added 2 vlan intefaces (vlan1 & vlan100) to ether1
vlan1 is member of bridge1
vlan100 is member of bridge100
Two CAPsMAN configurations with 2 different SSIDs, one configured with datapath.bridge=bridge1 and the other one has datapath.bridge=bridge100
When CAPsMAN is provisioning, none of the wlanXX interfaces are added to a bridge… (hence, no communication…)
I also tried setting the vlan tagging on the actual capsman config, but no success…
How’s CAPsMAN supposed to be configured when you want local forwarding and multiple SSIDs/VLANs?
Please use CAPsMAN v2 and use vlan-id setting for each SSID (CAP interface).
Then add a vlan interfaces on the ethernet/bridge interface on the CAPsMAN where the CAP boards are connected.
This is for the local-forwarding.
The datapath bridge option will only work if you use the full-forwarding and not the local forwarding.
I got it working with local forwarding when I moved mgmt traffic to its own vlan.
You can’t have a vlan interface added for mgmt with the same vlan id used in one of the wireless SSIDs. The vlan interface seems to intercept all traffic and it will never reach the wireless client.
And how to use multiple SSIDs/Vlans with full forwarding (not local)
I tried:
CapsMAn Configutration>Datapath>
Bridge=guest-bridge
VLAN Mode = use tag
VLAN ID = 87
Interfaces>VLAN
vlan_87_ether2
ID = 87
interface=ether2
Bridge
guest-bridge add port vlan_87_ether2, ether2
cap client conected to AP but can’t receive IP. Whout use tag 87 in CAPSMAN it works fine
I would like use vlan to separate traffic to from different SSID from Cap to CapsMan
Please, we need help to configure CAPsMAN with 6 RBCap2n
One of them is the CAPsMAN
All units are connected to a managed switch and all Ports that are used to connect those CAPs are tagged with two vlans.
Administration Network = VID 1000
Guest Network = VID 2000
So, my goal is:
Manage all CAPs with CAPsMAN (I think this is already done because inside the CAPsMAN I can see other CAPs)
Create two SSID on each CAP (one for VLAN 2000 and other for VLAN 1000)
Be able to segregate those SSID with those mentioned VLANs.
What I’ve done so far is:
Create a DataPath with local forwarding enable (because all CAPs have a possibility to achieve those VLANs networks)
Create a VLAN interface with same VID as mentioned before.
CAPsMAN are working with ether1 (without vlan) so, supposedly is using VID = 1 as access port (which is common for Switching)
Anyway, I’m kinda lost with all this process…
Hope that somebody could help! Thanks in advance.
Best regards
If you are here and reading this post, I did resolve this by adding those vlans to a bridge.
Not adding vlan inside a bridge, but creating a vlan with bridge as interface.
I have 1 CapsManager and 2 Caps- 2 SSID and 2 VLANs
If clients connect to free SSID(cap x.2) then (cap x.1- is General SSID with mac-filter)“xx:..x:xx:xx@Capx.1 rejected, forbidden by access-list”
Let’s suppose that your master SSID is “My office network” and slave “My private WiFI”. Now you can use a part of SSID: “My” in regexp for both networks or for single one of this: “office network”, office, network “private WiFI”, etc.
Wow…Made adjustments to the rules- working..
I thought a direct link is used.. I have 2 SSID like “WIfi” and “Wifi_Free”- rules to “Wifi” is work to all SSID..
Thanks for the help.
And how does the configuration on the CAP side in case of local forwarding look like? Do I need to define a bridge which is connected to the ether1? Or, do I need to define vlan on ether1 and add it to the bridge configuration or the Vlan tagging in the access menu on the CAPSMAN side is sufficient?