Hello, we have a RB4011 connected to 4 different buildings with dumb switches in each building.
Now we want to seperate the manage building from the rest so they cant talk to the manage building.
Is it just to setup a Vlan for the port that goes to that building or do I need a smart switch?
Everything is right now with default configs, set with quickset and dhcp range.
Please provide a network diagram to assist.
A smart switch would be a smart idea because any vlan subnets you make in the RB4011 could then be more easily distributed.
The simplest network topology with one subnet per building and one building per RB4011 ethernet port does not require smart switches and VLANs, some reconfiguration of RB4011 will do. However if you want to segment networks in the buildings (or have flexible configuration, some subnet spanning more than one building), then indeed the simplest way is to use VLANs (and smart switches in the buildings).
When providing network diagram, you can provide current RB4011 configuration as well: run /export hide-sensitive file=anynameyouwish, fetch the resulting file, open it with text editor, mask off any public IP addresses there might be visible, and copy-paste it to [__code] [/code] environment (the square brackets icon above post editor window). This way you’ll get a quality suggestion on how to change config.
You did not clarify about how dumb switches in buildings are connected to RB4011. Assuming each of those switches is connected to individual ethernet ports of RB4011 and assuming you want to run one subnet per building, then:
construct 4 subnet pools for DHCP servers
remove appropriate ethernet ports from common bridge
assign IP addresses directly to ethernet ports - each port will directly serve one of building subnets
configure DHCP servers on ethernet interfaces … use appropriate DHCP server settings for each of interfaces
add appropriate firewall rules (to chain=forward) to block traffic between subnets
If the op selects
add chain=forward action=drop as the last rule in the forward chain, will not that stop the etherports from seeing each other at layer3?? (aka one rule replaces many rules??)
It would, but his current setup is default which “only” drops everything from WAN. I was writing task list according to his current config, not according to your golden standard.
Is it possible to only vlan eth2 and leave the rest like it is?
Every switch is connected directly into ethernet ports, but the managers are using switch connected to eth2 and we would like the rest of the network not to be able to reach that building if you can understand what I mean.
If you only want to isolate LAN beyond ether2, then only perform steps I listed for ether2. E.g. remove ether2 from bridge, set IP address from a new IP subnet to ether2, add DHCP server on ether2 (with appropriate settings for selected subnet), add appropriate firewall rules which will block connections from LAN interface-list towards ether2 (you probably want to allow connections in the opposite direction).
Whatever connected to the rest of ports will continue to work as is.