VLAN configuration on a "smart" switch for a guest WiFi network


Recommended Posts

So I finally got round to buying a proper access point (Unifi nanoHD), which is capable of having multiple SSIDs, mapped to VLANs.  I have a "smart" switch (TP-Link TL-SG2008), and a PFSense based firewall (SG2220).

 

Assuming that:

1) The AP is connected to the switch on port 1

2) The firewall is connected to port 8

3) There a bunch of other "trusted" devices on the other 6 ports.

4) I want my "trusted" network to run on VLAN 11.

5) I want my "untrusted" network to run on VLAN 99.

 

Is it right that I?

Set up a "trusted" SSID on the AP, which is on VLAN 11.

Set up an "untrusted" SSID on the AP, which is on VLAN 99.

Set up port 1 on my switch to preserve VLANs

Set up port 8 on my switch to preserve VLANs

Set up ports 2 through 6 to tag packets on entry with VLAN 11 and strip VLANs on the way out

 

Does anyone know how to achieve the configuration on my particular switch?

Also what changes do I need to make to pfSense to treat the VLANs as logical interfaces, each with their own subnet, DHCP ranges, internet access and prevent any routing between them?

 

Is there a specific sequence I need to do this all in so I don't lose connectivity to the various components whilst I make the changes?

In your pfsense config, you will want to create your vlans.  What you will do is create a rule to block traffic coming from your guest vlan to your private vlan, it will be able to communicate with all other networks.  

 

You will trunk your vlans on a port (usually you just have to enable trunking, but you can tell it to include those vlans on that trunk port) to the switch.  You will probably have to configure the switch port that is coming from pfsense to trunk.  You will have to configure the switch with the vlan id's that are coming from the pfsense router.  Then you can assign those vlans to ports.  

 

If you have a AP that is vlan capable (**cough** ubiquiti **cough**), you would trunk all of the vlans to that and make your AP default to the private vlan or a management vlan of some sort (so add another vlan for management of devices that can only have source traffic come from your private vlan, another pfsense access control list) to manage networking devices.  Then you can have your AP host both the Guest VLan via a Guest SSID and your Private vlan via Private SSID.

 

 

Draw it out on paper first on how you want things to work.  It will then become clear to you what you have to do and if you will or will not experience an outage.  Understand that you will probably have 1 lan  for internet traffic to go across, 1 lan for house, 1 lan for guest, if any guest or house will need to share devices like printers, another for printers/shared devices, and maybe for the hell of it one for IoT devices.  (fyi, I don't see a way to not have an outage of some sort...you can create the networks and test, but when you move devices over to the new LANs they may have to reboot).

 

  On 24/05/2019 at 19:33, sc302 said:

Draw it out on paper first on how you want things to work.

Expand  

This is very good advice... This will allow you to understand exactly what has to be done, and where.

  On 28/05/2019 at 11:57, sc302 said:

And vlan 2 (or whatever vlan....could be vlan1 but that is just lazy) going between modem and router. Internet traffic isolated on its own vlan to not mix secured from unsecured devices

Expand  

Can you explain that?  Given that the modem is ISP provided, with no control whatsoever in terms of VLANs, how would I achieve this?

The isp goes into the router. Whatever that is it is a Vlan or untrusted network.  This would be an untagged port. If we are treating this as an outside/untrusted network on a firewall/router nothing else is needed to be done.  

  On 28/05/2019 at 15:14, BudMan said:

So both of those vlans are tagged or is one native (untagged) and the other tagged? 

Expand  

Is one of these choices better than the other? If I choose to leave one untagged, would it be the trusted or guest one?

 

  On 28/05/2019 at 15:14, BudMan said:

At the switch and router? 

Expand  

Don't understand this question.

 

The picture is meant to be of what I want to end up with, not what I have right now (single SSID, no tagging at all anywhere)

  On 28/05/2019 at 15:48, Fahim S. said:

The picture is meant to be of what I want to end up with, not what I have right now (single SSID, no tagging at all anywhere)

Expand  

tagging/untagging is how switches work.  an untagged port is an access port.  An access port is an endpoint port where a device on the other end is essentially dumb and doesn't know the difference between tagged and untagged traffic.

 

Tagged is how a trunk works, this allows the port to encapsulate all of the vlans you choose on a single port.  You can have a native vlan (untagged) and several encapsulated vlans (tagged) on a single port that connects to a switch that can decipher this type of traffic (known also as 802.1Q).  

 

For your ap to work, it will have one port.  That one port can support all of the vlans you want to send over to the AP.  You can have the AP on both a tagged and untagged port...the tagged vlan will be the guest vlan and the tagged/untagged vlan will be your secured vlan.  just like in your picture.  

 

You need to understand the terminology, that is all.  If you don't know ask, don't assume that you aren't tagging anywhere, you have to tag for vlans to function across a single port.

