Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN on D-link

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    99 Posts 6 Posters 23.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bingo600B
      bingo600 @fireix
      last edited by bingo600

      @fireix

      On the "Snip where you" show Port43 belonging to "Untagged" Vlan40 , what does it aay about Native Vlan , it should show nothing or 40

      I would do 2 things ...

      1:
      Give the PC in P43 a static ip in the pfSense Vlan40 range.
      Can you ping from the PC in P43 to the pfSense Vlan40 interface ip addr.
      I doubt , but worth a try.

      2:
      Make another port (44 ?) untagged member of Vlan40.
      Connect a PC to both port 43 , and port 44 , give them a temporary static ip in the same net ... 192.168.x.10/24 and 192.168.x.11/24.
      See if you can ping from one pc to another , if success then both must be in same vlan.

      Once a port is defined as access-port, it locks the port from beeing anything else than Untagged as far as I can tell (I can't even override it and make it anything else). I have my PC connected on port 43.

      That is correct , an access port would be an Untagged member of just one Vlan.

      To override make it a member of another Vlan , or make it NON Access first i suppose ... I have never used or seen a D-Link 15xx series.

      /Bingo

      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

      pfSense+ 23.05.1 (ZFS)

      QOTOM-Q355G4 Quad Lan.
      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

      F 3 Replies Last reply Reply Quote 0
      • F
        fireix @bingo600
        last edited by fireix

        @bingo600 said in VLAN on D-link:

        @fireix

        On the "Snip where you" show Port43 belonging to "Untagged" Vlan40 , what does it aay about Native Vlan , it should show nothing or 40

        I would do 2 things ...

        1:
        Give the PC in P43 a static ip in the pfSense Vlan40 range.
        Can you ping from the PC in P43 to the pfSense Vlan40 interface ip addr.
        I doubt , but worth a try.

        Under Native, it just shows - instead of any value. Indicating nothing.

        Correct, no reply. Tried the other way also, from pfSense to this IP. Will try method #2 now.

        1 Reply Last reply Reply Quote 0
        • F
          fireix @bingo600
          last edited by fireix

          @bingo600

          Once I brougth the two servers into the VLAN40 (both untagged), they could communicate/ping eachother from member ports. When I removed one of them as member from VLAN40, communication between them stopped at once. So we have VLAN isolation from port to port.

          I also tried to put an IP in the pfSense-range that I had before (in no-vlan-mode or non-configured) and I couldn't ping pfSense when I was member of VLAN40. As soon as I escaped from VLAN40, I could communicate with internet and the pfSense - including the IP of the interface for VLAN40.

          1 Reply Last reply Reply Quote 0
          • F
            fireix @bingo600
            last edited by fireix

            @bingo600 One strange observeration though:

            Each time I enable "Untagged member" on the 2nd port I tried (port 43), it removed the VLAN "40" under Tagged VLAN on port 1. So now it looks like this:

            screenshot-77.40.236.4-2022.06.22-22_34_53.png

            I have put "40" back there on port 1, but it seems like I'm figthing the system and it tries to tell me something!

            Here you see the "member port definition" for VLAN40 (if I try to choose Tagged member on port 1, it will not stick, I tried):

            screenshot-77.40.236.4-2022.06.22-22_40_49.png

            And here you see how it just just now, after I corrected so that 40 appear under Tagged VLAN again:

            now.png

            But only communication between ports on VLAN40, I can't communicate with Port 1. In my head, it should have been tagged port, but this interface almost looks the oposite of what I find logic... But you are two people saying it looks normal, so I will go with that for now ;)

            R bingo600B 2 Replies Last reply Reply Quote 0
            • R
              rcoleman-netgate Netgate @fireix
              last edited by

              @fireix said in VLAN on D-link:

              Each time I enable "Untagged member" on the 2nd port I tried (port 43), it removed the VLAN "40" under Tagged VLAN on port 1. So now it looks like this:

              Correct because you are now setting this port as that VLAN without a VLAN tag in the ETH packet. This would be expected.

              Ryan
              Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
              Requesting firmware for your Netgate device? https://go.netgate.com
              Switching: Mikrotik, Netgear, Extreme
              Wireless: Aruba, Ubiquiti

              F 1 Reply Last reply Reply Quote 0
              • F
                fireix @rcoleman-netgate
                last edited by fireix

                @rcoleman-netgate Not sure exactly why that is expected, but do I fix it by adjusting it on the interface afterwards - so that the last screen there looks correct setup?

