I am new to managed switches. I have never had to set one up. So I am not asking for the answer directly, but maybe some guidance/online tutorials. I have printed out the manual and I attempted this setup yesterday. After 18 hrs and still not internet and me not getting anywhere, I am now going to reach out and see if I can get some guidance. I have setup a DLINK DES-3528, and it is currently in production, but only default VLAN can get DHCP and I there is no intercommunication between VLANS. I have drawn up a network map on what I am trying to accomplish. I am still going to write out what I am trying to accomplish, but the network map will help with a visual. I will say that I have successfully set up the firewall with VLANS and static routing. So I do have basic knowledge.
Port 1 on NMD Setup
Internet -----> Firewall from ISP. IP is a static assignment.
VLAN 1 -----> Public Access (10.10.10.0/24)
VLAN 100 ------> Phone only (10.20.20.0/24)
I do have access to this firewall, but I do not change any settings on it due to the ISP manages this firewall. The ISP is a smaller ISP and I have a good name with the company so they gave me access to the firewall.
Port 2 on NMD setup
Internet ---> Fortigate 60E WAN. IP is a static assignment.
Fortigate Port 1 -----> Cisco switch. Port 1 has a total of 5 VLANS configured on it.
Port 28 assigned to VLAN 1 (Default 10.0.0.0/24) ----> No DHCP
Port 1-8 assigned to VLAN 100 (Domain 172.16.100.0/24) ----> DHCP & DNS comes from DC with DNS, AD, DHCP installed
Port 9-12 assigned to VLAN 101 (WiFi 10.30.30.0/31) -----> DHCP & DNS comes from DC with scope defined in DHCP
Port 13-16 assigned to VLAN 102 (NAS 10.40.40.0/31) ------> DHCP & DNS comes from DC with scope defined in DHCP
Port 17-19 assigned to VLAN 200 (Mail Server 10.50.50.0/27) ------> DHCP & DNS comes from Fortigate DHCP enabled on VLAN
Port 20-25 assigned to VLAN 300 (Phone 10.10.10.0/24) -----> DHCP & DNS comes from Firewall for phone system
Port 25-27 unassigned and locked.
DHCP & DNS Server for Domain is 172.16.100.6/24
DHCP & DNS server for Phone is 10.20.20.1/24
Each VLAN has a interface assigned with a ip of a.b.c.2 (a.b.c. = first 3 sets of ip for the vlan)
So this is what I am trying to accomplish in the end:
VLAN 1 supplies internet to all VLANS
VLAN 100, 102 can access each others resources and can access VLAN 300 network so I can manage the PBX system on 10.10.10.0/24
VLAN 101 and VLAN 200 have no communications with each other or any other VLANS on network.
VLAN 300 No communications with any VLAN except VLAN 100 for management purposes, hands out DHCP to phones attached from the DHCP server 10.20.20.1
VLAN 101 will be setup to direct known devices to VLAN 100 based on MAC address. This way the wireless computers that need access to the Domain can access VLAN 100.
I have setup static routes in the Fortigate. Tried every way I could possibly try and still couldnt get any inter communications among VLANS. Also tried setting up Static Routes on Cicso with not success. The Cisco is setup for Layer 3.
I hope I have explained this in detail, and if you have any questions please ask. I have hit a brick wall and have turned desperate for help! If you do tell me the answer, please explain the answer. This is not meant for someone to set it up for me and I walk away. I want to learn this. I have taught myself with the help of others on here everything from programming to what I know now with networking.
Information on image:
Yellow lines are hard line Cat 5e
Red dash line is WiFi
Teal line is Mail Server VLAN
Blue line going from phone to Cisco is a Cat5e comming from back of phone. It is given ip of 10.10.10.0/24
Black lines are from the phone network.
There are more devices that do connect to the network. I have been seeing performance issues due to all devices on the Domain network except the phones and Mail server. After adding the NAS server and running backups, the network does slow down. Also when there are mettings, the outside brings in the laptops and connect to the Domain network due to location of routers. I will eventually add a Cisco AirNet access point, waiting on the PoE injector. NMD is the Network Management Device. It has fiber from outside going to a 4 port switch convertor. 2 Ethernets comes out from NDM, 1 goes to Network 1 Firewall, 1 goes to Network 2 Firewall.