VLAN headache

freedomit

Well-Known Member
Reaction score
200
Im trying to setup a guest wireless network for a client but they have a mish-mash of equipment and its giving me a headache!

The setup is this...

Billion 7800NXL router -> D-Link DGS-1100-24 switch -> Draytek 902 Access Point

So the first issue is the Billion router doesn't support VLAN tagging but it does have something called 'Interface Grouping' which is basically port based VLAN. So i have setup a guest group with DHCP on another subnet and attached port 2 on the router to it, then run two network cables to the switch.

Billion.JPG

On the D-Link switch i set the following...

Default all ports - HYBRID VLAN ID 1 untagged
eth 2 (from port2 on router) - ACCESS VLAN ID 5 untagged
eth 5 (Access point) - HYBRID VLAN ID 1 untagged & VLAN ID 5 tagged

DLink.JPG

On the Draytek AP i created the following...

Wireless 1 - RPFoffice
Wireless 2 - RPFguest VLAN ID 5

DraytekAP.JPG

The problem is it doesn't work, wireless clients connecting to guest seem to take forever to connect and then get an IP in the first LAN. Also, when i connect to the second LAN with a cable i have no internet as the WAN interface isnt part of the group on the Billion and it seems it can only be a member of one group?

Any ideas what im doing wrong?
 
Looks similar to how we do VLANs when the edge device doesn't support tagging. Or even if it does, I often opt not to have the edge device terminate the VLAN. Example....when we have Untangle firewalls at the edge, Eth0 is WAN, Eth1 is primary LAN (say 192.168.10.0/24), and Eth2 might be for guest LAN (say 192.168.20.0/24). DHCP enabled on Eth2.

We typically do our guest SSIDs VLAN'd on ID6.

On the managed switch, I'll have any ports facing the APs tagged for default 1 and add tagged VLAN ID 6.

And on the switch, the port facing Eth2 on the edge device....I'll exclude VLAN 1 and untag VLAN 6.
 
Im trying to setup a guest wireless network for a client but they have a mish-mash of equipment and its giving me a headache!

The setup is this...

Billion 7800NXL router -> D-Link DGS-1100-24 switch -> Draytek 902 Access Point

So the first issue is the Billion router doesn't support VLAN tagging but it does have something called 'Interface Grouping' which is basically port based VLAN. So i have setup a guest group with DHCP on another subnet and attached port 2 on the router to it, then run two network cables to the switch.

View attachment 7310

On the D-Link switch i set the following...

Default all ports - HYBRID VLAN ID 1 untagged
eth 2 (from port2 on router) - ACCESS VLAN ID 5 untagged
eth 5 (Access point) - HYBRID VLAN ID 1 untagged & VLAN ID 5 tagged

View attachment 7311

On the Draytek AP i created the following...

Wireless 1 - RPFoffice
Wireless 2 - RPFguest VLAN ID 5

View attachment 7313

The problem is it doesn't work, wireless clients connecting to guest seem to take forever to connect and then get an IP in the first LAN. Also, when i connect to the second LAN with a cable i have no internet as the WAN interface isnt part of the group on the Billion and it seems it can only be a member of one group?

Any ideas what im doing wrong?

Seems all Goofed up, and I think it is mostly from mismatched equipment but also from a lack of understanding of VLAN tagging vs untagged.


Looking at the Billion router, I see two Group ID's, yet I am not certain what functionality a group creates. Perhaps it is is like a firewall zone whereby to pass traffic from GuestNetwork to Default you need a rule/policy to allow said traffic?

I do notice you have both the LAN and WAN in the same Group. That would be akin to the same zone, which on a trusted network makes sense. Now for just plain routing, you would typically configure virtual interfaces on different VLANs; since, at Layer-3 the VLAN tags get stripped off anyway (i.e. for routing between subnets). That is that VLAN tags survive only within a any given Layer-2 network segment. None the less, it is still completely feasible to apply IP addresses at the Interface level regardless whether or not they are on different subnets, so having both your WAN and your LAN under Default is not necessarily wrong especially if these are really "zones."


