Hi,

        I'd like to have a little explanation about vlans...

What I know:

- You need a switch that supports vlans
- NIC that support vlans

First scenario:

I have one switch to manage 2 zones, I use vlans. I configured the 2 ports that are internet facing in a vlan. Let's say it is port 1 and 2. Port 1 is from my ISP, port 2 is my PfSense WAN interface (public IPs). I can configure the rest of the ports (3->24) in another vlan and connect the computers I want to have to have protected by pfsense and the pfsense LAN interface there (private IPs). This way, nothing on the WAN can connect to anything in the LAN directly (would have to be allowed by firewall rules). Am I right?

To make it a little more complex, let's say I would like to have some hosts not protected by pfsense. Here is what I think:

Configure these ports in one vlan: Internet Port, PfSense WAN port, number of ports for number of unprotected hosts. Configure the others for internal hosts with Pfsense LAN interface in the same vlan.

For these 2 scenarios, I guess no special configuration is needed. It is just like if the internet ports were in one switch and lan ports in another.

If this is all right? Then when does vlan numbers important? When you want to have 1 interface in multiple vlans?

Thanks,

Ugo


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to