Two for now. Make VLAN3 regular AP access and VLAN4 guest AP access.
1 - Give the two VLANs interfaces static IP addresses and assign the two VLANs to ethernet port #1
2 - define a subnet, mask, gateway for each VLAN subnet
3 - set up the firewall for each of the two vlans or subnets.
Next steps are to create a port trunk on the TP-Link with two VLANs and then assign one VLAN to two ports. Note this is to test the two vlan connections one by one. IE: you can plug in a laptop to port 5 or port 6 and it should get a DHCP address from either of the subnets.
Baby steps here as you want to validate your stuff. After validation we will create a second port trunk on the Main TP-Link switch...but not yet....don't think of the VLANs as guest and regular for now...just make them two subnets; recall that each vlan is a separately defined network. It is straight forward using the TP-Link managed switch. Later on too you can utilize the TP-Link managment software for multiple switches (only runs on Windows).
IE:
1 - Tomato router ethernet port #1 is a trunked port with two VLANs #3 and #4. (less wiring) - one cable from ethernet port #1 to TP-Link ethernet port #4
2 - TP-Link Port #4 is a trunked port with two VLANs #3 and #4
3 - TP-Link Port #5 is VLAN3 - temporary for testing
4 - TP-Link Port #6 is VLAN4 - temporary for testing
Do we need two vlan or we can do it with vlan3?
Two VLANs for Wireless APs for time bean as an exercise relating to VLANs.
Recall that you only have one ethernet cable between the AP and the managed switch that it plugs in to (so you are trunking that port with two vlans or two networks).
AP ==> ONE wire (2 networks) ==> managed switch with trunking on one port (2 networks) ==> ONE Wire ==> main managed switch ==> ONE wire ==> Tomato router.
Call the second one main VLAN if you want and that one can be your main subnet in the future.
Unifi has the ability to set a vlan for ssid_guest so it would be one network cable using vlan 3 if I understand it.
We are going to make the configuration such that you will have a regular connection VLAN - SSID and a guest connection VLAN - SSID - two subnets - one guest and one regular.
1 - Give the two VLANs interfaces static IP addresses and assign the two VLANs to ethernet port #1
2 - define a subnet, mask, gateway for each VLAN subnet
3 - set up the firewall for each of the two vlans or subnets.
Next steps are to create a port trunk on the TP-Link with two VLANs and then assign one VLAN to two ports. Note this is to test the two vlan connections one by one. IE: you can plug in a laptop to port 5 or port 6 and it should get a DHCP address from either of the subnets.
Baby steps here as you want to validate your stuff. After validation we will create a second port trunk on the Main TP-Link switch...but not yet....don't think of the VLANs as guest and regular for now...just make them two subnets; recall that each vlan is a separately defined network. It is straight forward using the TP-Link managed switch. Later on too you can utilize the TP-Link managment software for multiple switches (only runs on Windows).
IE:
1 - Tomato router ethernet port #1 is a trunked port with two VLANs #3 and #4. (less wiring) - one cable from ethernet port #1 to TP-Link ethernet port #4
2 - TP-Link Port #4 is a trunked port with two VLANs #3 and #4
3 - TP-Link Port #5 is VLAN3 - temporary for testing
4 - TP-Link Port #6 is VLAN4 - temporary for testing
Do we need two vlan or we can do it with vlan3?
Two VLANs for Wireless APs for time bean as an exercise relating to VLANs.
Recall that you only have one ethernet cable between the AP and the managed switch that it plugs in to (so you are trunking that port with two vlans or two networks).
AP ==> ONE wire (2 networks) ==> managed switch with trunking on one port (2 networks) ==> ONE Wire ==> main managed switch ==> ONE wire ==> Tomato router.
Call the second one main VLAN if you want and that one can be your main subnet in the future.
Unifi has the ability to set a vlan for ssid_guest so it would be one network cable using vlan 3 if I understand it.
We are going to make the configuration such that you will have a regular connection VLAN - SSID and a guest connection VLAN - SSID - two subnets - one guest and one regular.
Comment