• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Best Practices for VLANs with Multiple Interfaces

Scheduled Pinned Locked Moved L2/Switching/VLANs
4 Posts 2 Posters 1.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • O
    ossgeek
    last edited by Apr 10, 2022, 8:23 PM

    I've just received my netgate 4100 and am beginning to set it up to replace my current router. The current setup has several VLANS all going down a single interface to a managed switch. Since the 4100 has quite a few ports for me to segment things into, I was thinking of breaking out my server and desktop vlans on their own interfaces (with the rest of the vlans lumped on a 3rd interface). So something like this:

    ix3 - WAN
    igc0 - LAN (management, untagged)
    igc1 - VLAN 16 (desktop, tagged)
    igc2 - VLAN 19 (servers, tagged)
    igc3 - VLAN 18,99,116,110, 172 (various, tagged)

    The question I have is: what's the best practice for setting this scenario up? Should igc1 and igc2 even be VLANS on the 4100 or should I just mark the port on the switch with the VLAN ID? Is there any throughput advantage/disadvantage to doing it either way?

    thanks in advance!

    J 1 Reply Last reply Apr 10, 2022, 8:51 PM Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator @ossgeek
      last edited by Apr 10, 2022, 8:51 PM

      @ossgeek said in Best Practices for VLANs with Multiple Interfaces:

      Is there any throughput advantage/disadvantage to doing it either way?

      Not really - some go by practice tag all, etc. But there are some advantages of not tagging in the sense you can connect to that port without having to tag. Like you have on your "lan" if you want to call that management.

      I do same sort of setup where some interfaces are untagged, and then on another interface I have my tagged vlans - my wifi stuff mostly since they are going to be less bandwidth intense, and there is no intervlan traffic between them to speak off.

      Really comes down to personal preference, especially if just a home network where there are no actual company policies or procedures that have to be adhered too, etc.

      Breaking out networks to their own interfaces does have the advantage bandwidth for that network/vlan has that physical interface to itself. So traffic between those interfaces is not shared via hairpin.

      Example if say your vlan 116 and 110 did a lot of intervlan talking - I wouldn't put them on the same physical interface if have the interfaces to work with. But if those vlan 18,99,116,110, etc. don't really do a lot of bandwidth intense communication between themselves.. Then makes sense to group them together on the same uplink.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      O 1 Reply Last reply Apr 10, 2022, 9:05 PM Reply Quote 0
      • O
        ossgeek @johnpoz
        last edited by Apr 10, 2022, 9:05 PM

        @johnpoz

        Thanks for the quick reply!

        This is just a home setup so no corpo policies to speak of. The primary reason is definitely that the desktop and server vlans DO have lots of traffic and the rest of the vlans (iot, phones, dmz, etc) should not talk to each other (in fact there will be firewall rules to prevent it!).

        Really all I can think of as a disadvantage to NOT tagging would be if in the future I wanted to add another VLAN to servers or desktop interface, it would be a few extra clicks to configure.

        Thanks again. I think I'll move forward untagged and just have the vlan specified on the switch port.

        J 1 Reply Last reply Apr 10, 2022, 9:11 PM Reply Quote 0
        • J
          johnpoz LAYER 8 Global Moderator @ossgeek
          last edited by Apr 10, 2022, 9:11 PM

          @ossgeek said in Best Practices for VLANs with Multiple Interfaces:

          it would be a few extra clicks to configure.

          Either way adding more vlans to a physical interface is no big deal, be it you have untagged on the interface already or not. Sure you would have to change the config on your switch a bit.

          But I run native (untagged) network on same interface I also have tagged vlans on.. There is nothing saying you can not do that - unless you had some limitation of your switch? Or again some company policy stated not to do that ;)

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          4 out of 4
          • First post
            4/4
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
            This community forum collects and processes your personal information.
            consent.not_received