F5F Stay Refreshed Power Users Networks PFSense paired with a 10GB switch offers strong performance and reliability.

PFSense paired with a 10GB switch offers strong performance and reliability.

PFSense paired with a 10GB switch offers strong performance and reliability.

Pages (2): 1 2 Next
C
cowcow4321
Senior Member
623
10-15-2016, 05:02 AM
#1
I've had a PF Sense box running smoothly for many years. I'm weighing whether to upgrade to a larger 10GB or 40GB switch. The main concern is whether my internal network traffic will affect performance on the 10GB switch. I'm hoping the software can manage IP assignments and handle remote access while the switch takes care of the rest, avoiding the need for TNSR. Any advice would be appreciated.
C
cowcow4321
10-15-2016, 05:02 AM #1

I've had a PF Sense box running smoothly for many years. I'm weighing whether to upgrade to a larger 10GB or 40GB switch. The main concern is whether my internal network traffic will affect performance on the 10GB switch. I'm hoping the software can manage IP assignments and handle remote access while the switch takes care of the rest, avoiding the need for TNSR. Any advice would be appreciated.

M
MOGS_McFex
Junior Member
11
10-17-2016, 05:56 AM
#2
No, only DHCP traffic passes through the pfSense unit. Basic concepts. My setup relies on static IPs, so I can disable the pfSense entirely and the rest of the network still works. (The devices using DHCP will simply stop responding.)
M
MOGS_McFex
10-17-2016, 05:56 AM #2

No, only DHCP traffic passes through the pfSense unit. Basic concepts. My setup relies on static IPs, so I can disable the pfSense entirely and the rest of the network still works. (The devices using DHCP will simply stop responding.)

S
sydaves5418
Member
66
10-17-2016, 01:02 PM
#3
Thanks for the details. pfSense limits data transfer overall, but since my fiber connection doesn’t hit that cap, I’m good on that front. All the key info is set up, including the static IP.
S
sydaves5418
10-17-2016, 01:02 PM #3

Thanks for the details. pfSense limits data transfer overall, but since my fiber connection doesn’t hit that cap, I’m good on that front. All the key info is set up, including the static IP.

B
BaiFelicia
Member
231
10-30-2016, 10:05 AM
#4
It varies based on the network configuration and connections, but by default, two machines linked to the same switch won’t need to pass through your PFSense device.
B
BaiFelicia
10-30-2016, 10:05 AM #4

It varies based on the network configuration and connections, but by default, two machines linked to the same switch won’t need to pass through your PFSense device.

P
philipvans
Junior Member
12
10-31-2016, 08:04 PM
#5
It's important to note this if your PFSense operates as a router on a single device. Otherwise, it won't create a bottleneck. When VLAN routing happens on the switch, performance remains unaffected.
P
philipvans
10-31-2016, 08:04 PM #5

It's important to note this if your PFSense operates as a router on a single device. Otherwise, it won't create a bottleneck. When VLAN routing happens on the switch, performance remains unaffected.

T
tobuscis7
Member
170
10-31-2016, 09:06 PM
#6
If both gadgets share the same VLAN from the start, the setup won’t need Pfsense at all, even with a basic router configuration.
T
tobuscis7
10-31-2016, 09:06 PM #6

If both gadgets share the same VLAN from the start, the setup won’t need Pfsense at all, even with a basic router configuration.

S
Sman4231
Member
113
11-02-2016, 09:47 PM
#7
It's definitely possible in theory, but not guaranteed. I can route all traffic between two devices within the same VLAN using a device on another stick, and I can set up the guest VLAN to block direct communication without going through the firewall.
S
Sman4231
11-02-2016, 09:47 PM #7

It's definitely possible in theory, but not guaranteed. I can route all traffic between two devices within the same VLAN using a device on another stick, and I can set up the guest VLAN to block direct communication without going through the firewall.

