Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    TP-LINK Smart Switches anyone?

    Scheduled Pinned Locked Moved Hardware
    239 Posts 54 Posters 171.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD
      Derelict LAYER 8 Netgate
      last edited by

      In both cases the frame should be dropped because the port is not configured to service VLAN 20, tagged or untagged.

      There are typically three different configurations for a switchport with regard to VLANs:

      1  untagged, or access port - traffic arriving on the port is placed on the configured VLAN.  Traffic for the VLAN is sent out the port with the tag stripped (untagged).  If the switch does anything with received tagged traffic it should drop it.  Else it should strip the tag and place it on the access VLAN.

      2. tagged, or trunk port - traffic arriving on the port should be tagged with a configured VLAN else dropped.  It's possible to configure a port to accept traffic for any VLAN.  Traffic for a configured VLAN on the port is sent out with the VLAN tag intact (tagged).  Traffic received for an unconfigured VLAN should be dropped.

      3. hybrid, or general, or dual-mode port.  Behaves like a tagged/trunk port except a Primary VLAN (PVID) is configured.  Untagged traffic received by the port is placed on the primary VLAN.  Tagged traffic for configured tagged VLANs is processed like a trunk port.  Traffic for configured VLANs is sent out the port with the VLAN ID intact (tagged) except for traffic on the Primary VLAN.  The switch strips the VLAN tag for the PVID before transmitting and sends it untagged.

      In my limited experience, you will be happier in the long run as your network grows if you stick with method 1 or 2, and should only resort to method 3 if absolutely necessary.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • E
        Escorpiom
        last edited by

        Thanks for the explanation.
        The PVID stands for Primary Vlan ID or Port Vlan ID?
        It appears TP-Link has their own definitions.

        Cheers.

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          @Escorpiom:

          Thanks for the explanation.
          The PVID stands for Primary Vlan ID or Port Vlan ID?

          Primary VLAN ID.

          It appears TP-Link has their own definitions.

          Cheers.

          Why am I not surprised.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • E
            Escorpiom
            last edited by

            Sorry but I should rectify something.
            Elsewhere on this board I posted about my experience with TP-Link switches and the Gb port changing to 100Mbit sometimes.
            It appears now that the switch is not at fault, but the Ubuntu drivers for my server's Marvell nic.

            A few weeks ago there was a kernel update for Ubuntu 14.04.1 and since then the connection to the switch has been stable at Gb speeds.
            I hate it when a product gets a bad rap due to issues that are unrelated. So here's the correction.

            Cheers.

            1 Reply Last reply Reply Quote 0
            • R
              robi
              last edited by

              TP-Link Smart switches got a firmware update recently, v1.0.4 Build 20140811 Rel.50404(s). Changes:

              1. Improved stability of the system;
                2. Optimized management of Memory usage."

              Updating from v1.0.3 to v1.0.4 didn't require a settings restore anymore. Tested on two TL-SG2216 boxes.

              1 Reply Last reply Reply Quote 0
              • E
                Escorpiom
                last edited by

                TL-SL2428 has no updated firmware. December 2013 is the last release.
                Perhaps a newer version will be released later.

                I was wondering, does this switch support IPv6?
                As it is a level 2 switch, it should be of no importance to the switch.
                But what about the switch IP address itself? I couldn't find anything in the manual and data sheet.

                Cheers.

                1 Reply Last reply Reply Quote 0
                • H
                  hamelg
                  last edited by

                  @finnest:

                  @robi:

                  I agree, but in that case, it's unfair to be disappointed that there's no CLI or webif available for it.

                  You can use the config software with any JRE enabled system (Pure Java). See info at http://pastebin.com/DwB4uaPR

                  Hi,
                  I have checked your howto, It works, but …
                  On linux, the utility doesn't discover any switch.
                  I've done some network captures and strace and I found out why.
                  On linux, to receive broadcast udp packet, the application must bind INADDR_ANY, the TP utility bind the nic IP addr.
                  To allow discovery works, you must use a nat rule :
                  iptables -t nat -D PREROUTING -p udp -d 255.255.255.255 --dport 29809 -j DNAT --to <@IP your host>:29809
                  It would be nice if you add this information in your howto ...

