Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    Port tagging on APU2?

    L2/Switching/VLANs
    5
    56
    208
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      orangehand @bingo600 last edited by

      @bingo600 Yes, Wifi clients. (sorry for delay - it's not letting me post more than once every 2 mins)

      bingo600 1 Reply Last reply Reply Quote 1
      • O
        orangehand @bingo600 last edited by

        @bingo600 DNS from DHCP is 1.1.1.1 and 9.9.9.9 and I cannot ping 8.8.8.8 from the Guest SSID, but can from the untagged SSID

        bingo600 JKnott 3 Replies Last reply Reply Quote 1
        • bingo600
          bingo600 @orangehand last edited by bingo600

          @orangehand

          Can you ping the wifi def-gw (the pfSense Guest interface) from a wifi device ?

          If you disable the "bloc access to lan" rule on your wifi nterface , can you ping lan devices ?

          1 Reply Last reply Reply Quote 1
          • bingo600
            bingo600 @orangehand last edited by bingo600

            @orangehand said in Port tagging on APU2?:

            @bingo600 Yes, Wifi clients. (sorry for delay - it's not letting me post more than once every 2 mins)

            Just gave you 3 likes ... Think your (now) 5 , makes that limit go away

            1 Reply Last reply Reply Quote 1
            • JKnott
              JKnott @orangehand last edited by

              @orangehand said in Port tagging on APU2?:

              @bingo600 DNS from DHCP is 1.1.1.1 and 9.9.9.9 and I cannot ping 8.8.8.8 from the Guest SSID, but can from the untagged SSID

              Take things one step at a time. Can you ping your VLAN interface by IP address, not host name? The WAN port? The ISP's gateway? If those work then your routing is set up correctly. If you then try something like google.com, and it works, then your DNS is OK. This is how you troubleshoot a problem. Otherwise, we have to guess and make suggestions.

              1 Reply Last reply Reply Quote 1
              • bingo600
                bingo600 last edited by bingo600

                I suppose JKnott is taking over here
                He's repeating most of what i suggested

                JKnott 1 Reply Last reply Reply Quote 1
                • JKnott
                  JKnott @bingo600 last edited by

                  @bingo600

                  No, just making sure he's not missing anything.

                  bingo600 1 Reply Last reply Reply Quote 1
                  • bingo600
                    bingo600 @orangehand last edited by bingo600

                    @orangehand

                    Since you don't get the pfSense box as DNS servers on your WiFi clients , you must have changed the default DHCP Server settings.

                    You haven't changed the DHCP Server Gateway option , have you ?

                    O 1 Reply Last reply Reply Quote 1
                    • O
                      orangehand @bingo600 last edited by

                      @bingo600 No - Screenshot 2020-11-28 at 19.05.29.png

                      And to follow your checklist, I can ping the VLAN gateway when on the VLAN SSID. I cannot get any further than that.

                      1 Reply Last reply Reply Quote 0
                      • bingo600
                        bingo600 last edited by bingo600

                        Did you try to remove/disable the LAN block rule on the Guest Vlan ?
                        Can you then ping the Lan IF , and/or a Lan device ?

                        Something is fishy ....
                        Smells of missing or wrong def-gw.

                        But if you havent touched Anything besides what you have posted in the dhcp screenshot. PfSense should hand out the interface address as def-gw.

                        And that you can ping.

                        Hey ...

                        That screenshot is not DHCP Server , that's the IF
                        You haven't set any upstream gw on the if ... have you
                        Dooh missed it was set to none

                        O 1 Reply Last reply Reply Quote 0
                        • O
                          orangehand @bingo600 last edited by

                          @bingo600 I removed the custom DNS addresses from the DHCP server and that made no difference. What I am wondering is why the SG-1100 has a switch submenu in Interfaces to enable port tagging, and this APU2 does not. Might that be the crux of this?

