That was a fantastic explanation, and it's exactly what I needed to know. I have a large number of smart devices in my house, and I'm starting to run out of IP address. I'm running an Opnsense router, so now I just need to learn how to segment smart devices to 192.168.2.x, computers to 192.168.1.x, game consoles to 192.168.3.x etc. while allowing them to still talk to each other like they're on the same LAN. I know Google Home says it has to be on the same network as the devices it controls, so I have to figure out how to do this so my phones can connect to wifi on the 1.x network for example, but still detect and control devices with 2.x addresses. Off to the search bar I go!
This video was great. I wish you had a VLAN video explaining the difference between tagged, untagged, excluded, forbidden ports for VLANs. Very confusing.
Thank for you video. I did get somewhat confused towards the end about VLANs which is what I came here for but the explanations about everything before that was easy to understand. Thank you
Thank you thank you thank you. As with most things. The last 30 seconds was the most important but everything leading up to it allowed me to understand it. I thought I was an idiot. I just wasn't visualizing it properly. Thank you.
Technically these are each a private non routable networks and not subnets unless you configured them other than /24. After that this is a great way to describe this topic.
Hi great video and explanation. I have one question, how do each of the VLAN use the router to connect to the internet, considering they have x3 separate VLAN / NETWORKS ?
Each VLAN subnet would also be built on the router, by allowing only some or all VLAN tags (the street in this scenario) to pass traffic to the Internet on the router. Any traffic not matching those permitted VLAN tags would thereby not be permitted Internet access. You could use this capability to restrict Internet to certain devices on the network as well! Of course, the router must support multiple VLANS in itself, and can also be the source of other services, such as DHCP for each VLAN subnet. Robert may be able to explain better and there may be another video showing this functionality. In that setup, your layer 3 switch also acts as a psuedo-router in that it allows or forbids certain VLANs from accessing individual switch ports, essentially breaking one switch up into several smaller switches for each subnet. It's all really cool stuff and very useful in any networking environment.
I need ideas on setting up 4 VLANs. 1. For main computers, one for IoT devices, one for my guests and finally one for my Web Server to isolate it from everyone. Current my default gateway is 192.168.123.254. Subnet mask is 255.255.255.0. The web server is static on 192.168.123.104. How would you build the VLANs on a Cisco SV260w router?
After creating the vlans, you then need to apply them to each port. You will need a router to route the traffic between vlans unless you have an intervlan router which I'm not sure if this is. I will add this to my list but too hard to type it all here.
@@techpub Now If I can just get our switches setup with VLAN correctly.... I'm off to watch more videos to try and figure it out. Yours was a helpful start.
Thank you so much for this video, it cleared up a lot of confusion about why we would need to configure several VLAN-s on one switch.
Glad it was helpful!
Super useful video. I loved how you broke it down into layman's terms. Thanks!
Glad it was helpful!
Thanks for this info. I’m a VLAN rookie. Appreciate it.
Glad it helped.
That was a fantastic explanation, and it's exactly what I needed to know. I have a large number of smart devices in my house, and I'm starting to run out of IP address. I'm running an Opnsense router, so now I just need to learn how to segment smart devices to 192.168.2.x, computers to 192.168.1.x, game consoles to 192.168.3.x etc. while allowing them to still talk to each other like they're on the same LAN. I know Google Home says it has to be on the same network as the devices it controls, so I have to figure out how to do this so my phones can connect to wifi on the 1.x network for example, but still detect and control devices with 2.x addresses. Off to the search bar I go!
Glad it was helpful!
finally. a SME that can explain this concept. thanks Robert
Glad it helped!
This video was great. I wish you had a VLAN video explaining the difference between tagged, untagged, excluded, forbidden ports for VLANs. Very confusing.
GOod idea. I will add it to the list.
Thank for you video. I did get somewhat confused towards the end about VLANs which is what I came here for but the explanations about everything before that was easy to understand. Thank you
Glad it was helpful!
Funny to find this video randomly and be sitting just minutes from the intersection of those streets in Glen Ellyn : )
Now that is funny. Wave to my old house for me.
Thank you for another great vid and mentioning the other vids in the series. Will watch those as well.
Glad you like them!
Great explanation, I actually understood everything.
Thanks for watching!
Very helpful. Thank you for taking the time to do this.
Glad it was helpful!
Thank you thank you thank you. As with most things. The last 30 seconds was the most important but everything leading up to it allowed me to understand it. I thought I was an idiot. I just wasn't visualizing it properly. Thank you.
So glad it helped you.
Excellent...simplicity 👍🏻👍🏻
Thank you 🙂
Technically these are each a private non routable networks and not subnets unless you configured them other than /24. After that this is a great way to describe this topic.
Thanks for watching!
Hi great video and explanation. I have one question, how do each of the VLAN use the router to connect to the internet, considering they have x3 separate VLAN / NETWORKS ?
Each VLAN subnet would also be built on the router, by allowing only some or all VLAN tags (the street in this scenario) to pass traffic to the Internet on the router. Any traffic not matching those permitted VLAN tags would thereby not be permitted Internet access. You could use this capability to restrict Internet to certain devices on the network as well! Of course, the router must support multiple VLANS in itself, and can also be the source of other services, such as DHCP for each VLAN subnet. Robert may be able to explain better and there may be another video showing this functionality.
In that setup, your layer 3 switch also acts as a psuedo-router in that it allows or forbids certain VLANs from accessing individual switch ports, essentially breaking one switch up into several smaller switches for each subnet. It's all really cool stuff and very useful in any networking environment.
@@screen-o-matic That is a great explanation and I just what I was looking for. Thanks very much 👌
Thanks for sharing this.Appreciate it!
My pleasure!
Thanks for this video , i understand now what vlan do
Glad it helped
I need ideas on setting up 4 VLANs. 1. For main computers, one for IoT devices, one for my guests and finally one for my Web Server to isolate it from everyone. Current my default gateway is 192.168.123.254. Subnet mask is 255.255.255.0. The web server is static on 192.168.123.104. How would you build the VLANs on a Cisco SV260w router?
After creating the vlans, you then need to apply them to each port. You will need a router to route the traffic between vlans unless you have an intervlan router which I'm not sure if this is. I will add this to my list but too hard to type it all here.
Fucking simple to understand from this video. Thumbs up.
Glad to hear it!
Vlan tag attached and detached on which port ? Access or trunk ?
No vlans attached to trunk ports. Only switched access ports.
Thank you!
You're welcome!
@@techpub Now If I can just get our switches setup with VLAN correctly.... I'm off to watch more videos to try and figure it out. Yours was a helpful start.
awesome thanks!
No problem!
Nice thanks
Welcome
Insightful...
Thanks for watching.