite, and the SG-3100 for remote offices. I'd much rather not build a case between a blue/red box VS pfSense + Distribution switch for these environment(s). Especially if i'm only loosing features that I wouldn't use anyway.

                              Could you confirm that the diagram below would work with the XG-7100/SG-3100 devices, or would I be best contacting pre-sales/getting one to play with? This is the 'refined' question that sparked this thread.

                              @braveben said in One L3 per VLAN across 2+ interfaces:

                              alt text

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                yeah with the switch models you can do that where with your vlan 10 and vlan 20 sure.

                                BTW the SG500 is still shipping until July 12, 2018 ;) So tech another month heheheeh

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                B 1 Reply Last reply Reply Quote 1
                                • B
                                  braveben @johnpoz
                                  last edited by

                                  @johnpoz said in One L3 per VLAN across 2+ interfaces:

                                  yeah with the switch models you can do that where with your vlan 10 and vlan 20 sure.

                                  Awesome! Consider this solved/done/resolved/completed. Thank you for all your help and feedback

                                  BTW the SG500 is still shipping until July 12, 2018 ;) So tech another month heheheeh
                                  0_1528067864817_Cisco_Love.jpg

                                  1 Reply Last reply Reply Quote 0
                                  • DerelictD
                                    Derelict LAYER 8 Netgate
                                    last edited by

                                    Everybody uses a core/distribution switch for this. Why are you insisting on being different?

                                    The absolute cheapest managed switch (Think D-Link DGS-1100 as the starting point - $30) will do this job better than a pfSense software bridge.

                                    An SG-3100 or SG-7100 would be a far better choice for this but I still don't see a reason why you would want to go that route (pun intended) instead of just getting another switch.

                                    Yes, the switch chip in either the SG-3100 or the XG-7100 could do that. Depending on bandwidth, I would probably suggest the 7100 due to your attempting IDS/IPS and, especially, anti-virus. Sales would know more.

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    B 1 Reply Last reply Reply Quote 0
                                    • B
                                      braveben @Derelict
                                      last edited by braveben

                                      @derelict said in One L3 per VLAN across 2+ interfaces:

                                      Everybody uses a core/distribution switch for this. Why are you insisting on being different?

                                      Respectfully, no not everybody has an environment where dedicated distribution is needed. I don't have Lots of (access) switches, redundancy requirement or high speed intervlan-switching (before firewalling). And @johnpoz extrapolated, really its only 2 switches that will share VLAN Trunks - why shouldn't this be distributed from the Firewall if all traffic should hit it first? I understand this is partially a hardware issue, I'm not trying to say 'well if this box can do it, why can't you' just that there are use-cases, and other vendor's facilitate this:

                                      This is for their switches, but I've done this on their firewalls:
                                      https://kb.juniper.net/InfoCenter/index?page=content&id=KB10972&cat=SWITCH_PRODUCTS&actp=LIST

                                      Watchguard can also do it...
                                      https://www.watchguard.com/help/docs/fireware/12/en-US/Content/en-US/networksetup/vlan_example_1vlan_2switches_c.html

                                      @derelict said in One L3 per VLAN across 2+ interfaces:

                                      The absolute cheapest managed switch (Think D-Link DGS-1100 as the starting point - $30) will do this job better than a pfSense software bridge.

                                      I get what you're saying. With an SG-3100/SG-7100 using switch ports I wouldn't be creating a software bridge though, right? I'd be able to switch the tagged packets to an L3 interface?
                                      This isn't my home network, distributing a network between a ~$1k Firewall and a ~$1K enterprise switch with a $30eur D-Link isn't gonna cut it ;P not to mention dem 10Gbit SFP uplinks....

                                      Speaking of those sexy XG-7100's 10Gbit SFPs, how would they respond to being a trunk with the same VLAN's as one of the switch ports? Could I still share a L3 interface/IP on the single VLAN?

                                      @derelict said in One L3 per VLAN across 2+ interfaces:

                                      Depending on bandwidth, I would probably suggest the 7100 due to your attempting IDS/IPS and, especially, anti-virus.

                                      The 7100 would be a perfect fit, I spent some time with a UTM/NGF vendor in support - without any [Inspect any <> any] rules, it should be pretty future proof for us.

                                      Thank you for all your input

                                      1 Reply Last reply Reply Quote 0
                                      • H
                                        heper
                                        last edited by

                                        @braveben said in One L3 per VLAN across 2+ interfaces:

                                        This is for their switches, but I’ve done this on their firewalls:
                                        https://kb.juniper.net/InfoCenter/index?page=content&id=KB10972&cat=SWITCH_PRODUCTS&actp=LIST
                                        Watchguard can also do it…
                                        https://www.watchguard.com/help/docs/fireware/12/en-US/Content/en-US/networksetup/vlan_example_1vlan_2switches_c.html

                                        what everyone has been trying to tell you isn't that you 'CANT' do it ..... you just SHOULDNT.

                                        but honestly, you do what you wanna do .... nobody will lose sleep over it either way.

                                        1 Reply Last reply Reply Quote 0
                                        • DerelictD
                                          Derelict LAYER 8 Netgate
                                          last edited by

                                          @braveben said in One L3 per VLAN across 2+ interfaces:

                                          Speaking of those sexy XG-7100’s 10Gbit SFPs, how would they respond to being a trunk with the same VLAN’s as one of the switch ports? Could I still share a L3 interface/IP on the single VLAN?

                                          You would, again, have to software bridge them. I would suggest using the 10G to an external switch instead.

                                          Chattanooga, Tennessee, USA
                                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.