802.11ac support
-
Our topology
WAN - pfSense - Unmanaged Switch - Wifi Router (as AP)
-Employees would connect to Wifi Router with employee SSID get access to whole LAN
-Guests would connect to Wifi Router with Guest SSID get access wan only
-Employees would connect to Unmanaged Switch (wired) get access to whole LANMakes sense?
-
So the ethernet connection comes out the router to a switch and an AP is connected to a switch ?
How are you setting up this "Wifi Router"?
-
Until you actually test it it will be impossible to know if that unmanaged switch will pass the required VLAN from the AP to pfSense.
Much better to either use a managed switch that definitely will pass VLANs oe connect the AP directly to pfSense.Steve
-
@Wastapi said in 802.11ac support:
Our topology
WAN - pfSense - Unmanaged Switch - Wifi Router (as AP)
-Employees would connect to Wifi Router with employee SSID get access to whole LAN
-Guests would connect to Wifi Router with Guest SSID get access wan only
-Employees would connect to Unmanaged Switch (wired) get access to whole LANMakes sense?
The Asus Router administration software does allow the ability to enable a Guest Network and disable access from it to the local intranet:
https://www.asus.com/support/FAQ/1009855/
This would be one option if you're looking to keep things simple (e.g. just one LAN subnet) and don't need more advanced SMB/Enterprise capabilities (e.g. multiple VLAN's, subnets, SSID's, etc.)
Hope this helps.
-
Or should I install an extra LAN card on the pfSense to hold the AP?
WAN - pfSense
pfSense - Unmanaged Switch (for wired only)
pfSense - AP (for wifi only)Yet I don't want to have a different AP for Guests and for Employees (budget)
And I feel that placing the AP (a router) between the pfSense and the Unmanaged switch is weird. -
It depends how you want to set things up:
Ideally LAN, WiFi, and WiFi Guest Networks would all be on separate subnet's (VLAN's) to allow for fine grained access control (since traffic would have to go across the firewall first for any of the subnets to speak with one another). However, if you want to keep things simple, you can put your WiFi and LAN clients on the same local subnet by using e.g. the router I linked to, turning it into AP, and then enabling the guest network on it for guest clients (which will only have access to the internet but not the local subnet).
What security requirements do you have, and which type of setup do you prefer?
-
@Wastapi said in 802.11ac support:
Or should I install an extra LAN card on the pfSense to hold the AP?
Nope you'll need two APs if you do this.
You need a switch that does VLANS and an AP that does VLANS.
-
You can just connect the AP directly to a NIC in pfSense and have multiple VLANs on that. You don't actually need a switch there.
For most installs it's just much easier to use managed switches because of the physical locations involved. APs like to be up high in the center of the coverage area and firewall is probably nowhere near.
Steve
-
@stephenw10 said in 802.11ac support:
Until you actually test it it will be impossible to know if that unmanaged switch will pass the required VLAN from the AP to pfSense.
Here is a list of Ethernet frame types. Any switch that can pass every one of them is defective.
-
@tman222 said in 802.11ac support:
However, if you want to keep things simple, you can put your WiFi and LAN clients on the same local subnet by using e.g. the router I linked to, turning it into AP, and then enabling the guest network on it for guest clients (which will only have access to the internet but not the local subnet).
Strictly speaking, you can use VLANs with an unmanaged switch, with pfSense and the AP configured to support the VLANs. Other devices on the network will just ignore the VLAN tagged frames. However, for a business installation, a managed switch is always a good idea and the proper way to do this in that environment.