Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN on D-link

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    99 Posts 6 Posters 21.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rcoleman-netgate Netgate @fireix
      last edited by

      @fireix On the PF your interface is assigned to the VLAN interface? Mine for comparison:
      Screen Shot 2022-06-22 at 5.03.02 PM.png

      Ryan
      Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
      Requesting firmware for your Netgate device? https://go.netgate.com
      Switching: Mikrotik, Netgear, Extreme
      Wireless: Aruba, Ubiquiti

      F 1 Reply Last reply Reply Quote 1
      • F
        fireix @rcoleman-netgate
        last edited by fireix

        @rcoleman-netgate Indeed. Also marked the checkbox to enabled the interface and put firewall-rule in place.

        screen1.png

        One thing.. I haven't actually defined any VLAN1 on pfSense, as the main mode is non-vlan setup and I don't want to disrupt non-tagged traffic. Could that be the issue? I don't think it should, as I should anyway be able to ping the interfaces IP-address in VLAN40.

        R 1 Reply Last reply Reply Quote 0
        • R
          rcoleman-netgate Netgate @fireix
          last edited by

          @fireix Doubtful. VLAN1 = unnumbered, likely your LAN.

          Is this a whitebox or one of our devices? What do you see when you run a PCAP on the interface?

          Ryan
          Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
          Requesting firmware for your Netgate device? https://go.netgate.com
          Switching: Mikrotik, Netgear, Extreme
          Wireless: Aruba, Ubiquiti

          F 1 Reply Last reply Reply Quote 0
          • F
            fireix @rcoleman-netgate
            last edited by

            @rcoleman-netgate said in VLAN on D-link:

            PCAP

            It is a Supermicro-server with pfSense installed and 4 ports. Haven't really ran an PCAP on it. Do you mean on the entire LAN, is it easy to identify VLAN-id tags in it? I'm only really basic on wireshark-skills, no idea how those packages will look like. I have a ton of non-vlan traffic, so will be a lot of noise.

            R 1 Reply Last reply Reply Quote 0
            • R
              rcoleman-netgate Netgate @fireix
              last edited by

              @fireix You can run the PCAP on just the VLAN interface in question.

              https://docs.netgate.com/pfsense/en/latest/diagnostics/packetcapture/index.html

              Ryan
              Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
              Requesting firmware for your Netgate device? https://go.netgate.com
              Switching: Mikrotik, Netgear, Extreme
              Wireless: Aruba, Ubiquiti

              F 1 Reply Last reply Reply Quote 1
              • bingo600B
                bingo600 @fireix
                last edited by bingo600

                @fireix said in VLAN on D-link:

                I'd do as @rcoleman-netgate says
                Try to capture some packets on pfSense , while pinging the pfSense IF.
                Both the way where it failed , and the way where you had succeed (Vlan1 ??)

                Tip: Capture detailed/all , save the file. Then it can be opened in Wireshark.

                RE:

                But only communication between ports on VLAN40, I can't communicate with Port 1. In my head, it should have been tagged port, but this interface almost looks the oposite of what I find logic... But you are two people saying it looks normal, so I will go with that for now ;)

                You could make P1 (or try w P2) a Tagged port.
                The only difference as i see it (30 sec glimpse at the Dlink 15xx config example) , is that you can't run Native/untagged data on it.
                So you have to TAG Vlan1 data also on the pfSense, aka Tag Vlan1 & Vlan40.

                This would be my preference anyways (tagged only), i'll always avoid those Hybrid ports when not needed.
                UniFI AP's springs to mind , as needs Hybrid ... Well at least in older fw.

                And i tend to avoid Vlan1 use anywhere in my infrastructure .. Old working habbit.

                Btw:
                I saw a "View Allowed Vlans Button" on the pict with the Voan40 definition.
                Does that give any clue .... Ie. Vlan40 not allowed

                Edit:
                You could also setup a "Monitoring port" on the switch , and connect a PC w. Wireshark to that one.

