Hello people!
I need some help to wrap my head around VLANs and how to configure them in a home network to make them span across devices, having never touched them, let alone going beyond basic home network configuration. I’m reading lots of stuff and watching tons videos, still can’t get to anything besides a strong headache (not joking…).
Below there is a quite horrible design of how my home network is arranged. For the moment, the Firewall isn’t connected, just treat it as a wire.
So far i have working a CRS310-8G+2S from which I feed rooms wall network sockets, a RB951ui-2hnD, then a RB260GSP which works as PoE switch and power
supply for two ceiling mounted PoE APs (CAP XL ac) located upstairs.
Home main network is 192.168.10.0/24 with the gateway (currently the DSL router) set to 192.168.10.254 and DHCP server.
That arrangement works beautifully, and i take the opportunity to encourage anyone in need for a AP to choose dual band ones because the 5GHz signal is really too weak to cover also a not so big house. Probably being the house quite old with thick walls and having a military airbase not far from here also doesn’t help.
A few premises to keep things as simple as possible:
I don’t need/want strong security as I live in a sparsely populated area, and strong WiFi passwords on all wireless devices would be enough.
Performance isn’t an issue: I rarely make use of all internal bandwidth, my downlink barely goes beyond 30Mb and is going to remain that low at least until they bring fiber, which has always been due in 3 months since the 1st time I asked …two years ago.
Basically,I would like to add to the above:
1- A guest VLAN (tagged “90” to allow untrusted WiFi devices to go outside, subnet 192.168.90.0/24). This is a very low priority feature to have “just in case” as usually people visiting would rather use their 4/5G phone to connect to the outside at much higher speed. I wouldn’t because i want a public IP.
2- A IoT VLAN (unsurprisingly tagged “107”, subnet 192.168.107.0/24) to connect various devices. All devices are reflashed using FOSS firmware and none of them would connect to any outside cloud service, that is, the IoT VLAN doesn’t need to access to the outside, and any access/management would be performed by a separate box (*Pi-like board, etc) working as a router/bridge.
3- A DHCP server on the CRS310 switch, which I plan to move on the firewall FW or on the small box once it’s operational.
So far, I’ve created on one of the ceiling APs: the virtual interface linked to the wlan1 (2GHz) one, a vlan bridge, a vlan dhcp client, all tagged accordingly, and on the CRS310 the corresponding vlan bridge and vlan dhcp server, but can’t seem to obtain a DHCP address. Using Torch i could see the DHCP requests from my phone being correctly tagged, but they seem confined within the access point. Then I tried with fixed addresses everywhere, again without success. I’ve been struggling for over a week with this problem and every document or video seems to add more confusion, which suggest I’m missing something very basic to proceed, hence this cry for help. Do I have to create a virtual interface for each physical one on the CRS310? This is very unclear to me as the whole mechanism of how packets travel from an interface to a bridge and back doesn’t seem clearly exposed, although in my past jobs I’ve written code to play with sockets and send/recv IP packets, encapsulate them, data conversion and alignment between different architectures etc, so I’m familiar with the concept but the documentation or the presentation wrt VLAN configuration doesn’t help to understand the mechanism.
Surely I’m missing something but have no idea what or where.
I don’t even know if that’s possible (corrections welcome!), but if a VLAN works like a virtual wire just as the one connecting physical interfaces, then I’d like to keep things as simple and transparent as possible, that is, no dedicated interfaces: every VLAN tagged packet entering whichever port on the CRS310 should be available on all others untouched, just like in a plain hub, then if something connects on the APs VLAN wireless virtual interface then can only be a IoT device and its input packets will be tagged as necessary, while output packets reaching it will be untagged. This is necessary as I don’t expect small ESP* boards and other uControllers for example to be able to connect to VLANs directly, correct me if I’m wrong. Also, I don’t plan to connect any IoT devices to any physical port, except for the above mentioned box which would work as bridge between LAN and VLAN.
Any help much appreciated, thanks!