Multiple SSIDs with Multiple Subnets on CAP&AC products
Dear all, hi there,
Starting off with the configuration guide on
https://www.tp-link.com/de/support/faq/1848/
I was convinced I could roll off my project without hassles. Great, finally a step by step guide for my usage case, I’ll spend money on this. Yes, you’ve figured it out, I’m no network guru, I didn’t have the chance to dive deeper into this particular topic ,all I know I’ve picked up here and there. I see that changes in build versions make things difficult where they should be easy, VLAN just got complicated as hell over the 3 TP-Link devices.
I’m sitting in front of the same device models as in the configuration guide. Here is the SaveStream Router, the L2 Managed switch (mine has less ports though) and access controller. Find more details on the topology plan attached.
The challenges comes with different build versions, my TL-ER620 is version 3.0, my T260G-18TS is version 4.0. This makes the configuration guide obsolete in it's most delicate part, the VLAN configuration. Guess what came out contacting the official support.. tons of blahbla but no substantial help at all, they simply cannot understand the usage case of their products no matter about lifetime warranty.
After many hours of try&error, cursing a lot about this bunch of s..t etc. I managed to get DHCP service and internet access on the 3 SSID's the CAP's are sending out. This is all built up with untagged VLANs since I understood the configuration guide like this. But this is where my journey begins, shouldn't I use tags for the WiFi VLANs? This got me so puzzled I hardly can find out now.
I'm stuck when it comes to separating the VLANs. All my subnets now have full access to the other subnets of the other VLANs and I have to separate this due to security requirements. Basically the idea is that VLANs 100, 200, 300, 800 and 900 can see their own subnet, the gateway router on 192.168.190.1 and internet. Access from one VLAN to another VLAN should be blocked (except VLAN1 of course). All in all basic requirements, no very special solution one might think.
I've fiddled around with the default route from 0.0.0.0/0.0.0.0 (everything) to 192.168.190.1 (main router) splitting it up into the 5 subnets like
from 172.21.181.0/255.255.255.0 (VLAN100) to 192.168.190.1
from 172.24.184.0/255.255.255.0 (VLAN200) to 192.168.190.1
from 172.28.188.0/255.255.255.0 (VLAN300) to 192.168.190.1
from 10.111.112.0/255.255.255.0 (VLAN800) to 192.168.190.1
from 10.115.230.0/255.255.255.0 (VLAN900) to 192.168.190.1
To my surprise this broke all internet access on the VLANs. Nice separation but not really the intention :-[
All in all I got 90 % working with +60 hours of try&error and now I can’t put this in place due to the very last issue.
Is there anyone out there who as came over this obstacle. Any hint is very much appreciated, please help.