                Here's how it's done on a D-Link 1210 , couldn't find anything for a 1510
                https://eu.dlink.com/uk/en/support/faq/switches/layer-2-gigabit/dgs-series/es_dgs_1210_como_monitorear_trafico_de_un_puerto_port_mirroring

                /Bingo

                If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                pfSense+ 23.05.1 (ZFS)

                QOTOM-Q355G4 Quad Lan.
                CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                F bingo600B 2 Replies Last reply Reply Quote 0
                • F
                  fireix @bingo600
                  last edited by fireix

                  @bingo600 said in VLAN on D-link:

                  I saw a "View Allowed Vlans Button" on the pict with the Voan40 definition.

                  That's the button I click to get to this screen posten above - to verify the setup:
                  alt text

                  "You could make P1 (or try w P2) a Tagged port."

                  That I have tried for days to do - based on everything I have read, that is the way it is done usually :) Port 1 is the main port to pfSense/Internet and is clearly a "tagged" candidate. But when I edit the VLAN40 and select Port 1 Tagged port in the screen below, it doesn't stick when I click Apply. I tried for port 2 now as you suggested and there it actually sticks/works like I want Port 1 to do. Now, if I just managed to do that with Port 1, I think it would work rigth away :)

                  screenshot-77.40.236.4-2022.06.23-11_41_39.png

                  I can't see any clear difference on port 1 vs port 2.. they are both Hybrid and both part of VLAN1 (or by default at least). But maybe this gives an important clue... Btw, after I added the Port 2, it automatically did this under Allowed VLAN-page, so config looks similar to Port 1:

                  allowed-vlan.png

                  Btw: I tried to remove the checkbox for "Native VLAN" on the port 1 (and 2, 3, 4) on the ports inside VLAN1, but it wouldn't stick either. Neither from the port-membership-overview page or the interface for each port. On the port-mebership-overview for VLAN40, I could remove the checkbox for all ports and that is how it is now.

                  Tagged VLAN40 disappeared from the Allowed VLAN on port 1 when I play around a bit. I have to re-add it manually on the VLAN interface port 1 every timeI do a small edit. I think forcing it doesn't work, it does however sticks on Port 2 as it should no matter what. So that tells me that D-Link doesn't allow it, it will be removed by the system. So even if it looks good on that last picture above, it is probably not respecting the VLAN40-tagged on Port 1.

                  1 Reply Last reply Reply Quote 0
                  • F
                    fireix @rcoleman-netgate
                    last edited by

                    @rcoleman-netgate said in VLAN on D-link:

                    @fireix You can run the PCAP on just the VLAN interface in question.

                    https://docs.netgate.com/pfsense/en/latest/diagnostics/packetcapture/index.html

                    Ah, it is built-into the GUI, nice :)

                    I ran it both in "Enable promiscuous mode" and without. Tried to ping both from the machine I have setup on VLAN40 (with static IP in DHCP-range) and from pfSense. The data below is from pfSense (I pinged machine 192.168.50.15 with no reply)

                    12:05:26.303035 ARP, Request who-has 192.168.50.15 tell 192.168.50.1, length 28
                    12:05:27.303720 ARP, Request who-has 192.168.50.15 tell 192.168.50.1, length 28

                    I think it is is purly a config error in D-Link, port 1 is simply not "connected" on VLAN40 internally.

                    1 Reply Last reply Reply Quote 0
                    • bingo600B
                      bingo600 @bingo600
                      last edited by bingo600

                      @bingo600 said in VLAN on D-link:

                      You could make P1 (or try w P2) a Tagged port.
                      The only difference as i see it (30 sec glimpse at the Dlink 15xx config example) , is that you can't run Native/untagged data on it.T
                      So you have to TAG Vlan1 data also on the pfSense, aka Tag Vlan1 & Vlan40.

