Inexpensive Budget Switch: TP Link TL-SG108E HW Rev. 3.0 With VLANS & pfsense Review

Поділитися
Вставка
  • Опубліковано 17 гру 2024

КОМЕНТАРІ • 411

  • @ronaldbarr1678
    @ronaldbarr1678 8 місяців тому +18

    The money shot!! 16 minute mark
    As a holder of an expired CCNP I credit you for reorienting my understanding about Tag vs Untag. My assumptions were the reverse
    After hours of frustration as to why I was not receiving an IP address from my firewall through my Netgear mini switch - and watching multiple videos :
    YOU were the only presenter to “nail it”
    Tag ports forward trunked VLAN tags between switches.
    Untag ports - are Members of the VLAN but strip the tag off because , IE: most people do not set the VLAN ID on their Windows NIC, so the tag would prohibit connectivity.
    You should do a new video specifically hammering home this point.
    Because Multi-Vendor VLAN trunking is a humbling experience
    Thank you sir!!

    • @MikkoRantalainen
      @MikkoRantalainen 27 днів тому

      If you ever need to debug network problems like this, learn to use `tcpdump -e -vvv` and you can use wireshark as the GUI. I had to connect our server to our corporate network and the guy maintaining the switches accidentally had marked our port as untagged (terminology between vendors is practically random) and I was inspecting the outgoing packets to verify that we tagged the traffic correctly so the problem must be at the another end.

  • @pygmaelion
    @pygmaelion 9 місяців тому +5

    In the past 5 years, nobody has made as comprehensive a video to describe the interconnection between these two exact devices.
    At least I know that I'm doing the same things someone else did, even if they aren't working.
    Cheers!

    • @pygmaelion
      @pygmaelion 9 місяців тому

      And 30 minutes later, I found the part of the video where you specifically talk about PVID settings on the switch AND on the NetGate. You're a pre-covid hero, riding out of the past to heal the networks of admins yet to ride.

  • @Appelible
    @Appelible Рік тому +10

    You are the best. I've been struggling to set VLANs up for my home network, and you explained it so clear.
    "Tagged ports are for smart devices, untagged are for dumb devices"
    What a genius!

  • @bodstrup
    @bodstrup 4 роки тому +7

    Tom that ‘odd’ cable test says ‘cable fault’. It is there to tell you the distance to a cable fault = broken cable. Gives you an indication on where to examine your walls/cable trays if you loose connection. Like when someone two rooms away decided to drill a whole right where there is a hidden cable channel. behind the plaster wall.

  • @lages5kram
    @lages5kram 6 років тому +126

    It seems that port 7 and 8 are "untagged" for both vlan 1 and 30. That might be the reason you can ping 192.168.1.2. Try to mark port 7 and 8 as "non-member" for vlan 1 to see what will happen.

    • @Printcrashrepeat
      @Printcrashrepeat 6 років тому +4

      I'd like to know the same thing, or move management to another vlan besides 1.

    • @schossel
      @schossel 6 років тому +13

      I have a Zyxel switch and that was my first thought, too. It's the same there, you set your pvid etc. but if you don't want the default net to be able to reach the management, you have to unmember VLAN 1 for these ports. I think this is a universal thing and nothing special or is it? As far as I know, Zyxel even mentions this either in the manual or in one of their youtube videos.

    • @timstallard468
      @timstallard468 6 років тому +9

      I'm not familiar with this exact switch, but it appears to be very similar to the equivalent Netgear product (the GS108Ev3), and I suspect it may use the same chip. On the Netgear at least, the management interface is available on any untagged port, regardless of the pvid and tagged/untagged setting on VLAN1. This also means that ethernet frames with a VLAN tag of 1 will not be treated as management traffic, which can cause issues if you intend to tag all of your VLANs on a link back to a router and then manage the switch from another VLAN, for example. You end up having to leave VLAN 1 (or whatever is your management vlan) untagged, and every other VLAN tagged.
      I ended up replacing that with a GS108Tv2, which has support for management on a VLAN, SNMP, 802.1x etc as mentioned in another comment.

    • @GavinPeters
      @GavinPeters 6 років тому +1

      It makes no sense to me to be able to have more than one untagged VLAN on a port. However I agree that the Management access 'issue' is linked to this.

    • @IvanHall03041986
      @IvanHall03041986 6 років тому +1

      I know that you are right, I had the same issue occur on a netgear - if you have multiple untags, it actually bBRIDGES the vlans _ i was super confused until I remembered it wasnt a fully managed switch. where ACCESS/UNTAGGED explicitly means only = 1 vlan on the interface

  • @SpazHeadSlotVideos
    @SpazHeadSlotVideos 6 років тому +17

    Thanks Lawrence for posting these videos, this one help me understand VLAN's, and tagged and untagged. Now I have my WIFI on a different VLAN and my Security system on another VLAN.

  • @GiorgioAresu
    @GiorgioAresu 6 років тому +8

    Thanks for these guides/tutorials/reviews that do not stop at showing the product but actually show the configuration and how to do stuff with pfsense :)

  • @lmaoroflcopter
    @lmaoroflcopter 4 роки тому +23

    Time domain reflectometery. That's what the faulty line test is doing to determine the length of the broken/open cable. Very very cool feature to be included in the switch.
    Send a pulse down the cable, time the reflected signal and analyse the phase. A shorted cable, would be inverted. An open cable would not be.

    • @bryanarnold8543
      @bryanarnold8543 2 роки тому

      Wow. You're dropping some knowledge here. Sounds like you've worked with low voltage wiring quite a bit.