                I have a PC in Port 34 and Port 43, supposed to be in VLAN40 untagged.

                pfSense is on Port 1.

                No communication with Port 1 at all when member of VLAN40 (I want communication with pfSense...)

                R 1 Reply Last reply Reply Quote 0
                • R
                  rcoleman-netgate Netgate @fireix
                  last edited by

                  @fireix On the PF your interface is assigned to the VLAN interface? Mine for comparison:
                  Screen Shot 2022-06-22 at 5.03.02 PM.png

                  Ryan
                  Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                  Requesting firmware for your Netgate device? https://go.netgate.com
                  Switching: Mikrotik, Netgear, Extreme
                  Wireless: Aruba, Ubiquiti

                  F 1 Reply Last reply Reply Quote 1
                  • F
                    fireix @rcoleman-netgate
                    last edited by fireix

                    @rcoleman-netgate Indeed. Also marked the checkbox to enabled the interface and put firewall-rule in place.

                    screen1.png

                    One thing.. I haven't actually defined any VLAN1 on pfSense, as the main mode is non-vlan setup and I don't want to disrupt non-tagged traffic. Could that be the issue? I don't think it should, as I should anyway be able to ping the interfaces IP-address in VLAN40.

                    R 1 Reply Last reply Reply Quote 0
                    • R
                      rcoleman-netgate Netgate @fireix
                      last edited by

                      @fireix Doubtful. VLAN1 = unnumbered, likely your LAN.

                      Is this a whitebox or one of our devices? What do you see when you run a PCAP on the interface?

                      Ryan
                      Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                      Requesting firmware for your Netgate device? https://go.netgate.com
                      Switching: Mikrotik, Netgear, Extreme
                      Wireless: Aruba, Ubiquiti

                      F 1 Reply Last reply Reply Quote 0
                      • F
                        fireix @rcoleman-netgate
                        last edited by

                        @rcoleman-netgate said in VLAN on D-link:

                        PCAP

                        It is a Supermicro-server with pfSense installed and 4 ports. Haven't really ran an PCAP on it. Do you mean on the entire LAN, is it easy to identify VLAN-id tags in it? I'm only really basic on wireshark-skills, no idea how those packages will look like. I have a ton of non-vlan traffic, so will be a lot of noise.

                        R 1 Reply Last reply Reply Quote 0
                        • R
                          rcoleman-netgate Netgate @fireix
                          last edited by

                          @fireix You can run the PCAP on just the VLAN interface in question.

                          https://docs.netgate.com/pfsense/en/latest/diagnostics/packetcapture/index.html

                          Ryan
                          Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                          Requesting firmware for your Netgate device? https://go.netgate.com
                          Switching: Mikrotik, Netgear, Extreme
                          Wireless: Aruba, Ubiquiti

                          F 1 Reply Last reply Reply Quote 1
                          • bingo600B
                            bingo600 @fireix
                            last edited by bingo600

                            @fireix said in VLAN on D-link:

                            I'd do as @rcoleman-netgate says
                            Try to capture some packets on pfSense , while pinging the pfSense IF.
                            Both the way where it failed , and the way where you had succeed (Vlan1 ??)

                            Tip: Capture detailed/all , save the file. Then it can be opened in Wireshark.

                            RE:

                            But only communication between ports on VLAN40, I can't communicate with Port 1. In my head, it should have been tagged port, but this interface almost looks the oposite of what I find logic... But you are two people saying it looks normal, so I will go with that for now ;)

                            You could make P1 (or try w P2) a Tagged port.
                            The only difference as i see it (30 sec glimpse at the Dlink 15xx config example) , is that you can't run Native/untagged data on it.
                            So you have to TAG Vlan1 data also on the pfSense, aka Tag Vlan1 & Vlan40.

                            This would be my preference anyways (tagged only), i'll always avoid those Hybrid ports when not needed.
                            UniFI AP's springs to mind , as needs Hybrid ... Well at least in older fw.

                            And i tend to avoid Vlan1 use anywhere in my infrastructure .. Old working habbit.

