• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

SG-3100 Switch Configuration

Scheduled Pinned Locked Moved Official Netgate® Hardware
19 Posts 5 Posters 9.8k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D
    Derelict LAYER 8 Netgate
    last edited by Derelict Jun 30, 2018, 7:15 PM Jan 5, 2018, 10:13 PM

    Is that not working?

    Be sure to be on 2.4.2 patch 1

    You should need something that looks like this:

    Set 802.1Q mode in Interfaces > Switches, VLANs and Save

    For clarity edit VLAN 1 and delete all but port 5. I am aware of the webgui glitch there and will be submitting a bug report on that.

    Add VLAN 10 creating 5 ports and setting them as 1, 2, 3, 4 tagged and 5 tagged

    Add VLAN 666 creating two ports and setting them as 4 tagged and 5 tagged

    In Interfaces> Switches, Ports Set the PVID to 10. Click the PVID and be sure to backspace/clear everything out of it (another gui bug report coming for that) and set to 10. Do that on ports 1, 2, and 3 and Save.

    In Interfaces > Assignments, VLANs create VLAN tags 10 and 666 on mvneta1, which is actually the internal, 2.5Gbit  "trunk" link from the SoC to the Switch.

    In Interfaces > Assignments either set existing interfaces to the now-available VLAN interfaces or create new ones.

    If you created new interfaces, edit them and enable, address, etc. Then create firewall rules and DHCP servers for them as you require.

    0_1530385923485_Screen Shot 2018-01-05 at 2.01.09 PM.png
    0_1530385959380_Screen Shot 2018-01-05 at 2.01.42 PM.png
    0_1530385996681_Screen Shot 2018-01-05 at 12.11.34 PM.png
    0_1530386025135_Screen Shot 2018-01-05 at 12.25.23 PM.png
    0_1530386147987_SG-3100-Switch.png

    Chattanooga, Tennessee, USA
    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
    Do Not Chat For Help! NO_WAN_EGRESS(TM)

    1 Reply Last reply Reply Quote 0
    • C
      CNLiberal
      last edited by Jan 6, 2018, 3:33 PM

      Derelict,

      Thank you for the response!  I figured out most of what you said.  However, when I changed the PVID on ports 1,2,3 I could no longer access the GUI.  I had to go into the console and assign VLAN10 to mvneta1.  Once I did that, the GUI was accessible again.  It would be great if I could change those interfaces from the CLI/Console as well.

      The other question I had is in regards to the AP that I want to hang off of LAN 4.  As you know, I want VLANs 10 and 666 TAGGED to LAN 4, which I've setup.  But, I want the AP to get a DHCP address for management from VLAN10.  Do I go back to PORTS and assign 10 to port 4?  The AP will pickup it's management IP based on the "NATIVE VLAN" of the interface it's on.  In the Cisco world, I can change the NATIVE VLAN per interface:

      interface Gig0/4
      description Access Point
      switchport mode trunk
      switchport trunk encapsulation dot1q
      switchport nonegotiate
      switchport trunk native vlan 10
      switchport trunk allowed vlan 10,666
      

      This Cisco switch config would allow the AP to grab it's management IP from VLAN10.  Is this a possibility with the SG-3100?  Can I change that VID to 10 and the AP will grab it's IP from VLAN 10?  Thank you!

      pfSense 2.7.2-RELEASE

      Dell R210 II
      Intel E3-1340 v2
      8GB RAM
      SSD ZFS Mirror
      Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
      1 x Cisco 3850 12XS-S (Core Switch)
      2 x Cisco 3750X PoE Gig Switch (Access Stack)
      3 x Cisco 2802i APs (Mobility Express)

      1 Reply Last reply Reply Quote 0
      • D
        Derelict LAYER 8 Netgate
        last edited by Derelict Jun 30, 2018, 7:17 PM Jan 6, 2018, 7:53 PM

        If you need port 4 to have VLAN 10 be the untagged/PVID (not tagged as you originally said) along with tagged traffic then do that.

        Edit VLAN 10 and set port 4 to be untagged (uncheck tagged)

        Edit the ports and set the PVID on port 4 to 10.

        Yes, you can lock yourself out mucking about with layer 2 on the port you are connected to.

        In your case I would have probably put a temporary layer 3 network on OPT1 and configured the switch from something connected there.

        No, the CLI/Shell will not help in general. You need to make permanent changes via the GUI so they make it into config.xml. There is some basic capability there to add VLANs and number interfaces but it is generally intended to help get access to the node so the GUI can be used. Switch configuration is essentially brand new in the product and I do not believe the shell commands for the switch are caught up yet, if they ever will be.

