Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Port forwarding on one-armed router

    Scheduled Pinned Locked Moved NAT
    15 Posts 3 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      So you switch does vlans.. So how do you have your vlans setup?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • B
        bob88
        last edited by

        Well, it's a one armed router. Port 5 is uplink to NUC, port 2 is lan and port 4 is wan. LAN is a VLAN, WAN is another VLAN, uplink is tagged for both. Standard setup, nothing strange.
        The thing is, this setup works in my network if I connect the WAN (port 4 of the switch in the one armed setup) to the existing network (LAN side) on DHCP. I have internet while I'm connected behind the one armed router. Port forwarding works as well.
        But when I take the wan cable out of the existing setup and put it into my one armed router (wan port on the switch, port 4), I can only access the LAN side of the network, I can access the pfsense webpage, DHCP works, but no internet.
        Also, I tried to power cycle all the other gear, I cloned the MAC of the existing router, still nothing (existing router is not cloning any other MAC, I checked that as well). I checked many times, WAN settings are correct.
        How do I troubleshoot this? I'll call  the internet provider tomorrow, maybe they have some ideas.

        1 Reply Last reply Reply Quote 0
        • JKnottJ
          JKnott
          last edited by

          @bob88:

          Well, it's a one armed router. Port 5 is uplink to NUC, port 2 is lan and port 4 is wan. LAN is a VLAN, WAN is another VLAN, uplink is tagged for both. Standard setup, nothing strange.
          The thing is, this setup works in my network if I connect the WAN (port 4 of the switch in the one armed setup) to the existing network (LAN side) on DHCP. I have internet while I'm connected behind the one armed router. Port forwarding works as well.
          But when I take the wan cable out of the existing setup and put it into my one armed router (wan port on the switch, port 4), I can only access the LAN side of the network, I can access the pfsense webpage, DHCP works, but no internet.
          Also, I tried to power cycle all the other gear, I cloned the MAC of the existing router, still nothing (existing router is not cloning any other MAC, I checked that as well). I checked many times, WAN settings are correct.
          How do I troubleshoot this? I'll call  the internet provider tomorrow, maybe they have some ideas.

          Perhaps I'm missing something, but generally, when using VLANs, you have ot configure the switch ports to be on specific VLANs or trunks.  For example the port connected to the router would be a trunk, as it has to carry multiple VLANs.  You'd then configure the router so that one side is on one VLAN and the LAN side on another.  Then configure the switch, so that those VLANs connect to the appropriate port.  You can probably use the native LAN on the LAN side of the router.

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          1 Reply Last reply Reply Quote 0
          • B
            bob88
            last edited by

            As far as I know, it's configured correcty. Tomorrow I'll explain better once I get into the switch's config page.
            The setup works, but connected to the LAN side on the actual setup. It wouldn't have worked if I didn't configure the one armed setup correctly.

            1 Reply Last reply Reply Quote 0
            • B
              bob88
              last edited by

              Here are my settings.

              1.PNG
              1.PNG_thumb
              2.PNG
              2.PNG_thumb
              3.PNG
              3.PNG_thumb
              4.png
              4.png_thumb

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                Not sure where you got the idea that you want to turn on MTU??

                MTU VLAN (Multi-Tenant Unit VLAN) defines an uplink port which will build up several VLANs with each of the other ports. Each VLAN contains two ports, the uplink port and one of the other ports in the switch, so the uplink port can communicate with any other port but other ports cannot communicate with each other.

                That should not be on..  Your port 5 should be tagged for vlan 100 and 10 and then your other ports. Like you have them but you don't need mtu.

                There mtu is like a private vlan..  You don't want/need that.. Turn that off and you should be fine..  But these tplink switches are ODD, since you can not remove vlan 1 and its not tagged..  You might want to just leverage that as one of your interfaces.  Since your pvid on your port 5 (trunk/uplink) is 1 currently.

