Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Is my scheme correct, or could I be doing it better?

    Scheduled Pinned Locked Moved Hardware
    11 Posts 6 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      OpenFerret
      last edited by

      Hi all,

      I'm just waiting for my Supermicro A1SRI-2758F with 8GB of RAM to turn up in the post, and then I'll be building and integrating my first ever firewall into my home network.

      I'm just planning out the addressing scheme and was curious if I should be doing things any different to make things more efficient.

      Apologies, I'm quite new to all of this and this is as much a learning exercise as anything else.  What I'm thinking of doing is shown in the diagram below, is this correct or should I be subnetting the LAN / OPT1 instead of using the usual Class C (/24) address space?:

      1 Reply Last reply Reply Quote 0
      • C
        chris4916
        last edited by

        What's your concern with IP range ?
        1 - you can define , within /24 subnet, how large is the range of IP to be delivered by DHCP server.
        2 - does it really matter if your range is, e.g. from 192.168.0.100 to 192.168.0.200 even if you have only 5 devices attached?

        Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

        1 Reply Last reply Reply Quote 0
        • O
          OpenFerret
          last edited by

          Hi Chris,

          I just wanted to check that I'm thinking along the right directions.

          I then understand that I can bridge the LAN and OPT1 connections to allow each subnet to communicate between one another, which is what I'm intending to do.

          1 Reply Last reply Reply Quote 0
          • H
            heper
            last edited by

            i'd change your lan subnet to something less common.
            if you ever want to use vpn to connect to your home network, then its best to have a home-lan-subnet that not the same as the one you are connecting from

            1 Reply Last reply Reply Quote 0
            • O
              OpenFerret
              last edited by

              Thanks Heper.

              I'll keep that in mind and go for a slightly different C Class range.

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                "I then understand that I can bridge the LAN and OPT1 connections to allow each subnet to communicate between one another"

                What??  Why would you do that?  Pfsense is more than capable of routing and firewalling traffic between 2 segments.  If you just want everthing on the same segment then connect them all to the same switch..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • O
                  OpenFerret
                  last edited by

                  That is the desired endstate, but as stated in my original post I'm still very much in the learning stage.

                  Everyone has to start some where dude…

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    I just downloaded the manual for that wrt1900ac.  Searched for VLAN - "No results found."  At that price point you're in the range of a Ubiquiti UAP-Pro or UAP-AC.  Or something from Xclaim, maybe.

                    I wouldn't blow a router port on the AP.  I'd tag the VLANs to your switch and plug the AP in there.  Then you can "bridge" an SSID with the LAN (put it on the same VLAN) make a guest SSID that's isolated from your LAN, etc.

                    Unless you know you're going to have more than 250 hosts on one segment, just leave it at /24.  It's what everyone's used to seeing.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • C
                      chris4916
                      last edited by

                      @Derelict:

                      I just downloaded the manual for that wrt1900ac.  Searched for VLAN - "No results found."

                      Although this is slightly off-topic, as it may help to improve current design, even if I think we are pretty close to the perfect one given inputs defined so far, it has to be noticed that WRT1900AC is a very expensive but very powerfull wifi router.
                      It does support VLAN tagging and also allows alternative firmware like OpenWRT (although this one is not yet 100% stable).

                      This means that you should not face any problem with your initial design:

                      • wired devices attached to your switch
                      • wifi either via wrt1900 attached to pfSense which will implement rules to control flow between wifi and wired networks
                        or
                      • wrt1900 attached to SG300-10 on dedicated VLAN and interVLAN managed at pfSense level.

                      Almost everything is possible, including capability to expose secondary SSID for guest.

                      From my viewpoint, you won't have any hardware/firmware related issue but can't neither improve your technical design until you progress on features and services you want to provide. I would focus on this first without any fears about hardware/software limitation.

                      Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        "Everyone has to start some where dude…"

                        Agreed, and thinking you should "bridge" you lan and opt together is wrong start..  "Bridging" has its uses - but not for this..  If you want your wifi on same network as your wired, then connect your AP to your switch. Trying to use a router interface as a switch port is wrong start!!!

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • ?
                          Guest
                          last edited by

                          I fully agree with @johnpoz and it would be not going better with or for your network at home
                          to try out the same thing more and more again as I see it right. For sure all peoples will be standing
                          on a starting point and network engineers would be not falling down from the heaven this is also a
                          well known and logical knowledge. And even try out the worst case or something nearly this would
                          be not nice but also fine by going step by step and asking before and not after, I accept this really.

                          Since the last time even more and more often peoples join, related to the circumstances that many
                          "good" or by friends given tips owed to the circumstance that the best firewall would be a transparent
                          firewall and there fore ports must be bridged and so on and so on, please read my lips, it is not so,
                          in very rarely cases and mostly only for peoples they absolutely know what they do and when they do
                          it right, bridging would be coming with a success and also a wining point.

                          The best way if you are starting with pfSense and if you have not really special needs, I really suggest the
                          best would be to go a straight and ordinary or most common way, because then if there is coming something
                          on top or your network will grow up, you are in the best position to realize it without any work around or hassle.

                          OpenFerret_2.jpg
                          OpenFerret_2.jpg_thumb

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.