@SteveITS said in Feedback request on home network design:
@disi1 said in Feedback request on home network design:
if I enable QoS for VLAN30, it is also applied on the WAN interface for all traffic?
re: inspecting encrypted traffic, the PC would need to trust a cert on the proxy which decrypts the traffic. So, could be an issue for phones or other devices. I know the Bitdefender GravityZone we use for clients can do that on the PC by adding its own cert to Windows and then it intercepts traffic on the PC.
I did register a domain and issued a valid certificate (Let's encrypt) to all internal services, including the firewall (wildcard which I know I have to manually renew every three months). To be clean and potentially use the Squid proxy*.
Before I changed our network over, I did experiment with squid on the exact hardware, using the old setup as the uplink and it produced a lot of overhead on the firewall.
The good news:
Since I use pfSense for all networking and isolated the VLAN30, there were no issues. Before I had extreme lags when I used ZScaler and Pulse VPN for work. It seems the network runs overall smoother. This is without any Traffic Shaping or QoS,
Only today I switched the ISP router to Modem Mode.
p.s. if anyone else wants to split WLAN into VLAN using Mobility Express, it took me some time to figure this out (where 10.10.10.3 is the wlc management interface, but the management vlan needs to stay 0 or the APs cannot join).
switch port access vlan 10 -> IP for the AP
switchport trunk allowed vlan 10,20,30 -> for the wlc interface and the WLANs
switchport trunk native vlan 10 -> needs to be the same as the APs vlan (10)
interface GigabitEthernet1/0/16
description VLAN20_POE
switchport access vlan 10
switchport trunk allowed vlan 10,20,30
switchport trunk native vlan 10
switchport mode trunk
power inline port poe-ha
Don't forget the ip helper to point to the DHCP for each vlan on the switch.
For Squid transparent proxy you do need a CA, not only a valid certificate. I thought process was wrong. But it doesn't hurt to have a valid certificates in the network.