NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
vlan
59 TopicsThree GS308E, PFSense, cannot get VLAN working on third switch
I'm working on getting VLAN setup in my home network. All of the switches are GS308E and have the VLAN turned on for the type "Advanced 802.1Q VLAN". The "LAN" coming into Port 1 of Switch 1 is coming from the TPLink Switch that is connected to the PFSense box. Switch 1 with Port 2 connects to Switch 2 with Port 1. The same for Switch 2 Port 2 connects to Switch 3 with Port 1. Eventually Switch 3 with Port 2 will connect to a ReoLink PoE for my Cameras/Frigate setup. On Switch 1: Ports 6, 7, and 8 setup for VLAN 400. Ports 3 setup for VLAN 300. Ports 2 setup to go to Port 1 of Switch 2 Ports 1 setup to connect to the LAN On Switch 2: Port 1 is connected to Switch 1 Port 2 Port 2 is connected to Switch 3 Port 1 No VLAN has been setup at this point on this Switch On Switch 3: Port 1 is connected to Switch 2 Port 2 Port 8 is setup for VLAN 602 For all the Switches I have the VLAN 1 which is the default VLAN. For Switch 1, I'm able to connect my laptop with Ubuntu 24.04 and a Raspberry Pi 5 with Ubuntu 24.04 just fine to Port 6-8. I've tried to connect another computer (Ubuntu 24.04) to Switch 3 Port 8, but it fails to connect. I've taken my laptop and tried, but it also doesn't connect. Now when I connect to like Switch 3 port 6, it connects just fine. I started this post last night, but just finishing it up this morning. I'll dig back into the setup of things and see if I have done something incorrectly. Below is the setup of PFSense and an outline of how I have configured the Switches. If there is something else that I'm not included, please ask for it and I'll see if I can capture it, as I'll be messing around trying to get this to work. I've put in screen shots of the PFSense setup - put in bold of my comments so they stand out... PICS will be done during edits of this post - won't post to start... In Pfsense I can see my three switches (which have not been assigned a static IP at this point) In Pfsense, these are the VLAN setup. These are the Interface Assignments: Here is the Configuration of the SecurityCams2 (VLAN 602) The configuration of the DHCP Servier for VLAN 602 The last part, the Rules for the new VLAN. Switch Configurations =================== Ports-Connections and VLAN assignment ====== Switch 1 Port 1 - Connects to the LAN of the PFSense Box Port 2 - Connects to the Port 1 of Switch TWO Port 6 - VLAN 400 Port 7 - VLAN 400 Port 8 - VLAN 400 Switch 2 Port 1- Connects to LAN of the PFSense box going to Switch 1 port TWO Port 2- Connects to the Port 1 of Switch THREE Switch 3 Port 1 - Connects to LAN of the PFSense box going to Switch 2 port TWO Port 2 - Will connect to another switch, but have not connected at this point. Port8 - VLAN 602 VLANs Definition in Switch 1 --------------------------- VLAN=1 (Default) Port 1 - U Port 2 -U Port 3 - E Port 4- U Port 5- U Port 6- E Port 7- E Port 8- E VLAN=300 Port 1 - T Port 2 -T Port 3 - U Port 4- E Port 5- E Port 6- E Port 7- E Port 8- E VLAN=400 Port 1 - T Port 2 -T Port 3 - E Port 4- E Port 5- E Port 6- U Port 7- U Port 8- U VLANs Definition in Switch 2 --------------------------- VLAN=1 (Default) Port 1 - U Port 2 -U Port 3 - U Port 4- U Port 5- U Port 6- U Port 7- U Port 8- U VLANs Definition in Switch 3 --------------------------- VLAN=1 (Default) Port 1 - U Port 2 -U Port 3 - U Port 4- U Port 5- U Port 6- U Port 7- U Port 8- E VLAN=602 Port 1 - T Port 2 -E Port 3 - E Port 4- E Port 5- E Port 6- E Port 7- E Port 8- U PVID table ========= Switch 1 Port 1 - 1*, 300, 400 Port 2- 1*, 300, 400 Port 3- 300* Port 4- 1* Port 5- 1* Port 6- 400* Port 7 - 400* Port 8 - 400* Switch 2 -------- Port 1 - 1*, 602 Port 2- 1* Port 3- 1* Port 4- 1* Port 5- 1* Port 6- 1* Port 7 - 1* Port 8 - 602* Switch 3 Port 1 - 1*, 602 Port 2- 1* Port 3- 1* Port 4- 1* Port 5- 1* Port 6- 1* Port 7 - 1* Port 8 - 602*2 Wohnparteien mit geteiltem Internet und Kameras
