ppoe and vlan

I have a local ethernet card with a pppoe AC on it.
Now I would like to segment my network with 6 vlans (and at the beginning I will still have untagged packets coming for a smooth transiction).

in my tests I can brdige the vlans together but if I bridge also the ethernet card pings dont work (why?).

is it logical to run the pppoe AC associated to a bridge that bridges all vlans ?

or how should it be done ?
thanks

Tired? Why bridge them? Why not add more pppoe interfaces to listen to? Wouldn’t bridging the vlan’s bring you back to unsegment lan? And if you absolutly must bridge them, why configure the switch to send the old networks data on an unused vlan-id and set the port to be trunk’d port and not access port or mixed port?

Bridging code intercepts packets before vlan code does i guess. This is how you can setup bridging between two ethernet interfaces and trunk all tagged packets through even though you dont configure a single vlan on the unit.
When vlan code doesnt recognize the vlan id it will most likely drop the packet.

thanks. u are right and I will test it.
may I contact you off list, my email is gianred123@yahoo.it

YOU SAY “Why not add more pppoe interfaces to listen to?”

how can I do it, since in interface pppoe-server server I can only add 1 interface to my server…

No. You can add an unlimited number of servers to each interface (not vice-versa). I have, for example 7 interfaces (some of them are VLAN, some are ethernets) and each interface has 5 different PPPoE servers. This is done to simplify for users the possibility to lower the MTU. So I made 5 servers with different MTU size. Each server exist on every interface, and user makes a connection to the one he choose.
Works as hell :slight_smile:
Here is the cutout from the config:

0 service-name=“pppoe-default” interface=cisco1 max-mtu=1480 max-mru=1480 authentication=chap,mschap1,mschap>
keepalive-timeout=40 one-session-per-host=no max-sessions=0 default-profile=vpn

1 service-name=“pppoe-default” interface=mikrotik max-mtu=1480 max-mru=1480
authentication=chap,mschap1,mschap2 keepalive-timeout=40 one-session-per-host=no max-sessions=0
default-profile=vpn

2 service-name=“pppoe-default” interface=senao max-mtu=1480 max-mru=1480 authentication=chap,mschap1,mschap2
keepalive-timeout=40 one-session-per-host=no max-sessions=0 default-profile=vpn

3 service-name=“pppoe-default” interface=proxim1 max-mtu=1480 max-mru=1480
authentication=chap,mschap1,mschap2 keepalive-timeout=40 one-session-per-host=no max-sessions=0
default-profile=vpn

4 service-name=“pppoe-default” interface=cisco2 max-mtu=1480 max-mru=1480
authentication=chap,mschap1,mschap2 keepalive-timeout=40 one-session-per-host=no max-sessions=0
default-profile=vpn

5 service-name=“pppoe-default” interface=ether3 max-mtu=1480 max-mru=1480 authentication=chap,mschap1,mschap>
keepalive-timeout=40 one-session-per-host=no max-sessions=0 default-profile=vpn

6 service-name=“pppoe-800” interface=cisco1 max-mtu=800 max-mru=800 authentication=chap,mschap1,mschap2
keepalive-timeout=40 one-session-per-host=no max-sessions=0 default-profile=vpn

… and so on.