                          bingo600 1 Reply Last reply Reply Quote 0
                          • bingo600
                            bingo600 @orangehand last edited by bingo600

                            @orangehand said in Port tagging on APU2?:

                            @bingo600 I removed the custom DNS addresses from the DHCP server and that made no difference.

                            I expected that , as your DNS servers are on the INET , and INET can't be reached.

                            What I am wondering is why the SG-1100 has a switch submenu in Interfaces to enable port tagging, and this APU2 does not. Might that be the crux of this?

                            Nope .. I'm running a Unifi on a pfSense wo. switch menu , and JKnott does the same (see further up).

                            Your tagging is working , since you get a Guest Ip address (in Vlan 20)

                            Post a picture of your DHCP Server settings for Guest

                            You don't have any group or floating rules , do you ?

                            O 1 Reply Last reply Reply Quote 0
                            • O
                              orangehand @bingo600 last edited by

                              @bingo600 Screenshot 2020-11-28 at 19.28.17.png Anything not shown is default

                              bingo600 1 Reply Last reply Reply Quote 0
                              • bingo600
                                bingo600 @orangehand last edited by bingo600

                                @orangehand

                                Then something is fishy ....

                                Did you remove the Lan block rule , and tried to ping lan IF and maybe a lan device.

                                Edit:

                                Now that you have removed the 9.9.9.9 & 1.1.1.1 as DNS , can you resolve DNS now?

                                I mean what does ie. ping dns.google.com show ?

                                Does it resolve like here , where it resolves to 8.8.4.4

                                $ ping dns.google.com
                                PING dns.google.com (8.8.4.4) 56(84) bytes of data.
                                
                                O 2 Replies Last reply Reply Quote 1
                                • O
                                  orangehand @bingo600 last edited by orangehand

                                  @bingo600 Yes. I can ping devices on both subnets from the guest subnet when that rule is disabled

                                  bingo600 1 Reply Last reply Reply Quote 0
                                  • O
                                    orangehand @bingo600 last edited by

                                    @bingo600 and @JKnott You are stars for trying; thanks so much. I need to go out to dinner now. Any further thoughts much appreciated!

                                    bingo600 JKnott 2 Replies Last reply Reply Quote 0
                                    • bingo600
                                      bingo600 @orangehand last edited by bingo600

                                      @orangehand
                                      Then def-gw ought to be set correct.

                                      Can you ping the WAN IF ?

                                      How is your outbound NAT set ?

                                      ac2653fc-edab-42ae-814f-1671508b729f-image.png

                                      Do you have "Auto created XXX to wan" for all the interfaces ?

                                      Especially look at Guest , if it's missing there

                                      Maybe post a screenshot

                                      1 Reply Last reply Reply Quote 0
                                      • bingo600
                                        bingo600 @orangehand last edited by

                                        @orangehand

                                        Did you get this solved ?

                                        O 1 Reply Last reply Reply Quote 0
                                        • O
                                          orangehand @bingo600 last edited by

                                          @bingo600 No. Here is the Outbound NAT screenshot: Screenshot 2020-11-29 at 10.02.19.png

                                          bingo600 2 Replies Last reply Reply Quote 0
                                          • JKnott
                                            JKnott @orangehand last edited by

                                            @orangehand said in Port tagging on APU2?:

                                            I need to go out to dinner now. Any further thoughts much appreciated!

                                            I like pizza. 😉

                                            1 Reply Last reply Reply Quote 0
                                            • JeGr
                                              JeGr LAYER 8 Moderator @orangehand last edited by

                                              @orangehand said in Port tagging on APU2?:

                                              On the Sg-1100 I set up yesterday there was a switch submenu in Interfaces where you added the tags. On my APU2 box there isn't a switch submenu so where do I do the tagging?

                                              Just for anyone else wondering: SG1100, 2100, 3100 and 7100 have built in Switch chipsets! Those ports are actually switched internally that's why they have a special pfsense version from Netgate to include the config of said switch chip. You don't have that on any other hardware!

