Recommended Posts

So after putting up with crappy WiFi around the house and after months of debating, I finally caved and decided to do something about it. 

 

IMG_20180828_162807.thumb.jpg.48d4a00df30bc48cca75a3c7db9f96d5.jpg

I went away and bought a couple of Ubiquiti APs plus an old desktop for pfSense.

 

Now I did a bit of reading up on best ways to set up, common pit falls and watched a few video tutorials. I arrogantly thought this would be a piece of cake, and of course I was wrong ;)

 

Credit to Ubiquiti, the APs were a doddle to set up, even with my lack of networking knowledge. The pfSense box on the other hand not so easy. After struggling to install it, configure the NIC and get any kind of basic connection, I gave up after 3 hours of tearing my hair out. 

 

There was clearly more to to the set up than I'd anticipated. If anyone has any pointers or things to read up on before I make another attempt at the weekend, please feel free to post. Keep an eye out for an update later this week ;)

 

Here's what I'm working with. 

  • UniFi AC Lite AP (x2)
  • HP Compaq 8200 Elite SFF (this is being used for the pfSense box)

    • Intel Core i5 2400 3.1GHz

    • 2GB RAM (DDR3)

    • Intel Pro 1000 PT

  • TP-LINK TL-SG108E

 

Here's what I'm trying to achieve

1504056070_UntitledDiagram.thumb.png.1867b7e972560bfb8d8b6a87bed77388.png

 

and the issues :P

 

  • When I had pfSense working, WAN was reporting 1000BaseTx, LAN however was only reporting 100BaseTx. I have 200Mpbs internet so really need Gigabit. 
  • After setting up and attaching the switch to the pfSense box, I was not able to access the switch. It was throwing an error with the message "Host IP address and switch IP address must be on the same subnet" I hadn't changed any of the subnet settings, so not sure why this was happening :(
Link to comment
https://www.neowin.net/forum/topic/1371566-my-networking-adventure/
Share on other sites

  On 30/08/2018 at 15:32, Jason S. said:

i've seen the name "pfSense" before, but i dont know what it is.... software firewall?

Expand  

Yeah it's an open source software firewall. It can be run on pretty much any hardware for the basics, but it's pretty powerful. 

are there any VLANs in your config? did you bridge your modem to the box, or did you leave it DHCP?

 

This seems to be a pretty good guide to setting pfsense as a router https://www.tecmint.com/installation-and-configuration-of-pfsense-firewall-router/

Edited by Circaflex

The ip of the switch must be on the same subnet as the host/gateway

 

In simpler terms if you have a 192.168.1.x network with a network subnet mask of 255.255.255.0, all of your devices must have a unique number starting with 192.168.1 and ending with a unique final number on the network.  This is its address.  

 

Think of 192.168.1 as your street and the final number as your street address...It is hard for two houses to sit on top of each other so you can't have two of the same final numbers...the network won't like it.  And if you have anything other than 192.168.1, it would exist on a different street and have no way of knowing how to get there (this is where routing comes into play and instructing traffic on how to get to where it wants to get to...without that instruction it will create errors or simply not work.    Traffic can easily find where it needs to go if it is on the same subnet (street), when traffic needs to go to different subnets (streets) it needs a router/route tables to assist with knowing where to go.

  • Thanks 1

Your going to have to give some details of what your doing exactly... Because you install pfsense and then follow the bouncing ball.. I would think my 8 year old grand daughter could follow a bouncing ball..

 

  On 30/08/2018 at 15:26, dipsylalapo said:
    • Intel Pro 1000 PT 

  • TP-LINK TL-SG108E 

Expand  

So you have 1 nic?  And your trying to do vlans with a switch that doesn't really support them - What version and firmware are you running on this tp-link 108e?  If its v3 and latest firmware you might be in luck.  But if its v2 or before good luck they don't let you remove vlan 1 from every port.

 

Happy to walk you through your install, But your going to have to give us more to work with other than you tried for X hours.. What are you plugging the wan into?  Are you able to access the gui once you install pfsense? etc. etc..  If you really have only 1 nic in that box I would suggest getting another one, and get a switch that actually handles vlans correctly.  The dlink DGS-1100-08 does.. Same price point tp-link.

 

I have run pfsense since version 1 of it.. So pretty sure we can get you up and running if you don't have hardware problems - like ###### POS that can not do vlans and you only have 1 nic ;)

  On 30/08/2018 at 18:33, BudMan said:

So you have 1 nic?

