Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Multiple LANs versus VLANS?

    Scheduled Pinned Locked Moved General pfSense Questions
    11 Posts 4 Posters 1.3k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D Offline
      Double00Kevin
      last edited by

      Been trying to learn a few things with this homegrown firewall. So I've been trying to find the answers to my little weird questions but maybe my terminology is wrong as I cant find the answers that I "think" I need. So please accept my apologies for my ignorance in advance.

      My pfsense box has 6 network ports, one will obviously go to my ONT for WAN access. As for the other 5, currently I'm only utilizing 1 port (192.168.1.1/24) connected to a switch for various PCs to have internet access.

      If I wanted to add a completely different network, say for another completely segregated network. How would that look exactly? I know I can configure another LAN ports and give it 172.16.1.1/24, but do I setup another gateway under STATUS/GATEWAYS?

      Is there a link or something somewhere that I'm just missing which might help me understand this a little more?

      1 Reply Last reply Reply Quote 0
      • stephenw10S Online
        stephenw10 Netgate Administrator
        last edited by

        @double00kevin said in Multiple LANs versus VLANS?:

        do I setup another gateway under STATUS/GATEWAYS?

        No. You would only add another gateway to pfSense if you were adding a second WAN connection.
        Devices on a second internal subnet will still be routed via your existing WAN, so the same gateway.

        Steve

        D 1 Reply Last reply Reply Quote 0
        • D Offline
          Double00Kevin @stephenw10
          last edited by

          @stephenw10 Gotcha, so no gateway listing here as well? under Services DHCP/LAN:
          Screenshot 2022-03-18 093551.png

          1 Reply Last reply Reply Quote 0
          • stephenw10S Online
            stephenw10 Netgate Administrator
            last edited by

            That's the gateway you are passing to clients in the new subnet to use. So usually that would be the pfSense interface IP address in that subnet which it uses by default if you don't add anything there.
            So don't put anything there unless you need clients to use some other gateway as their default route. Typically that would only be for HA setups where clients use the shared IP.

            Steve

            D 1 Reply Last reply Reply Quote 0
            • D Offline
              Double00Kevin @stephenw10
              last edited by

              @stephenw10 Roger that, thanks for the explanation!

              1 Reply Last reply Reply Quote 0
              • MarinSNBM Offline
                MarinSNB
                last edited by

                So what would be the benefit of having multiple networks originating from different PHYSICAL ports of pfSense router versus having all of them in separate VLANs that are tied up to one physical port? I thought I read somewhere that having multiple VLANs does impact the overall bandwidth for each network but that may not necessarily be an issue if you are utilizing different physical ports in pfSense. You could still create the same types of rules to control internet access for devices in each network/interface as well as other ones to control access between networks as in interVLAN routing.

                My pfSense box also has 6 physical ports too and I guess I am wondering if it would be best to utilize those extra ports somehow or just go the VLAN route to segregate networks. Will my overall internet speed be significantly impacted if I go the VLAN route?

                Appreciate your advice.

                Netgate 6100 Max pfSense+
                —>Unifi Aggregation/24 Pro PoE/24 PoE Enterprise switches
                —> UCK2+
                —> 3x U6E APs

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ Offline
                  johnpoz LAYER 8 Global Moderator @MarinSNB
                  last edited by

                  @marinsnb said in Multiple LANs versus VLANS?:

                  Will my overall internet speed be significantly impacted if I go the VLAN route?

                  Depends on what your internet speed is.. If your internet speed is 100mbps, and your sharing vlans on physical 1 gig port, prob not.

                  But if your internet is say gig, and you have a bunch of vlans on the lan side physical 1 gig interface - and you have a bunch of intervlan traffic going on that is using up that 1 gig physical bandwidth - then yes some client going to the internet could be limited.

                  When you share a physical interface with vlans - the physical interface is going to be the limit.

                  Lets say you have 4 vlans on 1 physical gig interface.. And you have devices in these 4 vlans all talking to devices in another vlan. They will be limited by the physical interfaces ability.

                  If you do not have any or much intervlan traffic and your physical interface is same or greater than your internet speed. Then no it shouldn't be much of an issue.