 

edit: so you don't get confused, and being that budman has more time with helping, I will let him work with you.  If you get stuck or need simpler explanation please ask.

As to tagged or untagged doesn't matter which... Its just how you set it up.. Its normally more intuitive on say your router where the actual physical interface network is left untagged.  Vs not putting any network on the physical interface, and only enabling vlans that run on that phy interface.

 

As to switch and router, this is where native or untagged vlan will come in to play. For example out of the box on a switch the vlan 1 is untagged. 

 

On your AP if you do not set a vlan for an SSID, then it would be native untagged... And that would be need to be set on the switch port the AP is connected too.  If you tag both SSIDs on AP with vlan IDs then you would have to set them as tagged on the switch port the AP is connected too.

 

On the interface to the router same thing - if you set both as tagged vlans on your router, then they would both have to be tagged on the switch port that connected to your router.

 

On a port that carries more than 1 vlan, only 1 could be untagged (native) all other vlans would have to be TAGGED... Or all of them could be TAGGED... All depends on the device your connecting to that switch port and how its configured for native or all tagged, etc.

 

To be honest I think tag and untagged is what confuses the most new users to vlans.

  On 28/05/2019 at 16:03, sc302 said:

edit: so you don't get confused, and being that budman has more time with helping, I will let him work with you.  If you get stuck or need simpler explanation please ask.

Expand  

Thanks for the offer (I genuinely am grateful), but with the very greatest respect I never find your explanations very "simple".

 

  On 28/05/2019 at 16:21, Fahim S. said:

Thanks for the offer (I genuinely am grateful), but with the very greatest respect I never find your explanations very "simple".

 

Expand  

Interesting, but ok.  I do take great pride to simplify things, but completely understandable.  Everyone has different understanding levels, some people require many different approaches until they finally understand (or think they do). 

  On 28/05/2019 at 16:04, BudMan said:

As to tagged or untagged doesn't matter which... Its just how you set it up.. Its normally more intuitive on say your router where the actual physical interface network is left untagged.  Vs not putting any network on the physical interface, and only enabling vlans that run on that phy interface.

 

As to switch and router, this is where native or untagged vlan will come in to play. For example out of the box on a switch the vlan 1 is untagged. 

 

On your AP if you do not set a vlan for an SSID, then it would be native untagged... And that would be need to be set on the switch port the AP is connected too.  If you tag both SSIDs on AP with vlan IDs then you would have to set them as tagged on the switch port the AP is connected too.

 

On the interface to the router same thing - if you set both as tagged vlans on your router, then they would both have to be tagged on the switch port that connected to your router.

 

On a port that carries more than 1 vlan, only 1 could be untagged (native) all other vlans would have to be TAGGED... Or all of them could be TAGGED... All depends on the device your connecting to that switch port and how its configured for native or all tagged, etc.

 

To be honest I think tag and untagged is what confuses the most new users to vlans.

Expand  

OK... but in my switch I can set a port (on a per VLAN basis) as Untagged, Tagged, or Not Member. I can also give a port a PVID.  The switch doesn't have an option to set a port as an access port or trunk as such. 

 

I am pretty sure that for VLAN 99 I want to set port 1 and 8 as tagged and the others as Not Member. 

 

But what do I do for VLAN 11? Set them all to Tagged? What PVID should they have?

 

 

So if you put a port in vlan 11, and your going to connect a computer to it then that would be untagged 11 with pvid set to 11... This tells the switch when it sees untagged traffic coming into that port that its vlan 11.

 

When you connect say your router that is using untagged (native interface on the router) and you want that as 11, then same thing untagged 11, pvid 11

 

For the vlan 99 which you run on top of that physical interface, on the switch port it would add tagged 99.

 

For your access point same sort of thing.. if you do not put a vlan ID on one of your SSID that would be the untagged and pvid setting, with the other vlan set to tagged.

 

Your running pfsense as your router?  I can show you some screenshots of what I mean by native and vlan on pfsense.

got it.. thank you!

I decided to keep my trusted network untagged and decided that VLAN 100 would be a better choice for guest.

 

OK.. now the pfSense set up...

I set up a VLAN for 100, and then a (sub)-interface for this VLAN

I then set the interface with a static IP (I used 192.168.100.1 /32).  Kept everything else as default.

When I go to add a DHCP server, I don't even see the tab for my Guest network. 

 

Have I done something wrong?

 

  On 28/05/2019 at 17:47, Fahim S. said:

/32).

Expand  

that is wrong!  You prob want /24 which would be 192.168.100.1-254 would be valid IPs on that network.

 

/32 is all 32 bits.. so 192.168.100.1 is the ONLY address.  So can not run a dhcp server on that ;)

  On 28/05/2019 at 17:49, BudMan said:

that is wrong!  You prob want /24 which would be 192.168.100.1-254 would be valid IPs on that network.

