Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Hello everyone VLAN

    Scheduled Pinned Locked Moved Hardware
    13 Posts 7 Posters 4.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      Metu69salemi
      last edited by

      Ports is automatically in access mode, if you don't tell em any vlans

      1 Reply Last reply Reply Quote 0
      • K
        kirlox_kitoy
        last edited by

        yes its basically  like 192.168.10.0 –-VLAN 1 so automatically this network will be member in vlan1 and 192.168.20.0--VLAN2  will be in vlan 2 respectively can this be possible without having a managed switch on your setup.

        1 Reply Last reply Reply Quote 0
        • K
          kirlox_kitoy
          last edited by

          i basically tried it but when i say one of my client is member of vlan 1 which is part of 192.168.10.0 network, and i assigned 192.168.10.2 to my vlan in pfsense and then 192.168.10.3 on one of my client, i cant be able to ping the 192.168.10.2 is there any other configuration to be made?

          1 Reply Last reply Reply Quote 0
          • Cry HavokC
            Cry Havok
            last edited by

            You need a VLAN capable switch to use VLANs.

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              You can only use vlans without a managed switch if your clients support vlan tagging. This is easy enough with freebsd or Linux but harder with windows. You would probably also require nics that correctly support vlan tagging, mostly Intel.
              However why would you want to do this? It offers almost nothing by way of security.
              Also you should bare in mind that you should not have tagged and non tagged traffic on the same interface, it can produce unexpected results.

              Steve

              1 Reply Last reply Reply Quote 0
              • K
                kirlox_kitoy
                last edited by

                tnx for the enlightment steve, I was curios about the vlan capability of pfsense.

                1 Reply Last reply Reply Quote 0
                • M
                  mikeisfly
                  last edited by

                  A switch port in access mode in Cisco is a Switch port with no VLAN tags. A trunk would be a switch port allowing Tagged traffic to ingress and egress the port. I have had both tagged and untagged traffic on the same port without any issue at all, on both NIC cards and managed switches. When I worked in a Cisco only environment I didn't really have a concept of tagged and untagged traffic because Cisco just handles everything for you, but if you want 802.1q traffic talking with equipment other than Cisco then you have to understand VLAN Tags. If you set the PVID of a port this will put all untagged traffic entering and leaving that port on that VLAN. If you add a VLAN to a port then it will put that VLAN tagged traffic on that port. Most PCs if not configured for tagged traffic will just drop those frames and just accept the untagged traffic (PVID). If a managed switch is then connected to the same port it will be able to except the untagged/tagged traffic. It is a good idea that once you add tagged VLAN to a port that you remove VLAN 1 (untagged traffic) from that port, or change your native VLAN.

                  In windows if you want to set your NIC for VLAN traffic, just go to properties of your NIC and click on the configure button. Then go to the advanced tab and you are looking for priority or VLAN or IEEE 802.1q if you don't have that option then your NIC doesn't support it or you don't have a driver that supports VLAN traffic in Windows.

                  I would like to see GVRP support in PfSense.

                  1 Reply Last reply Reply Quote 0
                  • K
                    kirlox_kitoy
                    last edited by

                    I do have that option in a realtek lancard but the options are just priority and enable vlans, is this what you are talking about? or anything else cause i have played with it and nothing happens.

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Not using tagged and untagged traffic on the same interface is specific to pfSense and even then it's only a problem with some drivers/NICs. You may find you can do that with no trouble.

                      Steve

                      1 Reply Last reply Reply Quote 0
                      • _
                        __ivy__
                        last edited by

                        A "smart" switch is probably what you are looking for. They can be had for well under US$400.

                        They have some limitations over a full managed switch, but I find these limitations acceptable at 10% of the cost of the latter solution.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.