SG2008P - How to getting the switch into Management VLAN

SG2008P - How to getting the switch into Management VLAN

SG2008P - How to getting the switch into Management VLAN
SG2008P - How to getting the switch into Management VLAN
a week ago - last edited a week ago
Model: SG2008P  
Hardware Version:
Firmware Version:

Hi, I want to separate my network into different VLANs and now I am humbling over how I get the switch in my Management VLAN without loosing access temporarily.

 

My setup: My router is a FritzBox 5690 pro (no management). Currently the switch is available under https://192.168.178.171 which is gathered from the FritzBox via DHCP. 

 

I configured in the switch's menu under L3 Features -> Interface an addidtional one:

Interface ID IP Address Mode IP Address Subnet Mask Interface Name Status Operation
 

VLAN10

Static

192.168.10.14

255.255.255.0

Mgmt Interface Switch

Up

 

 

The uplink Port 8 to the Fritzbox is configured to be in the VLAN10 (tagged) and VLAN1 (untagged). The Port 7 to my homeserver where my vlanrouter resides in a Proxmox Container is also tagged with VLAN10.

 

The vlanrouter contains Forwarding iptables from 192.168.178.0/24 to the VLAN 10 network. 

 

A route from my PC to the gateway of VLAN 10 exists.

 

I can successful ping from my management PC the 192.168.10.14. But if I want to reach 192.168.10.14 via the browser (http and https), I can't access the Management IF.

 

I also have setup omada LXC on my proxmox and can successful perform a configuration. Anyway, the omada controller which is also in the management VLAN IF is not finding the switch although I have set an addiational interface (see above).

 

Questions:

What is best practice to protect the Management switch IF? 

Do you have any ideas why a ping is coming through but the webserver isnt reachable via 10.14?

Any ideas why omada controller can't find my switch?

 

Thanks for your help.

 

PS: I will deliver the iptables as soon as I have access to my home network again.

 

Bernd

  0      
  0      
#1
Options
8 Reply
Re:SG2008P - How to getting the switch into Management VLAN
a week ago
Here are the ip tables: 22 ACCEPT tcp -- 192.168.178.0/24 192.168.10.14 tcp dpt:443 /* TEMPORARY Switch HTTPS WebUI (FB-Netz) */ 23 ACCEPT tcp -- 192.168.178.0/24 192.168.10.14 tcp dpt:80 /* TEMPORARY Switch HTTP WebUI (FB-Netz) */
  0  
  0  
#2
Options
Re:SG2008P - How to getting the switch into Management VLAN
a week ago

  @topcaser 

 

In standalone mode Omada switches do not have a default gateway setting.  For the Switch SVI on the  management vlan 10 to be able to route its response back to you, you will need to add a static route on the switch 0.0.0.0 / 0.0.0.0 > Fritzbox vlan 10 gateway IP (or wherever you want to route it to)

  0  
  0  
#3
Options
Re:SG2008P - How to getting the switch into Management VLAN
a week ago

I applied exactly this route, but still the same, no access from 192.168.10.14 to the management if. The AI says:  "Only the primary Management IP supports web access. Additional VLAN interfaces can be used for routing and ping, but not management access." https://community.tp-link.com/en/business/forum/topic/595460 and  https://www.tp-link.com/de/support/faq/3534/

 

If this would be true, I am wondering why the management offers this and how I can securly operate the switch. The route I applied look like this:

Protocol Destination Network Next Hop Distance Metric Interface Name
Static
0.0.0.0/0
192.168.10.1
1
0
VLAN10
Connected
192.168.10.0/24
192.168.10.14
0
1
VLAN10
Connected
192.168.178.0/24
192.168.178.171
0
1
VLAN1

 

This is from my admin PC: 

PS C:\Users\bernd> curl -v https://192.168.10.14
*   Trying 192.168.10.14:443...
* schannel: disabled automatic use of client certificate
* schannel: using IP address, SNI is not supported by OS.
* ALPN: curl offers http/1.1
* Recv failure: Connection was reset
* schannel: failed to receive handshake, SSL/TLS connection failed
* closing connection #0
curl: (35) Recv failure: Connection was reset
PS C:\Users\bernd> ping 192.168.10.14

Ping wird ausgeführt für 192.168.10.14 mit 32 Bytes Daten:
Antwort von 192.168.10.14: Bytes=32 Zeit=2ms TTL=64
Antwort von 192.168.10.14: Bytes=32 Zeit=1ms TTL=64
Antwort von 192.168.10.14: Bytes=32 Zeit=2ms TTL=64
Antwort von 192.168.10.14: Bytes=32 Zeit=1ms TTL=64

