Initial Setup - First LAN IP/Netmask

Comments

7 comments

  • Avatar
    Firewalla

    Any reason you are picking a /16 mask? This means you are creating a network for 65,000 devices. 

    Large masks will cause issues with device discovery and also waste lots of memory maintaining stats on devices you will never have. 

    a /18 mask is 16000 devices, which is already far beyond what a typical home can handle. 

    0
    Comment actions Permalink
  • Avatar
    Neal

    The reason for that was not a technical one, but more a human one.  I'm using the 3rd octet as a visual designation of the purpose of the devices (e.g. 10.10.250.x is IoT devices, 10.10.200.x is general WiFi, 10.10.150.x is home lab, etc.).  These aren't exact examples, but it gives the idea.

     

    I'd like to eventually get to a point where I have VLAN's controlled by Firewalla that maps to a similar construct , but using '/24' networks (e.g. VLAN 250 = 10.10.150.x/24 is IoT devices, VLAN 200 = 10.10.200.x/24 is general WiFi, etc.).

    But I don't know how to configure that yet using the Firewalla as a primary gateway, without totally bringing down everything for (what is to me) a huge learning curve, which will impact the wife.

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    Ah. 
    This is really simple. 

    Create your VLANs. They won't impact devices until you move them over. 

    Migrate devices when it is convenient. Make sure to remove or adjust any IP reservations in the process. 

    0
    Comment actions Permalink
  • Avatar
    Neal

    Thank you very much for you input, both of you.  Also, my appologies for the delayed response.  I had to travel for work.

    Ah. 
    This is really simple. 

    Create your VLANs. They won't impact devices until you move them over. 

    Migrate devices when it is convenient. Make sure to remove or adjust any IP reservations in the process. 

    As to the response, and please correct me if I am wrong, but isn't this a "phase 2" or 3 suggestion?  To my limited understanding, this is very much advice that I'd like to take.  Before I can though, wouldn't I need to first get the Firewalla IP'd on my existing network (10.10.0.0/16)?

     

    So unless I'm completely misinterpreting what you wrote, (which is quite possible) this leaves me with the original question: In Router mode, when creating my first LAN segment, the Firewalla app forces me to use a '255.255.192.0' (or '/18') netmask.  Is there a way bypass this and use a '255.255.0.0' ('/16') netmask?

     

    Is there a way to do this via command-line?  Can I use standard Debin/Raspbian command-line steps to forcibly set the 'br0' interface, which maps to 'LAN1', to an IP/netmask?  Is this possible to bypass the restrictions of the Firewalla app in this way?  Also, assuming this does work, will there be a process to get the Firewalla app to recognize the Firewalla firewall at the new IP?  Remember, if this can be done, the intention that this not be a permanent solution.  It's to do this temporarily in order to implement the next phase, which is creating VLAN's and migrating devices.

     

    Or...

     

    Is there some other, maybe even unintuitive, way of doing this that's unknown to a newbie like me?  Spit-balling, but could I do something like:

    1. Assign 1 port to bridge mode.
    2. Plug my mesh router into this port.
    3. Assign the other ports to router mode.
    4. Configure the VLAN's (VLAN 250 = 10.10.250.x/24 is IoT devices, VLAN 200 = 10.10.200.x/24 is general WiFi, etc.).
    5. Configure network routes in a way that I don't yet understand, such that everything on the new VLAN's can still talk to everything on the bridge port?

    Is this even a thing in the networking world, where 1 port is bridge, and other ports have VLANS, but network routes allow communication?  Even spitballing, this sounds very complicated, and would be easier if I could just assign an IP/netmask to the Firewalla on a '10.10.0.0/16' subnet.

     

    Thank you again.

    0
    Comment actions Permalink
  • Avatar
    David Rothenberger

    The Firewalla cannot act in both bridge and router modes simultaneously.

    If I understand correctly, you would like to connect the Firewalla to your existing network, move some devices behind the Firewalla, so they use the Firewalla as their router, and leave other devices in your regular network, and have everything work like that until you move everything behind the Firewalla. Is that correct?

    If so, my advice is to forget the phased approach and just move to the Firewalla in one go. But, if you wanted to try a phased approach, I think you would need to follow these steps:

    1. Add the Firewalla as a client to your existing network by connecting the Firewalla WAN port to your network.
    2. Define your LANs on the Firewalla.
    3. Move devices into the Firewalla LANs incrementally.

    This requires that the LANs you define on the Firewalla do not overlap with your existing LANs. So, you'll need to move to 10.11.0.0/16 or something for the Firewalla LANs.

    You must also decide whether to turn on Source NAT on the Firewalla. If you leave it on for your WAN connection (connected to your existing network), all the clients connected to the Firewalla will appear as the Firewalla to the rest of the network. That's not great for visibility, but it means you don't need to mess with the routing for your existing network. If you leave Source NAT off on the Firewalla, you will need to add routes to your existing router and switch to route the Firewalla networks (e.g., 10.11.0.0/16) to your Firewalla.

    As you can see, even the phased approach will require that you re-address all your devices. I don't know how difficult that will be for you.

    0
    Comment actions Permalink
  • Avatar
    Bruce

    I still have not seen a definite answer to "what is the default IP address for either a Purple or Gold SE and on which port?"  I want to be able to manually configure them as the iPhone app is not working.  I am about to return both of these.

    0
    Comment actions Permalink
  • Avatar
    Michael Bierman

    What have you connected the Firewalla to? Can you get the ip from there?

    Generally the ip won’t matter because the app will find firewalla over bluetooth or the local network.you only need to manually configure it in rare instances.

    0
    Comment actions Permalink

Please sign in to leave a comment.