                  All comes down to traffic flow.. Here maybe a simple drawing will help.

                  vlan.jpg

                  If your interface is 1 gig, and your sharing it with vlans. And A is moving 1 gbps to C (file copy, streaming media, etc.) how could vlan B get 1 gig to internet? They are both using the physical 1 gig interface.

                  Now if you had it like this..

                  likethis.jpg

                  Then the A to C traffic would not have to share physical interface bandwidth with traffic B.

                  Or if A and C vlans shared physical, and B was on a different interface.

                  Putting vlans on a physical interface - you will be limited by that physical interfaces speed, they are "sharing" it.. Will that matter? Depends on your traffic flow.

                  If you have the physical interfaces to spare both on your router and your switch or switches. Then using multiple interfaces for the different network can provide more bandwidth between your vlans or to the interenet that is "not shared"

                  I have plenty of interfaces on my sg4860, and my switch. So I break out the networks/vlans across multiple physical interfaces.

                  My wireless vlans all share 1 physical interface to pfsense. They have really no intervlan traffic going between them. And since they are wireless they can't really do full gig anyway.. So even if devices on 2 different wireless vlans talking to stuff in my other vlans, they really can not do gig anyway.. The wireless is their bottleneck.

                  I'm using the 2nd scenario - my wireless traffic is on the B physical interface. While for example I am moving files to my nas from my pc on vlan A to C.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  MarinSNBM 1 Reply Last reply Reply Quote 1
                  • MarinSNBM Offline
                    MarinSNB @johnpoz
                    last edited by

                    @johnpoz

                    Thanks so much! I have 1Gb internet and not a whole lot of devices so I have been debating on whether to use up the extra pfSense box ports or just the LAN one and segment everything via VLAN.

                    Marin

                    Netgate 6100 Max pfSense+
                    —>Unifi Aggregation/24 Pro PoE/24 PoE Enterprise switches
                    —> UCK2+
                    —> 3x U6E APs

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ Offline
                      johnpoz LAYER 8 Global Moderator @MarinSNB
                      last edited by

                      @marinsnb if your devices don't talk to each other across vlan, then it really doesn't matter - you can only share 1 gig to the internet anyway. So doesn't really matter if they also share 1 gig limit on the lan side of pfsense.

                      Where it would matter is if you had a lot of intervlan traffic..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      MarinSNBM 1 Reply Last reply Reply Quote 1
                      • MarinSNBM Offline
                        MarinSNB @johnpoz
                        last edited by

                        @johnpoz

                        Good to know - this makes a lot of sense. And the pics you included definitely do help. I do like the 2nd scenario too.

                        Thanks again!

                        Netgate 6100 Max pfSense+
                        —>Unifi Aggregation/24 Pro PoE/24 PoE Enterprise switches
                        —> UCK2+
                        —> 3x U6E APs

                        1 Reply Last reply Reply Quote 0
                        • D Offline
                          Double00Kevin
                          last edited by

                          Now that I actually have a little free time, I'm starting to play with my pfsense box like this:

                          -10.1.1.1/24=management LAN

                          -10.20.30.0/24=LAB env., have a few poweredge servers with vsphere 7, TrueNAS Scale, unRAID, might get lucky and learn something configuring Microsoft server 2022 ADDNS/DHCP within vSphere on this LAN.

                          -172.16.1.1/24=Personal, or basic home network for laptops, etc.

                          -192.168.20.1/24=IOT devices I guess

                          May try to figure out using the other two ports for the home and lab LANS.....future endeavor maybe.

                          Directing traffic via firewall rules.
                          Management LAN will have access to ALLOW ALL and ofcourse pfsense GUI
                          All other networks, BLOCKED from each other and also blocked to pfsense GUI

                          I dunno.......it all sounds right in my head. I'm sure I'm missing some things. You guys foresee any issues?
                          Is all this needed? I dunno....
                          Will I break something? All signs point to yes.....
                          Will I learn something? Fosho!!
                          Will the kids if and when I shut this mother down with some jacked up configs? Ofcourse but.......I grew up without internet, they can go without on it occasion.

                          1 Reply Last reply Reply Quote 1
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.