I came to this video for a similar reason. the solution I found was that the order of the rules makes a difference. so if the rules aren't acting the way you want them to try putting the new rule you are trying to use at the top.
Hey there @AlexXHitchcock , you are absolutely correct. I usually mention and discuss about the order of ACLs in my "Let's Configure" videos (I call them LCxx i.e. LC38 *hint* *hint* if you like ACLs, check that out) but for my non-LCs like this one (CS), I just mostly jump straight to the topic. Thanks for dropping by the channel!
I've had my network up for about a year and have been trying to get devices on my IoT VLAN to use my PiHole DNS server on my Unraid server on my main network. It hasn't been to big a deal until recently I installed Home Assistant to a VM also on my Unraid server. I needed the Iot devices to be accessible and now from that VM on the main network without exposing everything else. I had made the IP group and set the permit rules time and time again. It wasn't until today that I realized the rules could be reordered. As soon as I did everything just started working.
Nice to know things work @@AlexXHitchcock . By the way, here's my older LC38 video about the importance of re-ordering ACL, like you said, really makes a difference. LC38 19:38 : th-cam.com/video/pNrdLjBXPYQ/w-d-xo.htmlsi=mj-iRdvB5asaXqn1&t=1193
Hey there @deadmeats Can you confirm that Switch ACL only work if you have an Omada switch connected? I was hoping Switch ACL would apply to the LAN ports on the ER605v2 router which my EAP's and non-omada switch are connected to. Currently it appears there is no way to do granular ACL through my setup. Gateway ACL will work for this but that won't allow the granular ACLs
hey @nickramsay7568, thanks for dropping by the channel. I do not have access to my devices at the moment, but as you mentioned and have "clues" already, the Switch ACL applies only to TP Link Switches. If you have a Switch, even if it's TP Link, but if it's not in the Omada eco-system, the settings will not take effect. Your ER605 Gateway "LAN" ports will only work with Gateway ACLs. I am not sure about the latest firmware now, but iirc, a more granular Gateway ACLs has been requested in the past so hopefully, you can now do more granular ACLs on your router. I suggest you check the official TP Link forum or contact their tech support (links below) : * Official Forum - community.tp-link.com/en/business/forum/794 * Official Tech Support - www.tp-link.com/us/support/contact-technical-support/
hey @devlin2427, thanks for dropping by the channel and thanks for the kind words. as for your inquiry, i am not sure i fully understand the scenario so let me just answer it the way i interpret it. For "filtering", if you mean to limit allowed devices to connect to physical ports, you can use 802.1X for that, and I do have video specific for Wired 802.1X implementation. As for wireless MAC, I do not have a video, but you can enable it using that check box if you open up any of your SSIDs. For wired mac and 802.1x, check this video: th-cam.com/video/MLeOIasSzMM/w-d-xo.html
@@deadmeats 802.1x is not an option in my case. The working options is creating 2 rules, one that allows MAC addresses to get IPs and one that blocks all IPs from accessing protocols.
hello@@devlin2427 , by default, you don't need ACL to allow any devices (i.e. MAC addresses) to get IP addresses so you don't need any ACL to get IPs. As for blocking ALL IPs, this, you need to be very careful when blocking ALL IPs, as you may lose control of your network i.e. losing access to your all your network devices. Be safe when configuring and good hunting!
Great video. Solved part of my problem. My second problem is with wireguard vpn server. When you create the wireguard on Omada controler it ask you to write a local ip address. Let’s say I want it on another network. If i create a vlan from the same network as the vpn. As soon as I put acl rules, the vpn client get denied all access. Example: vpn network would be 192.168.140.1 in your exemple. I want to restrict those clients (192.168.140.2 , .3 , .4 , etc) from accessing vlan 110 and vlan 1 in your example. How would you do this?
heya @BigPtace, thanks for dropping by the channel. I am not sure I understand the scenario, so let me just answer the way I interpret it. Disclaimer: I have not tested this with any VPN, but I remember when I was doing Wireguard, ACLs work the same way, and affects both local and remote clients, so I will have this assumption that ACLs work with VPNs. Use Case Scenario (as I understand it): You want to block clients from Wireguard VPN clients (192.168.140.x Remote) from accessing VLAN 110 and VLAN 1 [LAN]. All you have to do is create an IP Profile Group with 192.168.140.0/24 (let's name with WG IP Pool, refer to 03:42 for the steps, focus on the /32 single client vs /24 whole network) and in your ACL, select IP Profile Group and make the necessary deny. Happy hunting.
