Hi,
I'd like to have a little explanation about vlans...
What I know:
- You need a switch that supports vlans
- NIC that support vlans
First scenario:
I have one switch to manage 2 zones, I use vlans. I configured the 2
ports that are internet facing in a vlan. Let's say it is port 1 and 2.
Port 1 is from my ISP, port 2 is my PfSense WAN interface (public
IPs). I can configure the rest of the ports (3->24) in another vlan and
connect the computers I want to have to have protected by pfsense and
the pfsense LAN interface there (private IPs). This way, nothing on the
WAN can connect to anything in the LAN directly (would have to be
allowed by firewall rules). Am I right?
To make it a little more complex, let's say I would like to have some
hosts not protected by pfsense. Here is what I think:
Configure these ports in one vlan: Internet Port, PfSense WAN port,
number of ports for number of unprotected hosts. Configure the others
for internal hosts with Pfsense LAN interface in the same vlan.
For these 2 scenarios, I guess no special configuration is needed. It
is just like if the internet ports were in one switch and lan ports in
another.
If this is all right? Then when does vlan numbers important? When you
want to have 1 interface in multiple vlans?
Thanks,
Ugo
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]