Setting up a Home/Business network

Comments

8 comments

  • Avatar
    Michael Bierman

    I know from some additional reading that the G3100 (which has a guest WiFi SSID) tags the Guest SSID with a VLAN 10 tag. If I understand correctly I can therefore set the FWG Guest VLAN to 10 and create a VLAN in my Switch tagged with 10 and that would manage all 'Guest' traffic.

    How is the G3100 setup? What is the order of devices?  It isn't clear what mode you plan to run Firewalla in.

    I'm hazy on how best to "share" the printer, should it sit in its own VLAN?

    Generically, you can put this on a separate VLAN or, you can put it on a particular VLAN and allow other VLANs to access the device. 

    Should I bother with multiple LAN networks on either the FWG or Switch, or should I lag two (or three) of the FWG LAN ports to a pair of ports on the Switch, then use VLAN's in the FWG and Switch to manage traffic and application of policies?

    Can't answer without knowing what the setup is. 

    Should the VPN routing be managed with yet another VLAN?

    VPNs on Firewalla are a separate network. 

    0
    Comment actions Permalink
  • Avatar
    Robert Manna

    How is the G3100 setup? What is the order of devices?  It isn't clear what mode you plan to run Firewalla in.

    Ah, sorry, I was not clear on that point! Intend to deprecate the G3100 to functioning as an AP with the FWG functioning as my primary router/security appliance for the entire network directly connected to the ONT. As noted, would eventually replace the G3100 and its extender with TP-Link APs. If the G3100 is too much of a hassle, may go ahead with the new APs sooner than later.

    So basic network architecture would be:

    ONT -> FWG -> 48 port switch

    I was planning to connect all devices to the switch, and only use the FWG LAN ports to connect to the switch, either broken out to separate LAN/VLANs on the switch or lagged together as a single trunk. Alternately I could hang the G3100 off of the FWG directly, but I'm not sure there would be any advantage to that...?

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    ONT -> FWG -> 48 port switch

    I was planning to connect all devices to the switch, and only use the FWG LAN ports to connect to the switch, either broken out to separate LAN/VLANs on the switch or lagged together as a single trunk. Alternately I could hang the G3100 off of the FWG directly, but I'm not sure there would be any advantage to that...?

    Great, thanks! With one minor exception, I don't know if any significant difference between connecting directly to FW and the switch. If your switch supports LAG you could create a LAG between FWG and the switch which gives you redundancy and greater bandwidth. https://help.firewalla.com/hc/en-us/articles/4409583011091-Link-Aggregation-Groups-LAG- 

    I know from some additional reading that the G3100 (which has a guest WiFi SSID) tags the Guest SSID with a VLAN 10 tag. If I understand correctly I can therefore set the FWG Guest VLAN to 10 and create a VLAN in my Switch tagged with 10 and that would manage all 'Guest' traffic.

    Maybe. Some routers that use a VLAN for Guest mode don't allow that in AP mode. one of this disadvantages of ISP routers like G3100 is the documentation and features are pretty limited. I could not find any documentation or any posts that confirm that you can use the Guest as a VLAN. In any case, you will be limited to the two VLANs. If you want more, you need to choose different APs.  Since you are already using Omada you might pick up their APs which support VLANs via multiple SSIDs. 

    Should I bother with multiple LAN networks on either the FWG or Switch, or should I lag two (or three) of the FWG LAN ports to a pair of ports on the Switch, then use VLAN's in the FWG and Switch to manage traffic and application of policies?

    Some people prefer separate LANs vs VLANs. It adds a bit of security. If you have enough ports and the wiring is feasible, it isn't a bad way to go. If either aren't an option, VLANs are the way to go. 

    1
    Comment actions Permalink
  • Avatar
    Robert Manna

    Thanks for the feedback.

    For completeness sake, this person seems to know what they're doing, and generally seems to have proven the G3100 uses a VLAN 10 tag on the Guest SSID. If I put it into bridge mode, I don't foresee any issue with the multi-SSID not functioning.

    However, in general I agree with your assessment about ISP routers, which is why I'm looking down the road at TP-Link APs. :-)

    It sounds/seems to me that it would be easier to only manage what I want with VLANs, and adding in LAN's would make it more complicated, as then I have to somehow set-up routing between the LANs, which I'm not sure how to do.

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    So with some APs (probably not the G3100) Guest networks are done using client isolation, not a VLAN. 

    The link you shared is promising, however I think they are describing using the G3100 as a router, not in bridge mode. 

    0
    Comment actions Permalink
  • Avatar
    Robert Manna

    So, based on the conversation above, and after further thought I've come up with the following diagram, hopefully it makes some sense. Does this seem reasonable?

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    The wiring looks fine. The segments make sense: 

    • Business
    • Family 
    • Guest IoT
    • Guest

    I have to confess that I don't quite follow what FWG Content Mgmt is or what it is for. 

    0
    Comment actions Permalink
  • Avatar
    Robert Manna

    'Content Management' was my euphemism for FWG's Family Protect settings as well as any other parental control settings. :-) 

    0
    Comment actions Permalink

Please sign in to leave a comment.