Configure VLAN segmentation, trunking, access port assignments, and enterprise-grade hardening to support a multi-VLAN OPNsense environment.
Tools Used
Cisco Catalyst-style Layer 2 switch
Console or SSH access
OPNsense Firewall (trunk uplink)
Terminal emulator (PuTTY, SecureCRT, etc.)
Steps Taken
Created VLANs for all network segments (Management, Servers, Workstations, VirtualLab, IoT, Guest, AP Infrastructure, Blackhole, and reserved DMZ/VPN/Quarantine).
Configured 802.1Q trunk uplink to OPNsense with VLAN 99 as the native VLAN.
Assigned access ports to their respective VLANs (Gi1/0/1–26).
Configured the management SVI on VLAN 10 with a static IP.
Enabled PortFast and BPDU Guard on all access ports.
Enabled storm control for broadcast, multicast, and unicast protection.
Enabled LLDP for device visibility.
Shut down unused ports (Gi1/0/27–47) and labeled them accordingly.
Restricted SSH access to VLAN 10 only using an ACL.
Disabled HTTP and enabled HTTPS for secure management.
Saved configuration to startup-config.
Screenshot: VLAN Table
Click to view full-size: VLAN table showing segmentation and port assignments.
Screenshot: Trunk Status
Click to view full-size: Trunk configuration on Gi1/0/48.
Screenshot: Interface Status
Click to view full-size: Active ports, shutdown ports, and descriptions.
Screenshot: Management SVI
Click to view full-size: VLAN 10 SVI with management IP.
Screenshot: SSH Access Restriction
Click to view full-size: MGMT_ONLY ACL applied to VTY lines.
Screenshot: Hardening Configuration
Click to view full-size: Hardening applied to access ports.
Network Diagram
Click to view full-size: Logical diagram of VLANs, switch, and OPNsense firewall.
Outcome
The switch is fully segmented and hardened, supporting a multi-VLAN architecture with secure management access, protected access ports, and a validated trunk to OPNsense. This establishes a strong foundation for subsequent labs involving DHCP, firewall rules, and inter-VLAN communication.