I am brand new to this forum and I read some of the previous posts but I have been trying to understand the following concept for a while and didn’t find much on the internet.
Here is my scenario:
I have a PfSense firewall with 4 NICS and an Unifi 24 port switch that distributes ethernet to all my devices in two different VLANs.
On the PfSense box, I use NIC0 for WAN and NIC1 for LAN, VLAN1 and VLAN2.
strong textHere is my question:
Is it a good practice and is there any benefit in separating the 2 VLANs among the other 2 NICs I have in the firewall?
I guess one benefit is that I won’t have the share the NIC bandwidth, but I will be connecting multiple ports from the firewall into the same switch. What are the best practices in this situation? Using all the NICS available or send all the VLANs through the same NIC?
All VLAN should be created with the same nic1 also known as your LAN. If you create with nic0, the WAN, i don’t think it’ll work. i created like 5 vlans with LAN one for your IoT devices, one for guest, etc.
IMO I think you ought to use a WAN, LAN, LAGG for the vlans on the 2 other nics, I have this setup, I don’t really use the LAN, if I need to access pfsense on the router in an emergency then I can do so, otherwise everything resides on vlans.
It sounds like a private environment (sorry if I’m wrong), there you can run the two vLANs over one port (shared).
If you have the requirement for a dedicated route (not shared), then it would be necessary that the VLANs are not routed over the same cable.
Separating this can be a bit tricky, so I have 8 VLANs all routed over one copper link to the firewall.
Some of our customers have the “urge” to have a dedicated connection to the Permitter firewall, but the majority are perfectly happy with shared LAN connections.