                  1 Reply Last reply Reply Quote 0
                  • O
                    ozett
                    last edited by

                    hey derelic, i have a question which arises from the approach to configure an VLAN on the  tp-link easy smart switch 1016de
                    you wrote here :
                    @Derelict:

                    …
                    2. tagged, or trunk port - traffic arriving on the port should be tagged with a configured VLAN else dropped.  It's possible to configure a port to accept traffic for any VLAN.  Traffic for a configured VLAN on the port is sent out with the VLAN tag intact (tagged).  Traffic received for an unconfigured VLAN should be dropped.

                    and the tp-link has the option to set a pvid. what is this for?
                    i can not set a pvid for unexisiting vlans.
                    i must chose a port as tagged or untagged to create a vlan.
                    after that i can set a pvid to that port.
                    and what for?

                    i assume now, that as i additionaly to the creation of the vlan change the pvid on an port to the same vlan-number on this port, that all (unconfigured?) traffic (or for unconfigured vlans?) is NOT dropped, but instead pushed into that vlan of  the pvid-number.

                    The default pvid number on all ports is 1, which is the undeletable default-vlan for all ports..

                    my assumtion seems to make sense to me, but i am a real beginner with that vlan..
                    every help appreciated…(besides this thread is a great pleasure in explaining this new easy-smart switches. ...)

                    thanks for attention,
                    ozett

                    1.jpg
                    1.jpg_thumb
                    2.jpg
                    2.jpg_thumb
                    3.jpg
                    3.jpg_thumb

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      I would want to tell the switch to drop untagged traffic on my tagged ports.  It doesn't look like that's possible with that gear.

                      That manual page you posted tells you exactly what the PVID is.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        You could presumably set an unused PVID on the 'trunk' port to effectively drop untagged packets?
                        Edit: Except that you can't use a PVID for a VLAN that doesn't exist.

                        I've stumbled my way through VLANs on several occasions but I've always come away with the feeling that either the setup is massively more complex than in needs to be or I'm just scratching the surface. I have a feeling it's the latter.  ;)

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Sorry to jump in here but perhaps someone can clear this up for me. The thing that has always confused me is the PVID setting. I understand what it does but it seems to be a superfluous setting, it's value could be assumed from the other settings. If you mark a port as untagged for a particular VLAN then it should also carry the PVID of that VLAN. Conversely that's the only time it should have that PVID. You wouldn't want untagged packets being tagged with a VLAN ID where a reply was impossible.
                          I can't see any situation where that sort of asymmetric tagging/untagging would be anything but bad. Am I missing something?  :-\

                          Steve

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            No.  You're not missing anything.

                            If that was my gear I would make a throwaway VLAN for every trunk port and set every trunk port's PVID different, effectively dropping untagged frames.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • O
                              ozett
                              last edited by

                              as i am struggling with that "easy smart" !!yes/no!!-Switches, all that you mentioned for their pvid settings seems sensible to me.

                              only one thought about that default pvid/vlan of 1 for this easy-smart-TP-Link-switches: maybe tp-link wants also on every port, which could be a trunk-port, that there is a 'somehow' collector-vlan for 'untagged' packets. So that these not get dropped (over a throwaway vlan) but instead put into this default vlan.

                              the risk seems to be, that if you have clearly defined vlans for all ports, under circumstances somehow untagged packets from any untagged port with a default pvid is send into this default vlan and are transfered to the other untagged port, wich also still have the default pvid set.

                              i did not test this, because my tp-links are under fire.. but one should check sometimes, if this theory is correct ?

                              regards,
                              ozett

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                If you've set the PVID to something other than 1 you shouldn't have an issue. Testing to find out for sure is a good idea though.  :)

                                Steve

                                1 Reply Last reply Reply Quote 0
                                • B
                                  bennyc
                                  last edited by

                                  It all depends on how the manufacturer implements (maybe "presents" is better suited here) the 802.1q standard.

