Here are other details and examples:

http://community.ubnt.com/t5/airMAX-Configuration-Examples/airMAX-VLANs/ta-p/455741
 
<http://community.ubnt.com/t5/airMAX-Configuration-Examples/airMAX-VLANs/ta-p/455741>

UBNT has some great articles in their community pages.  I recommend you take a 
look.  Google is a great tool for searching them.


> On Jan 20, 2015, at 3:34 PM, Brett A Mansfield <br...@silverlakeinternet.com> 
> wrote:
> 
> Yes, UBNT does support 802.1q.  Here is an example in their community pages 
> for what you are wanting to do:
> 
> http://community.ubnt.com/t5/airMAX-Configuration-Examples/airMAX-Management-tagged-and-Access-VLAN-untagged-on-Station-LAN/ta-p/1044653
>  
> <http://community.ubnt.com/t5/airMAX-Configuration-Examples/airMAX-Management-tagged-and-Access-VLAN-untagged-on-Station-LAN/ta-p/1044653>
> 
> 
>> On Jan 20, 2015, at 3:03 PM, Jeremy <jeremysmi...@gmail.com 
>> <mailto:jeremysmi...@gmail.com>> wrote:
>> 
>> Do UBNT radios support .1Q?
>> 
>> On Tue, Jan 20, 2015 at 3:02 PM, Jeremy <jeremysmi...@gmail.com 
>> <mailto:jeremysmi...@gmail.com>> wrote:
>> If we VLAN traffic to each AP already how would we do a management VLAN?  
>> Would we have to make every AP port a trunk port (pruned, of course), and 
>> then let the radio do the tagging and untagging?
>> 
>> On Tue, Jan 20, 2015 at 1:13 PM, Brett A Mansfield 
>> <br...@silverlakeinternet.com <mailto:br...@silverlakeinternet.com>> wrote:
>> It's possible there is a bug in the software then. All of my NATd radios on 
>> 5.5.9 and older I can only access the management on the management VLAN, but 
>> all of the ones running 5.5.10 I can access it on both the management VLAN 
>> and untagged interfaces.
>> 
>> Though there may be something in the configuration causing it. I'm double 
>> checking. It clearly shows management is set to the tagged vlan. Looks like 
>> the bridge is missing in the config though. It must have wiped it out when 
>> NAT was put in place.
>> 
>> Thank you,
>> Brett A Mansfield
>> 
>> On Jan 20, 2015, at 12:39 PM, Josh Reynolds <j...@spitwspots.com 
>> <mailto:j...@spitwspots.com>> wrote:
>> 
>>> Jesus Christ no.
>>> No.
>>> 
>>> SSH, web, SNMP, etc only respond on whatever the management interface is. 
>>> If it's left default, it responds on what's assigned. If you vlan it off, 
>>> it only responds on that vlan. Other untagged traffic goes through as 
>>> bridged or routed depending on what you have configured.
>>> 
>>> On January 20, 2015 10:12:37 AM AKST, Bill Prince <part15...@gmail.com 
>>> <mailto:part15...@gmail.com>> wrote:
>>> NATting in the radio just eliminates so many issues.  It solved lots of 
>>> issues for us when we did it with Canopy.  It was easy because the 
>>> management/NAT are always separated in Canopy.  It just became part of our 
>>> standard practice.
>>> 
>>> So if we're doing NAT on the CPE, management traffic will go to the public 
>>> interface?  That seems broken.  What defines "management" traffic besides 
>>> SSH/WWW ports?
>>> 
>>> bp
>>> <part15sbs{at}gmail{dot}com>
>>> 
>>> On 1/20/2015 11:07 AM, Brett A Mansfield wrote:
>>>> You'll need to set up a dhcp server for that vlan or manually assign it. 
>>>> 
>>>> Even with NAT on the CPE the management interface will work the same. But 
>>>> when doing NAT you'll be able to access the radio from its public address 
>>>> as well. There really is no reason to NAT at the radio with VLANs. 
>>>> 
>>>> Any reason you'd do NAT at the radio?
>>>> 
>>>> Thank you,
>>>> Brett A Mansfield
>>>> 
>>>> On Jan 20, 2015, at 12:03 PM, Bill Prince <part15...@gmail.com 
>>>> <mailto:part15...@gmail.com>> wrote:
>>>> 
>>>>> If you're bridging, where does the management VLAN get it's IP address?
>>>>> 
>>>>> Likewise (or almost likewise), if we're NATting in the CPE, is there a 
>>>>> place to assign the VLAN interface a different IP address?
>>>>> 
>>>>> bp
>>>>> <part15sbs{at}gmail{dot}com>
>>>>> 
>>>>> On 1/20/2015 10:33 AM, Brett A Mansfield wrote:
>>>>>> UBNT has a good video on this very thing. �If done right, all ssh 
>>>>>> traffic would be passed through the radio to the customers router on the 
>>>>>> public side and the management side will only be accessible internally.
>>>>>> 
>>>>>> Here is a link to their video on the VLAN setup for management.
>>>>>> http://community.ubnt.com/t5/airMAX-Frequently-Asked/airMAX-VLAN-management/ta-p/472529
