![cisco router on a stick cisco router on a stick](https://i.stack.imgur.com/UAKA7.png)
I.e., assigning the VLAN with the ID 10 the address 192.168.
![cisco router on a stick cisco router on a stick](https://www.ciscomadesimple.be/sdj/images/articles/smalllab.jpg)
I like the convention of matching the third octet of the IP with the VLAN ID. The traffic of the native VLAN may traverse a trunk port. Port carrying tagged and untagged traffic for multiple VLANs Port carrying tagged traffic for multiple VLANs Port carrying untagged traffic for one VLAN When configuring VLANs, we usually encounter three types of port configurations (Cisco lingo):
![cisco router on a stick cisco router on a stick](https://community.cisco.com/kxiwq67737/attachments/kxiwq67737/5991-discussions-wan-routing-switching/316846/1/sample2.png)
It is a method of inter-VLAN (virtual local area networks) routing where one router is connected to a switch via a single cable. In computing, a router on a stick, also known as a one-armed router, is a router that has a single physical or logical connection to a network. So, instructions in this guide also refer to SwOS. For routing, I use OPNsense, so I only need the L2 capabilities of the Mikrotik switch, which is why I run it on SwOS instead of RouterOS. As long as I don’t use too many PoE devices and keep an eye on the temperatures, these fans will dissipate enough heat for the time being. I also replaced its stock fans with Noctua NF-A4x20s, making it completely silent. It’s rack-mountable and was significantly cheaper than comparable Ubiquiti gear I was considering at the time of the purchase. It has a 500W power supply, so it’ll be able to serve as a core switch for my homelab for a long time. It features 24 Gigabit Power over Ethernet (PoE) ports and four 10 Gbps SFP+ ports. The Mikrotik CRS328-24P-4S+RM is a beefy Layer 3 (元) switch. And maybe this is useful for someone else, too. I wanted to document my switch and VLAN configuration. And with that, my networking needs also changed: stricter firewall rules, segregating untrusted IoT devices into separate networks, traffic prioritization, and more. My homelab grew quite a bit over the past years.