The S3900 series switches consist of three models: S3900-24T4S, S3900-24F4S, S3900-48T4S, which are fully managed stackable Gigabit switches, equipped with Broadcom chips, supporting 10G SFP+ uplinks, designed for SMB, campus and enterprise networks.
Product Guideline
Case Study
Download
FAQ
VLAN (Virtual Local Area Network) is a technology that divides a physical LAN into multiple broadcast domains to control the broadcast storm, enhance LAN security and simplify network management. The hosts in the VLAN can communicate with each other, but different VLANs cannot communicate with each other. Consequently, broadcast packets are confined to within a single VLAN.
VLAN can be divided into interface-based VLAN, MAC address-based VLAN, IP subnet-based VLAN, protocol-based VLAN, and policy-based VLAN. This article will focus on the interface-based VLAN configuration on FS S3900 series switches which are designed for the campus network, SMB, and home network.
The following figure shows a typical VLAN networking application of S3900-24F4S managed switch. At the first floor, there are two departments—IT and sales department. The company needs that different departments cannot communicate with each other, only the hosts in the same department can access each other. Therefore, different VLANs are configured on the S3900-24F4S switch to isolate the two departments.
Based on the connected object type and the way the interface process frames, the switch ports in the interface-based VLAN can be divided into the following types:
The access port can only receive and send untagged frames because it cannot identify VLAN tags. But it can add only a unique VLAN tag to untagged frames. Usually, the access interface connects to a user terminal like user host or server.
A trunk port can allow multiple VLANs frames to get through with tags, but it can only allow frames of one VLAN to be sent out of the trunk interface without tags (that is to say: removing the tags). Therefore, the trunk interface often connects a switch, router, AP, or voice terminal that allows tagged and untagged frames to pass at the same time.
Hybrid port allows tagged frames from multiple VLANs to pass. Frames sent out from a hybrid interface are tagged or untagged according to the VLAN configuration. And hybrid port can connect with terminal devices that can receive and send tagged and untagged frames.
Notes:
Hosts in the same VLAN can communicate with each other while different VLANs can not (you must configure the trunk or hybrid port for the switch or router).
There is a default VLAN in every port. Generally, the default VLAN of all ports is VLAN 1, but users can configure it according to their requirements.
The trunk and hybrid port can be used universally in many application scenarios, but in some scenes, you must use the hybrid ports. For example, if you want to use a port to connect a network segment of different VLAN, you have to apply the hybrid interface due to that an interface needs to add tags to multiple untagged packets.
Because an access port can join only one VLAN, its default VLAN is the VLAN to which it belongs and cannot be configured. On the contrary, you can configure a default VLAN for the trunk and hybrid port due to that they can join multiple VLANs.
The following configuration is done based on the three pictures mentioned above.
The interface-based VLAN configuration of S3900 series switches can be realized via CLI and web GUI interface. And the configuration process is suitable for all modes of S3900 series switches. Here take S3900-24F4S as an example.
The configuration roadmaps are here:
Connect the PC to the switch and login to the CLI interface through the console port, Telnet or SSH.
Create the VLAN and name the ID for it.
Configure the switch port mode and add it to the corresponding VLAN.
1. Login to the S3900-24F4S switch and enter into the CLI interface.
2. Create VLAN 10 and VLAN 20 in the S3900-24F4S switch 1.
S3900-24F4S-1#configure terminal
S3900-24F4S-1(config)#vlan database
S3900-24F4S-1(config-vlan)#vlan 10,20
3. Configure the 1/1 port as the access interface and add it into VLAN 10
S3900-24F4S-1(config)#interface ethernet 1/1
S3900-24F4S-1(config-if)#switchport mode access
S3900-24F4S-1(config-if)#switchport access vlan 10
4. Configure the 1/2 port as the access interface and add it into VLAN 20
S3900-24F4S-1(config)#interface ethernet 1/2
S3900-24F4S-1(config-if)#switchport mode access
S3900-24F4S-1(config-if)#switchport access vlan 20
5. Configure the 1/3 port as the access interface and add it into VLAN 10
S3900-24F4S-1(config)#interface ethernet 1/3
S3900-24F4S-1(config-if)#switchport mode access
S3900-24F4S-1(config-if)#switchport access vlan 10
6. Configure the 1/4 port as the access interface and add it into VLAN 20
S3900-24F4S-1(config)#interface ethernet 1/4
S3900-24F4S-1(config-if)#switchport mode access
S3900-24F4S-1(config-if)#switchport access vlan 20
7. After the configuration is successful, PC1 and PC3 are in the same VLAN 10 and can communicate with each other. PC2 and PC4 can communicate with each other and cannot communicate with PC1 and PC3.
