Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [Solved] SG-3100 Switch Configuration - LAN on VLAN ID1?

    Official Netgate® Hardware
    sg-3100 switchports switch vlan solved
    2
    6
    1.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      omid_1985
      last edited by johnpoz

      First, let me start by saying that I have configured SG-3100 ports and VLAN, and everything seems to be working as I wanted. Still, after watching Netgate Video and reading this post, I'm starting to think that something is wrong with the way I've configured everything, and I don't have true layer 2 VLAN. Also, I have three questions about this switch on SG-3100.

      Here is what I needed. I wanted to configure switch ports to have:
      Port 1 and Port 2 for LAN.
      Port 3 for access point including LAN, VLAN 43 (IoT) and VLAN 53 (Guest)
      Port 4: only VLAN 64 for FreeBSD jails

      Here is how I did it. Created three VLAN that I needed and added them to the interface:
      Screenshot from 2021-08-05 11-27-47.png

      Screenshot from 2021-08-05 11-30-22.png

      Then for switch configuration, I only removed member 4 and left my LAN in VLAN1 next to my uplink but created three VLAN IDs I wanted and added port members on each:
      Screenshot from 2021-08-05 11-36-39.png
      Also, assigned Port VID only on port 4:

      Screenshot from 2021-08-05 11-37-13.png

      Now, It's working exactly the way I wanted to work:
      If I connect clients to port 1 and port 2, they get an IP address from the LAN interface.
      If I connect my access point to port 3, It will get an IP address from the LAN interface by default, but I also can specify VLAN ID 43 and 53 on AP to have two more SSID for guests and IoT.
      If I connect clients to port 4, they only get an IP address from VLAN 64 for the Jails interface.

      First question:
      Please correct me if I'm wrong:
      After seeing those materials I've mentioned above, I see the correct way is to remove everything from VLAN group 0/VLAN ID 1 and only have the uplink 5 as a member. And then:

      1. have a separate VLAN ID, say Vlan ID10 for LAN with members: 1,2,3,5 (all untagged)
        Then the rest are similar to what I already have:
      2. have a VLAN ID 64 with these members: 4,5t (4 is untagged)
      3. have a VLAN ID 43 with these members: 3t,5t (all tagged)
      4. have a VLAN ID 53 with these members: 3t,5t (all tagged)

      To have separate and true layer 2 VLAN, Is this what I need to do?

      Second Question:
      When I have only one VLAN in a port, say port 4, where I have only VLAN 64, then I can choose my port number in the interface to monitor the states:
      Screenshot from 2021-08-05 12-01-36.png

      But how about when I have more than one VLAN in port 3? If I select port 3 for IoT, then the guest and LAN interface can't use the same one:
      Screenshot from 2021-08-05 12-06-41.png

      Should I leave all other first three ports on the default configuration below and don't worry about it?:
      Screenshot from 2021-08-05 12-08-08.png

      Third question:
      Is there any functionality like Private VLAN in the SG-3100 switch?
      Say I want to have all my guest clients be isolated from each other on VLAN 53. Even though I'm rejecting all RFC1918 addresses on VLAN, that doesn't make clients not talk to each other in the same VLAN.

      Please note that I don't have a separate managed switch, and I'm trying to achieve everything I mentioned above in the SG-3100 switch.

      1 Reply Last reply Reply Quote 0
      • O
        omid_1985
        last edited by

        This post is deleted!
        1 Reply Last reply Reply Quote 0
        • O
          omid_1985
          last edited by omid_1985

          Okay, regarding my first question, and thinking more about what @Derelict posted on here, I think the configuration I already have is correct, but I just don't understand why I need to remove all members from VLAN ID 1 and have a separate VLAN for LAN like this:

          VLAN Group 0: with VLAN ID 1 and only this member: 5 (untagged)

          VLAN Group1: with a separate VLAN ID for my LAN, say Vlan ID10 with members: 1,2,3,5t (only 5 tagged and 4 removed).

          VLAN Group 2: with a VLAN ID 43 with these members: 3t,5t (both tagged)

          VLAN Group 3: with a VLAN ID 53 with these members: 3t,5t (both tagged)

          VLAN Group 4: with a VLAN ID 64 with these members: 4,5t (only 5 tagged)

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by stephenw10

            Either would work fine there.
            The only significant difference there is that you avoid having tagged and untagged traffic on the same link with the second method. That is generally recommended but since that link is only internal in the 3100 you're unlikely to hit an issue with it.

            If you have a number of switches with trunks between them to distribute VLANs over a large network it's a bigger issue. If you have tagged and untagged traffic on those links it's far easier to accidentally untag a VLAN where it will then be put onto the untagged subnet. If you only have tagged traffic there anything accidentally untagged would just be dropped.

            Steve

            O 1 Reply Last reply Reply Quote 1
            • O
              omid_1985 @stephenw10
              last edited by

              Thank you @stephenw10 for a detailed reply. It does make sense now.
              Your input on my 2nd and 3rd question also would be highly appreciated.
              I assume for my 2nd question; it's safe to leave monitoring the states unassigned to any port? And for 3rd question, only a yes or no reply would be enough to put me on the right path.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                You can only choose a switch port on one interface as you found. If you leave unset it will use the actual VLAN status which takes it's state from the parent interface. In this case though that's the in internal port which is always UP.

                No, there's no private VLAN type function. That would need to be on a switch where hosts are connected directly.

                Steve

                1 Reply Last reply Reply Quote 1
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.