Sorry, no kid gloves here. By the way, after the 1000th person who says they read the article and know what they are doing in vlans, only to trip on their own 3rd leg, it gets old, and thus sometimes I lack patience!
I understand the angst of getting locked out.
Hence I always do the following → Take one port OFF the bridge to then do the config in a safe spot!!!
/interface ethernet
set [ find default-name=eth9 ] name=OffBridge9
/ip address
add address=192.168.75.1/30 interface=OffBridge9 network=192.168.75.0
/interface list member
add interface=OffBridge9 list=LAN
and if you have a management interface
add interface=OffBridge9 list=TRUSTED
Then plug in laptop to ether9 set ipv4 settings to 192.168.75.2 and you should be in. A must safer and nice location to do the config from.
+++++++++++++++++++++++++++++++
Okay the tricky part is that the controller is not on the same vlan as the APs themselves??
As noted previously, or perhaps not, ALL smart devices should be on the same management or trusted vlan.
Therefore the controller and APs should be on the same VLAN.
The difference or oddity is unifi APs come default expecting the management vlan to come into the AP untagged and the data vlans tagged.
If not possible for some reason, then we have to get funky with the APs themselves to know where to look for the controller, thinking DHCP options maybe for these devices but will have to get back to you on that.
The firewall rules will not direct the APs to look for the controller on a different subnet so that is the issue…
++++++++++++++++++++++++++++++
Okay so you have a server on the LAN, IMMICH and it has a specific IP address.
What does it mean going through a reverse proxy??
Who accesses this server, internal users only, external only, both?
For external users, can you create a source address list of their public static IPs and also include their own dyndns URL domain names for dynamic IPs ( many free ones on the internet )
- another option why not cloudflare trust this traffic as well.
- another option is for external users to wireguard in with access only to server?
Secondarily you have a second server, calling it home assistant. Assuming it has an IP?
You have this smartly setup going through a cloudflare zero trust tunnel.
How is this accomplished ( on the router? container? ) or some other mechanism (aka on server itself and thus transparent to the router.
Hairpin NAT is for which server, assuming the IMMICH?
The easiest way and recommended to avoid to use hairpin is simply create another vlan and only put the IMMICH on this subnet.
All local users will be able to access without any funky hairpin nat rules.
If not possible the rule required is put this rule first in NAT rules
add chain=sourcenat action=masquerade src-address=subnetOFserver dst-address=subnetOFserver.
I would drop the layer7 stuff until the rest is sorted!!