Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    VLANs, What am I doing wrong?

    L2/Switching/VLANs
    6
    32
    328
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NogBadTheBad
      NogBadTheBad Galactic Empire @johnpoz last edited by NogBadTheBad

      You did create the VLANs on the switch didn't you ?

      FWIW here is my config of a 2960x 28 POE switch I've been playing with.

      
      ! Last configuration change at 21:18:36 UTC Wed Jan 4 2017
      !
      version 15.2
      no service pad
      service timestamps debug datetime msec
      service timestamps log datetime msec
      service password-encryption
      !
      hostname switch
      !
      boot-start-marker
      boot-end-marker
      !
      enable password 7 XXXXXXXXXX
      !
      username admin privilege 15 password 7 XXXXXXXXXX
      aaa new-model
      !
      !
      !
      !
      !
      !
      !
      !
      aaa session-id common
      switch 1 provision ws-c2960x-24ps-l
      !
      !
      !
      !
      !
      !
      ip domain-name network.local
      ip name-server 172.16.1.1
      vtp domain network
      vtp mode transparent
      !
      !
      !
      !
      !
      !
      !
      energywise domain cisco security shared-secret 7 XXXXXXXXXX
      !
      !
      !
      spanning-tree mode rapid-pvst
      spanning-tree extend system-id
      !
      !
      !
      !
      vlan internal allocation policy ascending
      !
      vlan 2
       name USER
      !
      vlan 3
       name GUEST
      !
      vlan 4
       name IOT
      !
      vlan 5
       name DMZ
      !
      vlan 6
       name VOICE
      !
      vlan 7
       name TEST
      !
      vlan 9
       name NORD
      !
      vlan 11
       name SECURE
      !
      vlan 998
       name BLACKHOLE
      !
      vlan 999
       name LAN
      !
      lldp run
      !
      ! 
      !
      !
      !
      !
      !
      !
      !
      !
      interface Bluetooth0
       no ip address
       shutdown
       downshift disable
      !
      interface FastEthernet0
       no ip address
       shutdown
      !
      interface GigabitEthernet1/0/1
       switchport access vlan 2
       switchport mode access
       power inline never
       spanning-tree portfast edge
       spanning-tree bpduguard enable
      !
      ! snip snip
      !
      interface GigabitEthernet1/0/24
       switchport access vlan 4
       switchport mode access
       power inline never
       spanning-tree portfast edge
       spanning-tree bpduguard enable
      !
      ! snip snip
      !
      interface GigabitEthernet1/0/28
       switchport trunk allowed vlan 2-999
       switchport trunk native vlan 999
       switchport mode trunk
      !
      interface Vlan1
       no ip address
       shutdown
      !
      interface Vlan999
       ip address 172.16.1.5 255.255.255.0
       ipv6 address 2A02:XXXX:XXXX:1::5/64
      !
      ip default-gateway 172.16.1.1
      !
      no ip http server
      no ip http secure-server
      ip ssh time-out 60
      ip ssh source-interface Vlan999
      ip ssh version 2
      !
      logging host 172.16.2.10
      logging host ipv6 2A02:XXXX:XXXX:2::A
      !
      !
      !
      !
      !
      line con 0
      line vty 0 4
       session-timeout 60 
       exec-timeout 15 0
       logging synchronous
       transport input ssh
       transport output none
      line vty 5 15
       session-timeout 60 
       exec-timeout 15 0
       logging synchronous
       transport input ssh
       transport output none
      !
      ntp server 172.16.1.1
      !
      end
      
      switch#
      

      Just noticed your using a Realtek ethernet port.

      johnpoz 1 Reply Last reply Reply Quote 0
      • johnpoz
        johnpoz LAYER 8 Global Moderator @NogBadTheBad last edited by johnpoz

        From the thread he linked to.. He doesn't have the one port in trunk

        "OP also indicates that desired configuration is to trunk both ports (meaning Gi0/2 is misconfigured as an access port, as shown in the show interface status output posted above)."