  • @timrobertson8242
    @timrobertson8242 2 роки тому +29

    A while back I had the management bleed over problem described and where I had the switch made this a deal breaker. Today, I upgraded the Firmware (I have V3 hardware revision) because I was encouraged by the bug fix text. After wrestling with the .1q VLAN interface, I was able to eliminate access to the MGMT web interface on the non-Default VLAN! The key was assigning the Port as untagged on the new VLAN (add/update button), then removing VLAN 1 from that Port (add/update button) followed by Apply.

    • @defilogic6726
      @defilogic6726 2 роки тому

      oh. good advice! I will have to try that!

    • @TheCoolLama
      @TheCoolLama Рік тому +2

      Nah, I don't believe that. I got the v5 with latest firmware and still can access management interface from any vlan (even when no ports use default/native vlan1). I just tested it. I checked forums discussing this issue from several years back until now still active (@ netgear forum) and problem is still there for v3 as well. You probably didn't test using same subnet as management, do this and report back. I dare to bet you can still access it.

    • @timrobertson8242
      @timrobertson8242 Рік тому +2

      I tested again and you appear to be correct. I have replaced my TP-Link with a D-link DGS-1100 that has an explicit lock down of the MGMT.

    • @TheCoolLama
      @TheCoolLama Рік тому

      @@timrobertson8242Thanks for getting back to me so fast. I never heard of the D-link DGS-1100, but I've checked it quickly and it seems this should work from the datasheet and documentation, as you can specify the management interface's vlan under L2 features, so thank you very much for your fast reply, as this managed switch doesn't cost that much more than the tplink and netgear with their security flaws, so I've it on my list to order next (always looking for affordable managed switches that don't break the bank), excellent!

    • @Khundire
      @Khundire Рік тому +2

      I have a TL-SG108E v4.0 but not using VLANs at all (for the time being) and after seeing this video I also wanted to confirm this Admin webUI "leak". The first thing that crossed my mind is precisely that in the video ou keep Default VLAN1 on ALL ports (1-8). I went to my switch, added port 7 to another VLAN, removed port 7 from Default et voilá. No access to webUI (like supposed to). I have seen this comment being repeated all over youtube (other channels) and I would even consider buying another brand Zyxel if it wasn't the fact of already having this little TL-SG108E and being able to test it on the spot.

  • @hannesogrady8920
    @hannesogrady8920 5 років тому +3

    FYI. On the cable test. If your plugged in LAN Cable that has any broken strands then it will show up under cable fault.
    It tells you how far down the cable length you will find the broken aria so you can fix it.
    That is why it does not show under the cable fault when a working cable is plugged in.

  • @staaldak
    @staaldak 3 роки тому +4

    18:27 Personally I dont think you found a flaw. You misconfigured your vlans. Ports 7 and 8 are also avliable in vlan 1. Go back to your vlan settings, select vlan 1 and set ports 7 and 8 as 'not member' and save. Problem solved. And i am not even an IT specialist, just a hobbyist who prefers setting things up myself as opposed to hiring so called network specialists who miss these details.

  • @ILikeZerg
    @ILikeZerg 3 місяці тому

    I bought one of these to start messing with vlans a couple weeks ago and couldnt figure it out haha you are the only person to have made this video in the last 6 years. so thank you

  • @thedosiusdreamtwister1546
    @thedosiusdreamtwister1546 5 років тому +5

    Untagged traffic defaults to VLAN 1. So does all of your layer 2 control traffic. It's defined in the specification and covered on both the CCNA and Net+ certifications.

    • @SomeTechGuy666
      @SomeTechGuy666 2 роки тому +1

      So this switch is not suitable for connecting PCs to directly ? PCs generally send untagged packets. All untagged packets go to the VLAN1 group, which is every port on the switch ? Or how does that work ?

  • @DGTubbs
    @DGTubbs 2 роки тому +6

    Thank you very much! This was succinct and comprehensive. It was also relevant easy to understand. I have Network Chuck, but I've also been looking to add some other quality channels who discuss networking. I look forward to more videos from you.

  • @benjaminjames7856
    @benjaminjames7856 11 місяців тому

    Thanks for this video, and many of your others too. Im a 100% network noob and 6 weeks after buying a protectli vault for pfsense I still can’t get it working properly and am certain my network is still compromised.
    None of my slow and painful progress would have been possible without your videos, so once again, Thank you

  • @adrianTNT
    @adrianTNT 5 років тому +5

    0:56 I like to see plain brown cardboard when I buy something, that tells me I paid for the actual product inside and didn't pay for fancy boxes, carring pouch, and so on.
    Some people feel special when they buy something with a "premium" feel box, something is wrong with them :)

    • @ChadAmI80
      @ChadAmI80 5 років тому +1

      I agree. I also own a small manufacturing/retail business and our biggest product expense is packaging. Shiny costs $$$. When I'm looking for network gear I want the most plain jane box possible. No need to waste even $1 on a box.

    • @UNcommonSenseAUS
      @UNcommonSenseAUS 4 роки тому

      yes, fools are often overly impressed by shiny things... look at a certian "demographic" that like chrome wheels, diamond "teef" gold chains, big asses, blinged out "gats" and double digit iq's
      simple things entertain simple minds

  • @zyghom
    @zyghom Рік тому +1

    21:00 I don't think you are right with saying that when you computer is connected to port 8, switch should prevent your computer to get IP from another subnet - if I am not mistaken, switch has nothing to do with your IP - especially if you set it up manually. What swicht did however is: it blocked you from being able to ping from 1.9 to 1.1 when you were connected to VLAN 30 port. Just saying and maybe I am wrong but switch has nothing to say about which IP you set up manually on your end device.