>>>>>>  
>>>>>> <http://community.ubnt.com/t5/airMAX-Frequently-Asked/airMAX-VLAN-management/ta-p/472529>
>>>>>> 
>>>>>> Thank you,
>>>>>> Brett A Mansfield
>>>>>> 
>>>>>> 
>>>>>>> On Jan 20, 2015, at 11:18 AM, Josh Reynolds <j...@spitwspots.com 
>>>>>>> <mailto:j...@spitwspots.com>> wrote:
>>>>>>> 
>>>>>>> Management services only respond on the management vlan...
>>>>>>> 
>>>>>>> On January 20, 2015 9:17:24 AM AKST, Bill Prince <part15...@gmail.com 
>>>>>>> <mailto:part15...@gmail.com>> wrote:
>>>>>>> OK.� Great.� We can put another IP on a management IP on the 
>>>>>>> VLAN.� How does that block the SSH logins?
>>>>>>> 
>>>>>>> Can you specify that SSH only goes through the management VLAN?
>>>>>>> 
>>>>>>> bp
>>>>>>> <part15sbs{at}gmail{dot}com>
>>>>>>> 
>>>>>>> On 1/20/2015 10:14 AM, Josh Reynolds wrote:
>>>>>>>> It creates another interface, a tagged one. You specify which 
>>>>>>>> interface is the management interface. Don't route it out of your 
>>>>>>>> network.
>>>>>>>> 
>>>>>>>> On January 20, 2015 9:13:06 AM AKST, Bill Prince <part15...@gmail.com> 
>>>>>>>> <mailto:part15...@gmail.com> wrote:
>>>>>>>> My understanding of the UBNT VLAN is that it's all one VLAN? How do 
>>>>>>>> you split management/sub traffic?
>>>>>>>> 
>>>>>>>> bp
>>>>>>>> <part15sbs{at}gmail{dot}com>
>>>>>>>> 
>>>>>>>> On 1/20/2015 10:05 AM, Josh Reynolds wrote:
>>>>>>>>> Management. VLAN.
>>>>>>>>> 
>>>>>>>>> On January 20, 2015 8:51:22 AM AKST, Bill Prince 
>>>>>>>>> <part15...@gmail.com> <mailto:part15...@gmail.com> wrote:
>>>>>>>>> Not the AP side, but the client side. We have traditionally NATted 
>>>>>>>>> all 
>>>>>>>>> residential subs on Canopy, and were trying to do the same with UBNT.
>>>>>>>>> 
>>>>>>>>> With Canopy it's easy, because the NATted TCP stack just passes 
>>>>>>>>> through, 
>>>>>>>>> and if SSH ports are open, it goes to the sub's router (no impact on 
>>>>>>>>> the 
>>>>>>>>> SM).
>>>>>>>>> 
>>>>>>>>> Not so with UBNT, as the public IP for NAT is also the IP for the CPE.
>>>>>>>>> 
>>>>>>>>> Just wondering if anyone else has tried the CPE firewall to prevent 
>>>>>>>>> brute-force SSH logins.
>>>>>>>>> 
>>>>>>>>> I suppose I could cobble together something on the POP router, but 
>>>>>>>>> looking for options.
>>>>>>>>> 
>>>>>>>>> bp
>>>>>>>>> <part15sbs{at}gmail{dot}com>
>>>>>>>>> 
>>>>>>>>> On 1/20/2015 9:37 AM, Peter Kranz wrote:
>>>>>>>>>  Generally a bad idea to use that firewall (at least on the access 
>>>>>>>>> point side) as it supposedly cuts into your PPS capacity on the
>>>>>>>>> radio.
>>>>>>>>> 
>>>>>>>>>  Peter Kranz
>>>>>>>>>  Founder/CEO - Unwired Ltd
>>>>>>>>>  www.UnwiredLtd.com <http://www.unwiredltd.com/>
>>>>>>>>>  Desk: 510-868-1614 x100 <tel:510-868-1614%20x100>
>>>>>>>>>  Mobile: 510-207-0000 <tel:510-207-0000>
>>>>>>>>>  pkr...@unwiredltd.com <mailto:pkr...@unwiredltd.com>
>>>>>>>>> 
>>>>>>>>>  -----Original Message-----
>>>>>>>>>  From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] 
>>>>>>>>> On Behalf Of Bill Prince
>>>>>>>>>  Sent: Monday, January 19, 2015 1:47 PM
>>>>>>>>>  To: af@afmug.com <mailto:af@afmug.com>
>>>>>>>>>  Subject: Re: [AFMUG] UBNT firewall
>>>>>>>>> 
>>>>>>>>>  Nobody actually using the UBNT firewall?
>>>>>>>>> 
>>>>>>>>>  bp
>>>>>>>>>  <part15sbs{at}gmail{dot}com>
>>>>>>>>> 
>>>>>>>>>  On 1/14/2015 11:25 AM, Bill Prince wrote:
>>>>>>>>>  We notice that any time we use NAT on UBNT we get a lot of login
>>>>>>>>>  attempts via SSH.  Are any of you using the firewall built in? It's
>>>>>>>>>  not clear from the GUI interface whether this affects input or
>>>>>>>>>  forwarding, or both.
>>>>>>>>> 
>>>>>>>>>  What I'd like to do is block any
>>>>>>>>> SSH logins that are not in one of our
>>>>>>>>>  subnets, but I'm afraid if I turn it on, it will affect forwarded
>>>>>>>>>  traffic.
>>>>>>>>> 
>>>>>>>>>  Examples?
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> -- 
>>>>>>>>> Sent from my Android device with K-9 Mail. Please excuse my brevity.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> -- 
>>>>>>>> Sent from my Android device with K-9 Mail. Please excuse my brevity.
>>>>>>> 
>>>>>>> 
>>>>>>> -- 
>>>>>>> Sent from my Android device with K-9 Mail. Please excuse my brevity.
>>>>>> 
>>>>> 
>>> 
>>> 
>>> -- 
>>> Sent from my Android device with K-9 Mail. Please excuse my brevity.
>> 
>> 
> 

Reply via email to