NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

tachyon_pulse's avatar
Jan 27, 2015

Configuring static route

Device: FVS318N - Prosafe Wireless N VPN Firewall
Firmware Version : 4.3.1-22

I'm having problems getting a static route configured. I am logged into the router from 192.168.2.100 and from the CLI I execute the command:
show net routing static ipv4 setup

and get the following:

Name    Destination     Gateway         Interface       Metric  Active  Private
---- ----------- ------- --------- ------ ------- -------
test1 192.168.1.15 192.168.1.1 LAN 2 1 1



Then I try the following:


FVS318N> util ping 192.168.2.15
PING 192.168.2.15 (192.168.2.15): 56 data bytes
--- 192.168.2.15 ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss

FVS318N> util ping 192.168.2.1
PING 192.168.2.1 (192.168.2.1): 56 data bytes
64 bytes from 192.168.2.1: seq=0 ttl=64 time=1.329 ms
64 bytes from 192.168.2.1: seq=1 ttl=64 time=0.966 ms
64 bytes from 192.168.2.1: seq=2 ttl=64 time=0.955 ms
64 bytes from 192.168.2.1: seq=3 ttl=64 time=0.936 ms
64 bytes from 192.168.2.1: seq=4 ttl=64 time=0.960 ms
--- 192.168.2.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.936/1.029/1.329 ms

FVS318N> util ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1): 56 data bytes
64 bytes from 192.168.1.1: seq=0 ttl=64 time=1.397 ms
64 bytes from 192.168.1.1: seq=1 ttl=64 time=0.997 ms
64 bytes from 192.168.1.1: seq=2 ttl=64 time=0.813 ms
64 bytes from 192.168.1.1: seq=3 ttl=64 time=0.808 ms
64 bytes from 192.168.1.1: seq=4 ttl=64 time=0.813 ms
--- 192.168.1.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.808/0.965/1.397 ms


Why doesn't the static route work?

33 Replies

  • tachyon_pulse wrote:
    SamirD, Thanks for the tip on the used gear, any preference on which is friendlier to configure and use for a networking newbie? I picked up an inexpensive TL-SG108E and by using it's MTU VLAN configuration I was able to achieve the wired client isolation I wanted. I now have 2 final challenges.
    1 On 192.168.3.0/24 subnet that has the gateway and WiFi on the NetGear router, When I do a network scan from my iPhone, the "WLAN Partition" feature hides all the WiFi devices connected to that SSID, it doesn't hide any of the wired devices connected to the SG108E. Is there a way to hide the wired addresses from the WLAN addresses on the same subnet?

    2. I have an Amazon FireStick in my 192.168.3.0/24 WiFi segment, I wanted to take an old iPod and install the Amazon Fire app on it to control the FireStick. This requires that they both be on the same subnet and and can see each other. I'm wondering if their is some way (e.g., static route) that would maintain the WLAN isolation but let the iPod communicate with the FireStick?

    Thanks for all your advice and mentoring. I'm learning a lot.
    I usually look through the manual of anything I plan to buy. This way I can see how the configuration works, how difficult it is, and if there is anything that keeps me from doing what I want. I'd use the same approach with the managed switches, although I think they should be much simpler than the 318N.

    1. I don't think there will be a way to do that. Everything wired is accessible from the wlan, even if the wlan has isolation, so the sg108e will be seen the same way. There may be a way to make the sg108e isolate the traffic, but I'm not familiar with that device enough to say for certain.

    2. If you want the firestick and ipod to communicate with each other, but not anything else, why not use a separate vlan just them? Then you can turn isolation off and can control access to them via the interlan routing.
  • tachyon_pulse wrote:
    Is there a way to hide the wired addresses from the WLAN addresses on the same subnet?
    Separate VLANs - one per port - on an 8 port switch you can have 7 and the 8th port is a member of all VLANs that links to the FVS318N
  • fordem wrote:
    [QUOTE=tachyon_pulse;492414]Is there a way to hide the wired addresses from the WLAN addresses on the same subnet?

    Separate VLANs - one per port - on an 8 port switch you can have 7 and the 8th port is a member of all VLANs that links to the FVS318N
    Thank you fordem. I knew there had to be a way using vlans.

NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology! 

Join Us!

ProSupport for Business

Comprehensive support plans for maximum network uptime and business peace of mind.

 

Learn More