Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cisco dual band AP541N + vlan

    Scheduled Pinned Locked Moved General pfSense Questions
    19 Posts 5 Posters 8.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bastardz
      last edited by

      @stephenw10:

      I'm unsure quite how that would work. However I don't see why you'd want that anyway. With the connection in place this connects the work_guest network to the work network.

      I do not want work_guest to access work network. I try to configure AP541N as a access point for employees and guest.
      Employees should have access to work network and guest should have separate network with temporary access (web gui). 
      I will try use your hints in SLM2008 configuration.

      1 Reply Last reply Reply Quote 0
      • M
        mikeisfly
        last edited by

        Please don't take this the wrong way but If I were you I would re-this whole thing for a number of reasons:

        1. The first device that should be in line from your ADSL modems should be pfSense not sure how many nics you have in your box? Can you add
           nics? If not then look at my additional steps
        2. Coming out of your pfsense box I would hit your SLM2008 with a tagged VLAN port that has every member of all the vlans that you created
           for example port 8. I always like to use my last ports as trunk ports
        3. Make Port 7 a Tagged port as well with all the vlans as a member and connect that to your AP541N and make sure that is a tagged port on the
           access point. Then you can make your SSIDs and put them in what ever VLAN you like
        4. Make port 1 on your SLM2008 a member of your LAN vlan and keep it untagged.
        5. Connect port 1 from your SLM2008 to the last port of your un-managed lan switch
        6. Connect all your lan computers to your un-managed switch
        7. Enjoy!

        *this assumes that you have all the vlans created and added to your nic on your PfSense Box.

        additional steps - If you don't have the ability to add any more nics

        8. create a additional VLAN on your SLM2008 for example vlan10
        9. add that vlan untagged to your port 6 on your SLM2008
        10. create vlan10 on pfsense box and added it to the appropriate nic
        11. add vlan 10 member to your port 8 on your SLM2008
        12. Call new interface WAN2 and setup DHCP or Static which ever applies
        13. Enjoy!

        This way your firewall is the first thing that the internet sees. Below I have a proposed diagram.

        Hope this helps.

        Your can prevent the guest Vlan from access the LAN by using firewall rules in the PfSense box. Try using a block rule with source being the network were the guest located and the destination being the LAN IP and apply that to the lan were the guest are located. I like to apply a access-list as close to the user as possible that way your firewall doesn't process the packets it doesn't have to.

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          Ohhh.  Thats pretty.  Very logical.
          I also like the way it doesn't loop into its self like a snake with rabis eating its own tail. :D

          Its a simple and straight forward layout.

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            @mikeisfly:

            Please don't take this the wrong way but If I were you I would re-this whole thing for a number of reasons:

            Oh, wonderful… Finally a network that makes sense.

            1 Reply Last reply Reply Quote 0
            • B
              bastardz
              last edited by

              @mikeisfly:

              Please don't take this the wrong way but If I were you I would re-this whole thing for a number of reasons:

              additional steps - If you don't have the ability to add any more nics

              Thanks very much for you reply. This look great.
              However I have more WAN than I showed on my diagram.

              I have 3 WAN: 2 ADSL an 1 WIMAX.
              I skipped  WiMAX because it uses a separate network card.
              I have only 3 NIC in pfsense: one is for SLM2008, one for LAN SWITCH and one for WIMAX.

              What do you think about this architecture:

              ADSL
              ADLS      VLAN->SLM2008 -> PFSENSE -> SLM2008 -> LAN SWITCH
              WIMAX                                                      |
                                                                              | VLAN
                                                                          AP541N

              1 Reply Last reply Reply Quote 0
              • M
                mikeisfly
                last edited by

                Okay here is how it can be done:

                1. Make VLAN 20 on Pfsense box
                2. Make interface and attach it to VLAN 20 (This is called a VLAN Interface)
                3. Make VLAN 20 on your SLM2008 switch and add it to your tagged port 8
                4. Add VLAN 20 untagged to your port 5 of your SLM2008 switch
                5. Connect 3rd Wan connection to your port 5 of your SLM2008
                6. Enjoy!

                I guess you could use a switch as a WAN aggregate, as long as you make a new VLAN and VLAN interface for ever connection. I know some ISP's DHCP servers don't like to see the same MAC address across multiple connections, if this is the case for you then you can manually change the mac-address of your NICs (VLAN interface). Remember that every VLAN Interface is going to have the same MAC address if tied to the same physical NIC. Just go up a bit in the address of the last byte. For example if your last byte is :3F then make the next NIC (VLAN interface) :40 and you should be good. Just make sure that the port connected to your modems are untagged and the port going to Pfsense is tagged with all the VLAN members. If you follow the steps above you don't have to change anything in my drawling just add the new VLAN and VLAN Interface; connect your additional WAN and you will be good to go.

                Please report back with your results.

                1 Reply Last reply Reply Quote 0
                • M
                  mikeisfly
                  last edited by

                  One thing I forgot to mention (I assumed it), you should remove vlan 1 off the ports where you don't want it after you assign the new VLAN to it that way your WANs are on their own LAN.

                  1 Reply Last reply Reply Quote 0
                  • B
                    bastardz
                    last edited by

                    Thanks a lot.
                    I considered buying another SLM2008 but I'll do it on one based on your description.

                    1 Reply Last reply Reply Quote 0
                    • B
                      bastardz
                      last edited by

                      Works perfectly.
                      Thanky you all.

                      1 Reply Last reply Reply Quote 0
                      • M
                        mikeisfly
                        last edited by

                        Cool, good stuff.

                        1 Reply Last reply Reply Quote 0
                        • B
                          bastardz
                          last edited by

                          Hi. I have one more question.
                          I have two AP541 in cluster. Guest access works ok on first floor because AP541 is connected to SLM 2008 (exactly as you described).
                          Guest access doesn't work on 3rd floor because AP541 is connected to LAN SWITCH right now and it is obvious.
                          Before I will buy another SLM2008 I want to ask you if following architecure is correct.

                          There is only one cable from first floor to third floor. There is no option to add another.
                          I wonder if tagged guest network will work and guest network will see pfsense interface.

                          1 Reply Last reply Reply Quote 0
                          • K
                            kejianshi
                            last edited by

                            If the points that the AP541 are attached to are all VIPD set to a single VLAN they will all see each other fine as you have drawn it, as far as I can tell.

                            1 Reply Last reply Reply Quote 0
                            • M
                              mikeisfly
                              last edited by

                              Yes you will be good to go. Just make sure that the SLM2008 are Tagged ports with all vlan members needed to the 3rd floor. Also not sure how far apart the Access points are but remember the only channels that don't interfere with each other are 1, 6, and 11 @ 2.4 GHz. If your switch is not MDI-X capable then you will need a cross-over cable from switchport to switchport.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.