Expand  

Would it matter if that NIC is a dual port? Or would it still be recommended to have two separate NICs? I know most of the cookie cutter guides suggest two separate NICs and I'll be honest, I did not search all that much for that model and if it works that well with pfsense.

if you have dual port your good..

 

But I read

>Intel Pro 1000 PT

 

As 1 port nic.. Which sure you can do if your switch supports vlans - but his drawing doesn't even show that.. So really at a loss to what he is doing without some more details.

 

edit: So just noticed this

>WAN was reporting 1000BaseTx, LAN however was only r eporting 100Base T x

 

So that kind of says he has 2 nics?  Or dual port?  if its not coming up gig then you have problem with cable or switch/nic - and yeah what IP range your using very helpful.. And what you setup on the switch for a gui as well..

  On 30/08/2018 at 18:39, BudMan said:

if you have dual port your good..

Expand  

Got it, we'll have to see what OP has. There is both a Intel Pro 1000 PT single and dual port model available. Unless he is pairing that with the onboard NIC, guess we'll need clarification. 

If that switch is v2 or v1 - shoot even v3 I would return it... The latest firmware is suppose to fix it.. But not so sure.. I don't think they understand how to do vlans to be honest on their low end consumer stuff.. Its really broken that you can not remove a port from vlan1.. It makes not possible to isolate your vlans, and pretty much just junk - really not any different than just a dumb switch.. There are plenty of other options that are at the same price point.

 

Because if he wanting to do vlans with his AP he is going to want switch that can actually do vlans.

 

V3 has this

Published Date: 2018-01-05     Language: English     File Size: 421.27 KB

Modifications and Bug Fixes:

New Features/Enhancement:
1.The port can be removed from VLAN1
2.The port of VLAN1 can choose tagged/untagged

Notes:

1. For TL-SG108E_V3
2. Your device's configuration will not be lost after upgrading, which means you don't need to configure your device again after upgrading.

 

Seems they have V4 out now - you would hope it has fix.. But they do not update the v2 or v1...

 

  On 30/08/2018 at 16:21, Circaflex said:

are there any VLANs in your config? did you bridge your modem to the box, or did you leave it DHCP?

 

This seems to be a pretty good guide to setting pfsense as a router https://www.tecmint.com/installation-and-configuration-of-pfsense-firewall-router/

Expand  

No VLANs at the moment. Modem was set to bridge only. That's one of the guides that I was using. 

  On 30/08/2018 at 16:37, sc302 said:

The ip of the switch must be on the same subnet as the host/gateway

 

In simpler terms if you have a 192.168.1.x network with a network subnet mask of 255.255.255.0, all of your devices must have a unique number starting with 192.168.1 and ending with a unique final number on the network.  This is its address.  

 

Think of 192.168.1 as your street and the final number as your street address...It is hard for two houses to sit on top of each other so you can't have two of the same final numbers...the network won't like it.  And if you have anything other than 192.168.1, it would exist on a different street and have no way of knowing how to get there (this is where routing comes into play and instructing traffic on how to get to where it wants to get to...without that instruction it will create errors or simply not work.    Traffic can easily find where it needs to go if it is on the same subnet (street), when traffic needs to go to different subnets (streets) it needs a router/route tables to assist with knowing where to go.

Expand  

Great explanation, thanks. If I remember correctly, pfSense was set to 192.168.1.x and the switch (as it was something that I'd already had) was set to 192.168.0.x. I'll have a look at correcting that :) 

  On 30/08/2018 at 18:39, BudMan said:

if you have dual port your good..

 

But I read

>Intel Pro 1000 PT

 

As 1 port nic.. Which sure you can do if your switch supports vlans - but his drawing doesn't even show that.. So really at a loss to what he is doing without some more details.

 

edit: So just noticed this

>WAN was reporting 1000BaseTx, LAN however was only r eporting 100Base T x

 

So that kind of says he has 2 nics?  Or dual port?  if its not coming up gig then you have problem with cable or switch/nic - and yeah what IP range your using very helpful.. And what you setup on the switch for a gui as well..

