<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[LAN and OPT1 routing on the same VLAN]]></title><description><![CDATA[<p dir="auto">Hello everyone. I'm having some difficulty configuring pfSense with a WAN/LAN/OPT1 and soon to be OPT2 interface. I've tried several things from the forum which have not worked for me.</p>
<p dir="auto">I'm running the latest code on a VM 2.2.3-RELEASE.</p>
<p dir="auto">The WAN link is a on a separate VLAN to the internet.</p>
<p dir="auto">The LAN link and OPT1 LINK are on the same VLAN with different subnets.</p>
<p dir="auto">WAN=10.243.40.0/24<br />
LAN=172.16.0.0/16<br />
OPT1=10.10.10.0/24</p>
<p dir="auto">I have two VM's connected on the 10.10.10.x network running Cisco IronPort asyncOS. One of them runs fine the other one drops all connectivity after 15 minutes or so. If I reboot pfSense it immediately restores connectivity to the VM?</p>
<p dir="auto">Also SSH gets dropped after about 15 minutes to both VM's even if the sessions are active. I can reconnect to VM1 fine via HTTPS, SSH and ICMP. VM2 is completely knocked out, however after some period of time like 1 hour the VM will come back for 15 minutes or so.</p>
<p dir="auto">Ideas from the forum I have tried:</p>
<p dir="auto">Set Firewall Optimization Options to conservative. (SSH was only lasting about 3-5 minutes before this change, now it lasts 15 minutes?)<br />
Disabled Firewall Scrub<br />
Enabled Clear invalid DF bits instead of dropping the packets<br />
Disable hardware checksum offload<br />
Disabled Static route filtering and I created two new GW's and routes which I'm not sure are correct but didn't change anything.</p>
<p dir="auto">This is the routes I created:</p>
<p dir="auto">Network Gateway Interface Description<br />
172.0.0.0/16  MGMTGW - 10.10.10.1  OPT1   <br />
10.10.0.0/24  LANGW - 172.16.0.1  LAN</p>
<p dir="auto">Does anyone have any ideas? thank you very much</p>
]]></description><link>https://forum.netgate.com/topic/86722/lan-and-opt1-routing-on-the-same-vlan</link><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 16:51:08 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/86722.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 17 Jul 2015 17:56:37 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to LAN and OPT1 routing on the same VLAN on Fri, 17 Jul 2015 18:36:11 GMT]]></title><description><![CDATA[<p dir="auto">You still need two VLANs.</p>
]]></description><link>https://forum.netgate.com/post/557910</link><guid isPermaLink="true">https://forum.netgate.com/post/557910</guid><dc:creator><![CDATA[Derelict]]></dc:creator><pubDate>Fri, 17 Jul 2015 18:36:11 GMT</pubDate></item><item><title><![CDATA[Reply to LAN and OPT1 routing on the same VLAN on Fri, 17 Jul 2015 18:32:35 GMT]]></title><description><![CDATA[<p dir="auto">oh  ::) I didn't think of using one NIC. ok thanks let me try that.</p>
]]></description><link>https://forum.netgate.com/post/557909</link><guid isPermaLink="true">https://forum.netgate.com/post/557909</guid><dc:creator><![CDATA[jasonsfirewall]]></dc:creator><pubDate>Fri, 17 Jul 2015 18:32:35 GMT</pubDate></item><item><title><![CDATA[Reply to LAN and OPT1 routing on the same VLAN on Fri, 17 Jul 2015 18:32:12 GMT]]></title><description><![CDATA[<p dir="auto">You can use one NIC.  The purpose of VLANs is to put multiple layer 2 networks on one physical port.</p>
<p dir="auto">With VMware you have two choices:</p>
<p dir="auto">Create multiple VLANs in the vSwitch and create NICs to give to pfSense.  You will not create VLANs on pfSense in that case - the vSwitch will put the traffic on the right VLAN.</p>
<p dir="auto">Create one interface on vlan 4095 and give that to pfSense.  The vSwitch will treat that as a tagged port and all VLANs will be tagged to pfSense.  You will create VLANs in pfSense and assign them to pfSense interfaces as if it was a physical port receiving tagged traffic from a switch.</p>
<p dir="auto"><img src="/public/_imported_attachments_/1/VLAN-pfSense.png" alt="VLAN-pfSense.png" class=" img-fluid img-markdown" /><br />
<img src="/public/_imported_attachments_/1/VLAN-pfSense.png_thumb" alt="VLAN-pfSense.png_thumb" class=" img-fluid img-markdown" /></p>
]]></description><link>https://forum.netgate.com/post/557904</link><guid isPermaLink="true">https://forum.netgate.com/post/557904</guid><dc:creator><![CDATA[Derelict]]></dc:creator><pubDate>Fri, 17 Jul 2015 18:32:12 GMT</pubDate></item><item><title><![CDATA[Reply to LAN and OPT1 routing on the same VLAN on Fri, 17 Jul 2015 18:11:31 GMT]]></title><description><![CDATA[<p dir="auto">I've been using pfsense in my test lab using just the WAN/LAN and working great of course. I've added some appliances into the LAB and I'm wanting to simulate a management network and a DMZ (OPT1 and 2). Then I can test routing mail in my LAB ect.</p>
<p dir="auto">I guess now I don't really know if that is possible? However its working fine on one of the VM's and not the other?</p>
<p dir="auto">I was trying to keep it simply just using one NIC but as it turns out I guess its not so simple.</p>
]]></description><link>https://forum.netgate.com/post/557901</link><guid isPermaLink="true">https://forum.netgate.com/post/557901</guid><dc:creator><![CDATA[jasonsfirewall]]></dc:creator><pubDate>Fri, 17 Jul 2015 18:11:31 GMT</pubDate></item><item><title><![CDATA[Reply to LAN and OPT1 routing on the same VLAN on Fri, 17 Jul 2015 18:02:26 GMT]]></title><description><![CDATA[<p dir="auto">Why do you want two layer 3 networks on the same layer 2 network?</p>
]]></description><link>https://forum.netgate.com/post/557898</link><guid isPermaLink="true">https://forum.netgate.com/post/557898</guid><dc:creator><![CDATA[Derelict]]></dc:creator><pubDate>Fri, 17 Jul 2015 18:02:26 GMT</pubDate></item></channel></rss>