Netgear/Vlans/Pfsense
-
Great thanks for the help. I managed to change the IP now.
-
Well thanks again for the help, I am wondering whether anybody could help a little further with a simple VLAN internet connectivity problem. I am trying to setup one VLAN. I have created VLAN5 using the LAN interface on pfsense, enabled it and set up DHCP 192.168.5.50 - 100 gateway 192.168.5.1/24. I have pfsense LAN plugged into port 2 on the netgear switch, a pc plugged into port 1 and an access point serving IoT devices on port 3. I have the LAN DHCP on 192.168.1.10 - 100 gateway 192.168.1.1/24
On the netgear switch I have enabled 802.1Q. In the VLAN configuration tab I have
VLANID 1 with ports 2345678
VLANID 5 ports 12In the VLAN membership TAB I have
VLAN ID 1 all port Untagged apart from 1
VLAN ID 2 ports 1 and 2 Tagged others blankIn the Port PVID I have Port 1 set to PVID 5 all others set to 1.
I have the PC getting a DHCP lease but no internet connectivity. I have HYBRID NAT enabled with an autorule adding the 192.168.5.0/24 as well as 192.168.1.0/24 which is connected to the internet.
I have a rule for the VLAN interface IPV4 * Source VLAN5 net port * destination *
I can't quite get it to all work correctly so any help would be greatly appreciated.
Many thanks
-
I'm having trouble following what you are trying to do. Assuming vlan 1 is your lan, and vlan 5 is the OPTx network, you would want the port pfSense is in to be untag 1, pvid 1, tag 5. Ports with LAN devices would be untag 1, pvid 1. Ports connected to OPTx devices would be untag 5, pvid 5.
In pfsense LAN would be em0 (or whatever the interface is) and OPTx would be 'vlan 5 on em0' (Defined on vlan tab) -
@r79c said in Netgear/Vlans/Pfsense:
gateway 192.168.5.1/24
You mean you set pfsense IP to this, that is not its gateway.
Posting the rules you put on the vlan 5 interface would help.. Also auto outbound rules would auto added any vlan interfaces. What do you have in hybrid setup?
VLAN ID 1 all port Untagged apart from 1
What device do you have on vlan 5, port 2? This would not have vlan 1 in it, and would be untagged vlan 5, with pvid set to 5.
VLAN ID 2
What is vlan 2?
-
@dotdash I have tried your configuration. I have posted some screenshots to show that. To qualify LAN is interface igb0 VLAN5 is VLAN5 on igb0. Still getting DHCP lease but no connectivity to the internet.
@johnpoz Pfsense is plugged into Port 2 of the netgear switch from the LAN igb0 2 should be 5 typo.
Here some screens.
https://ibb.co/tHjqbvG
https://ibb.co/cYhbTBR
https://ibb.co/M2wcfwsVLAN1 is default, unassigned in pfsense as I read everything is default vlan1 so no need to configure. Basically I am just trying to create one vlan with one PC attached and connected to the internet.
-
You could have an issue with the rules or outbound NAT from the vlan 5 lan- they should be similar to your LAN rules. The screenshots look like you have both 1 and 5 untagged on many ports. There should be an option to clear the box- not a member. Computers just on lan or vlan 5 should not have the other vlan on their ports, and you generally never have a port U on multiple vlans.
-
@dotdash The netgear software in advanced configuration of 802.1q will not let me untag the many unused ports on VLAN ID 1 due to the following error
802.1Q
Cannot remove port 8 from this VLAN. Change its PVID first.Here's the current outbound nat and one of vlan5 rule
https://ibb.co/8dzx2FK
https://ibb.co/SBwzZQG -
well your forcing vlan 5 out some vpn group. I thought vlan 5 was 192.168.5.0/24 - so how would it it ever nat to some vpn connection.
Also your hybrid rules for wan interface are pointless - since those are already in the automatic rules.
Well you can not remove a vlan X from a port if pvid is set to vlan X..
