Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN - Did I do it right here in PFS? (not sure how to do it on Linksys VLAN switch).

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    6 Posts 4 Posters 942 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      RafterX
      last edited by RafterX

      pfsense+ on Netgate 1100 SG
      Assigned interface: VLAN 20 - name: WiFi
      Added VLAN to port 0(Lan Uplink) and port 2(LAN), both tagged.
      Interfaces/WiFi: Enabled Interface - STatic Ipv4 - Ipv4 Address: 192.168.20.1
      Services/DHCP Server / WiFi: Enabled DHCP - Allow All - Range(192.168.20.10 to .99).
      Firewall / Rules / WiFi: Added Pass - IPv4 - Protocol=Any - source/Dest: Any/Any rule.
      Anything wrong or missing here?

      For informational purposes:
      Linksys LGS308 8-port managed VLAN switch connected to pfsense(LAN port) from port 1 on switch.
      ASUS AC66U Router in AP mode connected to switch port 5
      Everything works fine. WiFi clients get internet and other wired connections on switch has internet too.

      But creating VLAN 20 on LGS308 and add it to port 5 doesn't work as far as having my router add DHCP leases in the 192.168.20.10-99- range.
      My technical skills and knowledge on VLAN, tagged/untagged, PVID or not PVID, aso.. are very limited. Don't know if the port need to be member of default VLAN1 too, or just VLAN20..

      Why create VLAN? For learning experience, and for being able to seperate all WiFi clients from other. Maybe add more VLAN later.

      I will appreciate any help, tips and tricks :) thank you.

      JKnottJ NogBadTheBadN 2 Replies Last reply Reply Quote 0
      • JKnottJ
        JKnott @RafterX
        last edited by

        @rafterx

        VLANs are often used with WiFi APs to provide multiple SSIDs, such as for a guest WiFi. Every device that the VLAN passes through must be configured for the same VLAN. So, if you're using VLAN 20, then pfsense, your managed switch and AP must all be configured for VLAN 20. The switch only has to have VLAN 20 enabled on the ports connecting to pfsense and the AP. You will also have to configure a DHCP server on the VLAN and configure appropriate rules.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        1 Reply Last reply Reply Quote 1
        • R
          RafterX
          last edited by

          @JKnott Thank you for your help :)

          Additional question to my post: Since my current WAP is not able to understand VLAN, do I have any other way of seperating the wifi clients, lets say with another subnet configured in pfsense, that I can tell the WAP to use instead? Or any other way?
          Besides buying a new VLAN-ready AP ofcourse ;-)

          JKnottJ 1 Reply Last reply Reply Quote 0
          • Bob.DigB
            Bob.Dig LAYER 8
            last edited by

            FreshTomato can do VLAN.

            1 Reply Last reply Reply Quote 1
            • JKnottJ
              JKnott @RafterX
              last edited by

              @rafterx

              No, there is no way to separate without VLANs.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              1 Reply Last reply Reply Quote 0
              • NogBadTheBadN
                NogBadTheBad @RafterX
                last edited by NogBadTheBad

                @rafterx Your port on the switch should look something like GE2, GE1 is my router to switch interlink :-

                Screenshot 2021-10-24 at 10.11.03.png

                Screenshot 2021-10-24 at 10.11.26.png

                Screenshot 2021-10-24 at 10.18.37.png

                The only difference would be that I have my management network for my Aruba AP22 & switches on the untagged vlan 4903.

                Andy

                1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.