NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
cwebster
Oct 12, 2015Aspirant
How do I constrain multicast traffic to specific ports on GS716Tv3?
I can't find specific instructions to constrain multicast traffic on the GS715Tv3 smart switch. I need to force all multicast traffic to travel over a specific set of interfaces, or at least to s...
- Oct 22, 2015
To switch the the Mangement VLAN to 4.
Make sure you have 2 ports on the switch, one in VLAN1 one in VLAN4.
Set the system you are using to a static IP in the range of the switch and confirm access to the web config then change the "Management VLAN ID" to 4 and Apply. then switch the system you are using to the port or any port in VLAN 4 then you should have access, if not, wait about 60-90sec and try again becuase you may have STP on and it will block anything on the port for a bit unless its set to "Fast Link" Enabled.
Then under "IP Configuration" set the switches IP address to somthing in in IP range of VLAN4.
For Simplisicty sake, Untagged ports should only ever be in 1 VLAN at a time.
And instead of using the point and click, goto "Port PVID Configuration" and just set the VLANs there.
Set PVID and VLAN member the same for a port, based on what VLAN it needs to be in
And to confirm, do you have a cable going from switch to switch for each VLAN? You could cut down on cables and ports if you trunk/tag the ports to the next switch. then all 3 VLAN would only need 1 cable between each pair of switches, saving you atleast 4 ports on each switch.
Just an example from my GS724T (ignore ports g8 and g19-20, thier Current PVID is becuase of somthing else you are not doing, LACP and Span/Monitoring):
All ports are setup for a single VLAN, my "Main LAN" is VLAN12, which the mangement VLAN is set for aswell, ports g23-24 are VLAN Trunks, they are set to tagg VLAN12 and 14 when that traffic goes out of those ports, then the switch on the other side reads the tagg and acts acordingly, this way I dont need 2 cables/ports for each of those.
Napsterbater
Oct 22, 2015Apprentice
Multicast should'nt be leaving the VLAN not matter what, IGMP or not, just like Broadcast, unless you have a) A Multicast router, or b) You have a config issue with your VLANS. IGMP only keeps multicast from going to ports/devices that have not requested the multicast traffic.
How are the VLANS configured on the ports betweeen Switch1 and Switch9, then how are they configured between Switch2 and Switch 9?
Are you Tagging the Packets/are they setup for VLAN Trunking?
or
Are they set as Access Ports/untagged and just assgined to a single VLAN.
Also VLAN Names do not matter they are for your info only, VLAN Numbers will though.
I think you have made one big single Layer 2 "broadcast" domain.
cwebster
Oct 22, 2015Aspirant
Thank you for taking time to respond Napsterbater.
I have discovered the fundamental issue causing this problem and solved it - explanation below. First, I'll address your questions.
[quote]
Multicast should'nt be leaving the VLAN not matter what, IGMP or not, just like Broadcast, unless you have a) A Multicast router, or b) You have a config issue with your VLANS. IGMP only keeps multicast from going to ports/devices that have not requested the multicast traffic.
[/quote]
Exactly my point. I expected that when I configured these VLANs they would be isolated unless I plugged in a router or otherwise configured the switch to forward packets elsewhere.
[quote]
How are the VLANS configured on the ports betweeen Switch1 and Switch9, then how are they configured between Switch2 and Switch 9?
[/quote]
Switches 1 through 8 are each connected via a cable plugged into a port in each's VLAN4 and premise wiring back to Switch 9 for software development.
[quote]
Are you Tagging the Packets/are they setup for VLAN Trunking?
or
Are they set as Access Ports/untagged and just assgined to a single VLAN.
[/quote]
There is no tagging or VLAN trunking. All VLAN ports are simple, untagged access ports.
[quote]
Also VLAN Names do not matter they are for your info only, VLAN Numbers will though.
[/quote]
This was always my understanding of VLAN ports too, but when things were not behaving as I expected I began to wonder if Netgear was performing some kind of voodoo behind this scenes.
[quote]
I think you have made one big single Layer 2 "broadcast" domain.
[/quote]
You are almost exactly correct. The problem was that, even though I configured these ports into separate VLANs, the switch left the ports also members of the default VLAN 1. The Software Administration Manual does not mention that VLAN ports must be manually removed from VLAN 1. Nor does it specify that VLAN ports must be configured with a PVID before they will work as expected.
To resolve my issues:
1. Configured the member ports with a PVID:
Switching->VLAN->Advanced->Port PVID Configuration
Selected ports in VLAN 6 by clicking the check-box
Typed "6" in "Configured PVID" field
Selected "Enable" in the "Configured Ingress Filtering" field
Clicked [Apply] button
Did the same for VLANs 4 and 5
2. Removed ports in my new VLANs from membership in VLAN 1
Switching->VLAN->Advanced->VLAN Membership
VLAN 1 is selected by default
Clicked to change port assignments from "Untagged" (U) to unselected (blank) for ports configured in VLANs 5 and 6.
Clicked [Apply] button
Left VLAN 4 alone (see below)
Unresolved Issues:
[Background]
Each of Switches 1 through 8 are part of a series of aircraft simulators. Switch 9 is on an engineering network. VLAN 5 is used for audio subsystems and VLAN 6 is used for other I/O subsystems (sensors, switches, relays, pumps, etc.) on each simulator. VLAN 4 is the VLAN that connects all these simulators together for research and software development on Switch 9.