Expand  

this is because /32 is a single IP Address and /24 would be a block of IP addresses? I don't understand how that works..

 

OK.. so now I have a DHCP server, giving out addresses 192.168.100.10 through 192.168.100.100.

Now no matter which WiFi network I get on, I can get out to the internet, which is good, but both networks can see devices in the trusted network.

 

How do I stop this?

Ooops...Completely forgot the firewall rules.

 

I added 2 rules.. an allow all, and a deny access to the trusted network, both to the Guest interface.

Do I need to add a similar deny rule to stop the trusted network being able to access the Guest network?

I can reach the pfSense administrative interface through both networks.  192.168.0.1 on the trusted network and 192.168.100.1 on the guest network.

Is there a way to stop access to this UI from the guest network?

Yeah put in a firewall rule to block it ;)

 

Normally on a guest network it would be pretty locked down..

 

Rules are evaluated top down, first rule to trigger wins, no other rules are evaluated... Post up our rules on our guest vlan interface and we can discuss

 

So what do you want to allow and what do you want to block?  If you just don't want clients to access gui.. Then put a rule above the any rule that says block dest lan address port XYZ, where xyz is the ports (or ports) via an alias that your gui is listening on.

 

example, if your gui just running on 80 (http)

example.thumb.png.7803110dc3e73282ac1f4b02f3583b23.png

 

Keep in mind that such rules would allow guest to actually hit your gui via your wan IP..

 

You could do something like this

otherblocks.thumb.png.51b83a10b4f6cb4e0fc82f1f32c02b86.png

 

So you allow guest to "ping" pfsense guest address. So client can validate they have connectivity to the gateway.

 

But then any other access to firewall is blocked - all IPs, lan, guest, optX, wan, etc.. "this firewall" is a drop down option for dest.

 

This would require clients to be using some outside dns - which is what you normally hand "guest" clients anyway - say 8.8.8.8 for example.

 

Or you could allow clients to use pfsense guest IP for dns and ping - but block all other access

icmpdnswlabels.thumb.png.1ae6bbf33a892c38c2084204340339a9.png

 

Given that when I show "test" on my screenshots you would use your "guest" ;)

 

Since this is local network and not public internet you might want to use "reject" vs just block.. This will tell the client F Off!! Vs letting the client keep trying with retrans, waiting and retrans again.. Client will get told instantly sorry blocked!

reject.thumb.png.37dfce04439b8e59d7d29d33953c019a.png

 

While reject is normally good for your local networks.. You would normally not want to reject any blocks you do from the internet.. Just block (drop) them.. Vs sending any sort of response.

 