        So yeah could see how he is having problems..

        That switch is 10/100 - ugghhh... Dude get a 40$ 8 port gig switch that does vlans.. And doesn't seem like you need all the ports.. From that thread all your other ports are off..

        If you want to test if your trunk is working connected to pfsense, then wire something to one of the ports on your switch and put that port in access mode in the vlan you want to be in.

        1 Reply Last reply Reply Quote 0
        • M
          marvosa @johnpoz last edited by marvosa

          @johnpoz said in VLANs, What am I doing wrong?:

          interface gigabitethernet5
          description "sg4860 WLan and vlans"
          switchport trunk allowed vlan add 3-4,6-7,19
          switchport trunk native vlan 2

          A couple of things:

          • Your screen shot shows you've created VLAN's 10, 20 and 99, but you're only allowing VLAN's 3, 4, 6, 7, and 19 over the trunk, which is why nothing's passing.
          • A trunk needs to have the same native vlan on both ends. Since it can't be changed on the PFsense side, you'll need to remove the "switchport trunk native vlan 2" line.
          • Also, I don't see the switchport mode set, so it's unclear whether the port is even acting as a trunk at this point.

          Here's the config you're looking for:

          description "sg4860 WLan and vlans"
          switchport trunk encapsulation dot1q
          switchport trunk allowed vlan 10,20,99
          switchport mode trunk

          NogBadTheBad 1 Reply Last reply Reply Quote 0
          • NogBadTheBad
            NogBadTheBad Galactic Empire @marvosa last edited by

            @marvosa said in VLANs, What am I doing wrong?:

            switchport trunk encapsulation dot1q

            If the switch is that old the encapsulation would be ISL, good spot @marvosa

            johnpoz 1 Reply Last reply Reply Quote 0
            • johnpoz
              johnpoz LAYER 8 Global Moderator @NogBadTheBad last edited by johnpoz

              From the thread he linked to the g2 port he has connected to pfsense is access in vlan 1

              Gi0/2                        connected    1          a-full a-1000 10/100/1000BaseTX SFP
              

              So yeah no wonder only thing working is the untagged network..

              @marvosa I suggest you re read the thread, and who is having an issue.. I sure and the F am not ;) And I have the vlans I want on that trunk ;) hehehe

              What I posted was an example for the OP ;)

              NogBadTheBad 1 Reply Last reply Reply Quote 0
              • NogBadTheBad
                NogBadTheBad Galactic Empire @johnpoz last edited by NogBadTheBad

                lol I just looked at the post on the Cisco forum and a guy I work with replied to it.

                johnpoz 1 Reply Last reply Reply Quote 0
                • johnpoz
                  johnpoz LAYER 8 Global Moderator @NogBadTheBad last edited by

                  @nogbadthebad good spot to @marvosa ?? Maybe both of you need to reread the thread.

                  I do not need to call out dotq in my config on the port.. Please reread and pay attention that my post for a config was an example.. Trying to get the OP to post his config.

                  NogBadTheBad 1 Reply Last reply Reply Quote 0
                  • NogBadTheBad
                    NogBadTheBad Galactic Empire @johnpoz last edited by

                    @johnpoz said in VLANs, What am I doing wrong?:

                    @nogbadthebad good spot to @marvosa ?? Maybe both of you need to reread the thread.

                    I do not need to call out dotq in my config on the port.. Please reread and pay attention that my post for a config was an example.. Trying to get the OP to post his config.

                    Wasn't saying an issue with your config, it may have been an issue with the OP.

