What is the best way to remotely access a switch behind a router? I'll be using a SF300 managed switch and there's no server.
For access points (APs) behind a router, I give each one a diffferent LAN address and port number. In router I forward TCP traffic with unique port/LAN IP. Then using ports numbers with router's static address, browser can remotely access router or any attached AP. But where do I set managed switch's LAN port number? Assume default is port 80 and would like to change it to 8001 for switch #1; 8002 for switch #2; etc. Can't find this info in configurtion manual.
Solved! Go to Solution.
At this point I would recommend a call to the Cisco Small Business support center at 1-866-606-1866 so that a case can be opened and your configuration can be reviewed.
I have replicated the concern here and I am able to remotely manage my SF300 switch with an RV082 as the router.
My rule in the RV082 are as follows:
Create custom service under UPnP heading. Create SF300 application name (this is a text based field and can be named anything), external port 8001 and internal port 80. I forward to the internal IP address of the SF300 switch and click the enable check box. From there I select Add to List. Once it appears in my list, I then click the Save Settings link at the bottom of the page.
The easiest thing to do is to setup an external to internal port rule in the router and forward it to the ip address of the switch.
External port 5000 to internal 80
That way you can put in your external ip address, colon external port 5000 to get to the interface of the switch (18.104.22.168:5000).
Can you provide some more details using switch on 10.0.0.2 and router on 10.0.0.1? Assume rule is set in firewall access rules on RV082, but need details here such as source/destintion IP, etc. Assume 2nd step is port forwarding, 10.0.0.2 -TCP on port 5000 forwarded by adding new service to list. Do I need to establish a static ip in router for each managed switch? I wish there was a white paper on this.
No firewall rule.
Just port mapping. Yes, you need to define a new service for each IP (switch) you want to reach, and yes this implies that they will be exposed to the Internet so use good passwords (the secure alternative is to use a VPN.)
No static IPs needed for the switches, but you need to know your router's public IP or DNS name, and the switches fixed IPs.
Everything is explained in the RV manual.
I'm using managed switch SF300-24 with static IP of 10.0.0.2. Port forward in router is configured as: SWTCH[TCP/8001~8001]->10.0.0.2 . Router WAN is static IP for easy access. When port 8001 is used with WAN in browser, I can't remotely access switch management GUI. What else is needed? Do I need UDP too?
SWTCH[TCP/8001~8001]->10.0.0.2 . Router WAN is static IP for easy access. When port 8001 is used with WAN in browser, I can't remotely access switch management GUI. What else is needed? Do I need UDP too?
My mistake, I tought port mapping was available, but its not. That means only one switch can use the port forwarding, and even that only if port 80 is not used by anything else.
Your best solution is using a VPN, that way you'll have access to everything with no configuration change (i.e. no port forwarding, or changing the listen port on each switch), except of course enabling VPN on the router.
Using RV08 router and 3 - SF300-24 switches, there must be a way to remotely access switches behind router. Remote access of router is easy so don't see why VPN to router makes any difference. Security isn't my issue. What config changes are needed in switches and router to achieve this? I know how to it if there was a way to change switch's management port from 80 to 8001, but don't see where GUI permits switch's port change?
The VPN is not only for security, it puts your remote computer in your LAN, that makes it the easiest option to reach your objective: access your switches the same way you do when you are in site.
The VPN takes care of all the configuration needed automatically.
You can use the same internal port 80 for all of your internal managed switches.
On your RV series router, navigate to Seti[ and then UPnP. Create new Services via Service Management. Use a unique external port (say 8001 for example) to port 80 internally to the IP address of switch A. Additionall use another port (say port 8002) to port 80 internallys and then to the address of switch B.
So the rule will look similar to this:
Port 8001 External - Port 80 internal - protocol TCP - IP address of switch - Enable
Then save settings.
So what you are doing is changing the source port you are coming in on. This allows multiple forwards to port 80 since the source port is different.
Hope that helps.
Believe we're really close to solution but can only access RV082 and not SF300-24 switch. I must be missing something. UPnP function is YES, service added is SWTCH[TCP/8001>80]>10.0.0.2 where LAN port of router is 10.0.0.1:80 and switch is 10.0.0.2. Switch is configured with a static IP. Connection to router is downlink, unprotected port G1, copper. DHCP in router is range 10.0.0.100 to 249, all 24 protected. Everything else is default. ISP provides a static IP so no DNS issue.
Would identifying switch's static IP and MAC in router help?