- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Native VLAN - what settings should I be using?
- Labels:
-
Interfaces
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The most common is for you to have a dedicated VLAN to manage, setting it as a native VLAN.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Many thanks for replying, the classroom network has internet access via VLAN 60, and so that is what I put in the switches as the management VLAN. If I'm reading your response correctly, we'd need another separate VLAN hence another route out to the internet and use that for management? I don't know how I'd get the local authority to provide us with another separate internet link just for that - probably a stupid question but is this what most setups have? A separate internet connection just for management? Thanks.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks again Alemabrahao, I'm showing my inexperience at this by asking, could you point me in the direction of how would I go about making this distinct VLAN for management, yet make it somehow get internet access (for the cloud management) from my only internet source, which is already in use by people whose machines are on VLAN 60? I do appreciate your time.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Think of the Switch mgmt IPs just like any client. They just need to be on a VLAN that can NAT out through your firewall to reach the internet/dashboard. Typical best practice is to use dedicated mgmt VLANs/subnets for infrastructure devices like Switches, AP, Cameras, etc. But they literally can be on any VLAN/subnet on your LAN as long as they can reach the internet.
For example in my network I use a unique VLAN for Switches, APs, Cameras. The mgmt VLAN for Switches is the native VLAN on my trunk ports. This allows the switch to grab a DHCP IP from the switch mgmt VLAN and this VLAN has proper firewall rules in place for it to talk to dashboard.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Ryan,
I don't have much if any contact with the company who provide the internet links, I believe they would charge for any changes to the firewall like that, so I'm guessing that is not an option I can go for at the moment. If that is the case, am I right in presuming I would have to use my only internet facing VLAN, 60 as the management VLAN, even though it is used by users too? In this case, would you still recommend I also use this VLAN as the native VLAN - would this have any impact on the setup? Sorry for all the questions.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
So, to clarify, would you recommend (presuming I can't get a new VLAN set up for management) that, in addition to having my management VLAN as 60 (my internet facing VLAN), would I also make the native VLAN on any trunks 60 also? Thanks.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Like @alemabrahao mentioned. As you wanted to be safe and stray away from default VLAN1. You're basically telling config set default VLAN to (blank) "untagged traffic is placed on the native VLAN".
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks kYutobi, so the notion of using (nothing) as the native VLAN is a bad idea?