                    I don't have switchport trunk encapsulation dot1q in my config either.

                    johnpoz M 2 Replies Last reply Reply Quote 0
                    • johnpoz
                      johnpoz LAYER 8 Global Moderator @NogBadTheBad last edited by

                      Read @marvosa post - he is highly confused to what is going on ;)

                      He is confusing the OP stuff and my "example" post ;)

                      1 Reply Last reply Reply Quote 0
                      • M
                        marvosa @NogBadTheBad last edited by marvosa

                        @johnpoz Bah... I was going to say the bottom line is the OP has his trunk port misconfigured, but after re-reading the thread, I noticed you posted that... and not the OP... smh.

                        Either way, re-verifying the config on his trunk port is still a valid step. I would also verify the config on the access ports, which we could help with if we could see the config as @johnpoz suggested.

                        johnpoz 1 Reply Last reply Reply Quote 0
                        • johnpoz
                          johnpoz LAYER 8 Global Moderator @marvosa last edited by

                          From the link he posted - yeah the port connected to pfsense g2 is just access.. So no vlans are going to work.. And not sure how he would even be getting any ips via dhcp that is for sure.. Not from pfsense.

                          A 1 Reply Last reply Reply Quote 0
                          • A
                            Apathia @johnpoz last edited by

                            For simplicity, I set the ports to only use VLAN 99:

                            cisco#show vlan
                            
                            VLAN Name                             Status    Ports
                            ---- -------------------------------- --------- -------------------------------
                            1    default                          active
                            10   IOT                              active
                            20   LCHR                             active
                            99   MGMT                             active    Fa0/2, Gi0/2
                            100  BLACKHOLE                        active    Fa0/1, Fa0/3, Fa0/4, Fa0/5
                                                                            Fa0/6, Fa0/7, Fa0/8, Fa0/9
                                                                            Fa0/10, Fa0/11, Fa0/12, Fa0/13
                                                                            Fa0/14, Fa0/15, Fa0/16, Fa0/17
                                                                            Fa0/18, Fa0/19, Fa0/20, Fa0/21
                                                                            Fa0/22, Fa0/23, Fa0/24, Gi0/1
                            1002 fddi-default                     act/unsup
                            1003 token-ring-default               act/unsup
                            1004 fddinet-default                  act/unsup
                            1005 trnet-default                    act/unsup
                            
                            VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2
                            ---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
                            1    enet  100001     1500  -      -      -        -    -        0      0
                            10   enet  100010     1500  -      -      -        -    -        0      0
                            20   enet  100020     1500  -      -      -        -    -        0      0
                            99   enet  100099     1500  -      -      -        -    -        0      0
                            100  enet  100100     1500  -      -      -        -    -        0      0
                            1002 fddi  101002     1500  -      -      -        -    -        0      0
                            1003 tr    101003     1500  -      -      -        -    -        0      0
                            1004 fdnet 101004     1500  -      -      -        ieee -        0      0
                            1005 trnet 101005     1500  -      -      -        ibm  -        0      0
                            
                            Remote SPAN VLANs
                            ------------------------------------------------------------------------------
                            
                            
                            Primary Secondary Type              Ports
                            ------- --------- ----------------- ------------------------------------------
                            