Expand  

There are three NICs in total, one onboard, plus two on the card. Another issue I had was trying to set up the WAN and LAN on the dual NIC card, but for some reason, during the pfSense setup, I wasn't able to use only the NIC

  On 30/08/2018 at 18:48, BudMan said:

If that switch is v2 or v1 - shoot even v3 I would return it... The latest firmware is suppose to fix it.. But not so sure.. I don't think they understand how to do vlans to be honest on their low end consumer stuff.. Its really broken that you can not remove a port from vlan1.. It makes not possible to isolate your vlans, and pretty much just junk - really not any different than just a dumb switch.. There are plenty of other options that are at the same price point.

 

Because if he wanting to do vlans with his AP he is going to want switch that can actually do vlans.

 

V3 has this

Published Date: 2018-01-05     Language: English     File Size: 421.27 KB

Modifications and Bug Fixes:

New Features/Enhancement:
1.The port can be removed from VLAN1
2.The port of VLAN1 can choose tagged/untagged

Notes:

1. For TL-SG108E_V3
2. Your device's configuration will not be lost after upgrading, which means you don't need to configure your device again after upgrading.

 

Seems they have V4 out now - you would hope it has fix.. But they do not update the v2 or v1...

 

Expand  

I'd bought the switch a while back so am stuck with it for now. I'll check the FW version and see if it's something that can be fixed. 

 

Is it better to create the VLANs using pfSense, the switch or even the APs? Eventually I'd like to have all my smart devices on their own VLANs. 

If you want to use vlan then you need switch and AP that support them.  The unifi sure do, so you need a switch that supports them as well.  The only question is if that switch you have actually does, if you can not remove vlan 1 from specific ports then it doesn't  Its really no better than some dumb switch if all ports are forced to be in vlan 1 even when you add other vlans too them.

 

The hardest part of about setting up dual nic is actually knowing which nic is which ;)  Its best to figure out the mac of the specific nic, then when you setup the interfaces you can tell by the mac listed which interface you want as what, ie wan or lan.. Its very common to flip them and then have issues.

  On 31/08/2018 at 12:22, BudMan said:

If you want to use vlan then you need switch and AP that support them.  The unifi sure do, so you need a switch that supports them as well.  The only question is if that switch you have actually does, if you can not remove vlan 1 from specific ports then it doesn't  Its really no better than some dumb switch if all ports are forced to be in vlan 1 even when you add other vlans too them.

 

The hardest part of about setting up dual nic is actually knowing which nic is which ;)  Its best to figure out the mac of the specific nic, then when you setup the interfaces you can tell by the mac listed which interface you want as what, ie wan or lan.. Its very common to flip them and then have issues.

Expand  

I'll take a look at the switch when I get back tonight. 

 

To be fair, I think with pfSense, if you have a display hooked you can figure them out with a bit of trial and error. 

 

More stupid questions..

 

Am I correct in understanding that you can segregate networks either via a VLAN or subnets? Is there a preference or best practice or does it depend on what I want to do?

 

I feel like there are some fundamental questions that I need to answer about exactly what I'm after before I try again.  

VLANs are almost like having physically separate networks for each vlan - each device can only see traffic on the vlan that they're on.

 

Subnets are slightly different. You can't communicate with other devices on a different subnet without going through a router, but if you were to have a network configured as 192.168.0.x for example, and connect a PC to it with it's IP set to 192.168.1.5, you'd still be able to see any broadcast traffic on 192.168.0.x if you used a sniffing tool in promiscuous mode (e.g. Wireshark).

 

VLANs give you actual isolation, if the port you're connected to doesn't output traffic for a specific vlan, there's no way you're seeing any of the traffic on that vlan.

  On 31/08/2018 at 19:00, DaveLegg said:

if the port you're connected to doesn't output traffic for a specific vlan, there's no way you're seeing any of the traffic on that vlan.

Expand  

Unless your using that POS switch from tplink that doesn't actually isolate the vlans - and every port is part of vlan 1 without any way to remove it ;)

 

Dave gave pretty good run down.. This can be confusing to someone new to networking for sure.  A vlan and network are really the same thing.. They are used interchangeable.. When you say your going to vlan your network... You could be doing it with a switch that supports vlans and doing all on say 1 switch, or sure you could use multiple dumb switches and use a different switch for each vlan/networrk.. 

 

Where it can get even more confusing for new to networking is a vlan can be tagged or untagged/native..   If all your doing is connecting your dumb switch to an interface in pfsense it would all be untagged traffic..  If your going to put more than 1 network on the same physical interface then your going to have to tag the vlans so that the router/nic can know which traffic belongs to which vlan/network.. You can still have a vlan that is untagged/native - but all other vlans on that interface have to be "tagged" or will not be able to isolate them.

