2 networks, but only one has access to the other, not vice versa.

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
12

2 networks, but only one has access to the other, not vice versa.

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
2 networks, but only one has access to the other, not vice versa.
2 networks, but only one has access to the other, not vice versa.
2023-02-25 19:55:36
Model: OC200  
Hardware Version: V2
Firmware Version: 5.7.6

Hello community, how do I set up in Omada 2 networks (1x IoT and 1x clients) where the IoT network does not have access to the clients network, but each client gets full access to the IoT network?

ER7206 V1 (ER605 V2 - reserve) OC200 V2 SG2428P V5 EAP655-Wall V1 EAP615-Wall V1 EAP610-Outdoor V1 EAP245 V3 EAP225-Outdoor V1 EAP225 V3
  0      
  0      
#1
Options
12 Reply
Re:2 networks, but only one has access to the other, not vice versa.
2023-02-25 20:39:16

  @AngelK 

 

Use Policy Routing.  You don't need the 'reverse' that's only when you want isolation.

<< Paying it forward, one juicy problem at a time... >>
  0  
  0  
#2
Options
Re:2 networks, but only one has access to the other, not vice versa.
2023-02-25 21:24:24

  @d0ugmac1 :
There is a lot of guidance on the net on how to set up policy routing in Omada, but it always refers to dual-wan configurations.
I have only one wan and unfortunately I can't find any instructions for such a scenario.
Do you have a tip on how to set this up exactly?

ER7206 V1 (ER605 V2 - reserve) OC200 V2 SG2428P V5 EAP655-Wall V1 EAP615-Wall V1 EAP610-Outdoor V1 EAP245 V3 EAP225-Outdoor V1 EAP225 V3
  0  
  0  
#3
Options
Re:2 networks, but only one has access to the other, not vice versa.
2023-02-25 22:10:15

  @AngelK 

 

To do what you want, you need a Router+Switch which are managed (but you have that).  So see below, left side would be the IOT subnet and right Side would be your client network(s).  This is a SWITCH ACL...the router ACL's don't seem to work.

 

block

<< Paying it forward, one juicy problem at a time... >>
  0  
  0  
#4
Options
Re:2 networks, but only one has access to the other, not vice versa.
2023-02-26 11:07:31

  @d0ugmac1 

Thank you very much.
However, there is one problem.
Once I create the switch ACL rule I no longer have access from clients to IoT.
Even if a corresponding rule is created that allows access from clients to IoT and prioritizes them before the deny rule (IoT deny clients), it doesn't work because the IoT responses are blocked by the rule.

 

Another question is also bothering me now: how to edit or delete IP groups created under switch-acl rules?

ER7206 V1 (ER605 V2 - reserve) OC200 V2 SG2428P V5 EAP655-Wall V1 EAP615-Wall V1 EAP610-Outdoor V1 EAP245 V3 EAP225-Outdoor V1 EAP225 V3
  0  
  0  
#5
Options
Re:2 networks, but only one has access to the other, not vice versa.
2023-02-26 15:45:02

  @AngelK 

 

I misunderstood your ask.  What you really need is to make the IOT network a 'guest' network....ie they can get to the internet but not see each other, or any other local subnets.  Then from the internet side, you could do some port mapping so you can 'see' into the IOT network, but it cannot reach back on it's own.  In effect you'd leverage a NAT function to isolate the two.  The state of NAT in TPlink is different based on standalone/controller and also individual devices/firmware.  Ideally you'd have 1:1 LAN NAT, so IOT device at say .40 maps to local LAN .40 (or .140, or .240 etc), but a 1 to many NAT can work as well, ie WAN.ip.port8001 maps to IOT device #1.port80, etc.

 

I hope somebody has a slicker option for you!

<< Paying it forward, one juicy problem at a time... >>
  0  
  0  
#6
Options
Re:2 networks, but only one has access to the other, not vice versa.
2023-03-02 11:41:06

  @AngelK 

 

I found a treasure post today, check this:

Secured Admin, Home, IoT, Cameras and Guest VLAN using Gateway ACL

Just striving to develop myself while helping others.
  1  
  1  
#8
Options
Re:2 networks, but only one has access to the other, not vice versa.
2023-03-02 15:17:49

  @Virgo 
Thank you for the very informative link.
Looks almost like the same scenario as what I have in mind.

ER7206 V1 (ER605 V2 - reserve) OC200 V2 SG2428P V5 EAP655-Wall V1 EAP615-Wall V1 EAP610-Outdoor V1 EAP245 V3 EAP225-Outdoor V1 EAP225 V3
  0  
  0  
#9
Options
Re:2 networks, but only one has access to the other, not vice versa.
2023-03-03 05:23:18

  @AngelK 

 

It's my pleasure. wink

Just striving to develop myself while helping others.
  0  
  0  
#10
Options
Re:2 networks, but only one has access to the other, not vice versa.
2023-03-05 14:32:08

Is it correct to assume that VLAN based networks are best controlled entirely by Omada switches?
I have a camera connected to an unmanaged switch (SG1005P) via POE, which is connected to the lan of a mesh connected EAP225 outdoor. I can't set a VLAN tag on the camera, so once it gets an IP address manually set from the camera network, it is no longer reachable on the network, as the connection still goes through the administrative network.
However, if I connect a device there that I can give the VLAN tag of the Camera network, everything works as desired.

ER7206 V1 (ER605 V2 - reserve) OC200 V2 SG2428P V5 EAP655-Wall V1 EAP615-Wall V1 EAP610-Outdoor V1 EAP245 V3 EAP225-Outdoor V1 EAP225 V3
  0  
  0  
#11
Options
Re:2 networks, but only one has access to the other, not vice versa.
2023-03-05 17:37:59

  @AngelK 

 

It might take a little redesign, but you could leverage the fact that the mesh link effectively bridges the connection between the two APs ethernet ports.  

 

Consider if you changed the PVID of the switchport (via Port Profile) feeding the wired AP to be the camera network's VLAN and then tagged the Management VLAN on that port.  Anything then attached to the unmanaged switch would appear as though connected to the 'camera' network.  You DO need to then migrate that AP to the management network to ensure that it can still reach a controller if you have one, or remain isolated from the camera network at L3.

 

EDIT - I just mocked this up with an EAP235-wall..make sure you start at the far 'end' and work back to your controller :)

 

Here's where I 'set' the Management VLAN  of the AP to now be tagged:

WARNING...make sure you enable Management VLAN at the REMOTE end FIRST! (I'm not a big fan of painting myself into a corner!)

 

tagvlan

 

The APs will likely get re-adopted and come back up within a few minutes

 

and here's the switch port #1 that feeds the wired AP

 

port

 

and the AltVLAN profile, in your case my 'Wireless' network would be your 'Camera' network

 

profile

 

This will make the ports of the SG1005P (hanging off the remote AP) look like they are all on the 'Camera' vlan/subnet, but the AP's should continue to operate on the management VLAN/subnet.  You can now configure ACLs to block traffic between those subnets, which until the very latest v1.2.3 firmware for the ER605 and ER7206, had to be implemented as Switch ACLs.

 

 

 

 

<< Paying it forward, one juicy problem at a time... >>
  0  
  0  
#12
Options