Need help setting up guest VLAN with AP on Cisco SG300 switch
-
Irios, you did not provided your full VLAN configuration on AP side, but I think you need at least check PVID Setting for dap-1353, it should be set manually (look at http://ftp.dlink.ru/pub/Wireless/DAP-1353/Description/DAP-1353_B1_Manual_3.00.pdf PVID setting) and the traffic must be tagged on Cisco.
-
Wow that was a good thread and some what related sure… But no that not the one I was talking about.. The one I was talking about was some specific brand of AP that didn't tag traffic or always had traffic in vlan 1 or something.. It was a crap AP that really could not do vlans at all even though stated they could..
I had posted info right out of their manual in the thread that stated the problem with the vlans he was having...
The thread you linked to was same sort of problem - tagged vs untagged.. Arrrggh I can not seem to find that thread now... But you need to validate that traffic is being tagged, or no pfsense not going to see it on the vlan interface.. It would see it on the naked/native interface network.
-
Hi there, w0w and johnpoz
Unfortunately the linked PDF is for the wrong model (B1 with 3.xx firmware). I have the A1 model, which can only run 2.xx firmware.
–------------
I've done a hard reset (factory defaults) of the DAP-1353, re-applied the firmware again, reconfigured it a little different, and gave it another shot.
This time I've set up the DAP-1353 with two VLANs:
- primary SSID as VLAN 1 (just a dummy VLAN, to see what happens really)
- added a secondary SSID as VLAN 40 (the guest network)
The switch:
- port1 trunk, PVID 1.
- port3 trunk, PVID 1.
Result:
It seems like the Primary SSID might be ignoring it's VLAN value if you don't actually have a secondary SSID enabled (bug? flaw? feature? who knows).
The guest devices are now receiving proper guest IP addresses 192.168.40.x, and cannot ping LAN devices. But… LAN devices can still ping guests hm (I guess this is a firewall rule I need to set up?).
New problem:
If I run speedtest.net (Ookla) on my laptops (on wireless guest network), it works fine. I get decent DL and UL speeds.
But all Android devices (tested 3 phones) cannot upload (at all) using the Ookla Speedtest app (or any other speedtest app). Seems like they are not able to send traffic. Browsing the web seems to works fine, though. So some data might trickle through, hmmm."tcpdump -i em0 -e" on pfSense shows this when running Ookla Speedtest (while downloading) on an Android device:
I wished I could show the a similar tcpdump when Speedtes is uploading, but there's really nothing going on, except a few VLAN 40 packets here and there.
Can the tcpdump only show stuff related to a particular android device? Would make it easier to troubleshoot, as the screen is flooded with regular non-related network traffic.
-
Yes tcpdump can be filter down to specific machine.. But since you see your tags now, you could just use the gui to capture and not have to use tcpdump at prompt - only reason to use prompt is the gui does not have way to show the layer 2 info that the -e does…
-
For troubleshooting, I've plugged a windows computer directly into the switch port3 (guest) and set the NIC drivers to VLAN40. This confirms that pfSense/switch is setup correctly, so I don't have to worry about that end at least.
I had another go at tcdump and put it into notepad++ to filter away unrelated entries, but I'm still not sure what I'm looking at. There's definitively some outgoing traffic in VLAN40 from my Android devices, but it's just very little of it. Some of it is directed at the server used for bandwidth testing, but not much traffic at all. It seems like the AP is "throttling"/discarding/dropping traffic, resulting in a very slow (none) upload speed. As mentioned, web surfing works fine.
I'm starting to think there be an issue with the radio firmware on the DAP-1353, making it unsuitable/incompatible with these Android devices. Let's just face it: it's perhaps just a shit AP. It's old. And was inexpensive at them time.
I'm not going to spend a single second troubleshooting this anymore without an alternative AP that can do VLAN, though. I've probably spent over 100 hours so far, and I'm getting really fed up. I'm just gonna order another AP. My WAP121 should arrive tomorrow. If this AP behaves differently (better), at least I know it's the DAP-1353 at fault. I'll post the outcome in this thread for future reference in case someone else has the same issue with the DAP-1353.
Thanks for the halp so far. It's very much appreciated :)
-
Not the AP I would of ordered.. It's only 2.4 and only has 10/100 interface… Why would not have gone with a unifi UAP-AC-Lite, its dual, gig comes with your poe injector all for $80... Looks like about the same price as that 121 at amazon with the addition of the poe injector..
That for sure I can promise you works with vlans, shoot you can even setup dynamic assigned vlans with radius server that is part of pfsense. They are working on MAB, but still seems to be a work in progress.
-
Thanks for the feedback. I'll probably go for a UniFi for the main AP here if I decide to get rid of my Asus RT-AC66U at some point (might donate it to someone in the family). I picked this Cisco AP because it was on sale at a local shop here, at roughly 40USD. And because I have some experience with my Cisco switches, I figured it would be good to see how some of their other products work as well.
The guest AP only needs to be 2.4GHz anyway. It's for AirBNB tenants, and throughout the years I have been providing both 2.4GHz and 5GHz, and they hardly ever use the 5GHz anyway (maybe one or two tenants have used 5GHz). Even though there are two SSIDs, they always end up using the 2.4GHz SSID. Dunno why they all go for 2.4GHz really, but it's probably because it's printed first in the how-to on the wall in the AirBNB apartment.
-
"Even though there are two SSIDs"
"Dunno why they all go for 2.4GHz really"Users are stupid ;) is Why hehehehe. Just give them the one ssid and let client do 2.4 or 5 on is own or with unifi you can do band steering to get the client over to 5 ;) If you really want be nice about it post up the common one and then put say _24 and _5 on the end for anyone that has some crappy ass client that has problem with the combo ssid..
If your only going to run 1 SSID or even multiple SSID that connect to the same network you really don't even need AP that does vlans… Just let the switch do all traffic on that port on whatever vlan you want to use on pfsense.. AP only needs to be vlan capable when you want to run different SSIDs on different vlans.. If all your wifi clients are going to be on the same network doesn't matter if the AP can tag or not - you can just set the switch to tag it for you to pfsense so pfsense can put that on different network than other networks.
You could do it old school/Jury Rig, MacGyver way with AP 1 on vlan X, and AP 2 on vlan Y, etc..
-
DAP-1353 a1 sets PVID automatically to 1 as I understand their some old FAQ for some similar models. They suggest to use VLAN1 as management untagged VLAN, but any other you create should be tagged. Anyway I also think that it's better to buy something better than that old DLINK AP that have VLAN feature just for marketing purpose ;D it does not have to work properly in this case.
-
Ok, I just got my Cisco WAP121… and everything is running super smooth. When you fire up the AP the first time, you are presented with a config wizard; I simply entered VLAN 40 when it asks for the wireless VLAN. Didn't have to touch anything else. And now everything works perfectly. This makes me positive the D-Link DAP-1353 is either broken, bugged, or doesn't comply to the networking standards.
At least the time spent on this "project" wasn't entirely wasted. I've honed my VLAN'ing skills, and learned a couple of new tricks :)
AP only needs to be vlan capable when you want to run different SSIDs on different vlans
I figured I'd need VLAN to separate the web interface from the guests, so I'd be able to config/snmp without having to access their network directly. Could this be done differently, even without VLANs?