1. Login to the S3900-24F4S switch and enter into the CLI interface.
2. Create VLAN 10 and VLAN 20 in the S3900-24F4S switch 1.
S3900-24F4S-1#configure terminal
S3900-24F4S-1(config)#vlan database
S3900-24F4S-1(config-vlan)#vlan 10,20
3. Configure the 1/1 port as the access interface and add it into VLAN 10.
S3900-24F4S-1(config)#interface ethernet 1/1
S3900-24F4S-1(config-if)#switchport mode access
S3900-24F4S-1(config-if)#switchport access vlan 10
4. Configure the 1/2 port as the access interface and add it into VLAN 20.
S3900-24F4S-1(config)#interface ethernet 1/2
S3900-24F4S-1(config-if)#switchport mode access
S3900-24F4S-1(config-if)#switchport access vlan 20
5. Configure the 1/3 port as the trunk interface and allow all VLANs to get through.
S3900-24F4S-1(config)#interface ethernet 1/3
S3900-24F4S-1(config-if)#switchport mode trunk
S3900-24F4S-1(config-if)#switchport trunk allowed vlan all
6. Do the same configuration on S3900-24F4S switch 2 like the switch 1 above, and then connect the two trunk ports together.
7. After the configuration is successful, PC1 and PC3 can communicate with each other and PC2 and PC4 can also communicate with each other.
1. Login to the S3900-24F4S switch and enter into the CLI interface.
2. Configure VLAN 10, VLAN 20, and VLAN 30 on the S3900-24F4S switch 1.
S3900-24F4S-1#configure terminal
S3900-24F4S-1(config)#vlan database
S3900-24F4S-1(config-vlan)#vlan 10,20,30
3. Configure the 1/1 port as the hybrid interface, default VLAN as 10 and allow untagged VLAN 10, 30 to get through.
S3900-24F4S-1(config)#interface ethernet 1/1
S3900-24F4S-1(config-if)#switchport mode hybrid
S3900-24F4S-1(config-if)#switchport hybrid pvid 10
S3900-24F4S-1(config-if)#switchport hybrid allowed vlan add 10,30 untagged
4. Configure the 1/2 port as the hybrid interface, default VLAN as 20 and allow untagged VLAN 20, 30 to get through.
S3900-24F4S-1(config)#interface ethernet 1/2
S3900-24F4S-1(config-if)#switchport mode hybrid
S3900-24F4S-1(config-if)#switchport hybrid pvid 20
S3900-24F4S-1(config-if)#switchport hybrid allowed vlan add 20,30 untagged
5. Configure the 1/3 port as the hybrid interface and allow tagged VLAN 10, 20, 30 to get through.
S3900-24F4S-1(config)#interface ethernet 1/3
S3900-24F4S-1(config-if)#switchport mode hybrid
S3900-24F4S-1(config-if)#switchport hybrid allowed vlan add 10,20,30 tagged
6. Create VLAN 10, 20, 30 in the S3900-24F4S switch 2.
S3900-24F4S-2#configure terminal
S3900-24F4S-2(config)#vlan database
S3900-24F4S-2(config-vlan)#vlan 10,20,30
7. Configure the 1/1 port as the hybrid interface, default VLAN as 30 and allow untagged VLAN 10, 20, 30 to get through.
S3900-24F4S-2(config)#interface ethernet 1/1
S3900-24F4S-2(config-if)#switchport mode hybrid
S3900-24F4S-2(config-if)#switchport hybrid pvid 30
S3900-24F4S-2(config-if)#switchport hybrid allowed vlan add 10,20,30 untagged
8. Configure the 1/3 port as the hybrid interface and allow tagged VLAN 10, 20, 30 to get through.
S3900-24F4S-2(config)#interface ethernet 1/3
S3900-24F4S-2(config-if)#switchport mode hybrid
S3900-24F4S-2(config-if)#switchport hybrid allowed vlan add 10,20,30 tagged
9. After the configuration is successful, PC1 and PC2 can communicate with PC3 and PC1 cannot communicate with PC2.
1. Open the browser and enter the Web GUI through IP address 10.32.96.153 (the IP address is set when you enable the web service in CLI interface).