Ping-Statistik für 192.168.10.14:
    Pakete: Gesendet = 4, Empfangen = 4, Verloren = 0
    (0% Verlust),
Ca. Zeitangaben in Millisek.:
    Minimum = 1ms, Maximum = 2ms, Mittelwert = 1ms
PS C:\Users\bernd>

 

As you can see, ping is workin, the curl command not. These are my relevant forwarding rules:

 

vlanadmin@vlanrouter:~$ sudo iptables -L FORWARD -v -n --line-numbers
[sudo] password for vlanadmin:
Chain FORWARD (policy ACCEPT 550 packets, 123K bytes)
num   pkts bytes target     prot opt in     out     source               destination
1    2666K 2138M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED /* Allow return traffic for established connections */
4       28  2223 ACCEPT     tcp  --  *      *       192.168.178.0/24     192.168.10.13        tcp dpt:22 /* TEMPORARY SSH Admin→omada (FB-Netz) */
6        0     0 ACCEPT     udp  --  *      *       192.168.10.0/24      192.168.178.101      udp dpt:53 /* TEMPORARY DNS VLAN10→Pi-hole (FB-Netz) */
7        0     0 ACCEPT     udp  --  *      *       192.168.30.0/24      192.168.178.101      udp dpt:53 /* TEMPORARY DNS VLAN30→Pi-hole (FB-Netz) */
12      40  2400 ACCEPT     tcp  --  *      *       192.168.10.0/24      0.0.0.0/0            tcp dpt:80 /* HTTP VLAN10→Internet */
13      63  4452 ACCEPT     tcp  --  *      *       192.168.10.0/24      0.0.0.0/0            tcp dpt:443 /* HTTPS VLAN10→Internet */
22      24  1440 ACCEPT     icmp --  *      *       192.168.178.0/24     192.168.10.14        /* TEMPORARY Switch ICMP WebUI (FB-Netz) */
23     150  7800 ACCEPT     tcp  --  *      *       192.168.178.0/24     192.168.10.14        tcp dpt:443 /* TEMPORARY Switch HTTPS WebUI (FB-Netz) */
24      41  2132 ACCEPT     tcp  --  *      *       192.168.178.0/24     192.168.10.14        tcp dpt:80 /* TEMPORARY Switch HTTP WebUI (FB-Netz) */
25   12502 2786K DROP       all  --  *      *       192.168.10.0/24      0.0.0.0/0            /* Default deny from VLAN10 */
26      58  3040 DROP       all  --  *      *       0.0.0.0/0            192.168.10.0/24      /* Default deny to VLAN10 */

 

And here is my VLAN Setup:

VLAN ID VLAN Name Members Operation
 
1
System-VLAN
1/0/1-8
 
 
10
Management
1/0/7-8
 
 
     
 
 
     
 
 
     

 

The PVIDs of each port are in VLAN 1, My port 7 is the downlink to the homeserver, port 8 the uplink to the fritzbox which isn't able to understand VLANs.

  0  
  0  
#4
Options
Re:SG2008P - How to getting the switch into Management VLAN
a week ago

  @topcaser 

 

Have you ticked the "Admin" and "Routing" mode on the vlan interface?

  0  
  0  
#5
Options
Re:SG2008P - How to getting the switch into Management VLAN
a week ago

  @GRL Yes, I did. I just double checked and can confirm:

Interface ID: 10

IP Address mode:  Static

IP Address: .10.14

Admin Status: Enabled

Interface STatus Up

Line Protocol Status Up

  0  
  0  
#6
Options
Re:SG2008P - How to getting the switch into Management VLAN
a week ago

  @topcaser 

 

I dont have a 2008P in standalone mode to play about with, but you definitely can and should be able to reach the switch management page on all "Admin" set interfaces.

 

This is a non-management interface on one of my switches

  0  
  0  
#7
Options
Re:SG2008P - How to getting the switch into Management VLAN
a week ago

  @GRL I also enabled temporarily access via port 80 to exclude certificate problems, but it also don't work. You are absolutely sure that I should reach with my setup the admin page on both (in parallel), the 

1. https://192.168.178.171 -> my Fritzbox net, which I want to disable as soon the admin interface is in the Management zone

2. https://192.168.10.14 -> my static ip in the admin zone. 

 

If this is true, something blocks. What do you recommend? Remove temporarily the drop rules? Any hints to debug the situation?

  0  
  0  
#8
Options
Re:SG2008P - How to getting the switch into Management VLAN
a week ago

I can't believe it. Two NAT MASQERADE rules did the trick:

    0     0 MASQUERADE  tcp  --  *      *       192.168.178.0/24     192.168.10.14        tcp dpt:443
    0     0 MASQUERADE  tcp  --  *      *       192.168.178.0/24     192.168.10.14        tcp dpt:80

 

  0  
  0  
#9
Options