Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    What should I do?

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    7 Posts 3 Posters 502 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sysadminfromhell
      last edited by

      Hello everyone,

      in the sake of my wife I wanted to trade in my 2 Switch Setup to a one Switch Setup.
      But I have a question, the switch I got is a MikroTik Switch with installed RouterOS.
      Im not very familiar with VLANs but what I know is that I can "split up" one physical connection into multiple. Thats fine but here is my setup:

      LAN -> Switch -> LAN (Wifi etc.)
      VMNET -> Switch -> Server Net

      I want to archive the same with also the same amount of connections mean I dont want to have one single Connection I want to have 2 to the new Switch.
      The MikroTik can use bridging to group some ports together my Idea was to Bridge one 10G port with 4 Others and one 10G Port with 7 Others so I can split them.
      I reed somewhere that it would be better to use VLANs but I´m not quite sure how to archive the same setup with VLANs.

      Someone got some experience here?

      Kind regards,

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @sysadminfromhell
        last edited by

        @sysadminfromhell said in What should I do?:

        The MikroTik can use bridging to group some ports together

        Don't know, what they call "bridging" in this context, but there should be an option to segment the switch, so that you can pool some ports to a virtual switch. So the switch would behave like multiple switches in fact.
        There is no VLAN needed for this if you connect it with two separate network cables to two pfSense NICs.

        S 1 Reply Last reply Reply Quote 0
        • S
          sysadminfromhell @viragomann
          last edited by

          @viragomann yes that’s bridging but I just figured out that only one of these virtual switches can be hardware offloaded / accelerated. Do you have any experience with non hw offloaded virtual switches or similar? I have now the fear that the performance will be really bad in one of the virtual switches. Kind regards

          V johnpozJ 2 Replies Last reply Reply Quote 0
          • V
            viragomann @sysadminfromhell
            last edited by

            @sysadminfromhell
            You can configured all ports you want to have within a "virtual switch" as VLAN, so that this VLAN is only inside the switch.

            This means, say you want to connect ports 5 - 8, set all these ports for tagging incoming packets (PVID) for say VLAN 10 and add them also to VLAN 10 as untagged.

            So from outside port 5 - 8 behaves as a separate dumb switch and they are segmented from all other ports.

            1 Reply Last reply Reply Quote 1
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @sysadminfromhell
              last edited by johnpoz

              @sysadminfromhell said in What should I do?:

              Do you have any experience with non hw offloaded virtual switches or similar

              Huh?? Any vlan capable switch can do what you want. Put ports 1,2,3 in vlan X, put 4,5,6 in vlan Y. etc. or port 7, 12 and 24 in vlan Z, etc..

              They can all have uplinks to different interfaces in pfsense that are not tagged.

              I do this..

              Here..

              vlans.jpg

              So the only interface that I run tags to pfsense on is igb2.. it carries 3 different networks.. it goes to port 5 on my switch.

              Igb0 goes to port 4 on my switch, and this is vlan 9 on my switch.. Igb4 goes to port 8 on my switch and this is vlan 7 on my switch, igb3 goes to port 6 on the switch and is vlan 3.

              The only "vlans" that pfsense has is 4 and 6 which are tagged because they share the same physical port and that I run my wlan network on igb2, which is vlan 2 on the switch.

              Put the ports you want on your lan in a vlan on your switch vlan 1 is fine.. then whatever interface you want to use for vmnet make this vlan 2 for example and put all the ports you want on this network in that vlan.. The only time you need to tag a vlan is when your going to carry more than 1 network over the same physical interface.

              The only vlans pfsense has to be aware of is ones where you are going to have more than 1 come in on the same physical interface. If your just going to put a network directly on an interface in pfsense.. Say for example my igb3 interface above - that network is just on the interface. But to the switch the port that comes in on is on my vlan 3.. any other ports I put in vlan 3 on the switch will be isolated from any of the other vlans on the switch. But none of it has to be tagged - and pfsense has no clue that is vlan 3 on the switch, etc.

              On the switch..

              interfaces.jpg

              The ports that are trunked and have multiple vlans on them run to another switch, or an AP.. Or one of my nas interfaces so I can put different vms I run on that nas into whatever network I want, etc.

              See ports 1 and 13 that I have on vlan 99 on the switch... My wan (modem) comes into port 1 and pfsense wan igb1 is connected to port 13... This isolates my wan traffic from all other networks on the switch.. Pfsense has no idea its vlan 99 on the switch, etc.

              What exact mikrotik device do you have - they have routers, they have switches.. And I think devices that can be either depending if you run their router os or the switch os, etc.

              If you need to do routing on their hardware you run the router os, if you just need switching you can normally run just the switch os.. But all the ports should be able to be put into a vlan on any of their products from my understanding. I can do routing on my switch, but currently just using it for layer 2 "vlans" and it doesn't do any routing.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              S 1 Reply Last reply Reply Quote 0
              • S
                sysadminfromhell @johnpoz
                last edited by

                @johnpoz so if I understand correctly what I could do would be:

                ix1 - ix5 (VLAN: 1) ix5 -> (untagged) Uplink pfsense
                ix6 - ix 12 (VLAN:2) Ix12 -> (untagged) Uplink pfSense

                That would work?

                Kind regards

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @sysadminfromhell
                  last edited by

                  @sysadminfromhell yeah - the only time pfsense needs to know about a "vlan" if it needs to understand tagging.

                  if you just setup native networks on your interfaces.. You can isolate them on your switch by just putting them in different vlans on the switch.

                  To pfsense its no different than if the ports were connected to 2 different physical switches. Your just creating 2 "virtual" switches by putting specific ports into different vlans on the switch.

                  This is the whole point of vlan capable switch.. Traffic being tagged is only used when you need to carry more than 1 vlan over the same physical wire. The tag allows either the router or AP or other switch to know this traffic is network X, this other traffic is network Y.. If you don't plan on running more than one "vlan" over the same physical wire you can still put different ports on your switch into different "vlans" and isolate them from other vlans on the switch, etc.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 1
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.