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • You could just do it now yourself with all the tools out there or the right Powershell scripts. Nothing stops you from tinkering away at it like the Tiny11 dev(s) do. It's easier to remove and turn off stuff when you're targeting a specific device like a gaming handheld. All the work/office bits alone are probably 60-70% of the code anyway.
    • hah, not for long. Microsoft will add copilot, video recording, social media integration, Microsoft 365 outlook, cdrom support, printer drivers, xbox memory card manager for zune music players, dedicated film and tv app for several providers that don't actually support it, and windows media centre for backward compatibility for anyone still using a sling tv box.... then they'll decide that it also need the start menu so they can provide a nice place to show your recent blank space that takes up half the screen while showing you full screen ads asking you to setup your Microsoft account for xbox. Then the only good thing it actually did, they'll let the new intern show their coding skills and the ABXY buttons will be changed around to 1256 because its better for international support or something, but ... at the end of it all, this time next year because Microsoft loves supporting software and hardware, the Asus oem won't get any more updates for it's Ally and it'll be forgotten faster than the Xbox Samsung TVs
    • Grounded 2 out next month, bringing fans a new miniaturized survival adventure by Pulasthi Ariyasinghe Alongside Avowed and The Outer Worlds 2, Obsidian Entertainment will officially be releasing three games in 2025. The first-party Xbox studio surprise revealed Grounded 2 during the Xbox Games Showcase event today. The same four kids from the original survival game are returning for this new adventure, and this time, they are miniaturized in a park. Check out the trailer above. Grounded 2 is set two years after the events of the first game, and this time, it's Brookhollow Park that will become the playground for players. Obsidian is getting help from Eidos Montréal as well, saying that the collaboration is adding more depth, danger, and discovery to the experience. In addition to building on the first game's features, Grounded 2 is introducing Buggies as one of its biggest features. Essentially bug mounts, these will let you ride ally bugs and use them across various operations in the game, including combat and building. Mounts had been one of the biggest requests by fans in the first game, and Obsidian says it has delivered with plenty of deep integrations Just like the original, Grounded 2 will be an early access title at launch, aiming to build out the game, story, and features with the community. Here are the key features of the Early Access/Game Preview launch: Omni-Tool introduced: A major quality of life upgrade that combines the hammer, axe, shovel, and wrench into one all-purpose tool, saving precious backpack space and streamlining your survival experience.  Story: In Grounded 2, we won’t tell you the whole story at the launch of Game Preview, but there’ll be enough there for you to start uncovering mysteries, chasing clues, and sharing your wildest theories right away (yes, we’re watching).  Expanded world-building brands: Expect the return of in-world favorites like Punch-O and Minotaurs & Myrmidons, alongside new brands and scenery that don’t just look cool—they tell a story (if you know where to look)—all coming together to bring Brookhollow Park to life with that signature Grounded charm.  New and returning bugs: Face off against familiar foes and never-before-seen creepy crawlies like the graceful cockroach, which adds new challenges and combat dynamics, such as having the ability to block your attacks.  Larger world, richer biomes: More spaces to build, explore, and survive in— Brookhollow Park is nearly as big as the entire backyard from the first game, packed with new secrets around every corner, from snack bars and toppled ice cream carts to long-forgotten edges of the park.  Community driven evolution: We’re building with you, and every update will be more meaningful and shaped by player feedback, with a public roadmap to keep you in the loop that we will share when Game Preview launches on July 29.  Combat 2.0 – Whether you’re flying solo or in full squad mode, new combat mechanics like dodging and smarter enemy behavior make every fight more intense—and more satisfying to survive.  Grounded 2 is launching on July 29 across PC and Xbox Series X|S consoles in early access on July 29, 2025, with a $29.99 price tag. Xbox Game Pass subscribers will be gaining the title at launch for no extra cost as well.
    • More like, doing too much that you don't need for a handheld gaming device, which isn't a full desktop PC you'd also plan to do work on.
    • Linux Mint is finally getting native fingerprint login support by David Uzondu In the latest monthly news roundup from the Linux Mint team, the developers announced a feature that users have wanted for a long, long time. The famously user-friendly distribution is finally getting proper, integrated support for fingerprint login. For a distro that has built its reputation on providing a comfortable, "it just works" experience for people new to Linux, the absence of this convenient security feature has been a noticeable gap, especially on modern laptops. The new feature will arrive in Linux Mint 22.2, powered by Fingwit, a brand new XApp built by the Mint developers. It handles detecting your fingerprint reader and recording your prints. Once configured, you can use your fingerprint for the login screen, the screensaver, authenticating sudo commands, and any other administrative actions that pop up a password dialog (pkexec). What makes this particularly interesting is how it deals with situations where a fingerprint just will not work. Fingwit uses fprintd for the backend work, but the Mint devs say its custom authentication module is clever enough to detect tricky cases. For instance, if your home directory is encrypted, you absolutely need your password to decrypt it at login. Just using a fingerprint would lead to a crashed session. Fingwit sees this coming and dynamically prompts for your password instead. The Mint team says Fingwit will be able to run "in any desktop environment and on any Linux distribution." A significant driver for this development has been the team's ongoing work with Framework. Testing the company's hardware has pushed the Mint team to better support the features packed into modern laptops. This partnership is also the reason Mint 22.1 got power profiles and why Mint 22.2 will ship with a newer HWE (hardware enablement) kernel. The team also announced a slew of other changes for the upcoming release. As part of this work, core applications like gnome-calendar, simple-scan (the document scanner), and baobab (the disk usage analyzer) will be upgraded to their newer libAdwaita versions. To solve the long-standing frustration of libAdwaita apps ignoring system themes, the developers have patched the library. Taking it a step further, they have forked it entirely into a new project called libAdapta. On a final, critical note, the team also had a serious warning for users of older versions. The Linux Mint 20.x series, which includes versions 20, 20.1, 20.2, and 20.3, officially reached its End of Life in April 2024. Your system will continue to function, but it will no longer receive any security updates from the official repositories, leaving it vulnerable. The team laid out two options. The recommended path is a fresh installation of a newer release (22.1), which provides support until 2029 and is the cleanest way forward. Alternatively, you can attempt a long and complicated in-place upgrade, which is a multi-step process from 20.x to 21.3.
  • Recent Achievements

    • Dedicated
      Epaminombas earned a badge
      Dedicated
    • Veteran
      Yonah went up a rank
      Veteran
    • First Post
      viraltui earned a badge
      First Post
    • Reacting Well
      viraltui earned a badge
      Reacting Well
    • Week One Done
      LunaFerret earned a badge
      Week One Done
  • Popular Contributors

    1. 1
      +primortal
      472
    2. 2
      +FloatingFatMan
      265
    3. 3
      ATLien_0
      235
    4. 4
      snowy owl
      224
    5. 5
      Edouard
      174
  • Tell a friend

    Love Neowin? Tell a friend!