NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
tachyon_pulse
Jan 27, 2015Aspirant
Configuring static route
Device: FVS318N - Prosafe Wireless N VPN Firewall
Firmware Version : 4.3.1-22
I'm having problems getting a static route configured. I am logged into the router from 192.168.2.100 and from the CLI I execute the command:
show net routing static ipv4 setup
and get the following:
Then I try the following:
FVS318N> util ping 192.168.2.15
PING 192.168.2.15 (192.168.2.15): 56 data bytes
--- 192.168.2.15 ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss
FVS318N> util ping 192.168.2.1
PING 192.168.2.1 (192.168.2.1): 56 data bytes
64 bytes from 192.168.2.1: seq=0 ttl=64 time=1.329 ms
64 bytes from 192.168.2.1: seq=1 ttl=64 time=0.966 ms
64 bytes from 192.168.2.1: seq=2 ttl=64 time=0.955 ms
64 bytes from 192.168.2.1: seq=3 ttl=64 time=0.936 ms
64 bytes from 192.168.2.1: seq=4 ttl=64 time=0.960 ms
--- 192.168.2.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.936/1.029/1.329 ms
FVS318N> util ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1): 56 data bytes
64 bytes from 192.168.1.1: seq=0 ttl=64 time=1.397 ms
64 bytes from 192.168.1.1: seq=1 ttl=64 time=0.997 ms
64 bytes from 192.168.1.1: seq=2 ttl=64 time=0.813 ms
64 bytes from 192.168.1.1: seq=3 ttl=64 time=0.808 ms
64 bytes from 192.168.1.1: seq=4 ttl=64 time=0.813 ms
--- 192.168.1.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.808/0.965/1.397 ms
Why doesn't the static route work?
Firmware Version : 4.3.1-22
I'm having problems getting a static route configured. I am logged into the router from 192.168.2.100 and from the CLI I execute the command:
show net routing static ipv4 setup
and get the following:
Name Destination Gateway Interface Metric Active Private
---- ----------- ------- --------- ------ ------- -------
test1 192.168.1.15 192.168.1.1 LAN 2 1 1
Then I try the following:
FVS318N> util ping 192.168.2.15
PING 192.168.2.15 (192.168.2.15): 56 data bytes
--- 192.168.2.15 ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss
FVS318N> util ping 192.168.2.1
PING 192.168.2.1 (192.168.2.1): 56 data bytes
64 bytes from 192.168.2.1: seq=0 ttl=64 time=1.329 ms
64 bytes from 192.168.2.1: seq=1 ttl=64 time=0.966 ms
64 bytes from 192.168.2.1: seq=2 ttl=64 time=0.955 ms
64 bytes from 192.168.2.1: seq=3 ttl=64 time=0.936 ms
64 bytes from 192.168.2.1: seq=4 ttl=64 time=0.960 ms
--- 192.168.2.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.936/1.029/1.329 ms
FVS318N> util ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1): 56 data bytes
64 bytes from 192.168.1.1: seq=0 ttl=64 time=1.397 ms
64 bytes from 192.168.1.1: seq=1 ttl=64 time=0.997 ms
64 bytes from 192.168.1.1: seq=2 ttl=64 time=0.813 ms
64 bytes from 192.168.1.1: seq=3 ttl=64 time=0.808 ms
64 bytes from 192.168.1.1: seq=4 ttl=64 time=0.813 ms
--- 192.168.1.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.808/0.965/1.397 ms
Why doesn't the static route work?
33 Replies
- tachyon_pulseAspirant
Wireless it can be done, but wired, it will requires a managed switch with a VLAN for every device, so not with the 318N
Yes, so is there an inexpensive managed switch that would work with the 318N to accomplish this? - SamirDProdigy
Unless you have only a few devices, then the 8 vlans might be enough.tachyon_pulse wrote: Yes, so is there an inexpensive managed switch that would work with the 318N to accomplish this?
What about this idea? Use a wireless to wired bridge and plug in the devices into that bridge. Would the client isolation still work or is that a function of the wireless? - tachyon_pulseAspirantHi Samir, so that's the bugger, client isolation is only for a VLAN's wireless clients, that is wireless clients can't see each other, but they can see wired clients on the same VLAN and the hardwired clients can 'see' everything. I don't understand why there isn't a simple check-box equivalent for wired clients (or simply all clients on a particular VLAN. Since I already have the 318N, it would be nice to find a Netgear managed switch that would integrate with the 318N for my isolation needs. Once I get this all set up I plan to do some tests to see if it behaves as I need. Any specific gear recommendations would be appreciated if not, please tell me explicitly the features I need to look for. Thanks. This is an awesome lesson.