        0_1530386206361_Screen Shot 2018-01-06 at 11.47.42 AM.png
        0_1530386236690_Screen Shot 2018-01-06 at 11.52.39 AM.png
        0_1530386254017_Screen Shot 2018-01-06 at 11.51.06 AM.png

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 1
        • C
          CNLiberal
          last edited by Jan 6, 2018, 8:10 PM

          Derelict,

          That is what I ended up doing.  If I come back and setup another VLAN for management, then I'll make that the UNTAGGED VLAN on that interface while tagging the other two. Thanks again for your help!

          pfSense 2.7.2-RELEASE

          Dell R210 II
          Intel E3-1340 v2
          8GB RAM
          SSD ZFS Mirror
          Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
          1 x Cisco 3850 12XS-S (Core Switch)
          2 x Cisco 3750X PoE Gig Switch (Access Stack)
          3 x Cisco 2802i APs (Mobility Express)

          1 Reply Last reply Reply Quote 0
          • D
            Derelict LAYER 8 Netgate
            last edited by Jan 7, 2018, 10:02 PM

            Added to Reply #2 for reference.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • J
              johnpoz LAYER 8 Global Moderator
              last edited by Apr 10, 2018, 3:35 AM

              Ok I am having a bit of problem… This seems pretty straight forward... But doesn't seem to be be working with sg-3100 running 2.4.3

              This should work with just the gui right??

              So I set opt1 to be a 192.168.2.0/24 network so wouldn't lock myself out.  I then setup the switch to be in q mode, and set port 1 with pvid 100.  An set new vlan group and put port 1 in it untagged and 5 tagged

              I setup dhcp server on this vlan interface.  And move my connection over to lan1 and nothing... Maybe its late??

              Connection is straight from my machine to the switch.. So can not be messing up any switch ports and same wire and interface grabs a 192.168.2 address when IP out in opt1 and access the gui that way.  But when I move it over to port 1 nothing.

              If just did it from the cmd line

              
              [2.4.3-RELEASE][root@pfSense.localdomain]/root: etherswitchcfg
              etherswitch0: VLAN mode: DOT1Q
              port1:
                      pvid: 100
                      state=1 <disabled>flags=0<>
                      media: Ethernet autoselect (1000baseT <full-duplex>)
                      status: active
              port2:
                      pvid: 1
                      state=1 <disabled>flags=0<>
                      media: Ethernet autoselect (none)
                      status: no carrier
              port3:
                      pvid: 1
                      state=1 <disabled>flags=0<>
                      media: Ethernet autoselect (none)
                      status: no carrier
              port4:
                      pvid: 1
                      state=1 <disabled>flags=0<>
                      media: Ethernet autoselect (none)
                      status: no carrier
              port5:
                      pvid: 1
                      state=1 <disabled>flags=1 <cpuport>media: Ethernet 2500Base-KX <full-duplex>status: active
              vlangroup0:
                      vlan: 1
                      members 2
              vlangroup1:
                      vlan: 100
                      members 1,5t</full-duplex></cpuport></disabled></disabled></disabled></disabled></full-duplex></disabled> 
              

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • D
                Derelict LAYER 8 Netgate
                last edited by Apr 10, 2018, 4:09 AM

                Yeah there's something not being done correctly when you switch to dot1q mode. All of those ports are disabled.

                Edit/save the ports page and reboot. Those should say "FORWARDING" not "DISABLED"

                I am pretty sure that has been fixed in 2.4.4, and is only necessary when you switch from port-based to dot1q mode. Subsequent config changes in dot1q mode should be fine.

                If you don't want to reboot, run these:

                etherswitchconfig port1 forwarding
                run again for ports[2-5]

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • J
                  johnpoz LAYER 8 Global Moderator
                  last edited by Apr 10, 2018, 9:43 AM

                  Yeah I just woke up… Did a reboot and bam... Working  WTF..

                  
                  [2.4.3-RELEASE][root@pfSense.localdomain]/root: etherswitchcfg
                  etherswitch0: VLAN mode: DOT1Q
                  port1:
                          pvid: 100
                          state=8 <forwarding>flags=0<>
                          media: Ethernet autoselect (1000baseT <full-duplex,master>)
                          status: active
                  port2:
                          pvid: 1
                          state=8 <forwarding>flags=0<>
                          media: Ethernet autoselect (none)
                          status: no carrier
                  port3:
                          pvid: 1
                          state=8 <forwarding>flags=0<>
                          media: Ethernet autoselect (none)
                          status: no carrier
                  port4:
                          pvid: 1
                          state=8 <forwarding>flags=0<>
                          media: Ethernet autoselect (none)
                          status: no carrier
                  port5:
                          pvid: 1
                          state=8 <forwarding>flags=1 <cpuport>media: Ethernet 2500Base-KX <full-duplex>status: active
                  vlangroup0:
                          vlan: 1
                          members 2
                  vlangroup1:
                          vlan: 100
                          members 1,5t
                  [2.4.3-RELEASE][root@pfSense.localdomain]/root:</full-duplex></cpuport></forwarding></forwarding></forwarding></forwarding></full-duplex,master></forwarding> 
                  

                  Knew it was straight forward ;)  Thought I had rebooted after putting in q mode though…  Should of caught the disabled ;)  DOH!!!