                            
                            cisco#show ip int br
                            Interface              IP-Address      OK? Method Status                Protocol
                            Vlan1                  unassigned      YES manual up                    down
                            FastEthernet0/1        unassigned      YES unset  administratively down down
                            FastEthernet0/2        unassigned      YES unset  up                    up
                            FastEthernet0/3        unassigned      YES unset  administratively down down
                            FastEthernet0/4        unassigned      YES unset  administratively down down
                            FastEthernet0/5        unassigned      YES unset  administratively down down
                            FastEthernet0/6        unassigned      YES unset  administratively down down
                            FastEthernet0/7        unassigned      YES unset  administratively down down
                            FastEthernet0/8        unassigned      YES unset  administratively down down
                            FastEthernet0/9        unassigned      YES unset  administratively down down
                            FastEthernet0/10       unassigned      YES unset  administratively down down
                            FastEthernet0/11       unassigned      YES unset  administratively down down
                            FastEthernet0/12       unassigned      YES unset  administratively down down
                            FastEthernet0/13       unassigned      YES unset  administratively down down
                            FastEthernet0/14       unassigned      YES unset  administratively down down
                            FastEthernet0/15       unassigned      YES unset  administratively down down
                            FastEthernet0/16       unassigned      YES unset  administratively down down
                            FastEthernet0/17       unassigned      YES unset  administratively down down
                            FastEthernet0/18       unassigned      YES unset  administratively down down
                            FastEthernet0/19       unassigned      YES unset  administratively down down
                            FastEthernet0/20       unassigned      YES unset  administratively down down
                            FastEthernet0/21       unassigned      YES unset  administratively down down
                            FastEthernet0/22       unassigned      YES unset  administratively down down
                            FastEthernet0/23       unassigned      YES unset  administratively down down
                            FastEthernet0/24       unassigned      YES unset  administratively down down
                            GigabitEthernet0/1     unassigned      YES unset  administratively down down
                            GigabitEthernet0/2     unassigned      YES unset  up                    up
                            
                            

                            @johnpoz The reason why this is a 10/100 is because a) it was free, and b) it's strictly for IOT shit that doesn't need anything faster. I'm using it to learn with. I have a second gbe switch that I use for my actual network. I've also swapped the AP for my laptop and VLANs still refuse to work, so either the switch config is wrong or PFSense is configured wrong. But from what I can tell, everything is correct (as I did set Gi0/2 to trunk mode after posting in the Cisco forum)

                            @NogBadTheBad What's wrong with Realtek? I understand that they're not great, but according to the PFSense docs, re# NICs should work with VLANs:
                            Ethernet interfaces with VLAN hardware support:

                            ae(4), age(4), alc(4), ale(4), bce(4), bge(4), bxe(4), cxgb(4), cxgbe(4), em(4), igb(4), ixgb(4), ixgbe(4), jme(4), msk(4), mxge(4), nxge(4), nge(4), re(4), sge(4), stge(4), ti(4), txp(4), vge(4)

                            It also looks like you set the IP address/default gateway for vlan999. Stupid question, but is that for SSH access? When I started messing with VLANs on this switch, SSH stopped working so I've been having to use a console cable..

                            @netblues I only posted the firewall rules for one of the NICs because they're all the same:
                            a51e84ae-4129-4bc1-899b-afb26e3095ee-image.png (I added the * -> * rule before reading your post but after making my post with the rules to see if it would make any difference. Spoiler alert, it doesn't.)
                            f5d9307b-1dc7-48ff-9ba9-238a2d30b87e-image.png
                            0a40e9be-0b94-4473-ad72-28e7996f8d5d-image.png
                            37099bc7-89a1-4500-8d46-e58179d3855d-image.png

                            johnpoz 1 Reply Last reply Reply Quote 0
                            • johnpoz
                              johnpoz LAYER 8 Global Moderator @Apathia last edited by johnpoz

                              How do you think anything would work for vlans if you don't have the port connected to pfsense in trunk?

                              For vlans to work on pfsense. To talk to the other vlans. They have to be allowed on the port that is connected to pfsense.

                              I take it that is g2? Where is the config showing its trunked, and allowing the vlans you want to use?

                              From your latest showing - only vlan 99 is allowed. Which seems to be native untagged, so pfsense would see it on the native interface.

                              So sure your laptop in also in vlan 99, fa2 I take it.. Would be able to talk to any vlan IP on pfsense with your rules.

                              Does your laptop get an IP? Please post the config of the interfaces F2 and G2..

                              A 1 Reply Last reply Reply Quote 0
                              • A
                                Apathia @johnpoz last edited by Apathia

                                @johnpoz Here's a super basic image of my actual network:
                                f0d48f45-74da-4b5d-9c7b-a45177f091f0-image.png
                                I do I have VLAN99/LAN2 (RE1) connected to G0/2 on the Cisco switch and F0/2 connected to the AP (or my laptop when I'm testing whether DHCP works or not).