                                              Other than that @JKnott and @bingo600 seem to have things under control, wouldn't want to intrude and confuse everyone :)

                                              O 1 Reply Last reply Reply Quote 0
                                              • O
                                                orangehand @JeGr last edited by

                                                @JeGr Thanks for that! So in the absence of that switch config, how does one tag the lan interface so that VLAN traffic flows through it?

                                                JKnott 1 Reply Last reply Reply Quote 0
                                                • JKnott
                                                  JKnott @orangehand last edited by

                                                  @orangehand

                                                  If you don't have a managed switch, you tag not only the LAN interface on pfsense, but also on every device you want to use the VLAN. This is easy enough to do with computers, but many other devices don't support VLANs.

                                                  These days, go with managed switches. They're cheap, but avoid TP-Link.

                                                  O 1 Reply Last reply Reply Quote 0
                                                  • O
                                                    orangehand @JKnott last edited by

                                                    @JKnott all my switches are Unifi

                                                    JKnott 1 Reply Last reply Reply Quote 0
                                                    • JKnott
                                                      JKnott @orangehand last edited by

                                                      @orangehand

                                                      I have a Unifi AP and a Cisco switch.

                                                      1 Reply Last reply Reply Quote 0
                                                      • Raffi_
                                                        Raffi_ last edited by Raffi_

                                                        I have an APU2 and a unifi ap as well. I can confirm the APU2 and pfsense VLANing does work since my unifi main wifi network is a VLAN coming from pfSense. However, I also had issues creating a seperate wifi VLAN with the unifi. I think it's mostly my not understanding the unifi stuff or something odd with the unifi since at one point I couldn't even get it to work at all after what I thought was a small change. I had to completely reset it.

                                                        I don't have a unifi switch however, mine is a Dlink. I would say make sure all your unifi software and firmware is up to date. Not sure if this video might help? His videos are very good and it sounds like exactly what you're trying to do.
                                                        https://www.youtube.com/watch?v=LNAAfja_ZOY

                                                        Edit, it also might be worth making sure your BIOS is up to date on the APU2 or at least check the release notes to be sure your not missing some fix that could be related to this.

                                                        JKnott 1 Reply Last reply Reply Quote 0
                                                        • JKnott
                                                          JKnott @Raffi_ last edited by

                                                          @Raffi_

                                                          Yeah, the Unifi config is a bit strange. However, working with VLANs is fairly simple. Just make sure your VLANs match across all devices, including any switch you pass through. I have my guest WiFi on VLAN 3, so I configured that on my AP, switch and pfsense.

                                                          1 Reply Last reply Reply Quote 1
                                                          • bingo600
                                                            bingo600 @orangehand last edited by bingo600

                                                            @orangehand

                                                            Why do you use Manual nat , and not Hybrid ?

                                                            It seems like you are missing outbound nat for your guest lan : 192.168.34.0/24

                                                            Re: Switches & stuff.
                                                            Since you can ping devices on your Lan , and you get ip addresses on your guest WiFi. I'd say your switch & Vlan works fine.

                                                            The reason you can't go on Inet from WiFi , seems to be that you are not doing outbound nat for that /24. And trying to send an RFC1918 ip to you ISP would not lead to anything good.

                                                            1 Reply Last reply Reply Quote 1
                                                            • Raffi_
                                                              Raffi_ last edited by

                                                              @bingo600 said in Port tagging on APU2?:

                                                              Why do you use Manual nat , and not Hybrid ?

                                                              Was wondering this also.

                                                              @bingo600 said in Port tagging on APU2?:

                                                              It seems like you are missing outbound nat for your guest lan : 192.168.34.0/24

                                                              Good catch.

                                                              1 Reply Last reply Reply Quote 0
                                                              • bingo600
                                                                bingo600 @orangehand last edited by bingo600

                                                                @orangehand

                                                                Not that it matters "much" .. nitpicking
                                                                But your 3CX NAT rule at the top, is covered by the 192.168.33.0/24 NAT rule further down.

