Folks,
In case there are 3 devices:
1.) Main router
2.) CAP
3.) HAP (with wifi)
Both CAP and HAP are setup as CAP, and managed by CAPSMAN on Main router.
Moreover, HAP’s all eth ports are put into its local bridge.
In capsman, I have created multiple configurations, so now both CAP and HAP are broadcasting with 2 SSIDs on their 5GHz interface:
1.) Home
2.) Guest
In the main router, capsman added all wifi interfaces dynamically, but they don’t attached to the main router’s bridge directly (however as both CAP and HAP are connected onto the eth2 and eth3 ports of the main router respectively, their wifi interfaces become part of main router’s lan indirectly).
So now, I wished to segregate “Guest” wifi with separate VLAN:
- I added a “guest vlan” interface to the bridge in the main router (Is this good, or I should have created a virtual bridge with CAP’s and HAP’s eth ports?)
- In bridge’s properties “vlan filtering” is turned off, and no vlan associations has been made (although I could have selected caps-wifi interfaces it felt like a bad idea as they sometimes got provisioned and changes their names). (Am I right here?)
- In capsman I added a datapath with the bridge and the VLAN ID
I wish to emphasize, that my configuration works, and I have watched and read many videos and articles, manuals.
With VLANs, there are usually dozens of use-cases, so it’s rather hard to navigate yourself especially if you have a little bit more specific situation.
Questions:
1.) guest vlan interface to main bridge, OR create a new virtual bridge with only eth ports that contains caps? Isn’t it a general bad practice to add a vlan to the bridge if we know exactly that only 2 ports can be in that particular vlan?
2.) shall/can I avoid manual interface to bridge tagging (in bridge’s “VLANs” properties) in case I use datapath with capsman because it is doing that for me behind the curtains?
3.) Shall I use bridge’s “vlan filtering”?
Thank you!