Hallo! Ich habe einen Netgear GS752TPv3 sowie eine Fritz!Box. Wir sind zwei Wohnparteien, die sich einen Internetanschluss teilen wollen, aber ansonsten getrennte (V)LANs haben wollen. Allerdings gibt es Überwachungskameras, auf die von beiden LANs sowie dem Internet zugegriffen werden soll. Ich habe heute einen Tag lang probiert, dies einzurichten, aber ohne Erfolg. Mein erster Ansatz war ein Primary VLAN, an das die Fritz!Box mit Internet sowie die Kameras angeschlossen sind, sowie zwei Community VLANs für die Familien. Leider finde ich keine Anleitung, die zu der Benutzeroberfläche meines Switches passt, und durch selber "rumfummeln" hat es nicht funktioniert, die Community VLANs haben keinen Internetzugriff. Ich blicke einfach nicht durch, was alles einzustellen ist, damit die Ports des Primary VLANs als "Promiscuous Port" funktionieren (Port-Zuordnungen und VLAN-Typen habe ich mMn. korrekt gesetzt). Lieber wäre mir sowieso eine Variante, bei der es zwei gleichberechtigte VLANs gibt, wobei das zweite VLAN an den Gastzugang der Fritz!Box angeschlossen ist. Die Kameras wären dann in einem dritten VLAN, und irgendwie über Routings würden diese von den beiden anderen VLANs zugreifbar sein. Die Kameras würden auch über ein Routing das Internet des Gastzugangs nutzen. Der Vorteil für mich wäre hierbei, dass das WLAN der Fritzbox zu dem einen Familien-VLAN gehört, und nicht zu dem Primary VLAN wie oben. Geht so etwas überhaupt? Irgendwie bin ich überrascht, wie schwierig das ganze ist, selbst mit einem Switch, der so teuer ist. Kann mir jemand ein paar Hinweise geben? Vielen Dank! JohannesGS308Ev4, GS305E - Help with uplinks/downlinks
Could I please have some help or confirmation that I have these setup correctly? I'm weary that they are because I sometimes have trouble connecting to the admin interfaces on these switches. I've already locked myself out of about 5 of these (they become unreachable) and had to do factory resets and start over. Other times, I login and the admin pages don't fully load. Or sometimes they load with weird names and labels. Sometimes I logout and chrome says "no data from site". I'm concerned I'm losing some packets somewhere. But generally speaking, everything is working and the untagged (U) vlan access ports are divvying out the correct ip addresses and devices are communicating within themselves ok. I don't think I'm understanding how the uplinks/downlinks need to be tagged, or untagged. Here's the big picture. Looking at it on paper makes me feel like I'm way out of league. There's a lot of empty ports, I'm just starting. Here's the 4 port setup on the router Let me just start down the port 1 trunk (stuff on left of picture). Here's the setup of GS308Ev4-1 for VLAN1 Same router VLAN31 Same router pvid And then both GS305E-1 and -2 are setup the same which is: How am I doing?436Views0likes18CommentsVLAN - Ubiquiti/Netgear/PfSense
Buongiorno, hardware disponibile 1-pfsense (ip 10.0.0.1) con 2 DHCP server per 2 reti rispettivamente 10.0.0.X e 10.0.X.0 sulla porta 36 dello switch 2-Switch Netgear GS752TXPv3 3-Ubiquiti U6+ Access Point WiFi sulla porta 5 dello switch Ho creato due SSID nell'ubiquiti SSID1 SSID 2 Al primo SSID1 è stato assegnato il Default Network 10.0.0.1 (gateway) Al secondo SSID2 invece è possibile soltanto assegnare un VLAN (io ho impostato 50) Come vorrei configurare la rete? Se un client si collega al SSID1 esce con il tag della VLAN = 1 che è il default (in realtà nella rete ubiquiti non è associato, non è proprio presente il VLAN = 1 e non lo si può "forzare" quindi lo deve prendere dal default dello switch) Se un client si collega al SSID2 esce con il tag VLAN = 50 che invece è impostato nella configurazione del network associato. Così facendo il DHCP di PfSense (che ho giò configurato) assegnerà l'indrizzo corrente di rete. Tutto questo per fare una sorta di rete "guest". Temo non mi stia funzionanto la configurazione dello switch Netgear (tag, untag ecc.). Ringrazio e saluto AndreaM4300 routing table Next Hop is Mgmt IP