                                I think that answers your questions? Everything is wired up correctly, LAN2 is only active because it's the only interface in Pfsense I can get to work.

                                I don't fully understand tagged/untagged, or what you're referencing when you say native. This is what I'm trying to learn.

                                cisco#show running-config interface g0/2
                                Building configuration...
                                
                                Current configuration : 170 bytes
                                !
                                interface GigabitEthernet0/2
                                 switchport access vlan 99
                                 switchport trunk encapsulation dot1q
                                 switchport trunk allowed vlan 1-99,101-4094
                                 switchport mode access
                                end
                                
                                cisco#show running-config interface f0/2
                                Building configuration...
                                
                                Current configuration : 156 bytes
                                !
                                interface FastEthernet0/2
                                 switchport access vlan 99
                                 switchport trunk encapsulation dot1q
                                 switchport trunk allowed vlan 99
                                 switchport mode access
                                end
                                

                                Posting this now so I can edit in a few to see if DHCP works for my laptop.

                                Update: I disabled LAN2 and it DHCP failed to work.

                                johnpoz 1 Reply Last reply Reply Quote 0
                                • johnpoz
                                  johnpoz LAYER 8 Global Moderator @Apathia last edited by johnpoz

                                  @apathia said in VLANs, What am I doing wrong?:

                                  switchport access vlan 99
                                  switchport trunk encapsulation dot1q

                                  That is wrong.. Which is it access or trunk?

                                  Its either a trunk port, that carry vlan (tags).. Or its an access port that is not tagged or native.

                                  Since your trying to use your re2 port with untagged vlan (your vlan 99 I believe).. Then your configuration should be trunk, with a native vlan set.. See my above example..

                                  interface gigabitethernet5
                                   description "sg4860 WLan and vlans"
                                   switchport trunk allowed vlan add 3-4,6-7,19
                                   switchport trunk native vlan 2
                                  

                                  This carries vlans 3,4,6,7 and 19 as TAGGED, ie vlan in pfsense. And untagged.. The native interface.. So for example here are my interfaces from pfsense where I am currently using some of those vlans. (4 and 6)

                                  vlans.png

                                  In this case traffic that is in vlan 4 or 6 is tagged, and pfsense sees the tags on my igb2, and knows that traffic is for vlan 4 or 6. While any traffic that is untagged.. in my case on the switch that is vlan 2.. Pfsense just see that traffic for the interface igb2 directly.. It is still a vlan on my switch.. Its just pfsense doesn't know that it is, and its just native traffic (untagged traffic)..

                                  You can run many vlans on a port that are tagged. Cisco calls this a trunk port. If you also want to carry upto 1 vlan that is untagged, that is a native vlan for pfsense on a trunk port.

                                  On a port in cisco where is is not tagged traffic, that would be a access port.. And the device connected that port doesn't see any tags.. This is where you would connect say a pc, or laptop or iot device. When you send traffic to your AP.. That will have say different SSIDs on different vlans. Then those are tagged, ie a trunk port.

                                  A 1 Reply Last reply Reply Quote 1
                                  • A
                                    Apathia @johnpoz last edited by

                                    @johnpoz I still don't entirely understand, but I managed to get it to work:

                                    cisco#show running-config int f0/2
                                    Building configuration...
                                    
                                    Current configuration : 159 bytes
                                    !
                                    interface FastEthernet0/2
                                     description "Wlan"
                                     switchport trunk encapsulation dot1q
                                     switchport trunk allowed vlan 1-99,101-4094
                                     switchport mode trunk
                                    end
                                    
                                    cisco#show running-config int g0/2
                                    Building configuration...
                                    
