Hi,

        Here is my situation:

I have a PfSense firewall and a switch that supports VLANs. I created 3 VLANS on this switch:


VLAN 101 contains ports that are connected directly to the internet (PfSense WAN port, internet port (it is in colocation), other servers that would be connected directly to the internet (not behind PfSense).

VLAN 102 contains ports that are connected to devices in the Subnet1, let's say 10.10.10.0/24.

VLAN 103 contains ports that are connected to devices in the Subnet2, let's say 192.168.10.0/24.

I left the default VLAN 1 that includes all ports.

I've given 10.10.10.1 as IP address to the PfSense' LAN interface, and added a proxy arp virtual IP of 192.168.10.1.

I configured the WAN interface of the PfSense to be part of VLAN 101.

I configured the LAN interface of the PfSense to be part of VLAN 102 and 103.

My goal is that even if I have only 2 interfaces on the PfSense system, I'd like to have 2 separate subnets on the LAN interface. This way, servers in the Subnet1 cannot talk directly to the servers in Subnet2, without going through firewall rules.

Right now, everything is fine for subnet1. It can connect to the internet, to the firewall. I configured 1-to-1 NAT and allowed SSH in for some hosts and it can connect.

However, subnet2 is completely isolated. It cannot talk to anyone, nor to the fw, nor the subnet1, nor the internet.

I know I should have used another firewall or a firewall with 3 interfaces, but I thought what I'm trying to do is possible. Is it?

If it is, where is my mistake(s)?
Please let me know if you need more information.

Regards,

Ugo


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to