Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VLAN Routing with UniFi APs

    L2/Switching/VLANs
    netgear unifi vlan
    3
    12
    1.6k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Y
      Yo5hi
      last edited by Yo5hi

      This post is deleted!
      1 Reply Last reply Reply Quote 0
      • Y
        Yo5hi
        last edited by

        This post is deleted!
        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by johnpoz

          Quite often an issue with traffic to device on another vlan, is firewall on that dest device. Or that device not using pfsense as its gateway.

          I would suggest you update your drawings to show your current setup - because this was clearly borked.

          borked.png

          If would suggest you sniff on your dest vlan interface on pfsense - do you see the traffic being sent. What do you get in response? If anything?

          edit: Also why would you be blocking bogon on a lan side interface? How would there ever be bogon on your own network?

          Why are you allowing dhcp? There is no need for that - pfsense auto adds rules for dhcp wheen you enable dhcp or dhcp relay on an interface.. There is no need for such rules.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          bingo600B 1 Reply Last reply Reply Quote 0
          • Y
            Yo5hi
            last edited by

            This post is deleted!
            1 Reply Last reply Reply Quote 0
            • Y
              Yo5hi
              last edited by

              This post is deleted!
              1 Reply Last reply Reply Quote 0
              • bingo600B
                bingo600 @johnpoz
                last edited by bingo600

                @johnpoz said in VLAN Routing with UniFi APs:

                Why are you allowing dhcp? There is no need for that - pfsense auto adds rules for dhcp wheen you enable dhcp or dhcp relay on an interface.. There is no need for such rules.

                Hmm ... Didn't know that šŸ‘

                I'm using Unifi AP-AC-PRO's wo. any probs.
                Only trick compared to "Cisco's" , is that the AP mgmt addr. must be on the Native/Untagged lan on the port the AP is connected to. Then just tag the Vlans you want for SSID's.

                Using UniFi controller on a VMware Deb-10 server

                /Bingo

                If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                pfSense+ 23.05.1 (ZFS)

                QOTOM-Q355G4 Quad Lan.
                CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  @bingo600 said in VLAN Routing with UniFi APs:

                  AP mgmt addr. must be on the Native/Untagged lan on the port the AP is connected to

                  No longer true.. As of controller software 5.8

                  https://help.ui.com/hc/en-us/articles/360046773733-UniFi-Using-VLANs-with-UniFi-Wireless
                  tagged.png

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  bingo600B 1 Reply Last reply Reply Quote 1
                  • bingo600B
                    bingo600 @johnpoz
                    last edited by

                    @johnpoz said in VLAN Routing with UniFi APs:

                    @bingo600 said in VLAN Routing with UniFi APs:

                    AP mgmt addr. must be on the Native/Untagged lan on the port the AP is connected to

                    No longer true.. As of controller software 5.8

                    @johnpoz šŸ‘
                    Hmm ... Missed that one.
                    So you can adopt the AP on/via an Untagged "Whatever port that can reach the controller"
                    Then switch mgmt to vlan xx , and have "just tagged" vlans on the AP production port.
                    Maybe add a garbage PVID vlan on the AP Port too.

                    Thnx

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      While I get where your coming from any untagged traffic would just go to some dummy vlan and not go anywhere.

                      But how would untagged traffic get on that port? But setting pvid to dummy or unused vlan on ports that only carry tagged traffic is common. But would depend on your switching os..

                      In cisco for example, if all you want is tagged traffic you can set the type to general and frame type to tagged only.. Any untagged traffic would just be dropped.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      bingo600B 1 Reply Last reply Reply Quote 0
                      • bingo600B
                        bingo600 @johnpoz
                        last edited by bingo600

                        @johnpoz
                        I guess i always direct "Native Vlan" to something known ....
                        In this instance we're talking D-Link DGS-1100 & DGS-1210 , as AP switches.

                        I do agree that it would "in normal cases" just be the AP (as it is connected to that port) , that can generate untagged frames. But in a new places i'm in an unknown environment (External partners) , and i have seen their engineers being "creative". Their CORP WiFi env. is locked heavily down (no FB etc).
                        And in an ARP walkthrough i have previously discovered XiaoMi MAC's on my "Lab Lans". The partner immediately took action when i informed them, that i saw what seemed to be "Private Phones" in my ENV.

                        But it made me think ...
                        I'm now using MAC filtering in the AP's , even though i "hate it" , as they have to contact me to get a new/replaced device whitelisted.

                        I'm using Win-PC's and VoiP phones w. WiFi , and the phones sets some limitations ... I switched from D-Link DGS-1100-08P to 1210-10P in order to get more reatures (.1x & Switch MAC filtering) , but not all of the phones can be configured to .1x ... So i'll have to use MAC filtering for now.

                        I only have the pfSense on these sites ... So if i ever want to try .1x , it would have to be FreeRad on the pfsense , and some Cert magic.

                        I'm just wondering if i would be killing my self in Cert mgmt if implementing that. If i do i will certainly have broken the KISS Rule

                        /Bingo

                        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                        pfSense+ 23.05.1 (ZFS)

                        QOTOM-Q355G4 Quad Lan.
                        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          @bingo600 said in VLAN Routing with UniFi APs:

                          i will certainly have broken the KISS Rule

                          Ya kind of already did that with mac filtering ;)

                          While mac filtering is a method of control, which is how you seem to be using it. Mac filtering is fine as a simple method of controlling the ability of users to add different devices to the network that you do not want. For example they using phone X, and you enable mac filtering. They can not bring in phone Y without letting you know - even if they know the psk to auth to the network.

                          Your involvement is going to get way more problematic as users update their phones and use private macs ;)

                          If you really want to prevent unknown devices from connecting to your wifi.. You could only allow devices that you control on the network, with use of certs.. It is fairly complex process to export a cert from a company managed device, and try and use that cert on a non company device. If the devices are managed and locked down sufficiently..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          bingo600B 1 Reply Last reply Reply Quote 0
                          • bingo600B
                            bingo600 @johnpoz
                            last edited by bingo600

                            @johnpoz

                            Luckily i'm in a controlled environment where only PC's and Desktop Phones approved by (me) are allowed to have access via WiFi.

                            No phones or personal devices are allowed on that segment.

                            /Bingo

                            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                            pfSense+ 23.05.1 (ZFS)

                            QOTOM-Q355G4 Quad Lan.
                            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.