                            Btw:
                            I saw a "View Allowed Vlans Button" on the pict with the Voan40 definition.
                            Does that give any clue .... Ie. Vlan40 not allowed

                            Edit:
                            You could also setup a "Monitoring port" on the switch , and connect a PC w. Wireshark to that one.

                            Here's how it's done on a D-Link 1210 , couldn't find anything for a 1510
                            https://eu.dlink.com/uk/en/support/faq/switches/layer-2-gigabit/dgs-series/es_dgs_1210_como_monitorear_trafico_de_un_puerto_port_mirroring

                            /Bingo

                            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                            pfSense+ 23.05.1 (ZFS)

                            QOTOM-Q355G4 Quad Lan.
                            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                            F bingo600B 2 Replies Last reply Reply Quote 0
                            • F
                              fireix @bingo600
                              last edited by fireix

                              @bingo600 said in VLAN on D-link:

                              I saw a "View Allowed Vlans Button" on the pict with the Voan40 definition.

                              That's the button I click to get to this screen posten above - to verify the setup:
                              alt text

                              "You could make P1 (or try w P2) a Tagged port."

                              That I have tried for days to do - based on everything I have read, that is the way it is done usually :) Port 1 is the main port to pfSense/Internet and is clearly a "tagged" candidate. But when I edit the VLAN40 and select Port 1 Tagged port in the screen below, it doesn't stick when I click Apply. I tried for port 2 now as you suggested and there it actually sticks/works like I want Port 1 to do. Now, if I just managed to do that with Port 1, I think it would work rigth away :)

                              screenshot-77.40.236.4-2022.06.23-11_41_39.png

                              I can't see any clear difference on port 1 vs port 2.. they are both Hybrid and both part of VLAN1 (or by default at least). But maybe this gives an important clue... Btw, after I added the Port 2, it automatically did this under Allowed VLAN-page, so config looks similar to Port 1:

                              allowed-vlan.png

                              Btw: I tried to remove the checkbox for "Native VLAN" on the port 1 (and 2, 3, 4) on the ports inside VLAN1, but it wouldn't stick either. Neither from the port-membership-overview page or the interface for each port. On the port-mebership-overview for VLAN40, I could remove the checkbox for all ports and that is how it is now.

                              Tagged VLAN40 disappeared from the Allowed VLAN on port 1 when I play around a bit. I have to re-add it manually on the VLAN interface port 1 every timeI do a small edit. I think forcing it doesn't work, it does however sticks on Port 2 as it should no matter what. So that tells me that D-Link doesn't allow it, it will be removed by the system. So even if it looks good on that last picture above, it is probably not respecting the VLAN40-tagged on Port 1.

                              1 Reply Last reply Reply Quote 0
                              • F
                                fireix @rcoleman-netgate
                                last edited by

                                @rcoleman-netgate said in VLAN on D-link:

                                @fireix You can run the PCAP on just the VLAN interface in question.

                                https://docs.netgate.com/pfsense/en/latest/diagnostics/packetcapture/index.html

                                Ah, it is built-into the GUI, nice :)

                                I ran it both in "Enable promiscuous mode" and without. Tried to ping both from the machine I have setup on VLAN40 (with static IP in DHCP-range) and from pfSense. The data below is from pfSense (I pinged machine 192.168.50.15 with no reply)

                                12:05:26.303035 ARP, Request who-has 192.168.50.15 tell 192.168.50.1, length 28
                                12:05:27.303720 ARP, Request who-has 192.168.50.15 tell 192.168.50.1, length 28

                                I think it is is purly a config error in D-Link, port 1 is simply not "connected" on VLAN40 internally.

                                1 Reply Last reply Reply Quote 0
                                • bingo600B
                                  bingo600 @bingo600
                                  last edited by bingo600

                                  @bingo600 said in VLAN on D-link:

                                  You could make P1 (or try w P2) a Tagged port.
                                  The only difference as i see it (30 sec glimpse at the Dlink 15xx config example) , is that you can't run Native/untagged data on it.T
                                  So you have to TAG Vlan1 data also on the pfSense, aka Tag Vlan1 & Vlan40.

                                  Sorry i meant Trunk port above , where i wrote Tagged.
                                  Try to set P2 as Trunk , allowing VL40

                                  Something is is spookey with that switch or FW ....

                                  Try to capture on interface , not Vlan40 , that way you should be able to see if it is tagging packets with VL40.

