Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Odd internet slowness with Netgear GS324TP Switch

    Scheduled Pinned Locked Moved General pfSense Questions
    60 Posts 5 Posters 10.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @Jarhead
      last edited by

      @jarhead said in Odd internet slowness with Netgear GS324TP Switch:

      BSD and having an untagged vlan on a trunk

      I have not run into this, and I run a native untagged on the interface my vlans are on.

      I am not sure where the problem is - but those speeds are horrible, so clearly something is wrong..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      CreationGuyC 1 Reply Last reply Reply Quote 0
      • CreationGuyC
        CreationGuy @johnpoz
        last edited by CreationGuy

        @Jarhead RokuNotWorking.JPG
        Roku is Port 10, ObiTalk is Port 20. 24 = the port going to pfsense.

        @johnpoz Same VLAN speeds are fine, inter-vlans (this is not in regards to the Roku).

        J 1 Reply Last reply Reply Quote 0
        • J
          Jarhead @CreationGuy
          last edited by Jarhead

          @creationguy You have every port untagged with vlan 1, why?
          You also have ports that should be in the other vlans as tagged. They should be untagged.
          Good rule of thumb, you only tag a vlan if the device you're plugging into that port is also tagged.
          Remove vlan 1 from ports it's not being used on and untag the ports that are not trunked.
          So ports 1-4 should be untagged with vlan 10 ONLY.
          Ports 5 and 6 untagged with vlan 20 only etc.

          CreationGuyC 1 Reply Last reply Reply Quote 0
          • CreationGuyC
            CreationGuy @Jarhead
            last edited by CreationGuy

            @jarhead I am new to VLANs, I found a couple of guides for Netgear managed switches and that's what worked. I've updated the settings:
            Screenshot 2022-07-23 at 23-22-17 NETGEAR GS324TP.png
            VLAN 1 is a default VLAN on the switch that I can't seem to disable.

            In order for me to get the two devices on guest to obtain an IP, I had to:
            Un-tag the two ports, and set their PVID to the VLAN as these devices are not 802.1q aware. I found this thread here.

            I don't have a way though to test if these devices can reach other VLANs. I do know that desktops on this VLAN 50 can't see devices on other VLANs, but those devices are not set up the same way (Untagged None).

            Edit: I placed a desktop in VLAN 50, the same manor as port 10 pictured above. I have a firewall rule set up so that 50 cannot access ANY, just internet. VLAN 10 can access all VLANs. This desktop cannot ping desktop in VLAN 10 until a desktop in VLAN 10 pings that VLAN 50 desktop. After awhile, VLAN 50 desktop can no longer ping VLAN 10 desktop. See below for the rules.
            lanrules.JPG guestrules.JPG

            J 1 Reply Last reply Reply Quote 0
            • J
              Jarhead @CreationGuy
              last edited by Jarhead

              @creationguy You still have the ports tagged. They should be untagged unless your devices themselves are also tagged (hint: they aren't).
              Ports 1-6 should be untagged ONLY. Nothing tagged on them. Along with all other ports that are "device" ports.
              Only port that should be tagged is trunk ports (hint: port 24).
              So only the port going to pfSense and any ports going to AP's that are using vlans if you have any.

              CreationGuyC 1 Reply Last reply Reply Quote 0
              • CreationGuyC
                CreationGuy @Jarhead
                last edited by

                @jarhead I'm confused now- you should that ports 1-6, which I want on VLAN 10 should be untagged, are you saying untagged under the VLAN Tag column?

                I reset the switch, and configured port 7 for VLAN 10.

                Thank you for taking the time to help with this.

                example.JPG

                J 1 Reply Last reply Reply Quote 0
                • J
                  Jarhead @CreationGuy
                  last edited by

                  @creationguy Again, only tag a port if the device connected to it is also tagged.
                  So if you're plugging pc's into ports, they should be untagged ports.

                  If you go back to the pic from the previous post, under the "Vlan tag" column, all ports should be NONE except the port going to pfSense (port 24).
                  1-4 should be untagged with vlan id 10, 5 and 6 untagged with vlan id 20.
                  They should all (except 24) look like port 20 except with the correct vlans on them.

                  Fix the switch, then we'll get to the firewall. You have issues there with understanding rules.
                  @johnpoz will go into much more detail for you than I will but to sum it up, putting a rule on vlan 10 does not stop other vlans from talking to vlan 10. You need a rule on the other interfaces to do that.
                  That's why you could ping one way, which created a state that allowed you to ping the other way.

                  CreationGuyC 1 Reply Last reply Reply Quote 0
                  • CreationGuyC
                    CreationGuy @Jarhead
                    last edited by CreationGuy

                    @jarhead
                    Ports 1-4 should be on VLAN 10, with port 1 needing to access VLAN 1 which is the switch (built in Netgear setting).
                    Screenshot 2022-07-24 at 22-16-42 NETGEAR GS324TP.png

                    The others shown are guest devices, of which, can't access VLAN 10, unless the device on VLAN 10 pings it. Eventually it stops being able to ping it.