2. Login the Web GUI using the default account and password (admin/admin).
3. Switch Management > VLAN > Static VLAN >VLAN Management > New, create new VLAN on the switch.
4. Enter 10, 20, 30 in the "VLAN ID" and click "Apply" in sequence, then close the page.
5. Configure the port 1 as the access interface in the "Member Setting" and add it to the VLAN 10.
Enter 1 in "Port Range", choose "Access" port mode and input 10 on the "VLAN ID", then click "Apply".
6. Configure the port 2 as the trunk interface and allow VLAN 10, 20, 30 to get through.
Enter 2 in "Port Range", choose 1Q "Trunk" port mode, input 10, 20, 30 on "VLAN ID" and click "Apply" separately.
7. Configure the port 3 as the hybrid interface and allow tagged VLAN 10, 20, 30 to get through.
Enter 3 in "Port Range", choose "Hybrid" mode, input 10, 20, 30 on "VLAN ID" and click "Apply" separately.
8. After the configuration is finished, you can view the port details in corresponding VLANs in the "Member List" above.
How to Log in to FS S3900 Series Gigabit Managed Switches
Traffic Segmentation Configuration on FS S3900 Series Switches
Hi, is there a way to set a default gateway for the Management Interface - or is the accesss only possible from the same network Segment? By Sebastian.Schubert on October 19, 2020
Hello, the s3900 management port is not isolated from the service interface, so you only need to write a default route. For example: IP route 0.0.0.0 0.0.0.0 10.32.133.254 By FS on October 20, 2020
My switches are running the most recent release of the software available, but the ssh server implementation is so ancient that it cannot interoperate with even a four-year-old Ubuntu 16.04 client. When can this be fixed? By Garrett.Wollman on August 26, 2020
Hello, our switch supports ssh2.0, please describe in detail "the implementation of sh server is so old". Asymmetric encryption support: RSA1, DSA2 Symmetric encryption support: AES-128, AES-192, AES-256, 3DES, des_cbc, Blowfish HASH support: MD5, SHA1 By FS on August 27, 2020
After the S3900 switches are stacked, the device has lost the stacking port. What is the reason? By henson on June 19, 2020
After the S3900 switch is successfully stacked and you check the port status through the commands, the two stacking ports of the device will disappear which is a normal situation. It is mainly to prevent misoperation. Please don't worry. By FS on June 19, 2020
Why is the calendar set time of the switch restored after restarting? By Emoef on June 18, 2020
The time of calendar set is not saved in the configuration file so it will not continue counting after the device is turned off. It is recommended to use the ntp service to synchronize the system time, so that after the switch restarts, you only need to set the next restart time, and don‘t need to set the system time again. By FS on June 18, 2020
When multiple S3900 switches are stacked, one of them will go down. Will it affect the normal operation of other switches? By Soucie on June 16, 2020
If the master is down, it will re-elect, the election process is the same as the first stack. If it is a slave downtime, there will be no impact. By FS on June 16, 2020
Can the stacking and LACP functions of the S3900 be used together? By Helfer on June 15, 2020
Yes, after the S3900 switches are stacked, they are logically one device and can implement LACP with other devices. By FS on June 15, 2020
Hello, why do I fail to upload firmware to the S3900 switch when upgrading the switch? By Dennis Haislip on June 12, 2020
The S3900 series switches only support a maximum of 2 firmwares. Please use the command dir to check whether there are currently two firmwares. If so, you need to delete one and add the new one. If there is only one, please check whether the firmware is damaged. It is recommended to download and install again. By FS on June 12, 2020
Does the S3900 switch support https import certificates? By Shuford on June 11, 2020
Yes, but there are some requirements for the size of the certificate, the maximum is 5KB and the key is 2KB. By FS on June 11, 2020
When configuring QinQ, how many QinQ can be configured for each port? By Jimmina on June 10, 2020
The S3900 series are the access layer switches, which have certain restrictions on the hardware, so the maximum entry for QinQ is 24 per port. By FS on June 10, 2020
Hello, i see you need a solution for your network; our tech and salers can help you design your whole network solution with best quality and price. And we recommend the S3900-24T4S for you to connect to the server. The function of the core switch is more abundant than that of the access layer switch. So as for the core switch, we recommend S5800-8TF12S for the core switch. By FS on June 9, 2020