Hey. To control traffic between devices use firewall filter with drop rules filtered by source addresses. To launch traffic of different networks via single interface use switch before hap ac2 or vlans on machines to start tagged traffic from PC and VMs and stripp tags on hap ac2.
Hi!
Here is what I would do looking at your diagram
Configure 2 vlans ( ex vlan10 for “internal” and vlan 11 for cameras") and 2 network subnets, one for each vlan (ex 192.168.0.0/24 and 192.168.1.0/24), in the hap ac2
optional - configure 2 dhcp servers for these vlans or only for vlan 10 if you assign static to the camers
\
CAP AC ports:
a) ETH2 - to camera poe switch - access mode, vlan 11
b) ETH1 - trunk mode, vlans 10 and 11
c) ALL wifi SSIDs - vlan 10
HAP AC2:
2 bridge vlans with IPs
physical ports:
a) to CAP AC - trunk mode, both vlans
b) to main PC, NAS, IPTV - access vlan 10
c) any SSID - vlan 10
Basically all your home will be in VLAN 10 with only the cameras in vlan 11. From here it is very simple to create firewall rules in the HAP AC2 to filter between the subnets and allow only the traffic you need.
Firewall is never HW offloaded. Intra-VLAN switching/bridging can be HW offloaded if device supports this particular way of configuring it … hAP ac2 doesn’t.