                                    Current configuration : 164 bytes
                                    !
                                    interface GigabitEthernet0/2
                                     description "rooter"
                                     switchport trunk encapsulation dot1q
                                     switchport trunk allowed vlan 1-99,101-4094
                                     switchport mode trunk
                                    end
                                    
                                    

                                    I don't know why g0/2 was set to access, unless I mistyped something but today I learned how to actually check the interface config (thanks for asking for that, made me google it and find out how to do it).

                                    johnpoz 1 Reply Last reply Reply Quote 0
                                    • johnpoz
                                      johnpoz LAYER 8 Global Moderator @Apathia last edited by johnpoz

                                      While that would allow vlans to work... Are you using vlan 1 as native?

                                      You seem to be allowing everything but vlan 100.. Even 1.. Which is never really tagged. This is the default vlan of switches.

                                      I would change your allowed to be only vlans your actually using.. Or will use shortly.

                                      But if you want to talk the network you have on re1, lan2 - you need to set that as native (untagged).. If your saying everything is working, I take it that is just whatever your using as vlan 1 on your switch?

                                      Another option is just not use any untagged network on this interface. Set lan2 to be a vlan.. But unless you have gotten deep into the weeds with unifi, AP management IP needs to on a untagged vlan. They support vlans - I find it highly unlikely you have set that up.

                                      Here this might help on what I mean by native
                                      https://networklessons.com/switching/802-1q-native-vlan-cisco-ios-switch

                                      Since you seem to be using a different physical switch for network attached to re2, vlan 1 as your native is ok. But you need to make sure you understand tag vs untagged, and when they are and when they are not tagged.

                                      M A 2 Replies Last reply Reply Quote 0
                                      • M
                                        marvosa @johnpoz last edited by marvosa

                                        Agreed. If you're essentially going to allow all VLANs, I would just remove the switchport trunk allowed command altogether.

                                        Although, best practice is to only allow the VLANs that are in use over the trunk.

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          Apathia @johnpoz last edited by Apathia

                                          @johnpoz I think I get it now. LAN2/RE1 is on the physical interface so it's "untagged". The switch throws this on VLAN1 as that's the default VLAN for anything without a tag?

                                          So essentially, the switch acts as if every packet is tagged, either explicitly or not. Non-explicit packets are thrown on the Native VLAN?

                                          If that's what it means then that does make sense. I also only used sw tr all vlan all because I was initially having issues with adding specific VLANs although that may have been due to having g0/2 misconfigured as access instead of trunk.

                                          Now that I have VLANs working, my AP is working just fine and assigning devices to the correct subnets.

                                          Thanks for all the help!

                                          My current config, btw:

                                          cisco#show running-config int g0/2
                                          Building configuration...
                                          
                                          Current configuration : 159 bytes
                                          !
                                          interface GigabitEthernet0/2
                                           description "rooter"
                                           switchport trunk encapsulation dot1q
                                           switchport trunk allowed vlan 10,20,99
                                           switchport mode trunk
                                          end
                                          
                                          cisco#show running-config int f0/2
                                          Building configuration...
                                          
                                          Current configuration : 154 bytes
                                          !
                                          interface FastEthernet0/2
                                           description "Wlan"
                                           switchport trunk encapsulation dot1q
                                           switchport trunk allowed vlan 10,20,99
                                           switchport mode trunk
                                          end
                                          
                                          
                                          johnpoz 1 Reply Last reply Reply Quote 0
                                          • johnpoz
                                            johnpoz LAYER 8 Global Moderator @Apathia last edited by

                                            Yeah that looks better.. And is fine if your using vlan 1 as native.

                                            I don't personally use vlan 1, this is habit from corp experience where vlan 1 is always disabled. And management lan is set to some other vlan.

                                            But there is really nothing technically wrong with doing that. But if your going to say at some point connect your other port into the same physical switch.. And run a network on the physical port along with vlans as well on that other port.

                                            You will need to understand how to change the native vlan on a trunk port, along with also understanding what pvid is. This where you set what vlan a switch puts untagged traffic into when it sees ingress into the port.