                      Sorry i meant Trunk port above , where i wrote Tagged.
                      Try to set P2 as Trunk , allowing VL40

                      Something is is spookey with that switch or FW ....

                      Try to capture on interface , not Vlan40 , that way you should be able to see if it is tagging packets with VL40.

                      I agree with that D-Link port , not tagging VL40 packets.
                      We miss a "little important thing" ..... I have no idea what ....
                      But you might be right in , when the "D-Link gui removes the VL40 tagging" , it might be a hint ....

                      Strange ... It's so easy on a D-Link 1210

                      I just had another glance at this
                      https://eu.dlink.com/uk/en/support/faq/switches/layer-2-gigabit/dgs-series/es_dgs_1510_escenario_config_vlan_por_gui_y_cli

                      Strange ... It seems to use a totally different way to GUI configure the ports.

                      You did say you had success in adding the VL40 tag to P2 , did you try to connect the pfS to that port ??

                      /Bingo

                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                      pfSense+ 23.05.1 (ZFS)

                      QOTOM-Q355G4 Quad Lan.
                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                      F 1 Reply Last reply Reply Quote 1
                      • F
                        fireix @bingo600
                        last edited by

                        @bingo600

                        I tried the console on the switch, run the command "show vla" to list all VLANs.

                        It reports this:

                        
                         VLAN 1
                           Name : default
                           Description :
                           Tagged Member Ports   :
                           Untagged Member Ports : eth1/0/1-1/0/33,eth1/0/35-1/0/42,eth1/0/44-1/0/50,
                                                   eth2/0/1-2/0/50,eth3/0/1-3/0/50,eth4/0/1-4/0/50
                        
                         VLAN 40
                           Name : VLAN0040
                           Description :
                           Tagged Member Ports   : eth1/0/2
                           Untagged Member Ports : eth1/0/34,eth1/0/43
                        
                         Total Entries : 2
                        
                        bingo600B 1 Reply Last reply Reply Quote 0
                        • bingo600B
                          bingo600 @fireix
                          last edited by bingo600

                          @fireix

                          That seems like it has accepted VL40 tagged on P2
                          Try to Connect the pFS IF to port2

                          Do you have a 4-Unit Stack ??

                          What port is your Management PC connected to ?
                          Sometimes the port where the PC is connected behaves weird , if you want to "kill" the Vlan you're actually Managing via,

                          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                          pfSense+ 23.05.1 (ZFS)

                          QOTOM-Q355G4 Quad Lan.
                          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                          F 1 Reply Last reply Reply Quote 0
                          • F
                            fireix @bingo600
                            last edited by fireix

                            @bingo600

                            Two units stack. The interface is showing 4 even if you have 2,3 or 4..

                            Indeed, Port 2 works just like I want both in the GUI and in the console.

                            I wish I could just switch it over :) But then I take down all customers while testing, so want to try to avoid it.

                            Maybe a way to copy all traffic on Port 1 to Port 2.. port mirror?

                            bingo600B 1 Reply Last reply Reply Quote 0
                            • bingo600B
                              bingo600 @fireix
                              last edited by

                              @fireix
                              Have to leave ... Wife is home
                              BB in 3..4 hours

                              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                              pfSense+ 23.05.1 (ZFS)

                              QOTOM-Q355G4 Quad Lan.
                              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                              F 1 Reply Last reply Reply Quote 0
                              • F
                                fireix @bingo600
                                last edited by fireix

                                @bingo600 Hmm....

                                On my pfSense LAN, I have LACP-lag that goes to Port 1 on Switch 1 and Port 48 on Switch 2. I didn't think this mattered, but this migth be the cause.

                                I tried to put port 48 on Switch #2 into tagged-mode. Same symptom: The interface shows it is possible for this port to join VLAN40, but once I choose it and Submit, it is removed. When I did the same on the empty port 47 next to it, it sticked and worked like it should. Either I'm not allowed to put tagged on a live-port that is plugged in - or the switch refuse to put a port in LAG into tagged mode.