                    I thought that my rules were fine, as shown below, I have the Guest set to not be able to communicate with the specified VLANs.
                    Screenshot 2022-07-24 at 22-19-40 TheWall.jrfam.lan - Firewall Rules GUEST.png
                    Screenshot 2022-07-24 at 22-19-50 TheWall.jrfam.lan - Firewall Rules LAN.png

                    R J 2 Replies Last reply Reply Quote 0
                    • R
                      rcoleman-netgate Netgate @CreationGuy
                      last edited by

                      @creationguy said in Odd internet slowness with Netgear GS324TP Switch:

                      Ports 1-4 should be on VLAN 10, with port 1 needing to access VLAN 1 which is the switch (built in Netgear setting).

                      Having port 1 as untagged on two VLANs can cause problems and could result in data leaking into VLAN 10.

                      CreationGuyC 1 Reply Last reply Reply Quote 1
                      • J
                        Jarhead @CreationGuy
                        last edited by

                        @creationguy Get rid of vlan 1 on ports 1 and 7. If you're saying you can't take it off of port 1, switch ports. ie leave port 1 at vlan 1 only and use port 5 as vlan 10.
                        As I said earlier, you'll need to add a rule on your other interfaces to stop them from accessing vlan 10. You can use the copy feature of your existing rule and just change the interface it's on and source/destination as needed.

                        1 Reply Last reply Reply Quote 0
                        • CreationGuyC
                          CreationGuy @rcoleman-netgate
                          last edited by

                          @rcoleman-netgate said in Odd internet slowness with Netgear GS324TP Switch:

                          @creationguy said in Odd internet slowness with Netgear GS324TP Switch:

                          Ports 1-4 should be on VLAN 10, with port 1 needing to access VLAN 1 which is the switch (built in Netgear setting).

                          Having port 1 as untagged on two VLANs can cause problems and could result in data leaking into VLAN 10.

                          How would I configure the port so that I could access the switch to manage?

                          J R 3 Replies Last reply Reply Quote 0
                          • J
                            Jarhead @CreationGuy
                            last edited by

                            @creationguy Had you tried iperf with the settings like that. Should see a difference now.

                            1 Reply Last reply Reply Quote 0
                            • R
                              rcoleman-netgate Netgate @CreationGuy
                              last edited by

                              This post is deleted!
                              1 Reply Last reply Reply Quote 0
                              • R
                                rcoleman-netgate Netgate @CreationGuy
                                last edited by

                                @creationguy said in Odd internet slowness with Netgear GS324TP Switch:

                                How would I configure the port so that I could access the switch to manage?

                                Move your pfSense to port 1?
                                Also ... it should be accessible through pf via VLAN1

                                CreationGuyC 1 Reply Last reply Reply Quote 0
                                • CreationGuyC
                                  CreationGuy @rcoleman-netgate
                                  last edited by

                                  @rcoleman-netgate VLAN 1 isn't hard-coded by the switch to be on only Port 1, port 1 is just the port that my primary desktop is on where I would normally log into the switch to make changes. I took off VLAN1 from the ports, I can still access the switch. Looks like I'm all set there. Thanks for the information on data leaking.

                                  @Jarhead Data transfer is still slow across the VLANs.

                                  J 1 Reply Last reply Reply Quote 0
                                  • J
                                    Jarhead @CreationGuy
                                    last edited by Jarhead

                                    @creationguy Wow, saw a switch set the same as you originally had and once the vlans were corrected the problem was fixed. I'll see if I can find that thread for reference.

                                    Next thing I would do is disable all firewall rules except the any any on all interfaces.

                                    Can you try adding vlan 1 as tagged to the interface going to the switch? You would also have to tag vlan 1 on port 24 in the switch. ie No untagged vlans on the trunk.

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @Jarhead
                                      last edited by

                                      @jarhead said in Odd internet slowness with Netgear GS324TP Switch:

                                      You would also have to tag vlan 1 on port 24 in the switch

                                      Tagging vlan 1 is not normal - many devices do not support it even.

                                      Vlan one is just the default untagged vlan, there is no significance to the ID number to be honest. Untagged traffic coming in defaults to vlan 1, if you want untagged traffic to be on a different vlan, then just set that - there is nothing to do with vlan 1..

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      J 1 Reply Last reply Reply Quote 0
                                      • J
                                        Jarhead @johnpoz
                                        last edited by

                                        @johnpoz Not looking for untagged traffic, trying to get rid of it actually.
                                        I have vlan 1 tagged with no issues.
                                        Screenshot 2022-07-25 090251.png

                                        johnpozJ 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @Jarhead
                                          last edited by

                                          @jarhead but does the sending device allow you to tag vlan1?

                                          I just do not see the point of tagging vlan 1, just don't use it - have your device use vlan 100 or something and tag that.

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          J 1 Reply Last reply Reply Quote 0
                                          • J
                                            Jarhead @johnpoz
                                            last edited by

                                            @johnpoz Doesn't matter anymore. I found the bug I mentioned earlier in this thread and it was referring to tagged and untagged vlans on a bridge interface so wouldn't apply here.

                                            Maybe it really is related to the dual nic?
                                            Doesn't seem to be much more it can be a this point.

                                            @CreationGuy Any chance you have another nic you can add to the system?

                                            CreationGuyC 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.