                                            Your old school cisco for sure can help you with understanding these concept. Cisco terms might be a bit different than other makers.. In general if you know what a tag or untagged vlan, and how the switch handles ingress traffic without a tag you will be cooking with gas ;)

                                            Glad you finally got it working how you want.

                                            For your next assignment ;) If you choose to accept it ;)

                                            Figure out how to put your AP management IP onto a tagged vlan..
                                            And how to change your native vlan g2 to something other than vlan1..

                                            A 1 Reply Last reply Reply Quote 0
                                            • A
                                              Apathia @johnpoz last edited by Apathia

                                              @johnpoz:

                                              Figure out how to put your AP management IP onto a tagged vlan..

                                              You mean this?
                                              43d9efc2-fbd6-4525-8376-c7d1e2dff7bc-image.png

                                              It was why I created the MGMT VLAN in the first place lol.. Once I figured out how to actually get the VLANs across the switch, the rest was relatively easy. Took me a bit to figure out why the AP would keep going offline when I switched it to the MGMT VLAN but I quickly clued into the PFSense rules, which again is what my plan was in the first place.

                                              And how to change your native vlan g2 to something other than vlan1..

                                              cisco#show running-config int g0/2
                                              Building configuration...
                                              
                                              Current configuration : 191 bytes
                                              !
                                              interface GigabitEthernet0/2
                                               description "rooter"
                                               switchport trunk encapsulation dot1q
                                               switchport trunk native vlan 2
                                               switchport trunk allowed vlan 10,20,99
                                               switchport mode trunk
                                              end
                                              
                                              cisco#
                                              
                                              johnpoz JKnott 2 Replies Last reply Reply Quote 0
                                              • johnpoz
                                                johnpoz LAYER 8 Global Moderator @Apathia last edited by johnpoz

                                                Do you have a vlan 2? Did you create one? ;)

                                                Or just copy that command from my example ;)

                                                But see how fast it clicks into place once you get what tagged and untagged mean.

                                                Welcome to the world of vlans! Now you just need a switch that isn't 20 years old, and does gig on all its ports ;) I would go insane with 100mbps.. Be like watching paint dry trying to move files around.. Gig is even a bottleneck, I connected my pc to my nas via 2.5gbps so could move the files back and forth when I work on them.. ;)

                                                But that switch is great for a lab.. How much juice does it draw? You might not want to leave it on 24/7 - those old things use to suck up some juice for sure.. 100w?

                                                A 1 Reply Last reply Reply Quote 0
                                                • A
                                                  Apathia @johnpoz last edited by

                                                  @johnpoz
                                                  I do now:
                                                  14f72a5b-371a-4e84-a445-cea230f3eb59-image.png
                                                  f0d74afe-0db7-412b-ab86-f37c5d6db045-image.png

                                                  This I presume means that if I enable another port on the cisco, remove it from the BlackHole VLAN, and plug something in then it'll default to VLAN 2?

                                                  RE2/LAN is connected to an HP 2920-24G-PoE+ Switch. Not new, but not 10/100 either. This is what I use as my main network. I plan on getting VLANs set up on it too, but I also don't want to accidentally take myself offline when I mess things up so I want a decent handle on VLANs before I do anything with it. My "file server" is currently my media center PC so I don't have to worry about network transfer speeds too much as I play everything off it anyway. I do have an actual server (Intel something, can't remember which), but that thing not only sounds like a jet engine, but it also drastically increases my electric bill.

                                                  I don't think either of the switches suck up much juice, the HP switch is currently reporting ~10W from 3 POE devices connected to it so I can't imagine it's too much. Last months electricity bill was surprisingly on par with the previous years, despite me now working from home and having these two switches. I will say though, the Cisco is whisper quiet compared to the HP.

                                                  I might eventually chain the switches, Router --> HP --> Cisco, but I want to get a good handle on the VLANs and configuring things before doing that.