                You prob want to change your setup to leverage vlan 1 on these switches and then just create your other ports on the vlan want as untagged an pvid.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • B
                  bob88
                  last edited by

                  Thank you for the answer.
                  I decided to just get a dual NIC small PC as the application is pretty serious and I don't want to play.
                  But I will make another one of these at home just to test and play around.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    I got one of those tplink switches to play with - since they come up on questions quite a bit.  But the can not remove vlan 1 is kind of issue if you ask me.  Nothing can not work around in a setup where you just run an untagged vlan on your uplink and are not worried about any sort of real security issues.

                    I currently have it in a setup where I run vlan 20 as untagged to this switch, that now becomes vlan 1 for this switch.  And the other ports have their pvid set to what vlan they are suppose to be in, etc.  But anyone could just connect to any port and access the management of the switch.

                    But if your going to get a new box for pfsense anyway, you might want to think about a different brand of switch that allows you to remove vlan 1 from ports you don't want vlan 1 on ;)

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • JKnottJ
                      JKnott
                      last edited by

                      But if your going to get a new box for pfsense anyway, you might want to think about a different brand of switch that allows you to remove vlan 1 from ports you don't want vlan 1 on ;)

                      Are you saying if you configure a port for a VLAN that the native LAN is still there?  In my experience, that should only happen on trunk ports with ports configured for a specific VLAN only connecting to that VLAN.

                      BTW, I also have one of those switches, but I bought it only to set up for port mirroring, so I could use Wireshark to monitor Ethernet connections.  I haven't done anything else with it.  It works OK in that role, though I don't think it should be passing frames from the monitoring computer back into the network.  That was the case with the Adtran switches I used to work with.  With the TP-Link, I had to set up a link local connection, to stop the computer from polluting the traffic.  ;)

                      PfSense running on Qotom mini PC
                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                      UniFi AC-Lite access point

                      I haven't lost my mind. It's around here...somewhere...

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        yes the low end tplink switches there are no way to remove vlan 1 from any interface.  See his screenshots.. All 5 ports have vlan 1 as untagged.  While you can change the pvid of the port.  You can not actually remove vlan 1 from any of the ports.  There have been quite a few threads about it here.

                        There also seems to be bug, cosmetic only it seems where it marks tagged traffic as bad in the interface counters.  Lots of posts on their forum about it - but no answers from tplink it seems.  And people have brought up the vlan 1 thing to them as well and from my understanding tplink answer was its not an issue and designed that way.

                        They work in a small setup for sure, and price is very nice.. Like I said I picked one up to be able to play with - got it for like $25 for a 8 porter.. I have it as a downstream switch I connect my pi's too ;)  So its not really a issue for me that can not remove the vlan 1.. It still allows me to put devices on different ports in different vlans.

                        But I wouldn't really recommend them for anyone that is wanting to actually plan with vlans other than in all but a most basic deployment/home setup.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • JKnottJ
                          JKnott
                          last edited by

                          I wonder if TP-Link engineers really don't understand VLANs.  I also have a TP-Link TL-WA901ND access point.  It supports multiple SSIDs and VLANs, but the native LAN/SSID leaks into the VLAN/2nd SSID, which makes it useless, as devices on the 2nd SSID often get the wrong config info.  When I complained to their support, the guy I was working with insisted that's the way it's supposed to work.  It was only when I reached 2nd level that they agreed it was a fault.  However, I haven't seen any update to fix the problem.

                          I currently have my eye on a Cisco 8 port switch that's not fully managed, but does support port mirroring.  I may get it to replace my current Cisco 16 port 100 Mb un-managed switch.

                          http://www.canadacomputers.com/product_info.php?cPath=27_1045_349&item_id=037370

                          http://www.cisco.com/c/en/us/products/collateral/switches/small-business-200-series-smart-switches/data_sheet_c78-634369.html

                          I bet Cisco VLANs work right!  ;)

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.