NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
tachyon_pulse
Jan 27, 2015Aspirant
Configuring static route
Device: FVS318N - Prosafe Wireless N VPN Firewall
Firmware Version : 4.3.1-22
I'm having problems getting a static route configured. I am logged into the router from 192.168.2.100 and from the CLI I execute the command:
show net routing static ipv4 setup
and get the following:
Then I try the following:
FVS318N> util ping 192.168.2.15
PING 192.168.2.15 (192.168.2.15): 56 data bytes
--- 192.168.2.15 ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss
FVS318N> util ping 192.168.2.1
PING 192.168.2.1 (192.168.2.1): 56 data bytes
64 bytes from 192.168.2.1: seq=0 ttl=64 time=1.329 ms
64 bytes from 192.168.2.1: seq=1 ttl=64 time=0.966 ms
64 bytes from 192.168.2.1: seq=2 ttl=64 time=0.955 ms
64 bytes from 192.168.2.1: seq=3 ttl=64 time=0.936 ms
64 bytes from 192.168.2.1: seq=4 ttl=64 time=0.960 ms
--- 192.168.2.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.936/1.029/1.329 ms
FVS318N> util ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1): 56 data bytes
64 bytes from 192.168.1.1: seq=0 ttl=64 time=1.397 ms
64 bytes from 192.168.1.1: seq=1 ttl=64 time=0.997 ms
64 bytes from 192.168.1.1: seq=2 ttl=64 time=0.813 ms
64 bytes from 192.168.1.1: seq=3 ttl=64 time=0.808 ms
64 bytes from 192.168.1.1: seq=4 ttl=64 time=0.813 ms
--- 192.168.1.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.808/0.965/1.397 ms
Why doesn't the static route work?
Firmware Version : 4.3.1-22
I'm having problems getting a static route configured. I am logged into the router from 192.168.2.100 and from the CLI I execute the command:
show net routing static ipv4 setup
and get the following:
Name Destination Gateway Interface Metric Active Private
---- ----------- ------- --------- ------ ------- -------
test1 192.168.1.15 192.168.1.1 LAN 2 1 1
Then I try the following:
FVS318N> util ping 192.168.2.15
PING 192.168.2.15 (192.168.2.15): 56 data bytes
--- 192.168.2.15 ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss
FVS318N> util ping 192.168.2.1
PING 192.168.2.1 (192.168.2.1): 56 data bytes
64 bytes from 192.168.2.1: seq=0 ttl=64 time=1.329 ms
64 bytes from 192.168.2.1: seq=1 ttl=64 time=0.966 ms
64 bytes from 192.168.2.1: seq=2 ttl=64 time=0.955 ms
64 bytes from 192.168.2.1: seq=3 ttl=64 time=0.936 ms
64 bytes from 192.168.2.1: seq=4 ttl=64 time=0.960 ms
--- 192.168.2.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.936/1.029/1.329 ms
FVS318N> util ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1): 56 data bytes
64 bytes from 192.168.1.1: seq=0 ttl=64 time=1.397 ms
64 bytes from 192.168.1.1: seq=1 ttl=64 time=0.997 ms
64 bytes from 192.168.1.1: seq=2 ttl=64 time=0.813 ms
64 bytes from 192.168.1.1: seq=3 ttl=64 time=0.808 ms
64 bytes from 192.168.1.1: seq=4 ttl=64 time=0.813 ms
--- 192.168.1.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.808/0.965/1.397 ms
Why doesn't the static route work?
33 Replies
- SamirDProdigy
I usually look through the manual of anything I plan to buy. This way I can see how the configuration works, how difficult it is, and if there is anything that keeps me from doing what I want. I'd use the same approach with the managed switches, although I think they should be much simpler than the 318N.tachyon_pulse wrote: SamirD, Thanks for the tip on the used gear, any preference on which is friendlier to configure and use for a networking newbie? I picked up an inexpensive TL-SG108E and by using it's MTU VLAN configuration I was able to achieve the wired client isolation I wanted. I now have 2 final challenges.
1 On 192.168.3.0/24 subnet that has the gateway and WiFi on the NetGear router, When I do a network scan from my iPhone, the "WLAN Partition" feature hides all the WiFi devices connected to that SSID, it doesn't hide any of the wired devices connected to the SG108E. Is there a way to hide the wired addresses from the WLAN addresses on the same subnet?
2. I have an Amazon FireStick in my 192.168.3.0/24 WiFi segment, I wanted to take an old iPod and install the Amazon Fire app on it to control the FireStick. This requires that they both be on the same subnet and and can see each other. I'm wondering if their is some way (e.g., static route) that would maintain the WLAN isolation but let the iPod communicate with the FireStick?
Thanks for all your advice and mentoring. I'm learning a lot.
1. I don't think there will be a way to do that. Everything wired is accessible from the wlan, even if the wlan has isolation, so the sg108e will be seen the same way. There may be a way to make the sg108e isolate the traffic, but I'm not familiar with that device enough to say for certain.
2. If you want the firestick and ipod to communicate with each other, but not anything else, why not use a separate vlan just them? Then you can turn isolation off and can control access to them via the interlan routing. - fordemMentor
Separate VLANs - one per port - on an 8 port switch you can have 7 and the 8th port is a member of all VLANs that links to the FVS318Ntachyon_pulse wrote: Is there a way to hide the wired addresses from the WLAN addresses on the same subnet? - SamirDProdigy
Thank you fordem. I knew there had to be a way using vlans.fordem wrote: [QUOTE=tachyon_pulse;492414]Is there a way to hide the wired addresses from the WLAN addresses on the same subnet?
Separate VLANs - one per port - on an 8 port switch you can have 7 and the 8th port is a member of all VLANs that links to the FVS318N
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!