                                                  johnpoz 1 Reply Last reply Reply Quote 0
                                                  • johnpoz
                                                    johnpoz LAYER 8 Global Moderator @Apathia last edited by johnpoz

                                                    Does your HP also do vlans? If not I would do it that way I would do

                                                    router - cisco - hp

                                                    You can put a dumb switch downstream of a smart switch, and just everything on that dumb switch will just be 1 vlan.

                                                    What specific models of these switches? Can look up watch the cisco pulls. Is it 2950T-24, those are not all that bad only 30W max..

                                                    edit:
                                                    What do you want that rule to do? Your only going to be able to go to wan net, that doesn't allow you to do really anything.. Your not even allowing that network to query pfsense for dns.

                                                    wan net is not the internet, its just the network your wan is attached to..

                                                    A 1 Reply Last reply Reply Quote 0
                                                    • JKnott
                                                      JKnott @Apathia last edited by

                                                      @apathia

                                                      Is that a Unifi AP? If so, you can select an interface or VLAN when you configure it, though you can also move between one or the other later, as I had to do recently, when my pfsense firewall died. On my AP, the management interface is on my main LAN.

                                                      1 Reply Last reply Reply Quote 0
                                                      • A
                                                        Apathia @johnpoz last edited by

                                                        @johnpoz It's a WS-C3560-24PS-E, so looks like it it's 400+ W. The HP is an J9727A 2920-24G-PoE+ Switch, so it's also a managed switch. I think combined, they pull 800W max/

                                                        My goal with that rule was to restrict traffic, I was lazy and didn't want to add a separate rule restricting to the different VLANs but I guess that's not a thing.

                                                        @JKnott Yeah it is, I initially had it set up with defaults but now that I have a management VLAN, I've been moving appropriate devices over to it.

                                                        johnpoz 1 Reply Last reply Reply Quote 0
                                                        • johnpoz
                                                          johnpoz LAYER 8 Global Moderator @Apathia last edited by johnpoz

                                                          Well power MAX can for sure be misleading..

                                                          Great device to add to your tool belt, if you have any care to what devices draw.. Is a kill-a-watt meter..

                                                          Or a smart plug with power reading.. So you can plug a device in, and see what it actually draws.. Say leave it on the plug for 24 hours min.. And try and atleast use it a bit like you think you normally would..

                                                          Cost of elect can vary quite a bit.. But at the national average of like 12cents per kwh.. A 100W will cost you 100 Bucks a year. Not counting delivery cost of the elect as well, and taxes on that etc.. so going to be 100+ a year to run something that sucks 100w if left on 24/7/365

                                                          I have gotten pretty into how much something draws, even before I went solar.. So Im the blue line - guess when I went solar ;)

                                                          electric.png

                                                          I always use to be above even my non efficient neighbors (all the networking/computer toys) ;) The part I like the most is where I am under the 0... This is where I produced more than I used.. Which is the goal..

                                                          1 Reply Last reply Reply Quote 0
                                                          • First post
                                                            Last post

                                                          Products

                                                          • Platform Overview
                                                          • TNSR
                                                          • pfSense
                                                          • Appliances

                                                          Services

                                                          • Training
                                                          • Professional Services

                                                          Support

                                                          • Subscription Plans
                                                          • Contact Support
                                                          • Product Lifecycle
                                                          • Documentation

                                                          News

                                                          • Media Coverage
                                                          • Press
                                                          • Events

                                                          Resources

                                                          • Blog
                                                          • FAQ
                                                          • Find a Partner
                                                          • Resource Library
                                                          • Security Information

                                                          Company

                                                          • About Us
                                                          • Careers
                                                          • Partners
                                                          • Contact Us
                                                          • Legal
                                                          Our Mission

                                                          We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

                                                          Subscribe to our Newsletter

                                                          Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

                                                          © 2021 Rubicon Communications, LLC | Privacy Policy