1. I have as yet been unable to remove VLAN 4 ports from VLAN 1 without loosing management of the switches. Switch management is done from the engineering network on VLAN 4. I've tried changing the "Management VLAN ID" to 4 then removing them from VLAN 1 but I loose access and have to reset to factory defaults and start over.
2. I still don't see any evidence on the switch that IGMP Snooping is actually working. As I indicated in an earlier post, there is nothing in the IGMP Snooping Table after configuring IGMP Snooping and the IGMP Snooping Querier. There have been multiple sessions where multicast traffic has occurred since I first configured it so I'd expect something to show up here.
I'm fairly certain that it has had an impact on the flow of multicast traffic because, prior to discovering the solution above, configuring IGMP Snooping did seem to resolve half of the cross-talk issues.
I'll be capturing traffic on VLAN 6 (I/O Subsystems) of one of these simulators to analyze the traffic over the next few weeks in an effort to understand how this switch feature actually affects the flow of multicast, broadcast, and unicast packets.
Thanks again for responding.
Best Regards,
Cal Webster
- NapsterbaterOct 22, 2015Apprentice
To switch the the Mangement VLAN to 4.
Make sure you have 2 ports on the switch, one in VLAN1 one in VLAN4.
Set the system you are using to a static IP in the range of the switch and confirm access to the web config then change the "Management VLAN ID" to 4 and Apply. then switch the system you are using to the port or any port in VLAN 4 then you should have access, if not, wait about 60-90sec and try again becuase you may have STP on and it will block anything on the port for a bit unless its set to "Fast Link" Enabled.
Then under "IP Configuration" set the switches IP address to somthing in in IP range of VLAN4.
For Simplisicty sake, Untagged ports should only ever be in 1 VLAN at a time.
And instead of using the point and click, goto "Port PVID Configuration" and just set the VLANs there.
Set PVID and VLAN member the same for a port, based on what VLAN it needs to be in
And to confirm, do you have a cable going from switch to switch for each VLAN? You could cut down on cables and ports if you trunk/tag the ports to the next switch. then all 3 VLAN would only need 1 cable between each pair of switches, saving you atleast 4 ports on each switch.
Just an example from my GS724T (ignore ports g8 and g19-20, thier Current PVID is becuase of somthing else you are not doing, LACP and Span/Monitoring):
All ports are setup for a single VLAN, my "Main LAN" is VLAN12, which the mangement VLAN is set for aswell, ports g23-24 are VLAN Trunks, they are set to tagg VLAN12 and 14 when that traffic goes out of those ports, then the switch on the other side reads the tagg and acts acordingly, this way I dont need 2 cables/ports for each of those.
- cwebsterOct 23, 2015Aspirant
Thank you again Napsterbater!
There were several "spare" ports already in VLAN 1 so on the "Port PVID Configuration" page I changed "Configured PVID" and "VLAN Member" to 4 (and only 4) and set "Configured Ingress Filtering" to Enable on one of them then clicked [Apply]. I was plugged into a VLAN 1 port at the time. Then I Went to System->IP Configuration, changed "Management VLAN ID" to 4, and clicked [Apply]. Of course I lost the connection until I plugged into the VLAN 4 only port. Then I went back to "Switching->VLAN->Advanced->Port PVID Configuration" and changed the original VLAN 4 ports, which were also VLAN 1 members, setting "Configured PVID" and "VLAN Member" to 4 (and only 4) and set "Configured Ingress Filtering" to Enable. Now everything works as expected.
Before I was hopping between the VLAN Membership and Port PVID Configuration pages to try to accomplish the same thing. I didn't realize I could do everything on the Port PVID Configuration page.
[quote]
And to confirm, do you have a cable going from switch to switch for each VLAN? You could cut down on cables and ports if you trunk/tag the ports to the next switch. then all 3 VLAN would only need 1 cable between each pair of switches, saving you atleast 4 ports on each switch.
[/quote]
The only VLAN that is connected between simulators is VLAN 4. This VLAN is used for access to the host computers for distributing software updates and engineering. VLAN 5 and 6 are completely isolated within each simulator. The Audio and IO from one simulator should never communicate with the Audio or IO of the other. You might imagine the kind of confusion and chaos this could (did) cause.
[Sim 1 Host]----[sw1-vlan4]----| |
[Sim 1 Audio]---[sw1-vlan5] | s |
[Sim 1 IO]------[sw1-vlan6] | w |
[Sim 1 Host]----[sw1-vlan6] | i | ... | t |---[Devel Svr]
[Sim 8 Host]----[Sw8-vlan4]----| c |
[Sim 8 Audio]---[sw8-vlan5] | h |
[Sim 8 IO]------[sw8-vlan6] | |
[Sim 8 Host]----[sw8-vlan6] | 9 |Interesting way you're hauling traffic between switches. There is a similar setup here with non-Netgear switches. Traffic for the main VLANs are tagged and forwarded over a pair of GBIC ports over fiber to another wing of the building.
Thank you again for the help.
Cal Webster
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!