Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Isolating RA with VLANs

    Scheduled Pinned Locked Moved IPv6
    20 Posts 6 Posters 3.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      maverick_slo
      last edited by

      Endpoint should NEVER see VLAN tag except if you know what are you doing. In your case its very bad network config that is causing your issues and you should really put phones and pc's on different VLAN's…

      1 Reply Last reply Reply Quote 0
      • H
        helge000
        last edited by

        @doktornotor:

        Well, have fun.

        I do, indeed! Thankfully, I am facing the issue in a lab and our deployment is not nearly as large.

        where someone plugs some box in there and the whole network breaks because the host does not behave as expected

        Actually, it does not break. It is at best a cosmetic issue if your routing tables are correct. Also, nothing stops you from from discarding the traffic at the router.  I consider it dirty and a potential security issue.

        But back on topic and something hopefully helpful.
        Configuring an untagged vlan on the interface leads to the expected behavior (at leas, with intel nics). On windows 8+, this can even be done with netsh and is therefore scriptable. Also, I found that disabling "Priority & VLAN" seems to have the same effect (at least with my intel NICs).

        1 Reply Last reply Reply Quote 0
        • H
          helge000
          last edited by

          @maverick_slo:

          Endpoint should NEVER see VLAN tag except if you know what are you doing. In your case its very bad network config that is causing your issues and you should really put phones and pc's on different VLAN's…

          This is exactly what I am doing. Until now, I never had the need to put any non - used vlans on endsystem switch ports. But as a feature and to save cabeling, many IP phones are used that way; thus 'tagging out' the voice vlan while ignoring the untagged frames and forwarding them onwards to the host. To my knowledge this is a pretty standard setup.
          Interestingly the phones do the correct thing and do not acquire a prefix from the untagged vlan.
          IMHO the Windows IEEE 802.1Q is broken since any other OS, be them phones, MacOS, Linux, do not such a thing. Not that I can do anything about but scripting quirks and smartport macros. And I honestly think MS will stick to the behavior.

          1 Reply Last reply Reply Quote 0
          • M
            maverick_slo
            last edited by

            Standard config is:
            1 cable with 1 untagged vlan (default vlan for PC`s) on it and one tagged (for phones) and never 2 tagged, so your network knowledge is a bit short.
            See this: https://supportforums.cisco.com/discussion/11080716/tagged-and-untagged-same-interface

            1 Reply Last reply Reply Quote 0
            • H
              helge000
              last edited by

              @maverick_slo:

              Standard config is:
              1 cable with 1 untagged vlan (default vlan for PC`s) on it and one tagged (for phones)

              Sorry if I was unclear, but this is a quote from my last post:

              thus 'tagging out' the voice vlan while ignoring the untagged frames and forwarding them onwards to the host.

              So:
              Untagged / default / native/ primary vlan (whatever you like best) for the windows PC + one voice vlan tagged on the switchport, nothing else.
              (Even an untagged vlan has to be a tagged one before entering the switchport untagging it, hence these terms).

              1 Reply Last reply Reply Quote 0
              • M
                maverick_slo
                last edited by

                I have this config on Windows and Snom360 phones and its working just fine. I dont encounter this "bug" so it must be something on your config or network that is causing it.
                Windows has no such bug "IMHO the Windows IEEE 802.1Q is broken" , for me everything works just fine.

                1 Reply Last reply Reply Quote 0
                • H
                  helge000
                  last edited by

                  @maverick_slo:

                  I have this config on Windows and Snom360 phones and it`s working just fine.

                  Interesting; I suppose this might something the phone is doing, by not forwarding its vlan? Would make some sense to me. But if you like, you can easily confirm the windows behavior by assigning tagged vlans to a Windows endsystem. As I said above, I run this in a lab right now but can confim it on on our production LAN.

                  Here the quote from the link I provided. apparently  from MS NDIS:

                  If the driver isn't configured for a VLAN, then incoming VLAN tagged traffic is to be converted to untagged.

                  Also, unable to find the actual MS doc, Louisiana Sate University is facing the same thing; arriving at the same conclusion:

                  It is important for Microsoft to take a second look at how the NDIS is written and how they treat VLAN tagging.

                  http://www.educause.edu/discuss/networking-and-emerging-technologies/network-management-constituent-group/ipv6-vlan-tagging-windows

                  1 Reply Last reply Reply Quote 0
                  • R
                    razzfazz
                    last edited by

                    More likely it's a driver issue – AFAIK Windows leaves all 802.1q handling to the NIC driver (which may then just filter other VLAN, or expose a virtual interface per configured VLAN, or whatever else it sees fit to do).

                    1 Reply Last reply Reply Quote 0
                    • H
                      helge000
                      last edited by

                      True, this is a driver issue. But only a symptom - since driver vendors stick to the design described in NDIS (witch is written by Microsoft).

                      1 Reply Last reply Reply Quote 0
                      • A
                        antillie
                        last edited by

                        Friends don't let friends expose vlan tags to Windows boxes. The only OS I trust to do vlan tagging properly is ESXi.

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          If you are sending a tagged voice VLAN to a phone along with an untagged VLAN intended to be used by the host chained off the phone and the host chained off the phone is seeing both the tagged traffic and the untagged traffic, the phone is either broken or configured incorrectly.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.