Solved

Multiple SSIDs and VLAN with USG 100, GS2200 and Ubiquiti AP

Posted on 2013-11-15
2
5,308 Views
Last Modified: 2014-01-23
Hi,

I just installed 3 Ubiquiti Unifi AP.  I've setup 3 SSIDs.  I want them to be on their own VLAN and separate networks so they can't "see" each other.  I've set the Ubiquiti routers to different VLAN IDs for each SSID (ie. wifi1 =vlan2, wifi2 = vlan3 and wifi3 = vlan4).  I have a Zyxel GS2200 24 port switch and a Zyxel Zywall USG 100 router.

What's the best way to do this with my equipment?  I have currently setup 3 configurations under VLAN in Interface (name:  vlan2, vlan3 and vlan4--static IPs for each AP).  I've configured the GS2200 with VLAN2 on ports 14, 15 and 16 (where the three APs are connected).  

I am now able to ping the three AP but when I connect to them, I don't get an IP address from DHCP and I'm not certain if the networks are truly separate.  

Please let me know if you need further info.

Thanks for any help!
0
Comment
Question by:kendalltech
2 Comments
 
LVL 26

Expert Comment

by:Soulja
ID: 39652538
What device is serving the dhcp addresses?
Have you create a dhcp scope for each vlan?
Have you set up dhcp relay for whichever devices is routing your vlans?
0
 
LVL 1

Accepted Solution

by:
H323 earned 500 total points
ID: 39652719
In your switch set up vlan 2, 3 and 4 and set all ports as members of all vlans.
Only 1 patch cord between your switch and lan1 on the router.
In USG router go to configuration > network > interface > vlan tab > add
Interface type = internal
Interface name = vlan2
Zone = none
base port = lan1
vlan id = 2
select used fixed IP address
set IP of this interface i.e. 192.168.51.1
subnet: 255.255.255.0
on same page go down to DCHP and select DHCP server, then set your starting lease address and pool size
Make sure to change DHCP lease time to 1 or 2 days (don't let it infinite)
hit OK.
Repeat above process to add VLAN 3 and 4.

go to configuration > network > zone
Add a new zone called VLAN2 and add VLAN2 to that zone.
Repeat for VLAN 3 and 4.

Go to firewall and block interlan traffic as desired.   For example From: VLAN2 To: LAN1 would block all traffic from Wi-Fi VLAN2 headed for the corporate LAN1.

Go to routes and add a route for each vlan so that VLAN2, 3 4 can get to the internet.  I don't think those subnets will be able to browse by default.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question