Hello friends!
I am researching info for an upcoming VLAN project. The idea is to split an existing network into 2 separate networks - one for administration and management, and the other for guest use. The guest network would be limited to Internet, DHCP, and DNS only. Time is of the essence in this project and a complete overhaul would likely not be feasible.
I've browsed through these forums the entire day and found lots of helpful and relevant information, but have a few questions which I would feel very grateful to have clarified.
A bit about the current setup (sorry, didn't create a diagram yet)
I'm working with an EdgeRouter PoE v1.9.1.1. eth0 is the WAN link. eth1 is the uplink for the main switch (UniFi Switch 48) with 192.168.1.1/24 IP. eth2-4 are under switch0 with 192.168.2.1/24, and a PoE Controller CloudKey living on eth4. DHCP and DNS are enabled on each LAN, with 95% of all IP addresses ending up on 2.1. 1.1 acts as a backup in this configuration which was set up before my time. I'd like to disconnect eth1 entirely during this project.
There are 5 UniFi 8 PoE switches besides the main switch scattered throughout the property, each either connecting to the main switch or to one another, with 26 APs (a combination of Unifi AP, AP-LR, AP AC Pro, AP AC Mesh, and AP AC Lites) currently connected in total, a few bridged by Nanobeam ACs. The APs are broadcasting two separate SSID's with the Guest SSID currently only limited in bandwidth. The goal is to separate them through VLAN and proper firewall rules as well.
Now onto the questions:
1) Would there be any potential problems or difficulties if I just went ahead and created a, say switch0.30 VLAN with an IP of 10.0.0.1 in the EdgeRouter with DNS and DHCP enabled, and then had the Main Switch ports configured to redirect guest traffic to it? I presume I would need to create a corresponding VLAN network within the Main Switch also - Would I create it as a "Corporate Network" with the gateway pointing to the IP of the switch0.30 interface, or as a "Vlan Only" network with 30 under VLAN. Would I then simply provision the new Guest SSID through the APs and get a proper guest IP address?
2) Within the switch0 interface, 192.168.2.1 traffic will by default remain untagged. Is this correct? Would I need the Vlan-Aware setting which is not supported by the PoE version for any reason whatsoever in this setup?
3) Are there any disadvantages to using switch0 for vlans, as opposed to eth1? My concern is having to re-adopt all access points and switches or losing access to the CloudKey Controller in case something goes wrong, if I were to leave the current setup and migrate it all onto eth1. Somewhere I read switch0 is limited in throughput to 1Gbps and that could be a potential bottleneck. Any advice?
4) Would any of the Nanobeams powering smaller switches and APs need to be re-configured to pass along the new switch0.30 Vlan, or does it happen automatically?
5) Are there any potential difficulties in creating firewall rules to segregate Guest traffic from LAN in my proposed switch0/switch0.30 setup, since they're technically all on the same "switch"?
Thanks in advance for any and help you can provide!