Very long post, but trust me, there are questions at the end
After playing (and posting around this forum) with VLANs on “baby” equipment (CRS1xx series) I finally listened to wise people saying I should get real switches and moved on to the 3xx series, buying CRS326 and CSS326, and also one RB4011. Task remains the same, which I will try to briefly explain before moving on to my setup.
ISP provides internet (native vlan), IPTV (vlan), VOIP (vlan). The tv-boxes, despite broadcast being on iptv vlan, apparently also require native vlan connection, which ISP uses for remote firmware updates etc. Don’t ask me how, let’s just take it as fact.
ISP does not mind if I use “dumb” switches in front of my router, in order to split their signal into multiple cables which lead to multiple TV set-top boxes.
Existing setup is: ISP to dumb-switch1, from there one cable to TV-box, second table to router (behind which sits my internal network), and third cable to dumb-switch2 (and from here 4 cables to wall sockets for iptv).
(by a dumb switch I am refering to a most basic switch without management features, capable of forwarding also vlan frames – …no-name low cost switches for 10 EUR do the job just fine)
Goal: get rid of the dumb switches and use CRS326 and CSS326 to carry both – ISP network and my internal network.
Restrictions: ISP should not be able to see nor be aware of any of my internal devices, except the connection to router WAN port.
On my internal side I use 4 VLANs (22,25,1978 and 1112). Although the 1112 as per current physical setup does not need to be a VLAN, I rather have it future proof just in case I would need it elsewhere.
I have read few posts on this forum. The switchOS documentation is unfortunately little too narrow on information, which leads varying interpretations of what it means.
Therefore, with reference especially to (but not only) this post (viewtopic.php?p=1017926#p1017926), I have few questions below pictures of my setup.
Overview: Notes:
- Colors have two meanings: (1) on CRS326 and CSS326 they show port-isolation groups, i.e. only ports of the same color can forward communication between themselves; (2) color also depicts the VLANs which should be available on these ports (yellow=ISP VLANs, green=internal VLANs, blue=special internal VLAN).
- Under each port box you find information to where the cable from that port goes… (if empty, there is just a port number).
Inside each port box you have information which VLAN it is carrying (in general, one VLAN number means it is access port – usually also includes text “access” or “acc” or “a##”; multiple VLAN numbers mean it is a trunk port with tagged VLANs; two ports on CSS326 – e9 and e23 – run in hybrid mode with access for 22 and tagged for 1978 – this is for testing purposes). - CSS326-ether11 runs a trunk to a TP-link smart switch, which is not shown on the picture but it is not relevant (just for info, everything works as expected for devices connected to the TP link)
- Once setup is confirmed, I will run bonded connections (e.g. CRS 5&6 to CSS 1&2; CRS 7&8 to RB4011 2&3). But for now, bonds are not even defined and cables are not plugged-in, so there is just single cable link connecting switches/router as depicted.
- On RB4011 ports are not bridged, everything is routed. VLAN interfaces for vlan 22,25,1978 are defined under ether2 and vlan interface for 1112 is defined under ether5. DHCP servers run on each VLAN interface with appropriate network definitions, ip pools, etc.
CRS326 configuration screens:
System Port-isolation RSTP VLAN VLANs
CSS326 configuration screens:
System Port isolation RSTP VLAN VLANs
RB4011 configuration:
I am not sure if anything beyond what I wrote in Notes above is necessary, but if yes, please let me know and I will post relevant export.
Questions (finally):
- Can we please clarify relationship between port isolation and vlans? Specifically, it is usually simply siad “using both could cause problems”, but that is too generic. Sub-questions:
- Does it hurt if I have both applied, as per my setup?
- If I disable (un-tick) Port-isolation on VLAN screen, does the port-isolation definition get ignored? If yes, does it then hurt to have the port isolation defined “just in case”, if it is ignored?
- Do I understand correctly, that if I defined VLAN mode “strict” on ALL ports, then I can achieve the same effect as having port isolation? E.g. as per my setup, if on CSS326 ports 4-8 are defined as strict and belong only to ISP VLANs, and the rest of ports is also mode “strict” and belong to (and only to) one or more of my internal VLANs, then ISP will never see any of the green ports and vice-versa?
- RSTP – given my setup, should I run RSTP on internal (green, blue) ports? I certainly do not want it to run it on yellow ports (ISP can and probably should define my end as edge anyway…). I read a lot about RSTP and VLANs not liking each other, but again, the post are often misleading (e.g. saying one needs MSTP only in large setups where they want different root bridges per VLAN etc.). So in my case – is RSTP enough? Is it desired (probably yes for its potential loop protection)? Will it work?
- Use of VLAN 1 – as per the forum thread quoted above, it is not recommended. Given my explanation and setup, in my case I think it is required. Can we please elaborate on this? Can I use VLAN 1 as defined? Will it work? What are the possible consequences?
One different solution that comes to my mind is to use yellow ports in vlan mode=optional and not to define VLAN 1 as such. In such case, is my understanding correct that in such mode the native vlan of ISP will get through the yellow ports, but will never get to green or blue ports, while at the same time, if green and blue are in strict mode, even if a device on these ports would generate traffic with native vlan, it would never reach yellow ports? - Default VLAN ID – the use for me is clear in case of access ports and untagged frames, where incoming untagged frames get assigned the ID, and egress tagged with this ID get stripped.
But what is the implication if:- Port is accepting only tagged frames (probably the setting gets ignored).
- Port is accepting “any” frames (probably for untagged it is applied as if it was access port).
- How should one set the value in case port is: mode=strict; frame type=any and the port is member of VLANs for example 10,20,30? Somewhere I read that it should be set for a different VLAN id than those three. Why? My understanding is that if I set it to a different ID than the three, effectively the port becomes trunk, allowing only tagged 10, 20 or 30. If I set it to for example 10, port becomes hybrid, allowing tagged 20 and 30, but untagged gets assigned VLAN10. Is this interpretation correct?
- Finally, Is there something you propose to modify in my setup and why?
Sorry for very long post, but hopefully contains all required info and will help someone in future as well.
Cheers,
Brandon.