                                  PVID (Port VLAN ID) is a default VLAN id assigned to frames arriving on the port.

                                  In case of a 'trunk', it marks outgoing frames with the appropriate ID (vlan ID) from which vlan it originates on the switch.
                                  For incoming frames, it is the same behavior: the vlan ID -gets stripped but- dictates on which vlan the frame is put (which broadcast domain it shares)

                                  Yet, a trunk always continues to support untagged frames as well. To my knowledge, untagged frames don't get dropped, but are placed on the switch'es 'native' vlan. And this is (among others) a reason why one should avoid the default vlan 1 as native vlan.

                                  Hope this makes sense…

                                  4x XG-7100 (2xHA), 1x SG-4860, 1x SG-2100
                                  1x PC Engines APU2C4, 1x PC Engines APU1C4

                                  1 Reply Last reply Reply Quote 0
                                  • O
                                    ozett
                                    last edited by

                                    yop, that makes sense… but one never knows, if tp-link is doing this with the easy smart switches like theory -- if one never wiresharked and checked. i guess...
                                    but for now i found the theory for this strange pvid well explained... thanks...

                                    ozett

                                    1 Reply Last reply Reply Quote 0
                                    • O
                                      ozett
                                      last edited by

                                      a last post, because i found another default VLAN no 1 on openwrt.
                                      if you change there the untagged to tagged value of an connected lan-port, traffic would go in the easy-smart switch default vlan.
                                      to prevent this, one has to undertake some more steps. as mentioned before unter 'throwaway' vlan. first create a weired nr vlan for discarding all traffic on all used easy-smart-swiches, set all ports untagged to this pvid. than create and only allow vlan-numbers you want to allow. (take care with vmware vswitch, it uses 4095 as vlan-no. for all traffic…) on desired ports...
                                      it took me some days of testing and understanding...
                                      but thanks again for all explantions in this thread here.
                                      ozett

                                      3.jpg
                                      3.jpg_thumb

                                      1 Reply Last reply Reply Quote 0
                                      • L
                                        liya464
                                        last edited by

                                        Merci de l'info.trop bien etui samsung galaxy tab housse samsung galaxy tab 4

                                        1 Reply Last reply Reply Quote 0
                                        • H
                                          Harvy66
                                          last edited by

                                          @bennyc:

                                          It all depends on how the manufacturer implements (maybe "presents" is better suited here) the 802.1q standard.

                                          PVID (Port VLAN ID) is a default VLAN id assigned to frames arriving on the port.

                                          In case of a 'trunk', it marks outgoing frames with the appropriate ID (vlan ID) from which vlan it originates on the switch.
                                          For incoming frames, it is the same behavior: the vlan ID -gets stripped but- dictates on which vlan the frame is put (which broadcast domain it shares)

                                          Yet, a trunk always continues to support untagged frames as well. To my knowledge, untagged frames don't get dropped, but are placed on the switch'es 'native' vlan. And this is (among others) a reason why one should avoid the default vlan 1 as native vlan.

                                          Hope this makes sense…

                                          That seems like non-intuitive way to design a switch. My HP just lets me not assign a default VLAN. If no VLAN is assigned and an untagged frame comes in, it just blackholes it. poof. As I would naturally expect. My switch has no notion of a "default/native" VLAN. My desktop's port has a PVID of "none". It has access to all VLANS via tags, but there is no untagged VLAN.

                                          At least in my case, the term "Trunk" is used to indicate if LACP is being used. VLAN wise, all ports are capable of being trucks if you tag all of the VLANs to a port.

                                          Having an automatic "native" VLAN for untagged traffic sounds like a security nightmare.

                                          1 Reply Last reply Reply Quote 0
                                          • R
                                            robi
                                            last edited by

                                            Keep in mind though that the price tag of these switches is very low compared to any HP or other corporate-ready switch series. They're intented for SOHO applications, thus the effort put into developing their software is scaled accordingly.

                                            There are higher-class TP-Link models (L2 and L3), which can be configured almost as easily as an HP.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.