Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to block SLAAC on a VLAN.

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 3 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bigtfromaz @johnpoz
      last edited by

      @johnpoz I can remove VLAN 1 for sure but if I do that the production SSID that is currently not tagged will fail. I eventually want to negate VLAN 1 entirely but have to figure out how to safely move LAN to a VLAN and preserve all my configuration. LAN has a lot going on.

      In the meantime is there a way to block those broadcast with a rule on the VLAN?

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        Just at a loss to what your talking about... Why would you think it ok to run more than 1 untagged vlan on a port?

        If your device is in vlan X, then it should be vlan 1 as well.. It should only be set for untagged vlan X, and pvid of vlan X... vlan 1 doesn;t come into play at all.

        Now if sending traffic to your AP, sure vlan 1 could be the untagged, and your other vlans your going to put out on different ssids would be tagged.

        So your AP is leaking vlan 1 to other vlans - that is a problem!! And you shouldn't have to block them, because you should never have multiple vlans on the same layer 2 like that.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        B 1 Reply Last reply Reply Quote 0
        • JKnottJ
          JKnott @bigtfromaz
          last edited by JKnott

          @bigtfromaz said in How to block SLAAC on a VLAN.:

          For some reason, VLAN clients are receiving the SLAAC broadcasts being sent out by the "LAN's" DHCPv6 server

          Here's the reason:

          We chose tp-Link

          A "feature" of some TP-Link gear is they don't handle VLANs properly, with multicasts leaking between networks. Their access points also have that problem. I can't set up a guest SSID on my TL-WA901N because of this.

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          B 1 Reply Last reply Reply Quote 0
          • B
            bigtfromaz @johnpoz
            last edited by bigtfromaz

            @johnpoz Being new to a lot of this I may be using the wrong nomenclature.

            On the switch's configuration pages, VLAN 20 shows that the trunk ports and WiFi ports are selected as "Tagged". The configuration page for VLAN 1 shows all ports as untagged. If I understand, that means the WiFi access points will only see untagged LAN, or tagged VLAN 20 traffic. Does any of that make sense?

            On the access points, the new new IOT SSID is tagged. The original production SSID is as it was before the new switches. The prod VLAN is off which I assume means it is emitting untagged packets. This stands to reason because the access points also support unmanged switches and those may not be able to handle tagged packets at all.

            All the switches came with a default VLAN 1 configuration defining all ports as untagged. I assume that means the switch treats all VLAN 1 packets the same as untagged packets. True?

            Putting all this together, it would seem that LAN packets are untagged and arriving at the WiFi port still untagged. I don't have a clue on how to check that.

            In any event, the SLAAC broadcast packets are obviously showing up on VLAN 20 devices and that's a problem because they are being emitted by LAN. If an SSID is on VLAN 20 then it should be ignoring everything else. So it could be what you call leaking in the WiFi access points. An alternative to that is somehow, somewhere one of the switches, or the pfSense router is adding VLAN 20 tags to broadcast traffic, which makes no sense at all. I am pretty sure it's the access point too.

            I am going to call tp-link and pose this issue to them.

            JKnottJ 1 Reply Last reply Reply Quote 0
            • B
              bigtfromaz @JKnott
              last edited by

              @JKnott It's funny you should mention multicast. My switches have a feature called Multicast filtering. I will look into that.

              1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott @bigtfromaz
                last edited by

                @bigtfromaz

                For some reason, VLAN clients are receiving the SLAAC broadcasts being sent out by the "LAN's" DHCPv6 server.

                This is exactly the problem I was experiencing with my AP. I was talking to TP-Link support about it a few years ago. First level thought it was normal, but 2nd accepted it was a flaw. However, there never was a fix for my AP.

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                B 2 Replies Last reply Reply Quote 0
                • B
                  bigtfromaz @JKnott
                  last edited by

                  @JKnott I will let you know what I find.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by johnpoz

                    @bigtfromaz said in How to block SLAAC on a VLAN.:

                    If an SSID is on VLAN 20 then it should be ignoring everything else.