 

Same goes for a switch.. You put your ports into whatever vlan you want.. Connect to a device they will be untagged.  Connected to another switch or router and this port going to have more than 1 vlan on it - then they have to be tagged.  Picture always worth 10,000 words.. You create multiple networks/subnets all physical like this..

 

So you could do it with physical isolation of your network/subnets... Lets say 192.168.0/24 and 192.168.1/24

 

phsisolation.thumb.png.35ad51622358122ff5ccba45d04860f4.png

 

You route between these networks but all devices that are on the same network are isolated with just dumb switches, not vlan capable.. You have 3 physical interfaces, 1 for your wan/internet and 1 each for your 2 networks..

 

Then you can do with with vlan capable switches and AP... And now you can put any device on any network/vlan you want via configuration of the port on the switch or what SSID you connect to on your wireless.. All of these vlans will be different networks at layer 3, ie 192.168.0, .1, .2 /24 etc..

vlanisolation.thumb.png.2b9d87bd29853d2acb1e6c7c13834538.png

 

Now all these vlans if tagged can connect to just 1 physical interface on the Router.. And router knows what traffic is on which network via the tag... Or you could use physical interfaces for your different vlans to the router without tagging them..

 

tagandnative.thumb.png.0ec2bc3f3310f26a3f9b4a35da2222ec.png

 

Does that help?  So you See here there are some vlan/networks that are all on the 1 physical interface and tagged so router/firewall can tell them apart.  While vlan 80 comes in on its own physical interface an not tagged (it could be - but that is for later time).. So you can create networks with physical isolation where all devices connected to the same "wire" lets call it.. At layer 2.. Or you can vlan it (virtual network) and isolate the wire of each network virtually with "tags" on the traffic so the routers and switches can keep the different networks isolated.

 

In the above examples with vlans 50,60 etc.. Those would all be different networks... Lets say 192.168.50/24 and 192.168.60/24 etc..  The vlan ID, the number you assign to the vlan when you configure it in your switch/router is nothing more than an ID.. just some number (within specific range of numbers) Most the time you try and match those up.. So for example my network/vlan that is 192.168.9/24 uses vlan ID 9..

 

So you see here, while I have only 3 vlans defined on my router (pfsense) there are other networks connected to different physical interfaces.

 

vlan-interfaces.thumb.png.6c68f9bfd290822f1f9e3680c7f2fdc1.png

 

So for example my Lan network, which is 192.168.9/24 is setup on my switch as vlan 9, so some ports on the switch are on vlan 9.. Some are on other vlans..

 

switchvlans.thumb.png.a3a43f065d28c98b02b54bea393c84c1.png

 

I hope that is not too much information at once... Any questions just ask!!!

 

 

 

No that helps a lot! These posts have been way more useful than the stuff that I've been reading. I'll have to read it all through a few more times just to make sure that I do understand it all. 

 

I had a look at my switch at the weekend and it's a v1 so I'll have to replace that to implement VLANs. 

Any questions just ask, been doing this stuff a long time and running pfsense since its version 1.01

 

The switch is still usable as a dumb switch.. But yeah it can't actually do vlans..  Its no different then trying to run vlans over a dumb switch..  Which is just borked, but if all your devices understand tags you could do it.. Just not secure at all.. Just have to setup every device to understand what vlan your wanting it to be on via tag..  That is if the device nic driver/os supports it, etc.

 

 