If you just want 1 port on vlan 5 the only thing that needs to happen on the switch is tag vlan 5 on port connected to pfsense. And the port connected to device you want in vlan 5 would have vlan 1 removed and untagged vlan 5, and pvid vlan 5
-
vlan5 static ip is 192.168.5.1/24
I assumed I would be able to NAT the VLAN5 to use the VPN_GROUP I set up which is basically three openvpn clients, just like the LAN does?
I have followed your advice for the switch I have taken four more screenshots of the switch configuration.
https://ibb.co/j88PF1j
https://ibb.co/KWQbQQF
https://ibb.co/k0rn4Mg
https://ibb.co/WyKjjLZ -
You have port all ports untagged vlan 1 - that is WRONG!!!
That even lets you have 1 an 5 untagged on port 1 is just stupid.. You should not be able to put more than 1 untagged vlan on a port.. Its a borked configuration!!
ssumed I would be able to NAT the VLAN5 to use the VPN_GROUP
How - you don't have anything in outbound nat natting 192.168.5/24 to your vpn interface.. You only have 192.168.1/24
-
@johnpoz For me to change the port setup in membership tab on vlan1 I have to change the Port PVID
ah apart from port 1 which I can blank
like so
https://ibb.co/16BV4hz
-
You have its pvid set to 5.. So remove the vlan 1 untagged on that port!
Which is correct... Your telling the switch hey any untagged traffic you see ingress to this port is vlan 5 traffic!! And putting the switch in vlan 5 untagged tells the switch hey only send vlan 5 traffic out this port, and remove the tag.
Now the device connected to this port is in vlan 5, but it doesn't really know.. It just sees untagged traffic..
-
right ok I think I've done that
https://ibb.co/16BV4hz
https://ibb.co/w7ZLhMV -
That looks right yes.
Now you just need to fix your hybrid rules if you want vlan5 to go out your vpn connection.
-
So I would need to add a rule for 192.168.5.0/24 LAN to WAN?? altho I have an automatic rule with that.
BTW thanks for your help, I'm learning, albeit slowly!
-
No you need an outbound nat so that pfsense will nat 192.168.5 to one of your vpn interfaces.. You only had 192.168.1 in your hybrid natting to yoru vpn interface ips.
Why would you need a rule for lan to wan?? Wan net is not the internet - its just wan net, that is it... Your rule on sending vlan 5 out your vpn would send it out a vpn... But you had no outbound nat to nat 192.168.5 to vpn interface.
-
I added a rule to one of the vpn interfaces that I have outbound
https://ibb.co/4TspV7G
Is this correct?
-
Again those wan outbound hybrids are POINTLESS!!!
And how you sure that outbound nat is gong to use that vpn interface, if your policy routing it out a group... What if it goes out a different vpn interface?
-
So i have the following configuration and I still have no internet connectivity on the pc plugged into port 1 on the netgear switch. The VLAN5 interface is up, I have outbound NAT rules and firewall rules in the VLAN tab. I just dont understand it at the moment????? It should be relatively simple.
on the pc i get a dhcp lease but am unable to ping 192.168.5.1 or google.com
LAN is on 192.168.1.
VLAN is on 192.168.5.here are some more screens of the configuration.
https://ibb.co/0ft99fJ
https://ibb.co/D9W0ZXV
https://ibb.co/wy401MF
https://ibb.co/z7Rv26Z
https://ibb.co/dcXmmCQ
https://ibb.co/8r27zTG
https://ibb.co/vsmjRxW
https://ibb.co/7JGDVS1
https://ibb.co/HTCjhpNI've just read that you cannot send vlan over vpn!
https://forum.netgate.com/topic/148170/specific-vlan-over-vpn-only/5
-
Not sure how that NordVPN stuff works, but I think you need the 192.168.5.0 natting out the VPN gateway instead of the redundant WAN. Why don't you just verify the vlan works out the WAN first. I'll refrain from giving my opinions of 'privacy' vpn providers.
RE: That last link, i'm not sure what JP is on about- you can't carry the vlan tag over a VPN, but you can absolutely have a vlan interface with a unique subnet and route that. My experience however is with site to site tunnels.