Hi,
Just been setting up some VLAN's today to segregate IoT devices and Guest network access from the main network.
So I have one physical internal interface (the untagged VLAN), and two child VLAN's tags 20 and 30. This single interface is attached to a small netgear GS105Ev2 switch with one untagged port going to my main ethernet switch, one to my IOoT WiFi AP and one to my Guest WiFi AP.
internal 192.168.10.x
IoT VLAN 192.168.20.x
Guest VLAN 192.168.30.x
So, everything looks like is working OK apart from devices on the main Internal network (192.168.10.x) cannot access any of the devices on the other VLANs, whereas all devices attached to both VLANs can access any device on the Internal (192.168.10.x) network.
The behaviour I wanted was all three networks to be segregated, apart from being able to access both VLAN WiFi AP's from the internal network. I set up some filter rules to do this, but when they didn't work I turned then all off to try an workj out what was happening.
I can turn on the filter rules to segregate the VLANS and this works, i.e. I can no longer access devices on the Internal network from the VLAN's. I also have another rule that explicitly allows access to the VLAN WiFi AP's from the internal network, but this does nothing.
Turning off all the filter rules turns back on access from VLAN to Internal, but I still can get the access to work from the Internal network to the VLANS eg. I want to browse to the Guest WiFi AP config page at 192.168.30.10, but I just get no response...
Any ideas ?
Thanks.
Phil.