This topic is now closed to further replies.
  • Posts

    • Word can now read you document overviews like podcasts by Taras Buria If you have a big document and no time to check it, the latest Word feature will help you get it done. Microsoft announced that Microsoft 365 Copilot in Word can now read aloud document overviews, letting you listen to them on the go like podcasts or audiobooks. In addition to reading aloud document overviews, Word lets you customize the experience with reading speed controls, the ability to jump back or forward to key parts of audio, pause, and even save the recording to OneDrive to listen to it later or share with someone else. Voice document overviews are now available in Word on Windows (version 2506, build 18925.20138) and Word for the web. If you have a Microsoft 365 Copilot license, you can try it out by opening a document, clicking the Copilot button in the Home tab, and asking the AI to generate an audio overview. Once the overview is generated, Copilot will present you with a media player and playback controls, such as speed, jump forward/backward, and pause. To save the recording, click the three-dot button and select "Save to OneDrive." Finally, you can access previously-generated overviews in your Microsoft 365 Copilot chat history. For now, audio overviews work only in English (Microsoft promises to add more languages soon), and they require a Microsoft 365 Copilot license. There are also two other limitations: Audio overview only works for online files that are in OneDrive and SharePoint, and not local files that are on your system or external drives. Files require a minimum of 100 words to generate an audio overview. In case you missed it, Microsoft recently announced that the new GPT-5 by OpenAI is now available in Microsoft 365 Copilot, giving you a more powerful and modern AI assistant to help you work with documents. GPT-5 is also available in the Microsoft Copilot app on computers and mobile devices.
    • You don’t pay for Microsoft Lens so it must not be that valuable to you. Just saying. Microsoft is a business, it makes money from creating services and products customers are willing to pay for, in exchange for those products (Office, Microsoft, CoPilot) and Services (Office 365, Microsoft 365, OneDrive, GitHub, CoPilot).
    • I think it's aesthetically unappealing, and it's obvious to anyone, not just macOS users. It's right there in the middle of the top menu bar. The engineer responsible for that ugly notch would have been fired by Steve Jobs.
    • "they used a 56-qubit quantum computer to generate random numbers Certified randomness means the numbers are not just unpredictable, but also freshly created and mathematically verified." I don't understand why some would think this is a big deal. Many 6 year olds do this on math tests.😁
    • Mail Backup X (lifetime plan) is now 72% off by Steven Parker Today's highlighted deal comes via our Apps + Software section of the Neowin Deals store, where you can save 72% off a lifetime subscription to Mail Backup X Individual. For most individuals and organizations, emails are the most critical part of daily activities and communications. Some of us realize the importance of backing up emails only when critical emails are lost for some reason. Plan ahead and safeguard your mail data today with a robust and reliable mail backup solution. Mail Backup X is a one-stop solution for mail backup, archiving, email management & mail conversion trusted by 42,000+ business and home users worldwide. Backup from major mail clients. Apple Mail, Microsoft Outlook, Office 365, Microsoft Exchange, Thunderbird, Postbox Backup from mail services. Gmail, Outlook.com, Yahoo, Gmx.de, Office365, Microsoft Exchange, or any service supporting IMAP protocol Archive file viewer. Quickly search & view your emails from archives Highly compressed archives. Save up to 3x storage space Import almost any mail archive. Files like .pst, .ost, .mbox, .olk, .eml, .rge, and more Mirror backup. Cloud storage (Google Drive, One Drive, Dropbox, Pcloud or FTP) or USB drive Restore. Restore direct to the server account or a separate server account Migration. Move all mails onto a new account in Office365 100% privacy. Encrypt & secure your data with military-grade aes 256-bit encryption and your own private key, so it's only visible to you Top-notch premium support. Get help that you need from experts Good to know Plan: Individual Edition Length of access: lifetime Redemption deadline: redeem your code within 30 days of purchase Access options: desktop Max number of devices: 2 Only available to new users Version: 2 Updates included A lifetime subscription to Mail Backup X normally costs $179, but you can pick this up for just $49.99 for a limited time - that represents a saving of $129 (72% off). For a full description, spec, and terms, click the link below. Get Mail Backup X (lifetime plan) for just $49.99 (was $179), or learn more Although priced in U.S. dollars, this deal is available for digital purchase worldwide. We post these because we earn commission on each sale so as not to rely solely on advertising, which many of our readers block. It all helps toward paying staff reporters, servers and hosting costs. Other ways to support Neowin Whitelist Neowin by not blocking our ads Create a free member account to see fewer ads Make a donation to support our day to day running costs Subscribe to Neowin - for $14 a year, or $28 a year for an ad-free experience Disclosure: Neowin benefits from revenue of each sale made through our branded deals site powered by StackCommerce.
  • Recent Achievements

    • One Month Later
      Jaclidio hoy earned a badge
      One Month Later
    • Week One Done
      Yawdee earned a badge
      Week One Done
    • Week One Done
      eugwalker earned a badge
      Week One Done
    • First Post
      Ben Gross earned a badge
      First Post
    • One Month Later
      chiptuning earned a badge
      One Month Later
  • Popular Contributors

    1. 1
      +primortal
      635
    2. 2
      +FloatingFatMan
      176
    3. 3
      ATLien_0
      144
    4. 4
      Xenon
      120
    5. 5
      wakjak
      108
  • Tell a friend

    Love Neowin? Tell a friend!