                                  I agree with that D-Link port , not tagging VL40 packets.
                                  We miss a "little important thing" ..... I have no idea what ....
                                  But you might be right in , when the "D-Link gui removes the VL40 tagging" , it might be a hint ....

                                  Strange ... It's so easy on a D-Link 1210

                                  I just had another glance at this
                                  https://eu.dlink.com/uk/en/support/faq/switches/layer-2-gigabit/dgs-series/es_dgs_1510_escenario_config_vlan_por_gui_y_cli

                                  Strange ... It seems to use a totally different way to GUI configure the ports.

                                  You did say you had success in adding the VL40 tag to P2 , did you try to connect the pfS to that port ??

                                  /Bingo

                                  If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                  pfSense+ 23.05.1 (ZFS)

                                  QOTOM-Q355G4 Quad Lan.
                                  CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                  LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                  F 1 Reply Last reply Reply Quote 1
                                  • F
                                    fireix @bingo600
                                    last edited by

                                    @bingo600

                                    I tried the console on the switch, run the command "show vla" to list all VLANs.

                                    It reports this:

                                    
                                     VLAN 1
                                       Name : default
                                       Description :
                                       Tagged Member Ports   :
                                       Untagged Member Ports : eth1/0/1-1/0/33,eth1/0/35-1/0/42,eth1/0/44-1/0/50,
                                                               eth2/0/1-2/0/50,eth3/0/1-3/0/50,eth4/0/1-4/0/50
                                    
                                     VLAN 40
                                       Name : VLAN0040
                                       Description :
                                       Tagged Member Ports   : eth1/0/2
                                       Untagged Member Ports : eth1/0/34,eth1/0/43
                                    
                                     Total Entries : 2
                                    
                                    bingo600B 1 Reply Last reply Reply Quote 0
                                    • bingo600B
                                      bingo600 @fireix
                                      last edited by bingo600

                                      @fireix

                                      That seems like it has accepted VL40 tagged on P2
                                      Try to Connect the pFS IF to port2

                                      Do you have a 4-Unit Stack ??

                                      What port is your Management PC connected to ?
                                      Sometimes the port where the PC is connected behaves weird , if you want to "kill" the Vlan you're actually Managing via,

                                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                      pfSense+ 23.05.1 (ZFS)

                                      QOTOM-Q355G4 Quad Lan.
                                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                      F 1 Reply Last reply Reply Quote 0
                                      • F
                                        fireix @bingo600
                                        last edited by fireix

                                        @bingo600

                                        Two units stack. The interface is showing 4 even if you have 2,3 or 4..

                                        Indeed, Port 2 works just like I want both in the GUI and in the console.

                                        I wish I could just switch it over :) But then I take down all customers while testing, so want to try to avoid it.

                                        Maybe a way to copy all traffic on Port 1 to Port 2.. port mirror?

                                        bingo600B 1 Reply Last reply Reply Quote 0
                                        • bingo600B
                                          bingo600 @fireix
                                          last edited by

                                          @fireix
                                          Have to leave ... Wife is home
                                          BB in 3..4 hours

                                          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                          pfSense+ 23.05.1 (ZFS)

                                          QOTOM-Q355G4 Quad Lan.
                                          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                          F 1 Reply Last reply Reply Quote 0
                                          • F
                                            fireix @bingo600
                                            last edited by fireix

                                            @bingo600 Hmm....

                                            On my pfSense LAN, I have LACP-lag that goes to Port 1 on Switch 1 and Port 48 on Switch 2. I didn't think this mattered, but this migth be the cause.

                                            I tried to put port 48 on Switch #2 into tagged-mode. Same symptom: The interface shows it is possible for this port to join VLAN40, but once I choose it and Submit, it is removed. When I did the same on the empty port 47 next to it, it sticked and worked like it should. Either I'm not allowed to put tagged on a live-port that is plugged in - or the switch refuse to put a port in LAG into tagged mode.

                                            I see from a FAQ that VLAN-settings should be set to same on both individual ports that are member of the team, but how can I do that when D-link automatically removes the configuration before I can set it on 2nd unit..

                                            Port definition is exactly the same for port 47 and 48 (like 1 and 2), so I can't see any other reason.

                                            Edit: Using the "Clone port" option I was able to transfer the settings on Port 1 SW1 to port 48 SW2. But no such option for VLAN-membership.

                                            F 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.