                                                                @Raffi_
                                                                Thnx 😊

                                                                This was a "tricky one" ..
                                                                I'm 99% sure it's solved after OP makes the missing NAT rule.

                                                                /Bingo

                                                                O 1 Reply Last reply Reply Quote 1
                                                                • O
                                                                  orangehand @bingo600 last edited by

                                                                  @bingo600 Thank you all so much - that did the trick in Outbound NAT!
                                                                  Screenshot 2020-12-01 at 09.18.21.png

                                                                  No idea why it wasn't auto created though

                                                                  bingo600 1 Reply Last reply Reply Quote 0
                                                                  • bingo600
                                                                    bingo600 @orangehand last edited by

                                                                    @orangehand said in Port tagging on APU2?:

                                                                    No idea why it wasn't auto created though

                                                                    In your outbound NAT settings you have "tick'ed" Manual NAT (the round dots in top)
                                                                    That means no automatic nat is done.

                                                                    You should use either automatic or hybrid (hybrid let's you get automatic + you can add some your self)

                                                                    /Bingo

                                                                    O 1 Reply Last reply Reply Quote 0
                                                                    • O
                                                                      orangehand @bingo600 last edited by

                                                                      @bingo600 That makes sense! It was on manual I think due to some instruction from 3CX. If I put it back to auto or hybrid will anything get changed? Or will it just affect future changes? Thanks

                                                                      bingo600 1 Reply Last reply Reply Quote 0
                                                                      • bingo600
                                                                        bingo600 @orangehand last edited by

                                                                        @orangehand
                                                                        I'm 100% sure

                                                                        I would not expect it to be doing nasty stuff.

                                                                        Do a backup of your config , and try to switch it to hybrid.
                                                                        If anything FSCK's up , you can restore the backup , and you're back.

                                                                        Btw: The 3CX NAT seems redundant , it's covered by the 192.168.33.0/24 nat further down

                                                                        /Bingo

                                                                        O 1 Reply Last reply Reply Quote 1
                                                                        • O
                                                                          orangehand @bingo600 last edited by

                                                                          @bingo600 OK, nothing nasty happened! Will delete the redundant 3cx rule. Thanks SO much for your help; I'm incredibly grateful.

                                                                          bingo600 1 Reply Last reply Reply Quote 0
                                                                          • bingo600
                                                                            bingo600 @orangehand last edited by

                                                                            @orangehand

                                                                            Glad to be of assistance , we have all been in that situation 😊

                                                                            /Bingo

                                                                            1 Reply Last reply Reply Quote 1
                                                                            • bingo600
                                                                              bingo600 @JKnott last edited by

                                                                              @JKnott said in Port tagging on APU2?:

                                                                              @bingo600

                                                                              No, just making sure he's not missing anything.

                                                                              @JKnott
                                                                              You're right.
                                                                              Sorry about the "rant" ..

                                                                              1 Reply Last reply Reply Quote 0
                                                                              • First post
                                                                                Last post

                                                                              Products

                                                                              • Platform Overview
                                                                              • TNSR
                                                                              • pfSense
                                                                              • Appliances

                                                                              Services

                                                                              • Training
                                                                              • Professional Services

                                                                              Support

                                                                              • Subscription Plans
                                                                              • Contact Support
                                                                              • Product Lifecycle
                                                                              • Documentation

                                                                              News

                                                                              • Media Coverage
                                                                              • Press
                                                                              • Events

                                                                              Resources

                                                                              • Blog
                                                                              • FAQ
                                                                              • Find a Partner
                                                                              • Resource Library
                                                                              • Security Information

                                                                              Company

                                                                              • About Us
                                                                              • Careers
                                                                              • Partners
                                                                              • Contact Us
                                                                              • Legal
                                                                              Our Mission

                                                                              We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

                                                                              Subscribe to our Newsletter

                                                                              Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

                                                                              © 2021 Rubicon Communications, LLC | Privacy Policy