- fordemMentorWhen discussing switches, managed & inexpensive don't exactly go hand in hand - what you need is a switch that supports VLANs, so a SmartSwitch could do it, and you need port, one VLAN per device, so take a look at Netgear's SmartSwitch lineup and see what grabs your fancy
- tachyon_pulseAspirantLooking at the product descriptions still leave me unsure, would the NETGEAR ProSAFE GS108T 8-Port Gigabit Smart Switch 10/100/1000Mbps work?
- fordemMentorProvided you don't need more that seven wired devices on your IoT - it should - the eighth port will "uplink" to your FVS318N - I have one of the v1s here, very happy with it.
- tachyon_pulseAspirantThanks! One last question, I have a long single run connected to a Netgear GS105 going to two of my IoT devices. If I put the GS108T between the FVS318N and the GS105 does having the GS105 undermine my isolation plan? FVS318N --> Netgear GS105 ---> GS105 |--> IoT! |--> IoT2
- fordemMentorThose two devices will be able to see one another as they will be on the same VLAN - the same port off of the GS108T.
- SamirDProdigy
Oh I know what you mean, but that's why I was suggesting the wireless to wired bridge. If the client isolation is integrated at layer 1 as a feature set of the wireless lan, then a wireless to wired bridge should bring the same feature set to wired devices. But if client isolation is integrated into wireless lan at a higher level, like level 2 or above, then the wireless to wired bridge may not bring client isolation with it.tachyon_pulse wrote: Hi Samir, so that's the bugger, client isolation is only for a VLAN's wireless clients, that is wireless clients can't see each other, but they can see wired clients on the same VLAN and the hardwired clients can 'see' everything. I don't understand why there isn't a simple check-box equivalent for wired clients (or simply all clients on a particular VLAN.
Since I already have the 318N, it would be nice to find a Netgear managed switch that would integrate with the 318N for my isolation needs. Once I get this all set up I plan to do some tests to see if it behaves as I need. Any specific gear recommendations would be appreciated if not, please tell me explicitly the features I need to look for. Thanks. This is an awesome lesson.
Any switch that does VLANs should work, not just netgear brands. I usually look at used gear as you can get pretty nice bargains on solid equipment like this:
http://www.ntc-tech.com/store.php?p=4596
http://www.ntc-tech.com/store.php?p=13045
This is almost no longer true, although you still get what you pay for. It's pretty cool that switches have now completely replaced hubs, as you once had a pay a premium for a switch too.fordem wrote: When discussing switches, managed & inexpensive don't exactly go hand in hand - what you need is a switch that supports VLANs, so a SmartSwitch could do it, and you need port, one VLAN per device, so take a look at Netgear's SmartSwitch lineup and see what grabs your fancy
Yes, this would work fine.tachyon_pulse wrote: Looking at the product descriptions still leave me unsure, would the NETGEAR ProSAFE GS108T 8-Port Gigabit Smart Switch 10/100/1000Mbps work?
And if you don't need gigabit on all ports, but need ports, you can get some great bargains on 24-port managed switches with 2 gigabit uplinks.fordem wrote: Provided you don't need more that seven wired devices on your IoT - it should - the eighth port will "uplink" to your FVS318N - I have one of the v1s here, very happy with it. - tachyon_pulseAspirantSamirD, Thanks for the tip on the used gear, any preference on which is friendlier to configure and use for a networking newbie? I picked up an inexpensive TL-SG108E and by using it's MTU VLAN configuration I was able to achieve the wired client isolation I wanted. I now have 2 final challenges. 1 On 192.168.3.0/24 subnet that has the gateway and WiFi on the NetGear router, When I do a network scan from my iPhone, the "WLAN Partition" feature hides all the WiFi devices connected to that SSID, it doesn't hide any of the wired devices connected to the SG108E. Is there a way to hide the wired addresses from the WLAN addresses on the same subnet? 2. I have an Amazon FireStick in my 192.168.3.0/24 WiFi segment, I wanted to take an old iPod and install the Amazon Fire app on it to control the FireStick. This requires that they both be on the same subnet and and can see each other. I'm wondering if their is some way (e.g., static route) that would maintain the WLAN isolation but let the iPod communicate with the FireStick? Thanks for all your advice and mentoring. I'm learning a lot.
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!