cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
597
Views
0
Helpful
2
Replies

VLAN for Non-Profit - Please Help

CapnSunshine
Level 1
Level 1

Hi, I am assisting a Non-Profit organization that has a ISA500 and a SG300-10, both working fine.

 

They have a simple setup on the ISA500 with an internal company ports and several Guest ports for

Guest PC's and OpenMesh wifi connections.  It is using the default settings on the ISA500 of the VLAN

1 as internal to the NPO and VLAN2 as the Guest VLAN, everything is working fine.

 

They are adding another SG300-10 to a remote office greater than 100 meters away, so it will need to

be fiber.  They are in the process of getting the fiber ran.

 

Since this will be a fiber connection, they only want to run one line to save costs.  So they need to have

internal connection ports 1-5 and Guest ports 6-10 on the remote SG300-10, ie both VLANs using the

same line.  They  do not want the VLANs to be able to communicate, they want to keep Guest traffic

off the internal VLAN1.

 

I have tried to set up the switch using the VLAN1 and 2 as we have on the router.  This seems to work

on the internal ports, it will grab the proper IP addresses, but when trying to connect as Guest I am

getting the "limited connectivity" message on the test PC and no internet access.

 

I tried setting up another Guest VLAN and putting it in the same subnet thinking it needed it to assign

IP addresses properly, but same results. 

 

Right now the settings below are using the test 2nd Guest VLAN.  I've tried it initially using VLAN2,

neither worked.    I am focusing on using port 7 on both the switch and router for testing

 

Please see the current setup below.  Thanks in advance for any assistance, I know the NPO is grateful as well.

Apologies if the information is jumbled below, I tried best we could to cut and paste the information.  Thanks.

 

ISA500     

Status Summary
 

1
GE1
WAN
Connected
1000M/Full Duplex
Access
  
2
GE2
LAN
Connected
1000M/Full Duplex
Access
1
1
3
GE3
LAN
Connected
1000M/Full Duplex
Access
1
1
4
GE4
LAN
Not Connected
Auto
Access
1
1
5
GE5
LAN
Not Connected
Auto
Access
1
1
6
GE6
LAN
Not Connected
Auto
Access
1
1
7
GE7
LAN
Connected
1000M/Full Duplex
Trunk
1,3
1
8
GE8
LAN
Connected
1000M/Full Duplex
Access
2
2
9
GE9
LAN
Connected
100M/Full Duplex
Access
2
2
10
GE10
LAN
Connected
1000M/Full Duplex
Access
2
2

 

 

VLANs   (have tried this with using default VLAN2 GUEST and creating another VLAN3 GUESTYOUTH, same results.

Would prefer to just use GUEST VLAN that is working now if possible.

 

 

 

Routing table

192.xxx.xxx.xx
255.255.255.248
0.0.0.0
U
0
WAN1
172.168.25.0
255.255.255.0
0.0.0.0
U
0
GUEST
192.168.2.0
255.255.255.0
0.0.0.0
U
0
GUESTYOUTH
192.168.0.0
255.255.255.0
0.0.0.0
U
0
DEFAULT
10.1.1.0
255.255.255.0
0.0.0.0
U
0
VOICE
127.0.0.0
255.0.0.0
0.0.0.0
U
0
LOOPBACK
0.0.0.0
0.0.0.0
192.xxx.xxx.xx
UG
0
WAN1

 

 


SG300-10

1.3.0.62 L2 Mode

 

switch VLANs
VLAN ID VLAN Name Type

1Default

3GUESTYOUTHStatic

 

Interface Setting Table

 
 
 
 
 
Entry No.InterfaceInterface
VLAN Mode
Administrative
PVID
Frame
Type
Ingress
Filtering
 
1GE1Trunk1Admit AllEnabled 
2GE2Access1Admit AllEnabled 
3GE3Access1Admit AllEnabled 
4GE4Access1Admit AllEnabled 
5GE5Access1Admit AllEnabled 
6GE6Access3Admit AllEnabled 
7GE7Access3Admit AllEnabled 
8GE8Access3Admit AllEnabled 
9GE9Access3Admit AllEnabled 
10GE10Access3Admit AllEnabled 

 

VLAN ID = 1

ports 1-5 untagged   PVID checked

ports 6-10 forbidden no PVID

 

VLAN ID = 3

ports 1-5 excluded no PVID

ports 6-10 untagged  PVID checked

 

 

 

 

 

 

 

1
GE1
WAN
Connected
1000M/Full Duplex
Access
  
2
GE2
LAN
Connected
1000M/Full Duplex
Access
1
1
3
GE3
LAN
Connected
1000M/Full Duplex
Access
1
1
4
GE4
LAN
Not Connected
Auto
Access
1
1
5
GE5
LAN
Not Connected
Auto
Access
1
1
6
GE6
LAN
Not Connected
Auto
Access
1
1
7
GE7
LAN
Connected
1000M/Full Duplex
Trunk
1,3
1
8
GE8
LAN
Connected
1000M/Full Duplex
Access
2
2
9
GE9
LAN
Connected
100M/Full Duplex
Access
2
2
10
GE10
LAN
Connected
1000M/Full Duplex
Access
2
2
     
LAN
 
 
       
 
       
 
       
 
      
      
      
      
      
      
 
 
  
 
 
       
       
       
       
       
       
       
       
       
       
       
 
     
 
  
 
           
 
 
 
 
 
 
 
 
 
 
 
 
  
 
 
      
      
      
      
      
      
      
      
      
      
    
2 Replies 2

Mark Malone
VIP Alumni
VIP Alumni

Hi is this switch going to be layer 2 or layer 3 as currently it looks to be configured for intervlan routing but its set as L2 , how is it connecting to the other switch by trunk or ip ?

Firmware Version (Active Image): 1.3.0.62 System Operational Mode: L2 Mode

if its layer 2 you need to trunk it if its layer 3 ip the switch needs to be operating in l3 mode and should only have 1 management ip to be reachable everythiong else in te5rms of vlans should be purely layer 2

L3 mode allows inter vlan routing and for multiple layer 3 SVI Vlan interfaces

http://www.cisco.com/c/dam/en/us/td/docs/switches/lan/csbms/sf30x_sg30x/administration_guide/78-19308-01.pdf

Mark, thanks for the reply.

We do not want VLAN1 and VLAN3 on the switch talking to each other.  That's why it was left at Layer 2.  

Port 7 is set to Trunk (if it's not showing on the diagram, I have tried it as Trunk and Access, neither worked.

It seems like the problem is in DHCP somewhere, as when we connect to the VLAN3 ports it's not giving us a correct IP address on the Guest VLAN or allowing Net access.

 

Thanks, Jim