Yes everything is set up. I actually have a Synology NVR (DVA1622) and cameras already on the “cameras” VLAN. I have outside cameras that the Synology manages and Unifi camera that the Unifi controller manages for inside.
I guess with other security cameras I would just log into the cameras and assign them the static ip address. Then on the unifi switch I would change “Native VLAN / Network” to the VLAN I want them on.
So you are saying for me to do it in pfsense " DHCP Static Mappings"?
Change the vlan on the switch port first, so the devices are getting the correct vlan ip address
Under DHCP Server (Select the correct network), scroll down to the end - add status mappings for the device. - Note the the ip address has to be outside the dhcp range.
So that worked great. However, I needed to add a firewall rule to all those camera’s to get back to the controller. Is this the most secure way of doing this?
My controller is over on 192.168.8.2 (In my first post I said 192.168.1.0, but its not)
my rule is
pass
Protocol: TCP
Source: the cameras IPs (I will put them all in a alias)
Destination: the controller (192.168.8.2)
Can I limit the scope of this rule?
When I’m googling it, I am seeing ports that need to be opened are 7442, 7444 and, 7550
Sounds like you need to have that rule, otherwise the camera’s won’t be able to access the controller. Personally I would block WAN access on the CAM vlan as it doesn’t need it.