  • @tommajor2940
    @tommajor2940 6 років тому +7

    I would think that if you un-assign ports 7 & 8 from the default VLAN (1) you might not be able to connect to that network with a static IP address from ports 7 & 8. Unless of course your static IP address is on the 30 subnet that last comment does not apply.

    • @SamLivingLife
      @SamLivingLife 6 років тому +4

      I was thinking the same thing. Seems that the ports 7 and 8 are on both untagged vlans. The screen at 16:00 shows ports 7 and 8 as untagged on both vlans.

  • @arXiv76
    @arXiv76 6 років тому +13

    White glove service, my favorite. Thanks for the break down, I was looking at this device.

  • @Dang_Jim
    @Dang_Jim 6 років тому +13

    I use their 8 port non-managed gigabit switch and it has been working extremely well!

    • @pratwurschtgulasch6662
      @pratwurschtgulasch6662 3 роки тому +1

      i would not even bother with unmanaged switches these days, the cost is about the same but you get so much more out of a managed switch, just saying.

  • @alexd5637
    @alexd5637 6 років тому +11

    It is common for switches without "management vlan" option to allow traffic to the management IP on all vlans. It is more of a feature, especially for an office switch. Even when the pvid of 1 is not there .. It could be worse, you could have a Catalyst that forwards any traffic with destination port 179 to the management CPU.. That is fun ..

    • @Khundire
      @Khundire Рік тому

      To my understanding Default VLAN is the one that gives access to Admin WebUI. It sort of makes sense to not be able to removed it but you can configure it and limit which ports have access to WebUI. From the other small business/home switches I have seen so far I would still go with TL-SG108E.

  • @RipVanWinkle_Nature_Discovery
    @RipVanWinkle_Nature_Discovery 6 років тому +6

    VLAN1 is your default vlan and is enabled when you first create your vlans on the switch. You cannot delete VLAN1 but you can disable it (for security reasons) Works similar to cisco. If you've worked with cisco switches, its not an odd behavior.
    What is odd though, is that there's no security settings to access the management port.
    Good breakdown of the switch and thanks for the demo.

    • @RipVanWinkle_Nature_Discovery
      @RipVanWinkle_Nature_Discovery 4 роки тому

      @@DistantComputer Have you tried creating other vlans? For ex: VLAN10 or any other number? Make the new vlan you created the default vlan. Remove vlan1 from any prots. Then it's basically disabled.

    • @RipVanWinkle_Nature_Discovery
      @RipVanWinkle_Nature_Discovery 4 роки тому +1

      @@DistantComputer Glad you found it.

    • @Wahinies
      @Wahinies 3 роки тому

      The TL-SG1024PE I had configured did not allow removing vlan1 membership of any ports. When consulted, tplink said this was an antilockout feature.

    • @Serwer-v3e
      @Serwer-v3e 11 місяців тому

      A and he thought he had discovered America!
      Vlan 1 is crucial here

  • @jamesmaine8438
    @jamesmaine8438 6 років тому +6

    Love your videos..New to VLANS and your videos give me ahead start...Was able to get my SSID's on different VLANS :)

  • @Max34557
    @Max34557 6 років тому +8

    I personally use this switch. It’s very good for the money, but the only thing that bothers me is that the management page is accessible from every VLAN.

    • @christinolian4972
      @christinolian4972 5 років тому +4

      that is manage switch? Why the box say Unmanaged ?

    • @sitte24
      @sitte24 5 років тому +4

      @@christinolian4972 because names come from the marketing team and they just don't know anything...

    • @christinolian4972
      @christinolian4972 5 років тому

      @@sitte24 Thanks

  • @olivernote9162
    @olivernote9162 5 років тому +18

    I bought one at Fry's Electronics for just under $20 on sale with my employee discount. They are really cheap switches.

  • @shafeisharif7800
    @shafeisharif7800 3 роки тому

    I have learnt so much from you. Thank you

  • @donireland6218
    @donireland6218 Рік тому +1

    Thanks for this video. I have the 5 port version and was having an impossible time getting it set up to use VLANs. I was even working with their tech support and they weren't able to communicate how to get it working. Followed your video and had it working in 5 minutes.

  • @aguyandhiscomputer
    @aguyandhiscomputer 6 років тому +7

    Love how you open the cases. Something I never do but should try sometime.

  • @JeffHiggins
    @JeffHiggins 6 років тому +13

    I have the Netgear GS108Tv2, the hardware is almost identical, it definitly uses the exact same case, but it does offer a LOT more features in the software, a lot of things you will find on an enterprise switch, things like LLDP, SNMP, STP, 802.1x, ACLs, etc., it does cost a little more though, $70 on Amazon, so it's up to you if you want to spend the extra $30 for more features.
    I do kinda have it running in an enterprise environment, but as an R&D switch and not as the main switch, it's been running reliably for many years now.

    • @BillyDickson
      @BillyDickson 6 років тому +1

      Jeff Higgins I use the same switch at home, works a treat when combined with a Ubiquiti wireless access point and a pfSense router (Separate SSID and VLAN’s)

    • @rajilsaraswat9763
      @rajilsaraswat9763 6 років тому +1

      Jeff Higgins Can you assign a management vlan on it?

    • @JeffHiggins
      @JeffHiggins 6 років тому +1

      I just double checked and yes you can.

    • @koobydotnet
      @koobydotnet 6 років тому +1

      I have two of these, the v1 and v2. Every 3 months, VLANs would stop being tagged which is extremely frustrating. I contacted support and they recommended updating the firmware but seeing as it takes 3 months for the issue to occur again, I cannot be bothered. Maybe I can try updating and set up a test bed but I just need my VLAN tags to work because if I am not home and I am trying to access something remotely to which the bug occurs, it sucks.
      I have a GS724T though and it's practically flawless.

    • @koobydotnet
      @koobydotnet 6 років тому

      Moreover, I had Netgear support check the firmware update logs and there's no mention of this issue.

  • @davidstievenard6313
    @davidstievenard6313 6 років тому +10

    it seems that 8021q pvid vlan settings is something cisco refers as "native vlan" = the vlan that will not be tagged in a trunk port

    • @son_go_ma
      @son_go_ma 5 років тому +11

      This can be a little confusing because terms vary from manufacturer / switch software indeed. Afaik, it's security *gospel* that "VLAN Trunk ports should NEVER be on the native VLAN 1" (by "be on a native VLAN 'x'" we mean their PVID 'x' here), and as a corollary *"Thou shall NOT use native VLAN 1 for anything in prod."*
      Basically, the underlying idea is that Native VLAN 1 (this means, NO VLAN, it's the default / untagged VLAN) is insecure as an attacker reaching the switch would either reach it untagged or be able to untag itself from any VLAN header. This is why neither data (traffic passing through the switch) nor management (traffic aimed at administrating the switch) should ever be on VLAN 1. Obviously, neither should a trunk port.
      So take away, compared to Tom's video, where the Trunk to pfSense is Port 1:
      - PVID for this port should be some VLAN =/= 1, e.g. VLAN 10 named "LAN".
      - By extension, you'd put all the other used ports PVID to this "base" VLAN 10, and add them as "untagged" for VLAN 10 (do NOT add trunk ports to untagged anything otherwise you "break" the trunk on entry; only tagged traffic goes into trunk ports).
      This would ensure that all machines connected to the switch are on VLAN 10, never 1. Including pfSense and the Wi-Fi station, which would communicate over VLAN 10, not 1 (for instance if the wifi AP is set to DHCP for its own address, it would get an IP from pfSense's interface on VLAN 10 by default, since port 4 where it's connected, a trunk port, has PVID 10 by default). This means all ARP traffic, DNS, ICMPv6 etc is *always* on some VLAN, 10 by default, another one if specified.
      ____
      You can go 1 step further for security. The management port (should you dedicate one) and IP of the switch itself could be entirely segregated, e.g. port 5 on VLAN 55 (no interference between "data" and "management" traffic, the latter (VLAN 55) never goes into data trunks (VLANs 10, 20, 30, etc).
      Such a setup is easy and doable with this $40 switch. It's imho the next best thing after "out-of-band" i.e. physically different network for management, using a dedicated VLAN and never sharing ports (you're just "spending" 1 port per switch or router for this. I think it's worth it in terms of security because unprotected switches seem like a low-hanging fruit for hacking bots afaik.

  • @jeffcloninger8725
    @jeffcloninger8725 6 років тому

    No kidding 2 weeks ago I set up my first home pfSense box with this switch and my first unifi ap's. You're running about a week behind when i need you lately! Thanks much though, love the videos.

  • @guvanch.o
    @guvanch.o 2 роки тому

    Thanks, dude! Successfully configured 2 WLAN & LAN for pfsense with just two NICs.

  • @dkode80
    @dkode80 3 роки тому +1

    Thank you for the clear example with hardware. This is the first video where I had an ah-hah moment with us tagged/tagged options as I have this switch and was going to start to configure for vlan traffic

  • @hottroddinn
    @hottroddinn 2 роки тому

    Many, many great videos, Lawrence. I think the last combination video to do is have this switch work ESXi where the VLANs are configured on the switch and the firewall is giving out IPs from the DHCP server running on it and the VMs getting them. That's going to be the ultimate video **chef's kiss**

  • @tobiasputmanphotography5
    @tobiasputmanphotography5 5 років тому +4

    I have an 8 port PoE (TL-SG2210P) in my homelab for AP's and VoIP phone and for that it's excellent. It's a little higher end than that one I believe, really like it for home use. Would not put in in a corporate network. Liked the review! Nice overview and very complete. 10/10 for shiny box!

  • @DozeDaGrove
    @DozeDaGrove 3 роки тому +1

    I use these switches...they work great for me. But regarding your "VLAN hopping" comment at 24:22...you have the switch misconfigured. Untagged ports should ONLY be in 1x VLAN and under "Untagged Ports" column (and NOT in Tagged Ports column). Tagged ports should ONLY show up in the "Tagged Ports" column (possibly multiple times for each VLAN the trunk is carrying). For "UntaggedPorts", the PVID MUST match the VLAN of that port (There is no ambiguity as untagged ports only should be configured with 1x VLAN). PVID determines what VLAN tag to associate with untagged port traffic. For trunks, the PVID still has to be configured...the reality is no UNTAGGED traffic should exist on a trunk (unless somebody messed up)...but have to put something...in my case, I tag it with an unused/unrouted VLAN.
    I agree the UI could be improved...but it is what it is.
    I actually have very similar configuration with pfSense, tp-link switches and unifi-ap...works flawlessly regarding "who can get to what".