                                I see from a FAQ that VLAN-settings should be set to same on both individual ports that are member of the team, but how can I do that when D-link automatically removes the configuration before I can set it on 2nd unit..

                                Port definition is exactly the same for port 47 and 48 (like 1 and 2), so I can't see any other reason.

                                Edit: Using the "Clone port" option I was able to transfer the settings on Port 1 SW1 to port 48 SW2. But no such option for VLAN-membership.

                                F 1 Reply Last reply Reply Quote 0
                                • F
                                  fireix @fireix
                                  last edited by

                                  @fireix

                                  I tested tagging port #2 in a VLAN and then let it join in a LACP-bond/channel.. Boom, it removed the tagging setting on port #2.

                                  F 1 Reply Last reply Reply Quote 0
                                  • F
                                    fireix @fireix
                                    last edited by

                                    I disabled all LAG/team links and connected pfSense to fresh port #3. As you see. port 3 on VLAN60 is tagged as it should.

                                    The computer in port 34 on VLAN60 is Access port.

                                    No contact between pfSense and the computer on VLAN60.

                                     VLAN 1
                                       Name : default
                                       Description :
                                       Tagged Member Ports   :
                                       Untagged Member Ports : eth1/0/1-1/0/33,eth1/0/35-1/0/42,eth1/0/44-1/0/50,
                                                               eth2/0/1-2/0/50,eth3/0/1-3/0/50,eth4/0/1-4/0/50
                                    
                                     VLAN 40
                                       Name : VLAN0040
                                       Description :
                                       Tagged Member Ports   : eth1/0/2,eth1/0/46,eth2/0/47
                                       Untagged Member Ports : eth1/0/43,eth2/0/46
                                    
                                     VLAN 60
                                       Name : VLAN0060
                                       Description :
                                       Tagged Member Ports   : eth1/0/3
                                       Untagged Member Ports : eth1/0/34
                                    
                                    F 1 Reply Last reply Reply Quote 0
                                    • F
                                      fireix @fireix
                                      last edited by fireix

                                      I have a computer where I can set the VLAN ID on and I put it to 70 on pfSenses LAN port. I got on to correct VLAN and got DHCP for VLAN70 rigth away. So error is 100% in the switch. No idea what more to try.. No way to get the VLAN tag passed through port 3 to any port no matter what I do.

                                      Port 3 shows tagged VLANs 60,70.

                                      F 1 Reply Last reply Reply Quote 0
                                      • F
                                        fireix @fireix
                                        last edited by fireix

                                        @fireix

                                        By defining an IP under meny for Layer 3 LAN interfaces on the switch with an IP in the DHCP-range, I suddenly managed to ping my pfSense (and all other networks). I could however ping everything on the pfSense. Is it supposed to work like that? Seems like I can block it under firewall rules.

                                        This I found on the pfSense (it is the switch interface address on VLAN60 that has sent out UDP packets).

                                        Still no DHCP though.. Doesn't get assigned.

                                        vlan-60.png

                                        F 1 Reply Last reply Reply Quote 0
                                        • F
                                          fireix @fireix
                                          last edited by

                                          And suddenly I have DHCP also!

                                          Now just have to see that the VLAN seperation actually works, I can ping most stuff, by I assume it all goes through the pfSense and not port-to-port now and then I can at least filter out all traffic I want :)

                                          R 1 Reply Last reply Reply Quote 0
                                          • bingo600B
                                            bingo600
                                            last edited by

                                            @fireix

                                            Nice that you are making progress. šŸ‘

                                            But watch out on enabling L3 on the switch , if done "incorrectly" you could easily bypass the pfSense fwall , and route packets between vlans directly on the switch.

                                            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                            pfSense+ 23.05.1 (ZFS)

                                            QOTOM-Q355G4 Quad Lan.
                                            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                            F 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.