I
iRaine
Posting Freak
800
11-02-2016, 10:03 PM
#8
Certainly, I recognize you can set up port isolation, private VLANs, or whatever your provider refers to. That’s why I mentioned it from the start. In typical router-on-a-stick arrangements, devices within the same VLAN don’t need to pass through a default gateway either. What you’re describing applies only when port isolation is turned on. If you enable that feature, you’re telling people that two hosts on the same network can communicate directly without routing through a router. You seem to imply that with a router-on-a-stick setup, traffic from the same VLAN would be sent to the router instead of being forwarded in a switch. That’s incorrect unless port isolation is active. The usual expectation is that even with a router-on-a-stick, intra-VLAN communication stays within the switch. This only holds true if port isolation is enabled. You’re suggesting that router-on-a-stick forces traffic to the firewall, which isn’t accurate. It’s not about routing; it’s about VLAN segmentation and switching behavior. If port isolation isn’t enabled, you lose that routing path. I suspect there’s some misunderstanding in how these concepts are being presented.
I
iRaine
11-02-2016, 10:03 PM #8

Certainly, I recognize you can set up port isolation, private VLANs, or whatever your provider refers to. That’s why I mentioned it from the start. In typical router-on-a-stick arrangements, devices within the same VLAN don’t need to pass through a default gateway either. What you’re describing applies only when port isolation is turned on. If you enable that feature, you’re telling people that two hosts on the same network can communicate directly without routing through a router. You seem to imply that with a router-on-a-stick setup, traffic from the same VLAN would be sent to the router instead of being forwarded in a switch. That’s incorrect unless port isolation is active. The usual expectation is that even with a router-on-a-stick, intra-VLAN communication stays within the switch. This only holds true if port isolation is enabled. You’re suggesting that router-on-a-stick forces traffic to the firewall, which isn’t accurate. It’s not about routing; it’s about VLAN segmentation and switching behavior. If port isolation isn’t enabled, you lose that routing path. I suspect there’s some misunderstanding in how these concepts are being presented.

G
GenosFTW
Member
63
11-07-2016, 11:31 AM
#9
This topic involves understanding how traffic moves between different network segments—both inside and outside VLANs. Modern switches like TrendNet, TP-Link, EnGenius, UBNT, and others handle isolation at various layers, depending on configuration. Port-based separation isn't always necessary for intra-VLAN or inter-VLAN control. When L3 routing is enabled and the switches aren’t centrally managed, MAC-level isolation automatically activates. This functionality is intentional, not a mistake, and it’s something many users encounter frequently. It’s important to recognize this as a standard feature rather than an error.
G
GenosFTW
11-07-2016, 11:31 AM #9

This topic involves understanding how traffic moves between different network segments—both inside and outside VLANs. Modern switches like TrendNet, TP-Link, EnGenius, UBNT, and others handle isolation at various layers, depending on configuration. Port-based separation isn't always necessary for intra-VLAN or inter-VLAN control. When L3 routing is enabled and the switches aren’t centrally managed, MAC-level isolation automatically activates. This functionality is intentional, not a mistake, and it’s something many users encounter frequently. It’s important to recognize this as a standard feature rather than an error.

M
Maximoreyrojo
Member
141
11-09-2016, 04:43 AM
#10
This discussion covers different network concepts. Intra-VLAN refers to communication within the same VLAN, while Inter-VLAN involves routing between separate VLANs. Some configurations can direct traffic inside a VLAN to a default gateway, which relates to port isolation or private VLANs—not something router-on-a-stick handles. Router-on-a-stick is unrelated to port isolation and focuses on basic routing capabilities. The term "port-based isolation" is often used for private VLANs, but it’s not a standard technical term. You mentioned enabling L3 routing on a switch, which isn’t typically associated with router-on-a-stick. Your questions seem to mix ideas about switching features, routing modes, and terminology that aren’t directly connected. Clarifying these points would help avoid confusion.
M
Maximoreyrojo
11-09-2016, 04:43 AM #10

This discussion covers different network concepts. Intra-VLAN refers to communication within the same VLAN, while Inter-VLAN involves routing between separate VLANs. Some configurations can direct traffic inside a VLAN to a default gateway, which relates to port isolation or private VLANs—not something router-on-a-stick handles. Router-on-a-stick is unrelated to port isolation and focuses on basic routing capabilities. The term "port-based isolation" is often used for private VLANs, but it’s not a standard technical term. You mentioned enabling L3 routing on a switch, which isn’t typically associated with router-on-a-stick. Your questions seem to mix ideas about switching features, routing modes, and terminology that aren’t directly connected. Clarifying these points would help avoid confusion.

Pages (2): 1 2 Next