Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Two VLANs set up alike, one does not get Internet

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    14 Posts 5 Posters 410 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      RodSlinger @RodSlinger
      last edited by

      @RodSlinger said in Two VLANs set up alike, one does not get Internet:

      I'm getting an odd situation almost exactly the same. Setup two VLANs and they work perfectly. Created a third with the same setting profiles and no internet on it.

      The client does get an IP on the third VLAN and I can browse the gateway. I just can't get traffic through it. Logs aren't showing anything being blocked. It will not ping an IP beyond the gateway. Haven't pulled out Wireshark yet to see if this is a rejection or no response yet.

      Disregard my issue. While similar, not really related. A reboot of pfSense fixed me. Just not sure what the hangup was. Created first VLAN and it was fine. Second one wouldn't pass traffic. After reboot the second one came right up and worked normally.

      1 Reply Last reply Reply Quote 0
      • D
        DominikHoffmann @viragomann
        last edited by

        @viragomann: So, I was mistaken. Hosts on the guest network do get IP addresses. DHCP is not the problem. Still, I cannot ping 192.168.39.1. It’s so weird!

        Access points are Ubiquiti managed by a CloudKey Gen 2 Plus. It has DHCP guarding enabled, and the registered DHCP server is configured correctly. In that it is no different from the other VLANs using those access points.

        Still feels like I am grasping at straws.

        M 1 Reply Last reply Reply Quote 0
        • M
          marvosa @DominikHoffmann
          last edited by

          @DominikHoffmann The fact that there are no hits on any of the firewall rules on the GUESTWIFILAN interface suggests either switching or the traffic is being dropped off on the wrong VLAN.

          D 1 Reply Last reply Reply Quote 1
          • D
            DominikHoffmann @marvosa
            last edited by DominikHoffmann

            @marvosa: Yes, you have a point. My problem is that it looks like I have checked everywhere that could be occurring and have found nothing. Obviously I am missing something.

            I ran another test. I set my Ethernet-to-USB-C adapter to untag VLAN-ID 39 and plugged it directly into the Netgate-2100’s configured LAN port. Same behavior. I have the screenshots to demonstrate it:

            The DHCP server assigns an IP and provides all the necessary information about the subnet:
            Screenshot 2025-04-08 at 5.26.59 PM.png

            And, yet, I cannot ping the router address of 192.168.39.1:
            Screenshot 2025-04-08 at 5.27.05 PM.png

            This clearly eliminates the smart switch and the Ubiquiti Wi-Fi controller as possible culprits. It’s all in the 2100. I will look into this further.

            M patient0P 2 Replies Last reply Reply Quote 0
            • M
              marvosa @DominikHoffmann
              last edited by marvosa

              @DominikHoffmann Can you post what's shown on Interfaces -> Switch -> Ports?

              D 1 Reply Last reply Reply Quote 1
              • patient0P
                patient0 @DominikHoffmann
                last edited by patient0

                @DominikHoffmann on a unrelated note: in an early screenshot, in the alias 'InternalNetworks', two networks - 192.168.40.x and 192.168.41.x - have a subnet mask of /32.

                Is that still the case and is that what you want?

                And I'm pretty sure your "Interface / Switch / VLANs" is not setup as it should.

                All ports are still part of the VLAN group 0/VLAN tag 1. But one port should only be in one VLAN group untagged, check Netgate doc: Configuring the Switch Ports.

                1 Reply Last reply Reply Quote 1
                • D
                  DominikHoffmann @marvosa
                  last edited by

                  @marvosa said in Two VLANs set up alike, one does not get Internet:

                  @DominikHoffmann Can you post what's shown on Interfaces -> Switch -> Ports?

                  @patient0 said in Two VLANs set up alike, one does not get Internet:

                  @DominikHoffmann
                  And I'm pretty sure your "Interface / Switch / VLANs" is not setup as it should.

                  I am showing the corresponding configuration screens:

                  Screenshot 2025-04-09 at 5.18.50 PM.png Screenshot 2025-04-09 at 5.20.18 PM.png

                  @patient0 said in Two VLANs set up alike, one does not get Internet:

                  on a unrelated note: in an early screenshot, in the alias 'InternalNetworks', two networks - 192.168.40.x and 192.168.41.x - have a subnet mask of /32.

                  I have corrected that:

                  Screenshot 2025-04-09 at 5.23.49 PM.png

                  It made no difference.

                  patient0P M 2 Replies Last reply Reply Quote 0
                  • D
                    DominikHoffmann @viragomann
                    last edited by

                    This post is deleted!
                    1 Reply Last reply Reply Quote 0
                    • patient0P
                      patient0 @DominikHoffmann
                      last edited by

                      @DominikHoffmann I'm afraid you have not setup the VLANs correctly on the 2100. They can't be all in Port VID 1. Have a look at the documentation I linked.

                      The example is for port 4, VLAN 4084 and shows what you have to set. E.g. set Port VID to 4084 in Interfaces / Switch / Ports, remove port 4 from VLAN group 0. That is exactly how you have to do for all the ports since you created VLANs for each switch port.

                      On the 2100 port 1 to 4 are on a hardware switch and the way you separate them into single ports is by assign them to VLANs.

                      1 Reply Last reply Reply Quote 0
                      • M
                        marvosa @DominikHoffmann
                        last edited by

                        @DominikHoffmann, it looks like multiple things may need to be addressed.

                        • As @patient0 mentioned, it appears the VLAN table on Interfaces -> Switch -> VLANs needs to be adjusted. You'll want to remove members 1-4 from group 0, e.g similar to this.:
                          6f784608-ba67-4579-be78-1a05c24888af-image.png

                        • It looks like the switchports on the Netgate are misconfigured. From the vids and articles I've seen, your Interfaces -> Switch -> Ports section should look something like this:
                          6a1b6a6a-981b-4688-b7b2-2af698f7a9f6-image.png

                        • Another discrepancy I noticed, unless done by design for your use case, is on the Interfaces -> VLANs section. VLAN 4084 was created on the WAN interface instead of the LAN:
                          74a76525-9e9d-4a73-82e7-197f9974ae1a-image.png

                        • This is unrelated to the main issue, but regarding your "InternalNetworks" alias, I would modify the line items for Guest, IOT, and OpenVPN to reflect the actual network addresses. It's possible that what's listed may be accomplishing the same thing, depending on how the alias interprets it, but ideally, you'd want to list the network address if the intent is to block the network. I.e.:
                          192.168.39.0/24 - Guest Wi-Fi LAN
                          192.168.40.0/24 - IoT Wi-Fi LAN
                          192.168.41.0/24 - OpenVPN network

                        • I also have a curious streamlining question for your firewall rules... at a glance, it would appear blocking management ports on the first line is redundant:
                          a10319ce-858d-4af0-91ce-d2b27d69fb6d-image.png
                          If we're already blocking all traffic to the firewall here:
                          064c73c6-103d-4e2e-9f49-4557319f28bd-image.png
                          You likely have your reasons, just curious about your thoughts.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.