Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SG-3100: No trunking on LAN ports

    Scheduled Pinned Locked Moved Official Netgate® Hardware
    14 Posts 5 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      vve1505 @mcury
      last edited by

      @mcury

      Thank you for the response. Coming from a Cisco background, I think I've determined how the SG-3100 should work, but I cannot get it to actually pass traffic anything other than my default vlan (vlan 1).

      Here are screenshots of my setup. VLAN 1 being native, I'm trying to establish port 1 as a trunk carrying 3 VLANs and port 3 as having a different untagged (native) VLAN. Port 3 will end up carrying two vlans, so it also needs to be a trunk interface. If I understand your last comment, I may not be able to change the "native" on port 3, meaning I would have to tag native on the Cisco side so that the sg-3100 receives a tagged port.

      sg3100_vlans.png

      sg3100_ports.png

      sg3100_assign.png

      M 1 Reply Last reply Reply Quote 0
      • N
        NOCling
        last edited by

        You have to Tagged Port 5 to, this is the Switch Uplink to the Firewall CPU. If there is no Tagged, you stuck at this point.

        Netgate 6100 & Netgate 2100

        1 Reply Last reply Reply Quote 1
        • M
          mcury Rebel Alliance @vve1505
          last edited by

          @vve1505

          In the example below, ports:
          1 , 2 , 3 are access ports for VLAN100
          4 is a trunk port for VLAN100, VLAN10 and VLAN20.

          Note that you need to tag port 5 (uplink).

          a760d6d6-8eb4-4c00-bb24-26a12db48674-image.png

          03370ee7-c6dd-4d5f-8168-9f0529ec6f10-image.png

          dead on arrival, nowhere to be found.

          V 1 Reply Last reply Reply Quote 1
          • V
            vve1505 @mcury
            last edited by

            @mcury This helped a lot; my trunks are working correctly now.

            Thank you very much!

            1 Reply Last reply Reply Quote 0
            • J
              jd3
              last edited by

              I somehow managed to figure out by myself most of what's in this thread - phew. But I do still have a question:

              I'd like physical port LAN1 to be an access port for the system default VLAN, VLAN1. I ask this because I have other devices on that same VLAN, also using that VLAN for mgmt.

              Most of those devices I am able to change, but one, an AP, I can not. So I'm trying to figure out how to leverage VLAN1 to support it.

              Thoughts?

              M 1 Reply Last reply Reply Quote 0
              • M
                mcury Rebel Alliance @jd3
                last edited by

                ea05073f-1925-444f-bf44-741dd96fb836-image.png

                Include port 1 there, it would be port 1,5 (disregard port 4 in the picture above).
                Then, in ports, port 1 would be PVID 1
                mvneta1 interface would also to have an IP address.

                dead on arrival, nowhere to be found.

                J 1 Reply Last reply Reply Quote 1
                • J
                  jd3 @mcury
                  last edited by

                  @mcury
                  Thank you.

                  I did this... and it appears to work. I say appears because I left it as Members being 1,5. Not 1,5t.

                  I'm not entirely certain I understand what it means for the 5t being the uplink. Is there an explanation/documentation of this somewhere that I can read to understand what that means? Everything else said I need to do 5t. But in this specific case, when I put 5t (instead of the 5 I have), it doesn't give me an IP on that interface. Which makes me believe it "isn't working"... conversely when I just just 5 (eg, 1,5), I am able to get a response from DHCP on that interface on the correct network.

                  Does this make sense?

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    mcury Rebel Alliance @jd3
                    last edited by

                    @jd3 Port 5 doesn't physically exist, its the uplink to the switch.
                    Port LAN are the 4 switch ports.
                    So, to VLAN to work as you intended, you need to leave VLAN1 untagged to the uplink and set the PVID 1 in that specific port (port 1 in your case).

                    You only use TAG when you are connecting to another switch vlan capable, and you want to trunk other vlans to it.

                    dead on arrival, nowhere to be found.

                    J 1 Reply Last reply Reply Quote 1
                    • J
                      jd3 @mcury
                      last edited by

                      @mcury said in SG-3100: No trunking on LAN ports:

                      You only use TAG when you are connecting to another switch vlan capable, and you want to trunk other vlans to it.

                      I do intend to connect the SG3100 directly to a switch. My plan is to have ports 1-4 as access on the SG3100 (and then trunk them out of that 2nd switch to other things as needed). And use OPT1 to trunk out of the SG3100 a couple other networks so that the SG3100 is doing routing/firewalling between those networks (in addition to the access ports mentioned above).

                      I setup something very much the same on a vanilla PC running PFS with 2 NICs: 1 WAN and 1 port that was effectively 100% a trunk (basically a one-armed router/fw).

                      I bought the SG3100 do to logically the same, but with the physical difference being the integrated switch. So that I could get the full throughput of the switching for ports LAN1-LAN4. And then use OPT1 to manage 2 less bandwidth intensive VLANs in a trunk config.

                      So far I'm happy with it. And I think it's doing as I'm intending, but I want to make sure I'm not shooting myself in the foot mixing/matching traffic that shouldn't be.

                      Cheers,
                      JD

                      M stephenw10S 2 Replies Last reply Reply Quote 0
                      • M
                        mcury Rebel Alliance @jd3
                        last edited by mcury

                        full throughput of the switching for ports LAN1-LAN4

                        Ports 1 to 4, in case they are members of the same VLAN, then they would be using the switch bandwidth.

                        In case ports are members of different VLANs, they would share the 2.5Gbps uplink to the SOC.

                        It's not a Layer 3 switch, so Inter-Vlan connections would still go to the SOC limited to a 2.5Gbps.

                        Edit:

                        For that AP that you can't change the management VLAN, you can do like the image below and use the VLAN1 for MGMT.. Some cheap switches can't change MGMT vlan too, so this is how I do it.

                        In this scenario, you would use VLAN1 for MGMT for both the switch and the AP:
                        1265f507-ee7b-4c9c-a4ed-e0f6b30d8689-image.png

                        dead on arrival, nowhere to be found.

                        1 Reply Last reply Reply Quote 1
                        • stephenw10S
                          stephenw10 Netgate Administrator @jd3
                          last edited by

                          @jd3 said in SG-3100: No trunking on LAN ports:

                          My plan is to have ports 1-4 as access on the SG3100 (and then trunk them out of that 2nd switch to other things as needed). And use OPT1 to trunk out of the SG3100 a couple other networks so that the SG3100 is doing routing/firewalling between those networks (in addition to the access ports mentioned above).

                          Then you don't need to do anything with the 3100 switch config. That is it's default config.
                          Just add VLANs on OPT1 (mvneta0) like you would with your existing pfSense install.

                          Steve

                          1 Reply Last reply Reply Quote 1
                          • J
                            jd3
                            last edited by

                            Thanks to you both for the input. Greatly appreciated.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.