F5F Stay Refreshed Power Users Networks Pfsense transparent vlan trunk configuration

Pfsense transparent vlan trunk configuration

Pfsense transparent vlan trunk configuration

Pages (3): Previous 1 2 3 Next
D
Darkbandit92
Posting Freak
839
07-25-2016, 08:14 PM
#11
pfSense isn't meant for inline configuration. You can't modify it via the command line—it will erase all changes. The GUI doesn’t support trunking VLANs directly. You’d need to set up a separate VLAN interface and strip non-VLAN devices from your interfaces. Data would spill over if you keep using regular interfaces, and pfSense will remove any VLAN tags unless you manually add them. You’re left with whatever VLAN configuration you created on the switch (assuming it’s 1). Are you looking for a feature that works inline, or is there another tool you prefer? I think Sophos’ UTM might offer an inline option. It also frustrates me trying to imagine using a single physical port on pfSense while positioning it between your router and switch effectively. Seems like traffic would still reach its destination regardless of pfSense. If your real connection is Router > Switch > pfSense, it’s doable with VLANs, though it’s not ideal. Wouldn’t you tag the traffic on the router, which the switch would interpret and forward to all ports in that VLAN group?
D
Darkbandit92
07-25-2016, 08:14 PM #11

pfSense isn't meant for inline configuration. You can't modify it via the command line—it will erase all changes. The GUI doesn’t support trunking VLANs directly. You’d need to set up a separate VLAN interface and strip non-VLAN devices from your interfaces. Data would spill over if you keep using regular interfaces, and pfSense will remove any VLAN tags unless you manually add them. You’re left with whatever VLAN configuration you created on the switch (assuming it’s 1). Are you looking for a feature that works inline, or is there another tool you prefer? I think Sophos’ UTM might offer an inline option. It also frustrates me trying to imagine using a single physical port on pfSense while positioning it between your router and switch effectively. Seems like traffic would still reach its destination regardless of pfSense. If your real connection is Router > Switch > pfSense, it’s doable with VLANs, though it’s not ideal. Wouldn’t you tag the traffic on the router, which the switch would interpret and forward to all ports in that VLAN group?

M
Mehta42
Member
112
07-25-2016, 08:38 PM
#12
He also mentions two possible physical connections: a link from the content page and a reference to a PDF attachment. It seems they might not need actual hardware, just virtual setups if using a VM, but still count as two distinct interfaces.
M
Mehta42
07-25-2016, 08:38 PM #12

He also mentions two possible physical connections: a link from the content page and a reference to a PDF attachment. It seems they might not need actual hardware, just virtual setups if using a VM, but still count as two distinct interfaces.

1
193over71
Member
169
07-25-2016, 08:44 PM
#13
You're looking for a solution where all network traffic passes through a specific device, like a squid proxy, positioned along the path between a switch and a router. That way, everything is routed through it.
1
193over71
07-25-2016, 08:44 PM #13

You're looking for a solution where all network traffic passes through a specific device, like a squid proxy, positioned along the path between a switch and a router. That way, everything is routed through it.

D
dianarose32129
Senior Member
570
07-26-2016, 02:19 AM
#14
I'll verify, but I recall activating them both.
D
dianarose32129
07-26-2016, 02:19 AM #14

I'll verify, but I recall activating them both.

E
e_clips_gaming
Junior Member
10
07-29-2016, 06:22 PM
#15
I just recalled something—did you navigate to Firewall > Rules and insert the “accept all from network” entry for the interface (bridge10, where you placed the IP address)? Remembering that when you create interfaces manually, this setting doesn’t apply automatically, and it defaults to blocking all traffic, so pings won’t work. The standard rule should look like: Protocol: Any Source: (interface) net (for example “bridge10 net”).
E
e_clips_gaming
07-29-2016, 06:22 PM #15

I just recalled something—did you navigate to Firewall > Rules and insert the “accept all from network” entry for the interface (bridge10, where you placed the IP address)? Remembering that when you create interfaces manually, this setting doesn’t apply automatically, and it defaults to blocking all traffic, so pings won’t work. The standard rule should look like: Protocol: Any Source: (interface) net (for example “bridge10 net”).

L
Lemmons_
Junior Member
19
07-29-2016, 07:35 PM
#16
Yes, you can also adjust rules on the network segment side or use intrusion prevention systems for extra protection.
L
Lemmons_
07-29-2016, 07:35 PM #16

Yes, you can also adjust rules on the network segment side or use intrusion prevention systems for extra protection.

