Firewall Gold and TP-Link Managed Switch Configurations

Comments

12 comments

  • Avatar
    David Rothenberger

    If I were you, I would start by creating a new VLAN for Home and stop using the default VLAN ID of 1. 

    How is your Home LAN set up on the Firewalla?

    1
    Comment actions Permalink
  • Avatar
    rj834

    Home is set up as a LAN across ports 2 and 3 with VLANs also on 3.  Is there better security with home on VLAN as well?

     

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    @rj834 I think the idea is not to use the default VLAN ID is all. 

    Can you share the unifi settings? I suspect the issue lies there. 

    1
    Comment actions Permalink
  • Avatar
    rj834

    With the two questions around VLAN ID and Unifi, I think I just figured out the issue.  Firewalla is using a default LAN or Home, so not lining up with VLAN 1 on the switch.  Not sure why I assumed 1 was just a default for everything unless otherwise defined.  I also looked at my Unifi Console and while I have for SSIDs, I only have three networks defined.  Home is assigned to default, so it's not explicitly defined as the others are.  
    I'll reconfigure and update.  I bet that's it, but will be back to report either way.

    0
    Comment actions Permalink
  • Avatar
    rj834

    Well, that was certainly a complete disaster.  Lost access to everything.  Even the Firewalla changes took forever.

    I changed my local LAN to VLAN 10, after defining a VLAN on the Unifi access point clicked save on both and lost all access, even after reboots.  Had to set everything back to the way it was to regain access.

    Unifi configurations are:

    Network

    • Guest - VLAN 40
    • Router - 3rd Party Gateway (only option)
    • IGMP Snooping - Disabled
    • DHCP Guarding - Disabled
    • IoT - VLAN 60
    • Router - 3rd Party Gateway (only option)
    • IGMP Snooping - Disabled
    • DHCP Guarding - Disabled
    • Work - VLAN 80
    • Router - 3rd Party Gateway (only option)
    • IGMP Snooping - Disabled
    • DHCP Guarding - Disabled

    Created a new one for home which went badly - Currently not associated to anything on the Firewalla or Switch

    • Home - VLAN 10
    • Router - 3rd Party Gateway (only option)
    • IGMP Snooping - Disabled
    • DHCP Guarding - Disabled

    Wifi

    • SSID - Guest, Network - Guest, AP Group - All APs
    • SSID - Home, Network - Default, AP Group - All APs
    • SSID - IoT, Network - IoT, AP Group - All APs
    • SSID - Work, Network - Work, AP Group - All APs
    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    Yikes, you may have clipped access to the unifi management VLAN so you need to be careful about making changes. 

    I don't know why you only have 4rd party gateway as an option. I'm guessing some setting you have prohibits the Default option. I would set the Guest VLAN the same as the others and see if that changes anything. 

    I have: 

    • IGMP Snooping ON except for my Guest network.
    • Multicast DNS off (because Firewalla takes care of that
    • Router: Default for all networks
    • Are you using a standard or Guest network? 
    1
    Comment actions Permalink
  • Avatar
    rj834

    I'm using Standard on all Networks except IoT, which is the Guest (restricted profile). Doing most of the blocking still on Firewalla, the Guest profile on IoT, is jus an added measure.

    0
    Comment actions Permalink
  • Avatar
    rj834

    I just turned on IGMP Snooping on Home and Work, but left it off on Guest and IoT.

    Multicast DNS has been turned off.

    Router says VLAN only Network and the toggles are set to on.  Should I turn off?

    0
    Comment actions Permalink
  • Avatar
    rj834

    I tried a couple of other things since....so close....
    I updated the VLAN configuration to this:

    Then updated the PVID settings to:

    This may have been why things went bad the last time I changed the Home LAN to VLAN 10. 

    I then moved the Home SSID from default to the Home network created earlier and voila!
    Well, almost!!!  Absolutely everything worked as it was supposed to except the Unifi AP went to the 192.168 network above and while the SSIDs all worked, I got an AP Adoption failed notice in the console and lost access to it.  I know at this point this isn't a Firewalla issue anymore, but any idea why the AP would get attached to the 192 network, instead of staying on the Home network?

    0
    Comment actions Permalink
  • Avatar
    David Rothenberger

    Well, almost!!!  Absolutely everything worked as it was supposed to except the Unifi AP went to the 192.168 network above and while the SSIDs all worked, I got an AP Adoption failed notice in the console and lost access to it.  I know at this point this isn't a Firewalla issue anymore, but any idea why the AP would get attached to the 192 network, instead of staying on the Home network?

    I suspect you did not set the Management VLAN for the AP to VLAN 10, so the traffic between the AP and UNA is untagged. You could try changing the PVID for port 2 to 10 instead of 1. Hopefully, that will recover the AP. Then, you can set the Management VLAN for the AP to 10.

    2
    Comment actions Permalink
  • Avatar
    rj834

    Ah, looks like that may have been it.  I hadn't seen that setting.  Just found it under the AP Settings page.  Will try it shortly....

    0
    Comment actions Permalink
  • Avatar
    rj834

    Success!!!  That was it.  Thank you, David and Michael! 

    Happy New Year!

    0
    Comment actions Permalink

Please sign in to leave a comment.