Okay, now let's say that this router does not support VLANs. It would theoretically ignore any 802.1q tags and treat all tagged or untagged traffic as untagged traffic, so it would then not matter if the Interface facing it was tagged or untagged (i.e. trunk or access interface respectively). Best practice would be to ONLY face untagged interface(s) toward it.

What an untagged interface does is transmit/receive traffic where at layer-2 the VLAN tag field is blank within the Ethernet_II frame. It transmits and receives ONLY for traffic within the VLAN of which the interface is a member.

Hence, if your Billion router does NOT support VLAN's, you cannot trunk and therefore MUST use two separate network cables. One cable would be on P1 or P3 to the switch coming into an Untagged VLAN 1 interface. The other cable would be from P2 to any interface that is untagged on a different VLAN (i.e. VLAN5).

When that DLINK switch receives UNTAGGED frame(s) on an interface that is UNTAGGED to VLAN 5, those frames exist within memory on VLAN5 whereby they enjoy isolated ARP tables and perhaps Per-VLAN-Spanning-Tree(+) if so equipped. The frame will ONLY be transmitted via other UNTAGGED interfaces within VLAN 5 or from an interface TAGGED to VLAN5. The difference being transmitted on a TAGGED to VLAN5 interface would cause it to leave teh DLINK with an 802.1Q tag.

I see where it says eth5 on that Dlink switch is TAGGED to VLAN 5 and UNTAGGED to VLAN 1. This is what Cisco and most vendors refer to as a Native VLAN. Just because this interface can talk on both VLANS does NOT cause it to convert between the two. That is to say if this port receives an individual Etherent_II frame with the 802.1q field NUL or empty it places that frame into VLAN 1 whereby if it receives a frame with the 802.1q field set to VLAN 5 it places that frame into VLAN 5.

Any given frame may be a member of only one VLAN. Any given interface can only only be untagged to only one VLAN but may be TAGGED to many VLANs.


***********

The wireless router has me confused because there is no VLAN 0; it is simply not allowed within 802.1q. You may have 1 to 4095 only. Let's assume 0 = default which is VLAN 1 otherwise contact the vendor and inquire.

I notice only the word UNTAGGED to VLAN 5. What this would mean is that the Interface is within Layer-2 segment space within the wireless AP or router's memory but that it is transmitting/reeving without an 802.1q tag. If that is the case, can you associate both SSIDs to different interfaces on the Wireless router to connect them to different switch interfaces?

If yes, split the switch logically into any two VLANs making them all access (UNTAGGED) ports. It doesn't even matter what two you use; since, you are merely making two logical switches. Hang each logical switch from the router with two Ethernet cables and connect the router with two cables via the VLANs to the router.

What is key to know is that if an UNTAGGED frame leaves a device it does NOT matter what VLAN it left... it has no information on the frame. If it then flows into another interface that accepts UNTAGGED frames it becomes a member of whatever VLAN that interface has membership.
 
With a bunch of mismatched hardware, make sure you read up on the manuals to make sure you are doing things correctly for each piece of equipment. Some devices have odd ways of doing simple things like creating VLANs.

The switch is the easiest, if your main net is on VLAN 1, then everything can be set to PVID/untagged VLAN1, except the uplink port on the switch to the firewall for the guest network interface which should be PVID/untagged 5 and that switchport should be excluded from any other VLAN. The uplink port on the switch for the AP should be PVID/Untaged VLAN1 and tagged with VLAN 5.

Your AP should have the main wifi ssid untagged and your guest wifi ssid should be tagged VLAN ID 5..not sure what to make of the Subnet option in the screenshot of the AP.

Most likely something is set wrong on the firewall... if the clients can connect to the guest wireless SSID, but dont get a DHCP address or appear to be retaining the same IP address of the previous network it was connected then they arent talking to your firewall correctly. So most likely an issue with the interface grouping/dhcp setup on the firewall. You seem to have some pre-existing configurations on the firewall of maybe a previous wireless network in the default lan group, you sure thats not conflicting with your guest lan group or the draytek? Is the router still broadcasting wifi networks with the same SSIDs that the Draytek is also broadcasting?
 
Back
Top