Hi,
I've been stumped for a while trying to set up inter-VLAN routing for my network to segment the different types of network, in order to boost its efficiency as per your article on Jumbo frames and flow control.
VLAN Setup
- DMZ: VLAN 10, already setup, switching my 2 WAN modems with the 2 firewalls.
- Internet: VLAN 20, 2x ALIX 2D3 with pfSense 1.2.3 (100mbit)
- Gbit: VLAN 30, contains 4x LACP trunks to devices (QNAP TS-439, a Win 2008 Server and 2 client PC's, all using Intel Dual Port PT adapters), and a Mac mini with 1x Gbit port
- 100mbit: VLAN 40, 1x printer, powerline to 1 other PC, Xbox 360
- Wifi: VLAN 50, various devices such as iPhones and 2 laptops, mixed 802.11g & n connectivity
Networking gear
Switch: Linksys SGE2000 24 port Gbit switch
Server: has 3x NICs: Intel Dual Port PT, Intel Single port MT, Broadcom Gbit onboard, only the Dual Port is being used currently, but ofc the other 2 can be master ports for the Wifi and 100mbit subnets)
Firewalls: 2x pfSense ALIX 2D3 with 1x spare 100mbit NIC on each, also provide VPN capabilities)
Other info
Ideally, I'd like all traffic routed between the VLAN's rather than just bridged, so Gbit traffic is always Jumbo framed and flow controlled, while noise from the higher bandwidth stuff doesn't interfere with the wifi etc, and reduce congestion in the various segments.
I'm using the 10.0.0.0/24 subnet on my network currently. While it's easier to just give each VLAN a 10.0.[VLANID].0/24 subnet, I only actually need to use 16 devices in any segment right now, so I can use smaller (/27, 30 hosts or /28, 16 hosts) subnets for each segment.
My server is a development server, so it gets rebooted often, so I would prefer to use the Firewalls for DHCP and the switch for routing, but I'm happy to use the Server if I have to and use the other 2 NICs in it to route between the subnets.
Now the question
I can setup the VLANs and generally all the Layer 2 stuff for each segment, but need help with the Layer 3 stuff:
- Is this a good plan or should I leave it as is?
- What IP addresses should I give each segment?
- What IP addresses should I give key equipment (Firewall, NAS, Server & Switch)
- How do I set up the switch to route traffic, or if using the server, how should I set that up (RRAS or static routes)?
- How do I ensure services on the VLAN 20 (Internet) are accessible from all VLANs bar VLAN 10 (DMZ)
- How do I ensure services on VLAN 30 (Gbit) are available to VLAN 20 (The firewalls are VPN servers as well), 40 & 50
- Where should I put the DHCP server (VLAN 20, with the firewalls or with the Server having a NIC on each segment)
I've been stumped for a while trying to set up inter-VLAN routing for my network to segment the different types of network, in order to boost its efficiency as per your article on Jumbo frames and flow control.
VLAN Setup
- DMZ: VLAN 10, already setup, switching my 2 WAN modems with the 2 firewalls.
- Internet: VLAN 20, 2x ALIX 2D3 with pfSense 1.2.3 (100mbit)
- Gbit: VLAN 30, contains 4x LACP trunks to devices (QNAP TS-439, a Win 2008 Server and 2 client PC's, all using Intel Dual Port PT adapters), and a Mac mini with 1x Gbit port
- 100mbit: VLAN 40, 1x printer, powerline to 1 other PC, Xbox 360
- Wifi: VLAN 50, various devices such as iPhones and 2 laptops, mixed 802.11g & n connectivity
Networking gear
Switch: Linksys SGE2000 24 port Gbit switch
Server: has 3x NICs: Intel Dual Port PT, Intel Single port MT, Broadcom Gbit onboard, only the Dual Port is being used currently, but ofc the other 2 can be master ports for the Wifi and 100mbit subnets)
Firewalls: 2x pfSense ALIX 2D3 with 1x spare 100mbit NIC on each, also provide VPN capabilities)
Other info
Ideally, I'd like all traffic routed between the VLAN's rather than just bridged, so Gbit traffic is always Jumbo framed and flow controlled, while noise from the higher bandwidth stuff doesn't interfere with the wifi etc, and reduce congestion in the various segments.
I'm using the 10.0.0.0/24 subnet on my network currently. While it's easier to just give each VLAN a 10.0.[VLANID].0/24 subnet, I only actually need to use 16 devices in any segment right now, so I can use smaller (/27, 30 hosts or /28, 16 hosts) subnets for each segment.
My server is a development server, so it gets rebooted often, so I would prefer to use the Firewalls for DHCP and the switch for routing, but I'm happy to use the Server if I have to and use the other 2 NICs in it to route between the subnets.
Now the question
I can setup the VLANs and generally all the Layer 2 stuff for each segment, but need help with the Layer 3 stuff:
- Is this a good plan or should I leave it as is?
- What IP addresses should I give each segment?
- What IP addresses should I give key equipment (Firewall, NAS, Server & Switch)
- How do I set up the switch to route traffic, or if using the server, how should I set that up (RRAS or static routes)?
- How do I ensure services on the VLAN 20 (Internet) are accessible from all VLANs bar VLAN 10 (DMZ)
- How do I ensure services on VLAN 30 (Gbit) are available to VLAN 20 (The firewalls are VPN servers as well), 40 & 50
- Where should I put the DHCP server (VLAN 20, with the firewalls or with the Server having a NIC on each segment)