• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Incorporating 3100 into network

General pfSense Questions
4
16
1.3k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • I
    ipeetables @ajtradtech
    last edited by Apr 7, 2020, 4:03 AM

    @ajtradtech What model is your Linksys router? If you're only using the Linksys for WiFi and it supports AP mode, I would use that.

    A 1 Reply Last reply Apr 7, 2020, 4:24 AM Reply Quote 0
    • A
      ajtradtech @ipeetables
      last edited by Apr 7, 2020, 4:24 AM

      @ipeetables said in Incorporating 3100 into network:

      @ajtradtech What model is your Linksys router? If you're only using the Linksys for WiFi and it supports AP mode, I would use that.

      It's an E4200. There's a Bridge Mode setting that can be specified instead of DHCP - Automatic. That should turn it into an AP and switch.

      Thanks.

      I 1 Reply Last reply Apr 7, 2020, 4:30 AM Reply Quote 1
      • I
        ipeetables @ajtradtech
        last edited by Apr 7, 2020, 4:30 AM

        @ajtradtech Ah yes, you are correct lol :)

        1 Reply Last reply Reply Quote 0
        • A
          ajtradtech @NollipfSense
          last edited by Apr 7, 2020, 4:37 AM

          @NollipfSense said in Incorporating 3100 into network:

          @ajtradtech said in Incorporating 3100 into network:

          With DHCP being handled by the SG, am I correct in putting the Linksys router in bridge mode?

          Yes

          @ajtradtech said in Incorporating 3100 into network:

          Linksys router will be set to bridge mode

          • IP 10.24.218.12
            @ajtradtech said in Incorporating 3100 into network:
            Will the IP I've set for the Linksys cause any conflict with the SG?

          No...I would even give the switches 10.24.218.13 and 10.24.218.14

          I forgot to mention those are unmanaged switches - Linksys SE2500s. My bad.

          @ajtradtech said in Incorporating 3100 into network:

          Are there any steps that I'm missing?
          Thanks.

          You're doing good as far as I can see.

          Oh- I'll disable NAT and Firewall on the Linksys as well.
          I think that should cover it...

          Thanks.

          I 1 Reply Last reply Apr 7, 2020, 1:28 PM Reply Quote 0
          • I
            ipeetables @ajtradtech
            last edited by Apr 7, 2020, 1:28 PM

            @ajtradtech NAT should already be disabled in bridge mode. You said you already had VLANs setup on the 3100, but neither the E4200 or the dumb switches support VLANs. With that diagram you could only have every device on the same VLAN which defeats the purpose.

            A 1 Reply Last reply Apr 7, 2020, 7:39 PM Reply Quote 0
            • A
              ajtradtech @ipeetables
              last edited by Apr 7, 2020, 7:39 PM

              @ipeetables said in Incorporating 3100 into network:

              @ajtradtech NAT should already be disabled in bridge mode.
              Got it.

              You said you already had VLANs setup on the 3100, but neither the E4200 or the dumb switches support VLANs. With that diagram you could only have every device on the same VLAN which defeats the purpose.
              Baby steps :) I was afraid that would be the case. In the meantime, I guess I could move the other segments of the network to the 3100 so at least the wireless and IoT devices would be isolated on the E4200.

              If I ran the 3100 to a VLAN capable switch and connected the E4200 to that, would that work?

              Thanks.

              I 1 Reply Last reply Apr 7, 2020, 8:12 PM Reply Quote 0
              • I
                ipeetables @ajtradtech
                last edited by Apr 7, 2020, 8:12 PM

                @ajtradtech Yes it would.

                1 Reply Last reply Reply Quote 0
                • A
                  ajtradtech
                  last edited by Apr 10, 2020, 9:21 PM

                  Ok. I'll soon have a VLAN capable switch in my hands.

                  Based on the revised diagram below, I take it the connection between the unifi switch and the Linksys would be the trunk line? I'm hoping I can fence off the IoT devices and smartphone/tablet users into their own sandboxes. I could also move the dumb switch segments and the PC to the unifi switch. Sounds like a plan?

                  Thanks.

                  login-to-view

                  J 1 Reply Last reply Apr 10, 2020, 10:09 PM Reply Quote 0
                  • J
                    JKnott @ajtradtech
                    last edited by Apr 10, 2020, 10:09 PM

                    @ajtradtech said in Incorporating 3100 into network:

                    Ok. I'll soon have a VLAN capable switch in my hands

                    Avoid TP-Link. Some models don't handle VLANs properly.

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    A 1 Reply Last reply Apr 11, 2020, 3:38 AM Reply Quote 0
                    • I
                      ipeetables
                      last edited by Apr 10, 2020, 11:11 PM

                      The link between the 3100 and unifi switch would be a trunk/tagged link because it would be carrying traffic for multiple VLANs. The unifi switch port that connects to the linksys router would be an access port/untagged. This means everything that is connected to the linksys router, whether wired or wireless, would be on the same VLAN. Unfortunately you can't split those up because it doesn't understand vlans.

                      You are correct that moving the dumb switches directly to the unifi switch would allow you to assign them to any vlan.

                      A 1 Reply Last reply Apr 11, 2020, 3:19 AM Reply Quote 0
                      • A
                        ajtradtech @ipeetables
                        last edited by Apr 11, 2020, 3:19 AM

                        @ipeetables said in Incorporating 3100 into network:

                        The link between the 3100 and unifi switch would be a trunk/tagged link because it would be carrying traffic for multiple VLANs. The unifi switch port that connects to the linksys router would be an access port/untagged. This means everything that is connected to the linksys router, whether wired or wireless, would be on the same VLAN. Unfortunately you can't split those up because it doesn't understand vlans.

                        Alright, any thought of separating the IoT devices from the other wifi clients using the linksys is a dead end. Got it. Guess if I want to accomplish that, I'll have to use an AP that also supports VLANs.

                        1 Reply Last reply Reply Quote 0
                        • A
                          ajtradtech @JKnott
                          last edited by Apr 11, 2020, 3:38 AM

                          @JKnott said in Incorporating 3100 into network:

                          @ajtradtech said in Incorporating 3100 into network:

                          Ok. I'll soon have a VLAN capable switch in my hands

                          Avoid TP-Link. Some models don't handle VLANs properly.

                          Thanks. It's a UniFi switch that I purchased.

                          1 Reply Last reply Reply Quote 0
                          • A
                            ajtradtech
                            last edited by Apr 14, 2020, 4:52 AM

                            It's done and wow, that went smoother then I expected.

                            I first connected the UniFi switch to OPT5 on the SG. Adopted it, changed the IP so that it was on the same subnet. Everything connected to the Linksys was then moved to the UniFi switch.

                            Next, I reconfigured the gateway for IP Passthrough. Disabled the wifi. Entered the MAC address of OPT5- it's different from the one listed on the bottom of the SG.

                            The Linksys was reconfigured next. DHCP disabled along with SPI. Set to bridge mode.

                            Power cycled the gateway.
                            Power cycled the SG.
                            Power cycled the Linksys.
                            When all of the lights indicated systems ready, I logged into pfSense and bam! There's the public IP on the WAN interface!

                            The only gotcha I encountered was when I attempted to access the settings on the Linksys. I can't use the static IP that I assigned it. I had to use the IP that SG assigned to it and that was easy to find in the UniFi controller.

                            Thanks for your assistance, all.

                            1 Reply Last reply Reply Quote 1
                            • I
                              ipeetables
                              last edited by Apr 14, 2020, 7:05 PM

                              Nice, enjoy!

                              1 Reply Last reply Reply Quote 0
                              12 out of 16
                              • First post
                                12/16
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.