Physical Network Isolation

That's Chris Sherwood. Him and Willie Howe pretty much are the standard for YouTube videos on Ubiquiti equipment.
Agreed...
That video up above..from Crosstalk, is old, dated 2016.

OK - so I'll just come out and ask - do any of you have a tutorial or video collection that shows HOW to setup a 2 VLAN setup using an EdgeRouter Lite + Ubiquiti Switch + Ubiquiti WAP?

REALLY want to learn this... but the tutorials I find don't match the equipment or interface I have.

I have the ERL and the UAP's, but the switch is not ordered, so I am open to any suggestions!
 
OK - so I'll just come out and ask - do any of you have a tutorial or video collection that shows HOW to setup a 2 VLAN setup using an EdgeRouter Lite + Ubiquiti Switch + Ubiquiti WAP?

REALLY want to learn this... but the tutorials I find don't match the equipment or interface I have.

I have the ERL and the UAP's, but the switch is not ordered, so I am open to any suggestions!
I don't, but you're going to need the switch to do the VLAN's. Personally I would have went all Unifi, USG, Unifi Switch and UAP. It would have been very simple and through one controller, however take a look here. Edgeswitch VLAN, EdgeRouter VLAN Note: These are older videos and have no sound. Here is how to add the VLAN to the UAP: "You can set the VLAN that a SSID users by going to Settings > Wireless Networks > Advanced Options. The advanced options area is shown either when you create a new wireless network (SSID), or when you edit an existing SSID. You can use VLANs on standard or guest SSIDs."


Here is ER and ES VLAN config from Crosstalk
 
Thank you for the response. That's the video I referenced earlier but was told the interface has completely changed and the method of configuration has changed.

I will be going all ubiquiti, but I don't have the switch yet. It is a $700 purchase so I am a little shy in ordering it until I actually have a proper game plan to deploy.

Maybe VLAN's are easy-peasy but I am not there yet in my understanding. Looking for a video that goes, "OK, here's our UBNT equipment, let's deploy a standard network with two VLAN's, one for private, one for public, with isolation on the public network".
 
OK - so I'll just come out and ask - do any of you have a tutorial or video collection that shows HOW to setup a 2 VLAN setup using an EdgeRouter Lite + Ubiquiti Switch + Ubiquiti WAP?

REALLY want to learn this... but the tutorials I find don't match the equipment or interface I have.

I have the ERL and the UAP's, but the switch is not ordered, so I am open to any suggestions!

What I meant was, that's the "old way" of doing things before the Unifi system matured. He made that video before Ubiquiti made it really nice and easy with the whole Unifi system. The way Chris at Crosstalk does it in that video...is how we've always done VLANs the "old way"...with various equipment. Like if you have an HP ProCurve switch, and a Linksys LRT224 router or <whatever> that supports virtual VLAN interfaces within a physical ETH interface.

I contrast that "old way" against the "new way" which is with ALL Unifi equipment. Meaning, a Unifi Security Gateway, not an Edge Router. And a Unifi switch. And a Unifi AP. Having all 3x types of hardware on your network be Unifi...the gateway/router, the switch, and the AP...allows you to unleash the beauty and ease of management of the Unifi controller. And for your ease....you can easily remote manage everything within the remote portal of the Unifi system.

Having an EdgeRouter instead of a USG sorta negates that system, the fact that the switch is a Unifi switch sorta negates things..may as well have an edgeswitch or a Procurve switch. And your Unifi controller is now just running the AP. You end up missing out on all the fun, and you can't enjoy or harness the full power of the Unifi system.

Edge equipment does stuff the old way. Unifi equipment does stuff the new way.

KInda like if you were going to build a Meraki network, or an OpenMesh network...you want to get that brand and model equipment from top to bottom, else...you're losing the power and ease of management of the controller.

I'd put the ERL back on the shelf and get a USG.
 
Last edited:
@YeOldeStonecat - Thank you for this careful explanation.

Edge equipment does stuff the old way. Unifi equipment does stuff the new way.

I did not understand this distinction before, thank you.

For my customers sake, I think I will proceed with a simple setup and order in some Unifi equipment to experiment with first.

Thank you for your explanation. It is encouraging to know that Ubiquiti products aren't quite as fringe at TN as they seem to be elsewhere.
 
The biggest fallacy is that VLANS provide security like hitting a brick wall; they don't.

Using a separate VLAN for each room really doesn't add any security anyway in and of itself because a multi-layer switch will simply take the IP address and Mask assigned to each SVI and drop all of those respective subnets into the default routing process/VRF.

Regardless, if you do this you need 12 subnets (one for each VLAN), and you need to put your DHCP server helper IPs onto the SVIs, too.

Then to break connectivity between the rooms most folks would use ACLs, which would probably work but for meaningful security you also need to isolate the routing processes!

Realistically though, you would probably want to create 12 VRF tables such that each SVI is on its own virtual router instance vs being all routed together between the rooms. From there, you would need the Internet connection in its own VRF as well. Okay, so that is very easy... but now you need them to all talk to the Internet which is NOT in any of those routing processes and if you do IP VRF Forwarding dropping it into one, only that room has Internet...

To remedy this, you now need to do PBR (Policy Based Routing) and drop a route-map onto each SVI whereby you match the destination based on what would otherwise be a default route and set the destination VRF to the Internet VRF.

Bet you don't want to do the VLAN Idea anymore.

******************

I would do protected switchports:

Switch# conf t
Switch(config)# interface range GigabitEthernet0/1 -48
Switch(config-if)# switchport protected
Switch(config-if)# end

Protected ports cannot transmit/receive traffic between other protected ports. Hence, you would connect the Internet off a non-protected port and be done with it!

********************
My choice:

Only about $1000!

For the best security buy an Application-Layer firewall like a Palo Alto and configure it. Create a separate zone for every room and drop a sub-interface for each room into a different zone. This uses 802.1q and trunks it into a switch. From there you deliver an access port to the room within that VLAN, but it is critical you use only layer-2 functionality on the switch leaving the routing process on the Palo Alto! Make all zones layer-3 zones and put some subnet information on them (basically the default gateway). Setup DHCP on there, too. Make a NAT rule to NAT them all to a shared external IP for all those zones. NAT your staff to another IP from the pool though by using a different source zone.

Create a policy for each room to the outside to allow that traffic, and specify it by type using the same address object for each rule.

Next setup QoS on the Palo Alto guaranteeing the staff have more bandwidth and that the rooms are divided up evenly




Honestly, it would take only about an hour to configure it this way. I would put the majority of applications in the address-group to allow them, but if abuse happens, you could pull them out of the address group and it would impact all rooms. Each room would be firewalled from one another, but the settings would be uniform. If needed you could add a rule to just allow the Staff zone to any zone, and the staff could then print to a printer, scan the networks, etc.
 
Back
Top