In short, UniFi AP tags packets when it goes out from WLAN to wire. When tagged traffic comes in from the wire, it will untag it and forward it to WLAN. Please see our UniFi - Using VLANs with UniFi Wireless, Routing & Switching Hardware for more information.
Traffic tagging / untagging
- Traffic initiated from AP is untagged sent through br0 (or bond0 if link aggregation is enabled). This includes management traffic and RADIUS traffic, as described below:
- AP <-> Controller (management traffic)
- AP <-> RADIUS (when WPA-EAP is used)
- Traffic from WLAN without VLAN configured is untagged (the athX is bridged to br0)
- Traffic from WLAN with VLAN configured is always tagged (athX bridged to br0.VLAN to eth0.VLAN):
- AP <-> RADIUS (when WPA-Enterprise is used)
- Station -> AP (tags) -> switch
- Station <- AP (untags) <- switch
Whether it's redirected (to the guest portal) doesn't matter. When WLAN is configured with VLAN, the traffic will be tagged when it leaves the AP. However, after traffic is tagged by the AP, it's up to you where it should be passed upstream.
Here's an example:
My management network: 10.0.0.0/24 Guest VLAN network: 220.127.116.11/24 Switch: AP connected to port 5 (vlan1-untagged and vlan5-tagged) Ubuntu connected to port 1 (vlan1-untagged and vlan5-tagged) Controller connected to port 8 (vlan1-untagged) Ubuntu (acting as a Router) eth0: 10.0.0.2/24, routable to the Internet (gateway 10.0.0.1) eth0.5: 18.104.22.168/24, NATed to eth0 Controller is at 10.0.0.26
It's natural to think of a VLAN guest access is mentioned, since guests placed in their own VLAN are isolated from other parts of the network. However, there are a few technical details to talk about.
Let's start with the basic VLAN deployment where guest portal is not enabled:
1. UniFi AP tags wlan->wire traffic 2. AP-controller is untagged 3. controller is likely running on untagged interface 4. configured inside the AP: guest --- br0.3 --- eth0.3 --3--+ br0 ------------------+--u,3---port1 corp -----+
- port8 connecting to router's DMZ port, add port8 as member of vlan3 and untagging. enable DHCP server on your DMZ
- port5 connecting to internal network, have port5 untagged.
What happens when Guest portal enabled with VLAN
When guest portal is enabled, the controller acts as a portal server and the guests will be redirected to http://unifi_ip:unifi_http_portal_port/guest/. This is where the issues may arise - guest is on vlan3, bridged to DMZ, there's no way it can reach unifi_ip:unifi_http_portal_port.
In the scenario above, one solution to the problem is to add rules to your router
- add route for traffic from DMZ->unifi_ip
- allow DMZ->unifi_ip:unifi_http_portal_port
Another solution, where we envision this moving up in scale, is to have the controller running at NOC or cloud.