I've been reading, experimenting with my wifi router and a Cisco c3560-PS24 switch.
I find many different ways to configure, and am not sure what to follow, so decided to put my configuration here to get advice.
From the switch, I can see ethernet ports connect or not. From the wifi router, the active light comes on when a cable is connected to ethernet 4.
I have the Cisco switch setup to have vlan 20 vlan 30 vlan 60 and vlan 1 with vlan 1 having no ports used and only vlan 1 is assigned 192.168.10.1 address. Port 24 is a trunk. I am planning to use IP addr ranges 192.168.20.x on vlan 20 192.168.30.x on vlan 30 192.168.60.x on vlan 60.
I don't get any pings to work yet. Is my EA8300 in DSA mode? How to configure to get a ping through that trunk to ethernet 4 on the EA8300?
Here is my network configuration below:
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fdfd:4db4:e009::/48'
config device
option name 'br-lan'
option type 'bridge'
list ports 'lan1'
list ports 'lan2'
list ports 'lan3'
config device
option name 'lan1'
option macaddr 'c4:41:1e:ad:1a:a9'
config device
option name 'lan2'
option macaddr 'c4:41:1e:ad:1a:a9'
config device
option name 'lan3'
option macaddr 'c4:41:1e:ad:1a:a9'
config device
option name 'lan4'
option macaddr 'c4:41:1e:ad:1a:a9'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option ipaddr '192.168.3.1'
option netmask '255.255.255.0'
option ip6assign '60'
config device
option name 'wan'
option macaddr 'c4:41:1e:ad:1a:a8'
config interface 'wan'
option device 'wan'
option proto 'dhcp'
config interface 'wan6'
option device 'wan'
option proto 'dhcpv6'
config device
option type '8021q'
option ifname 'lan4'
option vid '1'
option name 'lan4.1'
config device
option type '8021q'
option ifname 'lan4'
option vid '2'
option name 'lan4.2'
config device
option type '8021q'
option ifname 'lan4'
option vid '3'
option name 'lan4.3'
Here is my dhcp:
config dnsmasq
option domainneeded '1'
option localise_queries '1'
option rebind_protection '1'
option rebind_localhost '1'
option local '/lan/'
option domain 'lan'
option expandhosts '1'
option cachesize '100'
option authoritative '1'
option readethers '1'
option leasefile '/tmp/dhcp.leases'
option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
option localservice '1'
option ednspacket_max '1232'
option dhcpleasemax '8'
option dnsforwardmax '22'
option sequential_ip '1'
list server '1.1.1.1'
list server '8.8.4.4'
config dhcp 'lan'
option interface 'lan'
option start '100'
option limit '150'
option leasetime '12h'
option dhcpv4 'server'
option dhcpv6 'server'
option ra 'server'
list ra_flags 'managed-config'
list ra_flags 'other-config'
config dhcp 'wan'
option interface 'wan'
option ignore '1'
config odhcpd 'odhcpd'
option maindhcp '0'
option leasefile '/tmp/hosts/odhcpd'
option leasetrigger '/usr/sbin/odhcpd-update'
option loglevel '4'
config host
option name 'xxxx'
option dns '1'
option mac 'xx:xx:xx''
option ip '192.168.3.x'
option leasetime '2h'
option duid '00041a2759fa58209a230fee768f95b59f3a'
config host
option name 'xxxxxxx'
option dns '1'
option mac 'xx:xx:xx'
option ip '192.168.3.x'
option leasetime '2h'
config host
option name 'hp-4700dn'
option mac 'xx:xx:xx''
option ip '192.168.3.7'
option leasetime '24h'
option dns '1'
Here is my firewall:
config defaults
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option synflood_protect '1'
config zone
option name 'lan'
list network 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
config zone
option name 'wan'
list network 'wan'
list network 'wan6'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config rule
option name 'Allow ssh'
option src 'lan'
option dest_port 'xx'
option target 'ACCEPT'
Here is the redacted show run from the Cisco switch:
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname cibololan1
!
enable secret 5 xxxxxxxxxxxxxxxxxxxxx
enable password xxxxxxxxxxx.
!
no aaa new-model
system mtu routing 1500
ip subnet-zero
!
!
!
!
no file verify auto
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface FastEthernet0/1
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/2
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/3
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/4
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/5
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/6
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/7
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/8
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/9
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/10
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/11
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/12
switchport access vlan 20
switchport mode access
!
interface FastEthernet0/13
switchport access vlan 30
switchport mode access
!
interface FastEthernet0/14
switchport access vlan 30
switchport mode access
!
interface FastEthernet0/15
switchport access vlan 30
switchport mode access
!
interface FastEthernet0/16
switchport access vlan 30
switchport mode access
!
interface FastEthernet0/17
switchport access vlan 60
switchport mode access
!
interface FastEthernet0/18
switchport access vlan 60
switchport mode access
!
interface FastEthernet0/19
switchport access vlan 60
switchport mode access
!
interface FastEthernet0/20
switchport access vlan 60
switchport mode access
!
interface FastEthernet0/21
switchport access vlan 60
switchport mode access
!
interface FastEthernet0/22
switchport access vlan 60
switchport mode access
!
interface FastEthernet0/23
switchport access vlan 60
switchport mode access
!
interface FastEthernet0/24
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet0/1
switchport access vlan 20
switchport mode access
!
interface GigabitEthernet0/2
switchport access vlan 20
switchport mode access
!
interface Vlan1
ip address 192.168.10.1 255.255.255.0
!
interface Vlan2
no ip address
!
ip default-gateway 192.168.3.1
ip classless
ip http server
!
ip access-list standard TELNET-ACCESS
permit 192.168.3.2
permit 192.168.3.4