Apologies for the dumb question: I have two M4300's stacked together with three VLANs configured. VLAN 10 has range 10.0.10.0/24, the gateway is (supposed to be) 10.0.10.1 and the management interface is at 10.0.10.252. However, the routing table for 10.0.10.0 shows the next hop as 10.0.10.252 which must have been set when I chose that IP for the management interface. I was expecting it to be the gateway not the management interface? In "IPv4 Management VLAN Configuration", The management VLAN is 10, Routing Mode is enabled, the IP Address/Subnet Mask are as above and the Gateway is 10.0.10.1. I can ping devices on VLAN10 including the management interface, but not the Gateway. Neither can I ping anything on the other VLANs. Is this normal or have I messed up my config somehow?122Views0likes2CommentsVLAN
Hi an alle, ich habe einen GS752TXPv3 Switch und würde gerne ein VLAN 50 untagged erstellen 192.168.50.0/255.255.255.0 im VLAN1 - 192.168.1.0/255.255.255.0 läuft ein DHCP Server für VLAN1 u. VLAN50 Wie muss ich das VLAN50 am Switch konfigurieren das der DHCP relay zu diesem DHCP funktioniert ? Wie bekomme ich ein Routing von VLAN50 zu VLAN1 konfiguriert ?Feature request: provide true network segmentation for guest wifi
It would be great if you could improve the guest wifi capabilities, at least giving the option of complete network segmentation for guest networks on your routers. Visitors, and untrusted devices (e.g., IoT devices) should be able to connect to a separate SSID, on a (separate) VLAN (or other logical segmentation), so that guest devices can't discover, communicate with, or sniff traffic from, devices on the trusted SSID, except as explicitly permitted through user-created rules. Ideally, VLAN management should also extend to the ethernet ports on the router and satellites, so that wired devices can also be segmented out to the untrusted VLAN (e.g., wired IoT devices).8.3KViews25likes4CommentsGS1xxE and their PoE equivalents. Getting them an IP using DHCP on a specific vlan.
Hello to anyone taking the time to read this. I have close to a dozen netgear GS1xxE switches at my home and various family member's homes by now and swear by the things. Vlan tagging is a must for our various setups and these switches haven't disapointed yet. However , when it comes to configuring them, the fact one is incapable of selecting the vlan on which the things do their DHCP negotiating forces me to use fixed IP's. In essence this isn't all that bad. But adding this to the firmware isn't something unreasonable to ask I would think. http://i.imgur.com/JZEvBx4.png http://i.imgur.com/p9evrYY.png Thanks in advance for taking the time to reply. If you also think this slight oversight should be rectified please do reply.70KViews21likes16Commentsvlan (ipv6 futureproofing)
Hi, We have a SRX5308 and a couple of FVS336 as well as a few other routers. We are futureproofing our corporate network by deploying ipv6 in parallel of ipv4. our address scheme was chosen as to be as simple for the admins as possible : ipv4 : 10.bbb.ccc.ddd (where bbb also denotes the vlan) ipv6 : fdgg:gggg:gggg:bbb::ccc:ddd:1 it's been deployed within the network, and it runs fine, no issues. our primary firewall-routerchain (not netgear) is also updated and works. I'm now trying to configure one of the netgear, and I'm discovering the issue where the ipv6 mode doesn't support vlan (at least through the GUI). is there any way to actually make ot work (telnet ?) or am I wasting my time, and should at some point replace them with other hardware ?15KViews3likes1Comment