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • D
                    Derelict LAYER 8 Netgate
                    last edited by Apr 10, 2018, 12:49 PM

                    Yeah there's something not right there.

                    I did load 2.4.4-DEV and everything I saw that was wonky in the switch in 2.4.3 seems to be fixed, except the webgui field problem when you edit the Port VIDs. (Click then clear out the field completely if you need to change that.)

                    I'd stay at 2.4.3 for the time being though if you rely on that device.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • J
                      johnpoz LAYER 8 Global Moderator
                      last edited by Apr 10, 2018, 1:00 PM

                      Is possible I didn't reboot after… First time I did it was testing the other thread where he lost connectivity on the change..  Yeah for sure you can lock yourself out ;)

                      So then I fired up the opt interface and consoled in as well.. So no way to lock myself out - I knew the disabled was odd ;)  But it was late last night and my brain wasn't working correctly or should of caught that it wasn't showing forwarding.

                      Thanks for kick to the ass ;) hehehe

                      Maybe I will reset it and play with actual set to forwarding mode.  I plan on putting this box into production today and wanted to get some play time with the switch before I did that..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • D
                        Derelict LAYER 8 Netgate
                        last edited by Apr 10, 2018, 1:13 PM

                        It's not a kick. You shouldn't have to reboot.

                        There is also a problem going from dot1q back to Port-based VLAN mode, which is also already fixed in 2.4.4, but I can't see a reason to do that. :)

                        Though there is a way to do port isolation in that mode which might have a niche somewhere.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • GrimsonG
                          Grimson Banned
                          last edited by Apr 10, 2018, 1:38 PM

                          @Derelict:

                          Though there is a way to do port isolation in that mode which might have a niche somewhere.

                          Maybe if you want to isolate some devices, but still want them on the same network for easier traffic shaping.

                          1 Reply Last reply Reply Quote 0
                          • J
                            johnpoz LAYER 8 Global Moderator
                            last edited by Apr 10, 2018, 4:47 PM Apr 10, 2018, 4:43 PM

                            I agree shouldn't have to reboot… But I was staring at those disabled and it wasn't clicking they should be showing forward.  I was thinking they were showing disabled because I had nothing connected.  And then when moved my client over since I couldn't get to the web interface couldn't tell.

                            But then when I looked at it via the console and saw disabled even on the interface I was connected too - it never clicked.. Lack of sleep and sure the beers didn't help ;)  So the kick was pointing out that disabled.. Which thanks for that!

                            Before I even read your thread I had rebooted it when I woke up first thing as I was consoled in.. Wanted to see what it said about the switch while it booted.. And then when I looked at etherswitchcfg saw the forwarding mode...  DOH ;)

                            We are up and running in it here at the office.. We really only needed 2 lan side interfaces.  Have the opt as management and switch ports are all currently lan with just 1 connection..  But left it in q mode in case we need to break out some other networks at a future date, etc.

                            Nice to see speed you paying for finally.  The old juniper we had on the connection was only 10/100 so max ever saw was like 90ish.. Now seeing 120mbps..  Few more to order for the other branch offices ;)

                            Its only the guest internet connection.. Love to get rid of beasts of cisco's they have here for the dual mpls connections - such a waste.. Pair of 4860s would be screaming overkill even.. Maybe at some point they will let me rotate those out.. But for now happy to get all the branch offices on netgate even if just for the guest internet connects..

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • jahonixJ
                              jahonix
                              last edited by May 9, 2018, 10:42 AM

                              Just to understand the switch/VLAN layout (before being able to put my hands on one of those units myself):

                              • A "VLAN Group" is just the row number in the VLAN table or can it do more than that?
                              • if mvneta1_port#5 is the uplink to the core then shouldn't it be port #0 rather than port #5? This seems counter-intuitive.
                              1 Reply Last reply Reply Quote 0
                              • D
                                Derelict LAYER 8 Netgate
                                last edited by May 9, 2018, 6:22 PM

                                Doesn't much matter. It is what it is.

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • jahonixJ
                                  jahonix
                                  last edited by May 9, 2018, 6:32 PM

                                  Thanks.

                                  "VLAN Group" is or does what?

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    Derelict LAYER 8 Netgate
                                    last edited by Derelict Jun 30, 2018, 7:18 PM May 9, 2018, 6:46 PM

                                    It depends on whether it is in port or dot1q mode.

                                    You can make what amount to "independent" switches with VLAN groups in port mode. But you probably don't want to put more than one group on port 5 if you intend them to be different broadcast domains.

                                    You can also make a poor-man's port isolation in a single broadcast domain using something like the attached. In that config all four ports communicate with the "trunk" back to the layer 3 interface in the firewall but do not communicate with each other.

                                    In dot1q mode each "group" is the collection of ports that have that VLAN tagged or untagged.

                                    0_1530386330098_Screen Shot 2018-04-03 at 10.08.33 PM.png

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    1 Reply Last reply Reply Quote 1
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                      This community forum collects and processes your personal information.
                                      consent.not_received