This is probably simple, but I have not successfully configured a Netgate SG3100 with two separate networks.
Requirements. A Company is subletting a room in their office and they want to share their internet connection and completely separate the networks.
Current Situation
Netgate SG3100 Connected to tp-link switch and 2 Unifi Access Points
Network: 10.21.53.0 for computer (default VLAN)
Network: 172.20.10.0 for mobile phones (VLAN 101)
tplink switch port 24 is connected to SG3100 LAN1
HPE Switch port 24 is connected to SG3100 LAN2
My idea was to enable 802.1q on the netgate and assign VLAN 10 tagged to port 4. Tag VLAN 10 on the HPE and all the other ports on the HPE untagged, but until now, there has been no success.
Is this the wrong approach or what other configuration should I apply?
Also I want to add the VLAN 10 to the Unifi AP’s for their Wifi
Yes, you can setup VLAN10 for the tenant and have it both on the HP switch and your switches and access points. I would make sure you have rules for their network set so they can not access your networks.
Configure each port on the HP (except the uplink port) to use VLAN 10, you’re essentially creating a “VLAN-tagged” network where all traffic on those ports is tagged with VLAN 10. This means that any device connected to those ports will only see VLAN 10 and won’t be able to access other VLANs.
The uplink port, which connects to your firewall would typically remain an untagged (or “native”) VLAN 10 port.
Blockquote Configure each port on the HP (except the uplink port) to use VLAN 10, you’re essentially creating a “VLAN-tagged” network where all traffic on those ports is tagged with VLAN 10. This means that any device connected to those ports will only see VLAN 10 and won’t be able to access other VLANs.
I followed the suggestions to configure each port on the HP (except the uplink port) to use VLAN 10 and also realised that I needed to set VLAN 10 on the pfsense Port VID 1 beside LAN4
But I was unsuccessful; I misconfigured the HP 1820-24G Switch J9980A Switch, or something was still missing on the pfsene.
To follow up on this configuration, I finally got to work, and used a Cisco Switch as an access switch. That was easier to test the client connectivity and I got this to work by leaving the switch default.
When I removed VLAN 10 from the ports, I could ping the gateway and DHCP Started working.