_
_iTofuYou_
Member
52
07-29-2016, 09:30 PM
#17
Linux seems to handle requests smoothly. Setting up Linux with Squid offers much more control. How exactly are you configuring it? If your router is at 10.10.1.253, PFSense assigns a single IP address—10.10.1.252—to that interface. When a client like 10.10.1.10 needs to reach 10.10.1.11, it would bypass the gateway and connect directly. Assuming the router is connected straight to the switch, you’d likely need multiple interfaces per segment, each linked to different devices. It sounds complex, almost like a Cisco setup, but with Linux it could be more manageable.
_
_iTofuYou_
07-29-2016, 09:30 PM #17

Linux seems to handle requests smoothly. Setting up Linux with Squid offers much more control. How exactly are you configuring it? If your router is at 10.10.1.253, PFSense assigns a single IP address—10.10.1.252—to that interface. When a client like 10.10.1.10 needs to reach 10.10.1.11, it would bypass the gateway and connect directly. Assuming the router is connected straight to the switch, you’d likely need multiple interfaces per segment, each linked to different devices. It sounds complex, almost like a Cisco setup, but with Linux it could be more manageable.

Z
Zikblackniggg
Member
145
07-31-2016, 05:02 PM
#18
The idea of placing Squid on a box between a router and a switch has been considered. I’d still need to connect ports and set up VLANs, right? Or would it be simpler on Linux instead of using PFSense? PFSense does have two interfaces linked to the switch and router for bridging traffic, but you’re wondering if it’s better not to bridge them altogether. Could you clarify more details?
Z
Zikblackniggg
07-31-2016, 05:02 PM #18

The idea of placing Squid on a box between a router and a switch has been considered. I’d still need to connect ports and set up VLANs, right? Or would it be simpler on Linux instead of using PFSense? PFSense does have two interfaces linked to the switch and router for bridging traffic, but you’re wondering if it’s better not to bridge them altogether. Could you clarify more details?

I
ItsPvPMaster
Junior Member
3
08-02-2016, 08:32 AM
#19
Then I completely misread the situation, sorry about that. My thoughts were really off track. I logged into my pfSense to check things out, but I’m unsure how to do this since when setting up a bridge you need interface assignments. I’m wondering if you should set up VLAN interfaces for both connections and then assign each one individually. That would mean five bridges in total—definitely not a single bridge handling everything. You’ll likely lose VLAN tags if you don’t handle them properly, so you’ll be at the mercy of your PVID. It seems the VLAN interfaces are necessary for pfSense to process tagged packets. You’ll probably have to do some manual outbound NAT. https://forum.pfsense.org/index.php?topic=115718.0 This person also struggled with passing VLANs through their bridge, so it’s clear you’ll need at least five bridges. Make sure any interface assignments you create are VLAN-based. Assuming em0 is linked to your router and em1 to your switch... VLAN 1 on em0, VLAN 10 on em0, VLAN 20 on em0, VLAN 30 on em0, VLAN 100 on em0, and VLAN 100 on em1, then set up the bridges accordingly.
I
ItsPvPMaster
08-02-2016, 08:32 AM #19

Then I completely misread the situation, sorry about that. My thoughts were really off track. I logged into my pfSense to check things out, but I’m unsure how to do this since when setting up a bridge you need interface assignments. I’m wondering if you should set up VLAN interfaces for both connections and then assign each one individually. That would mean five bridges in total—definitely not a single bridge handling everything. You’ll likely lose VLAN tags if you don’t handle them properly, so you’ll be at the mercy of your PVID. It seems the VLAN interfaces are necessary for pfSense to process tagged packets. You’ll probably have to do some manual outbound NAT. https://forum.pfsense.org/index.php?topic=115718.0 This person also struggled with passing VLANs through their bridge, so it’s clear you’ll need at least five bridges. Make sure any interface assignments you create are VLAN-based. Assuming em0 is linked to your router and em1 to your switch... VLAN 1 on em0, VLAN 10 on em0, VLAN 20 on em0, VLAN 30 on em0, VLAN 100 on em0, and VLAN 100 on em1, then set up the bridges accordingly.

S
slayer__is
Senior Member
521
08-02-2016, 11:13 AM
#20
Avoid setting up any interface links that aren't VLANs. Do not assign directly to em0 or em1.
S
slayer__is
08-02-2016, 11:13 AM #20

Avoid setting up any interface links that aren't VLANs. Do not assign directly to em0 or em1.

Pages (3): Previous 1 2 3 Next