    • @RottieHaven
      @RottieHaven 3 роки тому

      Sorry for my ignorance, just a noob trying to digest your statement above - for untagged ports (let's say a hardwired PC) are you saying that it should be defined as untagged on VLAN 1 (system-vlan) only, with the PVID set to the correct VLAN assigned for it? Rather than, like in this video, it being untagged on the VLAN it's assigned to + the PVID set to the VLAN it's assigned to?

  • @red94mr28
    @red94mr28 23 дні тому

    I believe you're able to ping the management interface (21:10) because you left ports 7 & 8 as members of VLAN ID 1. You can see this at 18:50 where you typed in "1" for the VLAN ID making it editable, you can see that ports 7 & 8 are defined as members of the management interface (VLAN 1). You should have removed ports 7 & 8 by clicking the radio buttons for each in the "Not Member" column thus removing them as members of the management interface (VLAN 1). But maybe the firmware at the time (6 years ago) didn't allow it.

  • @keithpetrino
    @keithpetrino 3 роки тому +1

    It's my understanding that LAG only reduces congestion by allowing for more simultaneous transmissions. It does not increase speed.

  • @nukedathlonman
    @nukedathlonman 3 роки тому +2

    I'm a little surprised by that - D-Links DGS1100-08 (rev B1) doesn't have https support, but it's very good when it comes to being able to lock out the administration stuff from untrusted sources. I just don't like how limited the D-link is in it's setup (no lag support, but does have trunk aggregation support, but too many limits on configurations like vlans, and some other really confusing things in it's interface if your looking to set up physical port security, etc). It's not bad, but I out grew it extremely fast.
    Of the budget switches, it's def a step up in price, but honestly for small soho style managed switches for small networks, I find Netgears tiny GS108T (V2) switch to be a real gem.
    Anyways, thanks for the review!

  • @SubliminalChaos
    @SubliminalChaos 6 років тому +3

    Thank you for the video! You give very good instructions and are easy to understand. I have brain damage and brain cancer and could follow your instructions perfectly. Again, thank you!

  • @demabkr
    @demabkr 2 роки тому +1

    The NETGEAR GS308E VLAN config works the same way like this. I tried everywhere and could not figure it out. This video was very helpful.

    • @cornellrpgdrums
      @cornellrpgdrums Рік тому

      i have the same netgear sw and unable to do vlans, did you find a way?

    • @demabkr
      @demabkr Рік тому

      @@cornellrpgdrums yes I did.

  • @wilikikilika
    @wilikikilika 3 роки тому +1

    Thanks for an easy to watch quick review, just what I was looking for, a managed switch to play with VLANs at home.

  • @Wahinies
    @Wahinies 3 роки тому +1

    I am generally happy with these but I had gotten the 24-port PoE model for a project and found a couple of disturbing things. There was not anywhere to change management VLAN or default from PVID1 and to top it off the switch would allow access from any VLAN *and* someone had found that ALL MANAGEMENT TRAFFIC WAS BROADCASTED ... in all VLANs (wtf?). Ive yet to verify that one but if securing management interface is important, look at equivalent Zyxel or Netgear switches. Then it would not accept alphanumeric characters into login passwords (I hate it when devices don't allow that)

  • @Bradley-Thomsen
    @Bradley-Thomsen 4 роки тому +2

    Shout out to you from a Solarwinds Engineer! Just noticed your sticker!!

  • @mattbunce2509
    @mattbunce2509 6 років тому +5

    I use a similar Netgear VLAN capable switch in conjunction with a SINGLE PORT pfSense server. I then use the following VLAN assignment:
    VLAN1 (native): LAN
    VLAN2: WAN
    VLAN3: Private
    VLAN4: Public (untrusted devices)
    VLAN5: VOIP (QOS Priority)
    There will obviously be some bottlenecks, but with my 50mbps WAN connection it's not something worth worrying about and it can save you buying an additional NIC for the server.

    • @spatt833
      @spatt833 6 років тому

      Thanks, what's the model number?

  • @skampp
    @skampp 3 роки тому +1

    I know this is an old video, but I enjoyed watching it. Primo content. Thank you sir.

  • @WeiserMaster3
    @WeiserMaster3 6 років тому +1

    The management interface is weird though, you can't set on which VLAN it listens. So if you would have it between your router and modem for VLAN tagging, and have it pull its IP from DHCP, it could actually get a internet routable IP adress from your ISP.
    Or did I miss something obvious?
    Either way, I just set it to static. It's reachable without problems over HTTP/S, but the ICMP based monitoring is a bit flakey..
    But for 30-40 bucks a no brainer. Works great.

  • @mattaylor5817
    @mattaylor5817 6 років тому +3

    Brilliant video ... you unpicked the weird ui that was confusing the hell out of me.

  • @BillZUpZBdZ
    @BillZUpZBdZ Рік тому

    Thanks for this!! Couldn't get an ip assigned because I had the ports tagged wrong. This video helped me get everything working!!

  • @VirendraBG
    @VirendraBG 4 роки тому +4

    10:10
    Have you tested Link Aggregation with Synology NAS? (DS 918+ etc.) with this switch?

  • @timkosem3521
    @timkosem3521 4 роки тому +1

    Oh, man, my Netgear ProSafe "Smart Managed" GS116Ev2 has the same issue with the web management. It runs straight HTTP like the TP Link you reviewed; and I was able to connect to the web console from a different VLAN than the one hosting the switch's IP address like you did by just mapping a static IP address in the same range as the switch. Doh. For the moment I guess I'll have to make sure that my admin password (with no user id, BTW), is as complex as I can make it. Thanks for pointing out this deficiency in SOHO VLAN switches!

  • @zenanon7169
    @zenanon7169 Рік тому

    Thanks...this really helped...the PVID part was what I was missing....for home vlans.

  • @GriffVicious
    @GriffVicious 3 роки тому

    still watching the video, only a minute in just purchased this myself a few days ago. From what I can tell so far is that they seem to have taken your review to heart and the box is no longer shiny

  • @MadMike78
    @MadMike78 4 роки тому +5

    The unmanaged switch seems to have a few things you can manage lol

  • @rrpedrigal
    @rrpedrigal 11 місяців тому

    Hi Tom, thanks for this. I'm really strungling with setting up unraid, pfsense vm on unraid and this top link switch. I understand now. Thank you. *subscribed*

  • @MrRyanpat
    @MrRyanpat 5 років тому +8

    The box literally says unmanaged though

    • @aaronsharp3858
      @aaronsharp3858 5 років тому +1

      I think it's labelled as unmanaged as these switches are part of the easy smart series tp link consider this not fully managed more customisable
      I have a few versions of the same switch and a bigger 24 port version
      Easy Smart means using a peice of software too manage the switch no Web ui
      Managed is normally configured using Web ui
      Tp link recently seem too have implemented a Web ui too manage the easy smart switches
      One of my 8ports and my 24 port are now configurable using Web ui or the easy smart software
      My other 8 Port is only easy smart it must be hardware revisions
      But same as was said in the video I have never had a problem with any of my tplink hardware they are reasonable priced and have a life time warrenty on the SMB Switches

  • @wiebowesterhof
    @wiebowesterhof 6 років тому +1

    Thanks for the review. It is a very basic looking, but reliable, low power use, bit of gear. I've used it mainly in bedrooms where I just wanted to run a single connection up to the main stack, but have a few drops in a bedroom, one for IOT like a FireTV, another for connecting a printer, another for laptop or other networked stuff. In LATAM, this model plus the unmanaged 24 port GBit switches are pretty popular, with DLink often used for managed switches at 3x the cost. Not ever had a problem, and the firmware has received updates over time. I agree with you that I probably wouldn't put this into a massive network, but for a smaller setup, these things would do the job. As they have no fans and are fairly temperature-robust, they are probably ideal for a small install that needs a VOIP and non-VOIP VLAN, perhaps a wifi for guests. I still have to set up my VLANs at home to do the IOT VLAN with the EdgeRouter Pro I have, but I need to plan that out beforehand. Appreciate you guys making videos and sharing your knowledge.

  • @techguy3424
    @techguy3424 5 років тому +15

    Hamburger helper glove comes to mind.

  • @MarkHimsley
    @MarkHimsley 4 роки тому

    Seems to be very similar to the Netgear GS108T, although the GS108T seems to have more features.
    The TP Link SG108E has very similar features and a more simple user-interface compared to the GS108T. The LAG, QOS and VLAN configuration is almost identical - including the VLAN and PVID settings being on two pages - which means it's super easy to lock yourself out of the switch. But the enhancements on the GS108T includes allowing you to set the VLAN that the management interface is on, which is one security issue you found on the SG108E.

  • @stephenreaves3205
    @stephenreaves3205 6 років тому +15

    Please tell me that your next video will be demonstrating and testing LAG between pfSense and FreeNas!

    • @cammelspit
      @cammelspit 6 років тому +3

      The LAGG on this switch is a static LAGG. It sucks but you can't use LACP or anything more advanced. I have two of these same switches at home and I was just forced to run some new cables and decided to drop 4 cables in the conduit instead of the 1 I had before. LAGG works but I am pretty sure it's a dumb round robin kind of thing. as my PC hits the network with traffic, each of the LAGG ports lights up at the same but one LAGG at a time literally rotating one to the other in a row and you can see it doing that by just watching the green light flash. $20 more and they have a model one step up that supports proper vendor independent LAGG implementations so if this is a feature you are wanting, just buy the better one. I haven't tried LAGG right from the pfSense because I would have no idea what to set my pfSense to to try and test it. I am still learning so my understanding is still limited on a lot of things, especially pfSense and anything more advanced than plugging it and it is a switch. Besides, I am out of ports on both right now anyways. :P

    • @attylaar
      @attylaar 6 років тому

      Yes. Its good idea. Showing LAG on Freenas with this switch and later with pfSense

  • @globalcharts369
    @globalcharts369 8 місяців тому

    21:05 normally tplink Devices has the setting in management console to disable the ping to the device. a bit late to party.

  • @fearlessknight1343
    @fearlessknight1343 2 роки тому +1

    Pretty helpful, still kinda confusing the way the GUI is represented. I always thought "Tagged" Vlans are for Vlans you want specific traffic passed through (Vlan30/40/50), whereas "Untagged" is basically any traffic being passed through. ....Guess not. :/ I have 2 of these. 1 connected to my Palo Alto FW and the other in my living room.

    • @Undertoedm
      @Undertoedm Рік тому

      Easy way to remember, tagged means it carries the VLAN ID to the next hop. Untagged means it strips the ID so it's just traffic on the subnet.

  • @onlycodered
    @onlycodered 5 років тому +3

    I’ve had ver2.0 of this switch for years now. It’s work great and has never given me any issues. Only thing I don’t like it the lack of web-based management GUI but unless you’re reconfiguring it often the Windows-based software is fine.

    • @megamaser
      @megamaser 2 роки тому +4

      What? He uses the web based management gui in this video.

    • @geraldh.8047
      @geraldh.8047 Рік тому +3

      @@megamaser that’s why Jared wrote he owns v2.0 and this review is of version v3.0.

  • @genxguy
    @genxguy 4 роки тому +1

    Great video! Really liked your description of tags vs untangled...network engineer myself but its been 15 or so years so I have forgotten a few things :)

  • @mikebroom1866
    @mikebroom1866 3 роки тому

    Just picked the 4xPoE version up for a wireless bridge to detached garage with AC LR +2 PoE cameras. Thanks!

  • @MikkoRantalainen
    @MikkoRantalainen 27 днів тому

    If you connect this device to router with DHCP, it will use whatever IP the router assigns to it. I think dot-one is perfectly fine for out of box configuration for offline configuration (which is the only safe way to configure things like this anyway).

  • @techno_john
    @techno_john 6 років тому +5

    Would love to see you review the DLink DGS-1100-08... It's going for about $35 as of this post, but has quite a few more settings than this does. I picked up one of those for my little home lab and it works GREAT, and the VLAN setup is much more sane.

  • @soggyfries4347
    @soggyfries4347 5 років тому +6

    Oh no, my friend, shiny boxes do MATTER!

  • @chrisbowie1438
    @chrisbowie1438 5 років тому

    I think the management interface is probably tied to the default vlan of 1 which is probably where your traffic goes since you statically changed the client's IP to a subnet other than what that port's Vlan is supposed to be on. Could be that is a vulnerability of the switch.

  • @Labs51Research
    @Labs51Research 4 роки тому

    the issue with 192.168.1.9 being able to ping the man interface is a feature called untagged management found in a lot of switches.. most only work in the first port.

  • @screenieman
    @screenieman 3 роки тому

    I have one and it runs really well and stable. Features I use - VLAN, Static LAGG.

  • @faisalali9290
    @faisalali9290 5 років тому +2

    TP-Link products are really awesome

  • @marcschweiz
    @marcschweiz 2 роки тому

    So informative and the explanations were clear. Thank you!

  • @tims
    @tims 6 років тому +6

    Thanks L-man! This is exactly what I was looking for to separate my IOT and guest networks from my main lan.

  • @aguyandhiscomputer
    @aguyandhiscomputer 6 років тому +5

    The config page was hard to see. Can you zoom in next time?

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  6 років тому +3

      Will do

    • @YodellingDuck
      @YodellingDuck 4 роки тому

      The core problem is, that solo many UA-camrs use screen resolution s beyond 1920x1080 on their notebooks! Makes zero sense when the final stream is 1080p at best.

  • @drtweak87
    @drtweak87 4 роки тому

    Been using these switches for yeeaaaars for small 5 and 8 port switches (Usually just get 8 as they are like 10 bucks more than the 5) and never had an issue ever with them! Probably used a hundred of them.

  • @rabbitcreative
    @rabbitcreative 4 роки тому +1

    Love that "Rage against the virtual machine" sticker. :)
    My 10-year-old Dell 610 whomps on almost every hosted VM I've played with.

  • @Greylegato
    @Greylegato 3 роки тому

    Thank you, this really helped me make a decision on what to do in my home network.

  • @LiveonWax
    @LiveonWax 6 місяців тому

    Thanks for the great informative video. I have a question, on this switch I noticed that you did not remove port 3 from being a member of the default network, but on another video you did with a the Edge switch, you did. Is it just different for this switch?

  • @RD4888
    @RD4888 Рік тому +1

    I purchased a pre loaded pfsense box and I want to access it Lan port with a laptop. How do I connect

  • @slaps1
    @slaps1 6 років тому +1

    Nice security discovery at the end there. Worrying yes, I guess but it is ok for a home network.

  • @putudipayana841
    @putudipayana841 4 роки тому

    the cable fault distance would help to find broken cable (based on the length where it ended)

  • @James_Knott
    @James_Knott 4 роки тому

    Some TP-Link managed switches have problems with VLANs. Multicasts can leak from VLAN 1 to other VLANs. I have the same problem with my TP-Link TL-WA901N access point.

  • @2acsharp
    @2acsharp 2 роки тому

    I have two of those same switch. One is attached to the firewall with several devices in the livingroom and the second is in my office fed off one of the livingroom ports. How do I set the livingroom switch to trunk the VLAN's to the office and then how do I set the uplink port in the office to provide the VLAN's to the office? I cannot figure out how to push the VLAN's between the switches.

  • @stevet6008
    @stevet6008 9 місяців тому

    Thanks Tom, I have been glued to your channel for the last month as I'm just getting acquainted with pfSense. Are you configuring pfSense handle the vlans and firewall rules? (I'm using the TL-SG2016P Managed PoE Switch). Or should I be using pfsense just for the WAN and LAN firewall, VPN, PFBlocker etc... and using the switch and controller to manage my VLANs and related firewall rules? Thank you!

  • @luismarrero9293
    @luismarrero9293 10 місяців тому

    Yes the naming also said sg1 which means unmanaged the e at the end means easy manage which allow you to see some features web base task but it is not manage switch . Good video anyway

  • @Perplexer1
    @Perplexer1 5 років тому +4

    Why does it say "Unmanaged Pro" on the box if it's a managed "Easy Smart Switch" switch ?

    • @christinolian4972
      @christinolian4972 5 років тому

      I have the same question

    • @tadejsadar7033
      @tadejsadar7033 5 років тому

      Its confusing i agree

    • @WatchfulListener
      @WatchfulListener 4 роки тому

      Its not a smart switch. Thats the SE model. And I assume unmanaged because its just L2... I guess?

  • @garyjustice8388
    @garyjustice8388 4 роки тому

    Going to the way back machine for this one. I have been using your videos to get acquainted with myself pfsense. I was looking for something inexpensive but with updated firmware an got the V.4 16 port version of this switch (TL-SG1016DE). So far does ok just set it up on my laptop with static IP on the same subnet. Plugged it in switched cables from 16 port dumb switch and away we go. Backed up the config before reboot but it held config. I will be doing VLANs next. I have pfsense with 4 port Intel nic with one as WAN from Cable provider and 2nd one to LAN. Any suggestions out there on how to manage the VLANs on this sort of setup? Welcome good advice. I already read all of the replies-comments here to this video so anything new would be great! Thanks Tom for all the informative videos and to the community for their great comments!

  • @BrianG61UK
    @BrianG61UK 4 роки тому

    Quite similar to Netgear GS308E.
    I don't understand why you left port 7 & 8 as members of VLAN 1 set?
    I see that the device might be able to figure out for itself that VLAN 1 shouldn't go to ports 7 & 8 from the pvid value but I don't think you can assume that. It might, for instance, send tagged VLAN 1 to ports 7 & 8.

  • @homeaccount344
    @homeaccount344 4 роки тому +1

    Great video as usual Tom..

  • @alphabanks
    @alphabanks 6 років тому +2

    Great video I have been using one of these for a while now so far so good. They also make a poe version that I plan on buying.

  • @leandrocosta4283
    @leandrocosta4283 6 років тому +2

    either terminal you use I loved the configuration and Linux which distribution? or how you customized?

  • @DialM4Microcontrollr
    @DialM4Microcontrollr 6 років тому +4

    Your comment near the end about not using $39 switches for Enterprise. COMPLETELY AGREE, this is a good switch for home, a home virtual lab where you use vlans, etc. Or for traveling tech like me, something to throw in the car for an emergency when you need vlans.

    • @wiebowesterhof
      @wiebowesterhof 6 років тому

      Agreed, it can be extremely useful if a client has a single network port and (with permission of their IT staff) you can just match your VLAN on this thing to get yourself on their network without using the guest network to get on VPN to get back into their network to do a job, with the guest network having zero bandwidth as it is at the bottom of the food chain haha. I've also used some variants of mini-router/APs + a dumb switch that you can power off USB. This can be used as a client to a hotel network that has the '1 user' restriction, at least in the room.

    • @pv6596
      @pv6596 6 років тому +2

      DialM4Microcontrollr how do YOU know how much better the expensive stuff is?
      Are you an electrical or electronic engineer?
      Have you studied the internals of both expensive and cheap brands??
      Have you tested the cheap stuff YOURSELF?
      Don’t you know that most electronics are made by the SAME Chinese factories??
      Don’t you know that longevity of electronics comes down to heat issues or low quality capacitors??
      (cheap brand name stuff run cooler and use quality caps!).
      I know all above and have tested the cheap (but brand name) stuff and NONE (zero) have failed in the last 10 years I have used or deployed them.
      Neeext fanboi please!

    • @dylancruz1131
      @dylancruz1131 6 років тому +1

      completely agree PV. I have 4 cheap Gigibit switches about $40 each from Netgear and I've been using them for years without any issue whatsoever!

    • @mdd1963
      @mdd1963 6 років тому +2

      I've got two 16 port GbE switches from TP-Link connecting a few offices 40 feet apart, about $80-$85 each.....; they've been working just great for 3-4 years now..... I suppose I *could* have used $800 Cisco switches, and gotten the same 110 MB/sec transfers from one office to another... What a quandary!

    • @pv6596
      @pv6596 6 років тому +1

      mdd1963 thank you, I am a realist, not a dumb ass!!

  • @warp-co-il
    @warp-co-il 5 років тому

    It's good, but I don't see value in buying new. I picked up a very similar 24 port (actually two) for the price of a new one and has waaay more features, 802.3ad trunking, VLAN blocking admin ports and SFP (and tons of other stuff). System refurbish establishments are what I'm sticking to for sure.

  • @ajishab
    @ajishab 5 років тому +2

    just bought and got the v4 hardware and it does not include the shiny box.....dammit

  • @gillianseed4419
    @gillianseed4419 2 роки тому

    I don't think being able to tell where a cable is broken is a weird feature, cisco has this feature as well.

  • @linuxdork
    @linuxdork Рік тому

    ugh! it was that freaking PVID setting that borked it all. THANK YOU!!!

  • @James_Knott
    @James_Knott 3 роки тому +1

    Be careful with TP-Link and VLANs. Some switch and access point models don't handle VLANs properly. Multicasts can leak from the main LAN to the VLANs, making it impossible to use IPv6 on the VLANs. I have experience this with an AP and others have with the switches.

  • @MrSuperpuss
    @MrSuperpuss 2 роки тому

    Question, I got a TP-link TL-WA1201 access point that supports VLAN. I was assuming it would just work out the box without anything else. Now I think I actually need a switch to configure the VLAN protocols. If I purchase the TP-link TL-SG108PE V3 switch, will I be able to successfully set up a VLAN network/wireless network without anything extra like a Pfsense?
    Currently have : ISP Router/Modem >> TP-link Acces point.

  • @velociraptor5962
    @velociraptor5962 5 років тому

    I bought one on the proviso that there would be 4 LAG options. No, it's only 2 instead, it's ports 1-4 and 5-8, so I returned it. This should have been outlined on the box. A bit disappointing.