Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 6420
  • Last Modified:

Multiple SSIDs and VLAN with USG 100, GS2200 and Ubiquiti AP

Hi,

I just installed 3 Ubiquiti Unifi AP.  I've setup 3 SSIDs.  I want them to be on their own VLAN and separate networks so they can't "see" each other.  I've set the Ubiquiti routers to different VLAN IDs for each SSID (ie. wifi1 =vlan2, wifi2 = vlan3 and wifi3 = vlan4).  I have a Zyxel GS2200 24 port switch and a Zyxel Zywall USG 100 router.

What's the best way to do this with my equipment?  I have currently setup 3 configurations under VLAN in Interface (name:  vlan2, vlan3 and vlan4--static IPs for each AP).  I've configured the GS2200 with VLAN2 on ports 14, 15 and 16 (where the three APs are connected).  

I am now able to ping the three AP but when I connect to them, I don't get an IP address from DHCP and I'm not certain if the networks are truly separate.  

Please let me know if you need further info.

Thanks for any help!
0
Matt Kendall
Asked:
Matt Kendall
1 Solution
 
SouljaCommented:
What device is serving the dhcp addresses?
Have you create a dhcp scope for each vlan?
Have you set up dhcp relay for whichever devices is routing your vlans?
0
 
H323Commented:
In your switch set up vlan 2, 3 and 4 and set all ports as members of all vlans.
Only 1 patch cord between your switch and lan1 on the router.
In USG router go to configuration > network > interface > vlan tab > add
Interface type = internal
Interface name = vlan2
Zone = none
base port = lan1
vlan id = 2
select used fixed IP address
set IP of this interface i.e. 192.168.51.1
subnet: 255.255.255.0
on same page go down to DCHP and select DHCP server, then set your starting lease address and pool size
Make sure to change DHCP lease time to 1 or 2 days (don't let it infinite)
hit OK.
Repeat above process to add VLAN 3 and 4.

go to configuration > network > zone
Add a new zone called VLAN2 and add VLAN2 to that zone.
Repeat for VLAN 3 and 4.

Go to firewall and block interlan traffic as desired.   For example From: VLAN2 To: LAN1 would block all traffic from Wi-Fi VLAN2 headed for the corporate LAN1.

Go to routes and add a route for each vlan so that VLAN2, 3 4 can get to the internet.  I don't think those subnets will be able to browse by default.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

NEW Internet Security Report Now Available!

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out this quarters report on the threats that shook the industry in Q4 2017.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now