Creating an ACL to allow access to a printer that is on one VLAN in the EAP...

Creating an ACL to allow access to a printer that is on one VLAN in the EAP...

Creating an ACL to allow access to a printer that is on one VLAN in the EAP...
Creating an ACL to allow access to a printer that is on one VLAN in the EAP...
a week ago - last edited Yesterday
Tags: #ACL #Gateway
Model: ER605 (TL-R605)  
Hardware Version: V2
Firmware Version: 2.3.0 Build 20250826 Rel.41004

Hope you're all well.

 

I have several VLANs on my EAP with different subnets. I need a VLAN belonging to a Wi-Fi printer to be accessed by another VLAN where the clients are located.

 

Printer VLAN = 2.4GHz
Client VLAN = 5.0GHz

 

I created an ACL on the client network for printer access. I can ping it, but it won't print.

I created an additional ACL on the printer network for client access. I ran the same test, but nothing.

I can only print when I connect the client to the same network as the printer.

 

If I'm pinging, the ACL is allowing it; I should be printing. I only see the printer going offline.

 

What am I doing wrong?


 

ADDITIONAL DETAILS - 1

 

The networks have some peculiarities.

 

[ SSID - 2G Printer ]
Guest Network = Disable
LAN = 192.168.10.0 / 29
Prohibit Wi-Fi Sharing = Enable
WPA Mode = WPA2-PSK / AES

VLAN: 71

 

[ SSID - 5G Client ]
Guest Network = Enable
LAN = 192.168.5.0 / 28
Prohibit Wi-Fi Sharing = Enable
WPA Mode = WPA2-PSK/WPA3-SAE / AES

VLAN: 70

 

[ ACL - VLAN 70 - Deny LAN to LAN ]

Type: Gateway

Direction: LAN -> LAN

Policy: Deny

Protocols: All

Source: VLAN 70

Destination: Others, except 71.

 

[ ACL - VLAN 71 - Deny LAN to LAN ]

Type: Gateway

Direction: LAN -> LAN

Policy: Deny

Protocols: All

Source: VLAN 71

Destination: VLAN 70 and others.

 

[ ACL - Allow VLAN 70 to Printer ]

Type: EAP

Policy: Permit

Protocols: All

Source: VLAN 70

Destination: IPgroup Printer. <- Create this to IP Printer - 192.168.5.4

 

I remembered something that happened to me, even before updating to the new firmware version of the controller and even the router.

I remember an IoT device couldn't work with the 192.168.7.0 / 29 network. I couldn't understand the limitation and couldn't find an explanation anywhere else. When I changed it to 192.168.7.0 / 28, the device was able to use the SSID - IoT.

 

I haven't tested it yet, but if anyone has any information, it would be helpful.

 

 

ADDITIONAL DETAILS - 2

 

I also tried disabling the Guest Network on the client VLAN, but the result was the same.

And in response to my friend, I also tried creating a Group to only report the printer's IP address.

  0      
  0      
#1
Options
1 Accepted Solution
Re:Creating an ACL to allow access to a printer that is on one VLAN in the EAP...-Solution
Thursday - last edited Yesterday

  @Artur.Aragao 

Thank you for your post. You can try configuring mDNS to see if it resolves the issue. Please add all networks as both Service Network and Client Network. Here is the configuration guide for your reference:How to configure mDNS via Omada Controller

Recommended Solution
  1  
  1  
#2
Options
3 Reply
Re:Creating an ACL to allow access to a printer that is on one VLAN in the EAP...-Solution
Thursday - last edited Yesterday

  @Artur.Aragao 

Thank you for your post. You can try configuring mDNS to see if it resolves the issue. Please add all networks as both Service Network and Client Network. Here is the configuration guide for your reference:How to configure mDNS via Omada Controller

Recommended Solution
  1  
  1  
#2
Options
Re:Creating an ACL to allow access to a printer that is on one VLAN in the EAP...
Thursday - last edited Friday

  @Ethan-TP

 

 

My dear.

Thank you for your kindness.
I'd like a more comprehensive explanation, if that's not too much trouble.

In my logic, if I'm enabling communication between the media (VLANs), no additional services would be necessary, since tunneling between them is functional.

 

One additional point.

I've been trying to understand more about mDNS, and this has caused me concern.
Some say it's just the mDNS reflector, and it's not working properly. Unfortunately, I haven't tested it yet because I had a busy day. I'm sorry I didn't answer this adequately.

And I saw in some posts on Reddit that enabling mDNS as a reflector activates it on all interfaces, including the WAN, and that would be quite bad. Could you confirm this?

Another detail: they say the best way to use mDNS is as a repeater, but then it would be applied on a separate server.

I'll try to run these tests later, but I'm VERY concerned about having to enable this on the WAN interfaces.

  0  
  0  
#3
Options
Re:Creating an ACL to allow access to a printer that is on one VLAN in the EAP...
Yesterday

  @Artur.Aragao

 

I'm back here to report my success with this case.

 

I still need to understand a few things, and I think the people here will be able to explain better.

 

Before applying mDNS, which was the only thing that resolved the printing issue, I tried allowing access between VLANs 70 and 71 and VLANs 71 and 70, but nothing worked.

 

Analyzing the context of the mDNS rules, I decided to initially apply mDNS at the AP level. The logic was quite clear to me. VLANs 70 and 71 are used by SSIDs, so communication would be effective for this type of access. It didn't work.

 

I created another rule in mDNS, but this time for the Gateway. I didn't understand it. I had to delete the previous one because the gateway option wasn't enabled. Great, let's go!

Rule created, I waited a bit, ran the test, and finally the printer did what was expected. Now I can block LAN-to-WAN on VLAN 71.

 

I'm a bit unsure and even inclined to test it later. Would this feature work even though I've blocked LAN-to-LAN and LAN-to-WAN networks on both VLANs? I really didn't want VLAN 71 to be open, but logically, I see that I should allow it.

 

I'm truly grateful to everyone who contributed to this.

 

In all my years in this vital industry, this is the first time this has happened to me. You must know woodpeckers around here. Amazing design. LOL

I want to continually improve the security level with my ER605 V2. Sometime in the future, God willing, I plan to buy an Omada with IDS/IPS and WLAN SFPs. I want to learn more.

 

Omada has been a very enjoyable experience, and sometimes nerve-wracking. I really wish there were more hardware diversifications for small and medium-sized businesses. Don't forget that's where they started. From nothing to what they are today.

 

I wanted to see hardware designed for virus inspection, in addition to the IDS/IPS. Suddenly, a device designed to be an add-on to the gateway.

  0  
  0  
#4
Options