Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Vlan for Windows 10

    Scheduled Pinned Locked Moved Hardware
    9 Posts 6 Posters 12.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      ghkrauss
      last edited by

      It seems that Intel has not produced driver software for Windows 10 that supports Vlans via the installed network interface card.
      I would like to access various vlans from my management workstation but can't. Any observations or ideas? Does any one know when Intel will start supporting Windows 10 with Valns?

      1 Reply Last reply Reply Quote 0
      • D
        dreamslacker
        last edited by

        They won't.

        Your only choice to get vlans (with any NICs) is to install Hyper-V role.

        That will allow you to add Hyper-V virtual adapters and tag them with VLANs (powershell needed).

        1 Reply Last reply Reply Quote 0
        • G
          ghkrauss
          last edited by

          Thanks for the update. you gave the answere I did not wish to receive. It is unfortunate the vendors will not work together. I will embark on the route you suggest.

          Best To You…

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            Why can you not access these vlans from your "management" station?

            Why are you wanting to create extra networks and tag them at the client?  Why would you not just put your management station in the management vlan.  Or just at your firewall allow that management stations IP no matter what vlan its in to access the other vlans..

            Been in the field for many a year, and have never seen tagging done at the management station as way to access other vlans.  That by design would defeat the whole purpose of firewall between your vlans.  Might as well just multi home it and put multiple nics on each layer 2..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • T
              tirsojrp
              last edited by

              From Intel site:

              Detailed Description
              Creating Intel ANS teams and VLANs on Windows® 10 is currently not supported. As a result, when created, teams and VLANs do not pass traffic. We expect that ANS will be supported on Windows 10 client in a future release.

              https://downloadcenter.intel.com/download/25016/Intel-Network-Adapter-Driver-for-Windows-10

              1 Reply Last reply Reply Quote 0
              • R
                robi
                last edited by

                @johnpoz:

                Why can you not access these vlans from your "management" station?

                Why are you wanting to create extra networks and tag them at the client?  Why would you not just put your management station in the management vlan.  Or just at your firewall allow that management stations IP no matter what vlan its in to access the other vlans..

                Been in the field for many a year, and have never seen tagging done at the management station as way to access other vlans.  That by design would defeat the whole purpose of firewall between your vlans.  Might as well just multi home it and put multiple nics on each layer 2..

                There may be exceptional cases when it is needed to "hack" the firewall. Multicast audio/video streams for example cannot pass through pfSense (and in many applications they shouldn't) but equipment management in such a network, including testing those streams, may require LayerII presence, and access to other networks in the same time.

                1 Reply Last reply Reply Quote 0
                • W
                  whosmatt
                  last edited by

                  @dreamslacker:

                  They won't.

                  Your only choice to get vlans (with any NICs) is to install Hyper-V role.

                  That will allow you to add Hyper-V virtual adapters and tag them with VLANs (powershell needed).

                  Bummer, but good to know.  I was going to upgrade my workstation @ the office to Windows 10 but I bring a few VLANs into it (for running virtual machines on different segments) and I guess I'll have to wait.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    "but I bring a few VLANs into it (for running virtual machines on different segments)"

                    That is a valid reason.. But what does that have to do with the OS wouldn't that be controlled at the VM software?

                    "There may be exceptional cases when it is needed to "hack" the firewall."

                    exceptional for sure - 25 some years in biz, and never had such a requirement.  If you needed something to be on a specific vlan, you can just use a different device on that vlan other than your "management" pc ;)

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • D
                      dreamslacker
                      last edited by

                      @whosmatt:

                      Bummer, but good to know.  I was going to upgrade my workstation @ the office to Windows 10 but I bring a few VLANs into it (for running virtual machines on different segments) and I guess I'll have to wait.

                      Not much point waiting. Even with Server 2012 R2, you're expected to use M$ tools to run VLANs (by setting up a single NIC in a LBBO Team and assigning VLANs to it).

                      It's not exactly a bad idea since not all network chip manufacturers provide tools to configure VLANs and/ or link aggregation.

                      The only issue is that with Windows 10, you can't configure VLANs without Hyper-V role. That means your processor on the workstation will never clock down - Hyper-V forces the processor to always run at the maximum clockspeed to reduce impact on the VMs. Probably not a problem for desktops but it's an issue for laptops.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.