visortgw
Part of the Furniture
@jksmurf: Some more details on my configuration:Ah ok thanks. I recall the cheap managed switches discussion.
So yeah, it will be difficult to isolate as the sample size of those with my specific setup, so far is… maybe 2 or 3 including me.
@visortgw has a working system, the difference his to mine appears to be primarily HW.
- GT-BE98 Pro primary router with two (2) ports configured for 2.4 GHz IoT VLAN (Access Mode)
- one 2.5 Gbps port connected to 8-port TP-Link unmanaged switch; and
- one 1 Gbps port connected directly to Sony BRAVIA TV.
- One 10 Gbps port of GT-BE98 Pro connected to 10 Gbps port of TP-Link 10 Gbps (2-port)/2.5 Gbps (8-port) managed switch.
- Second 10 Gbps port of managed switch connected to 8-port 10 Gbps unmanaged switch which feeds GT-AXE16000 AiMesh node (and other devices)
- four 1 Gbps ports configured for 2.4 and 5 GHz (two each) IoT VLANs (Access Mode) to two NASs
- one 2.5 Gbps port configured for 2.4 IoT VLANs (Access Mode) to 8-port TP-Link unmanaged switch
- One 2.5 Gbps port of managed switch configured for 2.4 GHz IoT VLAN to 8-port TP-Link unmanaged switch.
- Two more unrestricted 2 .5 Gbps ports of managed switch connected to two (2) GT-AX6000 AiMesh nodes — individual ports are configured on each of these nodes as needed for individual devices to access 2.4 GHz IoT VLAN (Access Mode).
- My 2.4 GHz IoT VLAN has Set AP Isolated
disabledto allow eufy devices to reach the eufy HomeBase on the same VLAN. - IPv6 is not enabled in my network.
- I have configured one-way access from my primary network (.222 subnet) to my IoT and guest networks (.52, .53, and .54 subnets with the following additions to
/jffs/scripts/firewall-start:
Code:
iptables -I FORWARD -i br0 -s 192.168.222.0/24 -d 192.168.52.0/24 -j ACCEPT
iptables -I FORWARD -i br0 -s 192.168.222.0/24 -d 192.168.53.0/24 -j ACCEPT
iptables -I FORWARD -i br0 -s 192.168.222.0/24 -d 192.168.54.0/24 -j ACCEPT
service restart-firewall
Hope this helps!
Last edited: