Controller v6 new feature - Isolated VLANs - goes a bit too far in isolating them

Controller v6 new feature - Isolated VLANs - goes a bit too far in isolating them

Controller v6 new feature - Isolated VLANs - goes a bit too far in isolating them
Controller v6 new feature - Isolated VLANs - goes a bit too far in isolating them
Yesterday

Just a bit of feedback, posting here in gateways since its gateway specific

 

Omada v6 allows us to set an isolated vlan - great, saves making gateway and switch rules to prevent inter-vlan for those networks.......BUT

 

In my opinion it goes a bit too far in isolating them.  It also prevents them reaching out to anything that isnt the gateway / internet - i test isolated a vlan on my public networks gateway, and it no longer allowed the use of that gateways static route i have set to a printer on my main network.  As soon as i un-isolated the network i was testing, the static route was able to be used by that vlan again.

 

I think there are plenty of scenarios where users would want a vlan isolated from other vlans, but i dont think that should extend to isolating it from other things like routes.

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
  1      
  1      
#1
Options
6 Reply
Re:Controller v6 new feature - Isolated VLANs - goes a bit too far in isolating them
Yesterday

  @GRL 

 

WRT the static route issue, this may be related.  I asked about the priority of the VLAN isolation option over ACLs in this post.  The response was that ACLs take priority.  I just tested this with the V6 controller update and it seems to be working OK.  What I am getting at is that an ACL may be a workaround for a static route problem (until the problem is fixed).

 

In my case, I have a VoIP phone on a separate VLAN.  I liked the idea of isolating the VLAN so I wouldn't have to include it in my various ACLs that deny inter-vlan routing.  After isolation, I could no longer reach the phone's GUI.  That was solved with a single ACL that allows my PC's private network to access the VoIP network.  The rule does, in fact, override the isolation option.

 

1x ER706W 1x OC300 4x SG2008 1x EAP610 2x EAP650
  0  
  0  
#2
Options
Re:Controller v6 new feature - Isolated VLANs - goes a bit too far in isolating them
Yesterday

  @GRL 

 

Interesting, but since the networks on my public vlan gateway are gateway interface only, i cant use a LAN<>LAN ACL to point to an IP_Group :-(

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
  0  
  0  
#3
Options
Re:Controller v6 new feature - Isolated VLANs - goes a bit too far in isolating them
Yesterday

  @GRL 

 

I don't use IP groups here as I am only using gateway ACLs.  For example, to get around a printer access problem, I simply put the printer (I only have 1 printer) on it's own VLAN with a /30 subnet.  The only 2 useable IP addresses are assigned to the gateway and to the printer.  As inter-VLAN routing is enabled by default on the gateway, all the VLANs that need access to the printer have it.

 

1x ER706W 1x OC300 4x SG2008 1x EAP610 2x EAP650
  0  
  0  
#4
Options
Re:Controller v6 new feature - Isolated VLANs - goes a bit too far in isolating them
Yesterday

  @jra11500 

 

In my case, the printer exists on a network on a different gateway that doesnt have a corresponding vlan on the public gateway, hence the static route.  I would have to be able to add that IP as a LAN<>LAN IP group destination for the exception to work, which we cant do on gateway rules 

 

I have just left it un-isolated and have its acces controlled in myprior way which works fine.

 

I have taken advantage of isolation & removal of old rules for the other networks on that gateway though!

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
  0  
  0  
#5
Options
Re:Controller v6 new feature - Isolated VLANs - goes a bit too far in isolating them
9 hours ago

Hi  @GRL 

 

Static Route should have higher priority than isolated VLAN.

 

Would you please share with us some screenshots of your config, and some screenshots of the test result? This helps us fully understand the situation. Thanks.

  0  
  0  
#6
Options
Re:Controller v6 new feature - Isolated VLANs - goes a bit too far in isolating them
8 hours ago - last edited 8 hours ago

  @Vincent-TP 

 

Sure

 

I seperated out my main physical building network into two sites - Main and Public.  Main uses ER8411 as gateway on 1.3.2 and hosts all the switches, EAPs and has all the inter-vlan routing for the internal networks as hybrid gateway & switch routing.  Public is an ER7206 v2 running 2.2.3 that has gateway hosted vlans for all the public access networks with matching vlan tags on a trunked port to my main switch

 

All the public access networks are switch only vlans on the main site so i can pipe those vlans around the switches and EAPs, and they are gateway only vlans on the public site.

 

hopefully that makes sense!

 

 

Public Gateway Site :

 

Networks - The one i was intending to isolate was "BBar" - note it IP range of 192.168.100.X

The Core network is my wider management vlan that connects it to the main network for omada control and the static route to and from the switch

 

 

Public gateway static route for the printer on the main network - hops the single IP address to the main routing switch hosting the SVI for that vlan on the main site

 

On the main switch (the main site) - static route hops traffic destined back to the BBar network to the public gateway IP on the management vlan

 

 

This all works perfectly, until i enabled VLAN Isolation on the BBar network on the public gateway site.  Then, it just stops - no pinging the printer from the bbar network and the main site cant ping the bbar network from the printer IP

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
  0  
  0  
#7
Options