Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cannot add VLAN interface

    Scheduled Pinned Locked Moved Routing and Multi WAN
    12 Posts 3 Posters 801 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Cool_CoronaC
      Cool_Corona
      last edited by

      This post is deleted!
      bingo600B johnpozJ 2 Replies Last reply Reply Quote 0
      • bingo600B
        bingo600 @Cool_Corona
        last edited by

        @cool_corona

        Don't use /16 on the LAN interface , if you want to use 10.1.x.x on the new Vlan interface.

        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

        pfSense+ 23.05.1 (ZFS)

        QOTOM-Q355G4 Quad Lan.
        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

        Cool_CoronaC 1 Reply Last reply Reply Quote 1
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @Cool_Corona
          last edited by

          @cool_corona said in Cannot add VLAN interface:

          I have interfaces added on 2.4.5P1 no issues.

          With that /16 mask? Pfsense has prevented overlapping IPs for as long as I can remember..

          As @bingo600 correctly stated - don't use overlapping networks on your interfaces. It is not a valid configuration..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          Cool_CoronaC 1 Reply Last reply Reply Quote 0
          • Cool_CoronaC
            Cool_Corona @bingo600
            last edited by

            This post is deleted!
            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @Cool_Corona
              last edited by

              Overlapping is overlapping - you can not do that..

              If its just a parent interface with vlans on it - why are you even setting an IP on it? If you want native network on the parent, with vlans on it - they still can not overlap..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • Cool_CoronaC
                Cool_Corona @johnpoz
                last edited by

                This post is deleted!
                johnpozJ bingo600B 2 Replies Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @Cool_Corona
                  last edited by johnpoz

                  its BORKED!! How is pfsense to know where an IP is at if has same network on 2 interfaces.

                  IP address xyz could be on the parent or the vlan..

                  Be it you think it worked ok before, and if pfsense lets you do from cmd line (where no code to check) is besides the point. Such a configuration is just plan BORKED!!

                  Such a configuration would not allow your native network clients to ever talk to vlans - because it would think that IP is suppose to be on its local network, and it would just arp for it, vs sending to the gateway.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 1
                  • bingo600B
                    bingo600 @Cool_Corona
                    last edited by bingo600

                    @cool_corona

                    It couldn't (shouldn't) have worked if you had comms from lan to vlan.
                    Lan would due to the /16 just have "arp'ed" for any "vlan ip" , and never used the gateway , aka. routed the package via L3. So no comms ought to be possible.

                    You might have been saved by some kind of "Proxy Arp" , but i wouldn't have expected a FW to do proxy arp - (Don't know pfSense inners that good)

                    Hmm : JP beat me to it 😊
                    /Bingo

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    Cool_CoronaC 1 Reply Last reply Reply Quote 1
                    • Cool_CoronaC
                      Cool_Corona @bingo600
                      last edited by

                      This post is deleted!
                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @Cool_Corona
                        last edited by johnpoz

                        Be it you think it works, or worked for your scenario is again besides the point... It is a completely and utterly borked setup..

                        It is networking 101 and basic common sense. You can not expect it to work if you put the same network on more than 1 interface.. It is borked, will always be borked..

                        Correct your setup. How can you think such a setup is valid?

                        How does a device on parent /16 network get to a device on a vlan - when that vlan IP is on its own /16.. Unless you don't actually have vlan isolation there is no way this /16 network device could arp for an IP that is he believes should be on his network.. So how would he ever talk to said device.

                        The only possible this could ever work is your not actually isolating your vlans.. Also borked!

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        Cool_CoronaC 1 Reply Last reply Reply Quote 0
                        • Cool_CoronaC
                          Cool_Corona @johnpoz
                          last edited by

                          This post is deleted!
                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @Cool_Corona
                            last edited by johnpoz

                            Dude I don't know what else to tell you.. Its BORKED!

                            Fix your setup.. There is nothing for pfsense to do here.. what you are trying to do is wrong - no matter how you look at it, or want to think you should be able to do it..

                            Even the most basic grasp of how networking works tells you how you have it setup is just plain borked..

                            edit:

                            When a client wants to talk to an IP.. Is that IP suppose to be on my network.. Does it fall inside the IP space of my address and mask. Oh its on my network - ARP!! for it.. Ok device with mac address abc, answered for IP 123.. Send the traffic to that mac..

                            In no scenario does the client say - oh no answer for arp, send it to my gateway... The only scenario where it "could" work is if the gateway (pfsense) was doing proxy arp and answer for any IP that doesn't answer arp.. Which there is no such thing - there is a way to do proxy arp for VIPs..

                            So if you have some device on your /16, and it wants to talk to a an IP that is on one of your vlans that falls under this /16 block.. How would it know where to send the traffic.. So either your L2 are not actually isolated. Or you have pfsense doing proxy arp for every single IP under the /16 that is not actually on the /16 L2..

                            You can not expect your setup to ever function correctly.. Pfsense will clearly warn you - as it did that what your trying to do is wrong, ie the overlapping networks warning. But how can it warn you from a cmd line setup? Pfsense can try and keep users from shooting themselves in the foot.. But it can not protect you from every scenario of shooting yourself.

                            Setup your networks on pfsense be them native or vlans so they do not overlap..

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.