                    Its shouldn't have to ignore anything... if you have broadcast/multicast from vlan 1 traffic leaking to vlan 20 -- that is a problem!! That is tplink lack of understanding of what vlans are if you ask me.

                    I would never use their products where vlans are required because of personal experience with them and with horror stories here and then my own research into the issues with multiple products of theirs..

                    I had actually purchased one of their low end switches because I thought the users here posting the problems they were seeing were just not setting them up correctly... And hey it was 35 bucks.. Could use a switch on the shelf that could do vlans for that price sure.. Come to find out its just plain a POS!!!! And you could not remove vlan 1 at all.. And from the forum threads over on tplink - they thought this was normal and a feature - WTF!!!

                    They finally fixed from what the firmware says for v3 of their hardware... but they never released anything for v2... Which I just found out recently you can actually install the v3 firmware on the v2 hardware... And now the gui says your running v3 hardware.. It allows you to now remove vlan 1 from ports... I have not had time to actually test that it does but the gui now now allows you to remove vlan 1.. So step in the right direction.

                    But from this, and from @JKnott horror stories with their AP... I could never suggest anyone buy any of their products if they have any plans on doing anything with vlans.

                    So I would suggest you validate you can remove the vlan 1 - but you should never see bleed over from vlan X to vlan Y be it broadcast or multicast - if you are... Then something is WRONG, be it with the firmware of that device or the config.. But that should never happen.. vlans are isolation at layer 2, if your seeing broadcast and or multicast then you have not isolated at layer 2.. And you might as well just run your multiple layer 3 networks all on some dumb switch and not even worry about tags, etc..

                    But it could come down to their equipment is just flawed, and you will have to buy equipment that actually isolates the vlans like they are suppose to be isolated. The unifi AP seem to handle this fine, and have had zero issues with any sort of vlan leakage on them that I have run into.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • B
                      bigtfromaz @JKnott
                      last edited by

                      Ok. The night before last, when the problem was occurring, I stayed late. After things calmed down on the network, I took two phones, mine and a test phone and disconnected them from all networks.

                      I brought up the test phone on the SSID that links to the VLAN, no SLAAC broadcast received, IPv4 configured fine and all was well. I let a about a minute pass. Still no SLAAC. That was a bit of a surprise.

                      Then I brought up my phone on the LAN. It received the correct configuration, IPv4 and an IPv6 configuration supplied by SLAAC.

                      Then I was surprised again. The moment my phone received its IPv6 configuration from LAN, the test phone received one on the VLAN. I was tired and left it that way for the night.

                      Now here is the really confusing part. When I returned yesterday morning everything was fine! The test phone had a link-local IPv6 configuration, no SLAAC. All other phones are fine as well. In other words, the problem disappeared and it hasn't returned. At this point, I can no longer recreate the issue. I restarted all switches and APs last night and everything is still fine today.

                      Sigh...Obviously something changed but I can guarantee you it wasn't anything I did while sleeping. Any thoughts? Perhaps there is a cache, or table somewhere that refreshed overnight?

                      I had opened a ticket with tp-link and they had requested config files and a network diagram. They want to recreate the issue and correct my configuration or debug. I am going to close that ticket and will give them the above observations as well. As an FYI the tp-link switch models in use are T1600G-18TS (1) and T1500G-10PS (3). VLAN 1 can definitely be disabled port by port the switches. The access points are EAP225 (2) and EAP445 (1). I still think the leak is/was in the access points.

                      In any event, I have no trust in the way things are. The end goal has always been to totally negate VLAN 1 so the Netgate 5100-G router will never send out a VLAN 1 packet, nor will it send any untagged packets. Any links that might help in that regard will be greatly appreciated. The part I don't understand is how to safely move my LAN from igb1 to a VLAN without losing my LAN interface configuration.

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        Just remove those tplink devices from your network - I do not trust them at all to understand isolation of vlans... When they will not let you remove vlan 1 from a port.. But let you assign another untagged vlan to the port - they do not understand how vlans are suppose to work.

                        Don't buy their products is the only way to get them to understand it seems.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.