Hi I'm really confused with the problem. Either I don't know what I'm doing or I'm just missing something.
I have 192.168.1.0/24 as Main Subnet
I tried to create a VLAN20 for NVR and Cameras with Subnet 192.168.20.0/24
I can't access the Unifi NVR with Static IP 192.168.20.2 when I'm on my admin PC on subnet 192.168.1.0/24 subnet
is it because of my firewall settings or the way I have my Netgear Switch VLAN setup?
Here's my config:
"firewall { all-ping enable broadcast-ping disable group { network-group VIDEO_LAN { description "Video Camera VLAN subnet" network 192.168.20.0/24 } network-group VIDEO_VLAN_BLOCK_NETS { description "Drop Video Camera Traffic to other VLANs" network 192.168.10.0/24 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name VIDEO_VLAN_IN { default-action accept rule 20 { action drop destination { group { network-group VIDEO_VLAN_BLOCK_NETS } } } } name VLAN10_IN { default-action accept description VLAN10_IN rule 10 { action accept description "Allow Accesss to Cloudkey" destination { address 192.168.1.4 port 8880 } log disable protocol tcp } rule 20 { action drop description "DROP access to 192.168.1.0" destination { address 192.168.1.0/24 } log disable protocol all } } name VLAN10_LOCAL { default-action accept description VLAN10_LOCAL rule 10 { action accept description "Allow VLAN10 DNS" destination { port 53 } log disable protocol tcp_udp } rule 20 { action drop description "drop access to 192.168.10.1" destination { address 192.168.10.1 } log disable protocol all } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_OUT { default-action accept description "Internal to WAN" rule 1 { action accept description "Accept Established/Related security camera to WAN" log disable protocol all source { group { network-group VIDEO_LAN } } state { established enable invalid disable new disable related enable } } rule 2 { action drop description "Block Security camera initited connections to WAN" log enable protocol all source { group { network-group VIDEO_LAN } } state { established disable invalid disable new enable related disable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 205.200.229.194/22 description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } out { name WAN_OUT } } speed auto } ethernet eth1 { address 192.168.1.1/24 description Local duplex auto speed auto vif 10 { address 192.168.10.1/24 description VLAN10_GUEST firewall { in { name VLAN10_IN } local { name VLAN10_LOCAL } } } vif 20 { address 192.168.20.1/24 description VLAN20_VIDEO firewall { in { name VIDEO_VLAN_IN } } } } ethernet eth2 { address 192.168.2.1/24 description "Local 2" duplex auto speed auto } loopback lo { } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth1 lan-interface eth1.10 wan-interface eth0 } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN1 { authoritative enable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.38 { stop 192.168.1.243 } } } shared-network-name LAN2 { authoritative enable subnet 192.168.2.0/24 { default-router 192.168.2.1 dns-server 192.168.2.1 lease 86400 start 192.168.2.38 { stop 192.168.2.243 } } } shared-network-name VLAN10 { authoritative disable subnet 192.168.10.0/24 { default-router 192.168.10.1 dns-server 192.168.10.1 dns-server 4.2.2.2 lease 86400 start 192.168.10.2 { stop 192.168.10.254 } } } shared-network-name VLAN20 { subnet 192.168.20.0/24 { default-router 192.168.20.1 dns-server 192.168.20.1 dns-server 4.2.2.2 start 192.168.20.2 { stop 192.168.20.20 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth1 listen-on eth2 listen-on eth1.10 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } ssh { port 22 protocol-version v2 } } system { gateway-address 205.200.228.1 host-name ubnt login { user iwcmain { authentication { encrypted-password **************** } level admin } } name-server 142.161.2.155 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC }"
And here's how it's wired and the VLAN setup on Netgear Switch and ToughSwitch:
I use a Netgear switch and 1 ToughSwitch and here's the VLAN config:
Netgear - Office
Port 1 - UAP AC LITE - Office
Port 6 - NVR
Port 25 - ERL
Port 26 - ToughSwitch
TOUGHSWITCH - Main Hall
Port 1 - UAP-LR
Port 2 - UAP-LR
Port 3 - Desktop 1 - Admin
Port 4 - Unmanaged Switch - TP Link
Port 5 - UAP-LR
btw when I try to access the gateway 192.168.20.1 it lets me go to ERL page.
Thanks in advance