@@deadmeatshi, exactly what I did. Made an ip group then created an acl switch rule exactly as you mentioned. But if after I want to create a vlan with this subnet (140), as soon as it’s created, my client can’t access anything. Why creating a vlan? For now I don’t have a use case but I thought it would be easier to make acl rules with the vlan instead of an ip group. Note: my main lan is 192.168.x.x. And vpn vlan I wanted to create was 172.16.x.x
heya@@BigPtace , the way I understand is that, as soon as you create the VLAN, the remote clients lose access. If this is what happens, you probably have conflict with your IP address. You have to make sure that the Wireguard Interface IP is unique (not in use in your LAN), even on the VLAN that you created. Good hunting to you!
@@deadmeatshi friend, i cant select ip group when in lan to lan direction on the acl menu on the controller, só i cant block WireGuard traffic to vlan 1 😭
I have an Apple TV in the ioT VLAN and my NAS in my Main Lan, I want to stream movies from my NAS to my Apple TV but Apple TV is blocked from accessing the NAS because I have a deny rule in switch ACL to deny all ioT access to main Lan. How can I grant access to ONLY the Apple TV and not the entire iOT network? When I disable the ACL rule, it works. Again, I only want to grant access to the Apple TV.
Hello @miguelmejias7234, thanks for dropping by the channel. TP Link ACL can either be simple or complex, yours is not as straight forward and will require that you know what port/protocols you want to pass thru between your NAS and your IoT VLANs. I have discussed and covered this more extensively in another topic and you can read the articles I posted in the official forum. I will also leave a link to a video where I covered cases similar to yours: Article: community.tp-link.com/en/business/forum/topic/656428 Video: th-cam.com/video/yraDD9P-PZk/w-d-xo.htmlsi=q9paAQw40xhRUwmI&t=1456 Good hunting!
I came to this video for a similar reason. the solution I found was that the order of the rules makes a difference. so if the rules aren't acting the way you want them to try putting the new rule you are trying to use at the top.
Hey there @AlexXHitchcock , you are absolutely correct. I usually mention and discuss about the order of ACLs in my "Let's Configure" videos (I call them LCxx i.e. LC38 *hint* *hint* if you like ACLs, check that out) but for my non-LCs like this one (CS), I just mostly jump straight to the topic. Thanks for dropping by the channel!
I've had my network up for about a year and have been trying to get devices on my IoT VLAN to use my PiHole DNS server on my Unraid server on my main network. It hasn't been to big a deal until recently I installed Home Assistant to a VM also on my Unraid server. I needed the Iot devices to be accessible and now from that VM on the main network without exposing everything else. I had made the IP group and set the permit rules time and time again. It wasn't until today that I realized the rules could be reordered. As soon as I did everything just started working.
Nice to know things work @@AlexXHitchcock . By the way, here's my older LC38 video about the importance of re-ordering ACL, like you said, really makes a difference.
LC38 19:38 : th-cam.com/video/pNrdLjBXPYQ/w-d-xo.htmlsi=mj-iRdvB5asaXqn1&t=1193
Hey there @deadmeats Can you confirm that Switch ACL only work if you have an Omada switch connected? I was hoping Switch ACL would apply to the LAN ports on the ER605v2 router which my EAP's and non-omada switch are connected to. Currently it appears there is no way to do granular ACL through my setup. Gateway ACL will work for this but that won't allow the granular ACLs
hey @nickramsay7568, thanks for dropping by the channel. I do not have access to my devices at the moment, but as you mentioned and have "clues" already, the Switch ACL applies only to TP Link Switches. If you have a Switch, even if it's TP Link, but if it's not in the Omada eco-system, the settings will not take effect. Your ER605 Gateway "LAN" ports will only work with Gateway ACLs. I am not sure about the latest firmware now, but iirc, a more granular Gateway ACLs has been requested in the past so hopefully, you can now do more granular ACLs on your router. I suggest you check the official TP Link forum or contact their tech support (links below) :
* Official Forum - community.tp-link.com/en/business/forum/794
* Official Tech Support - www.tp-link.com/us/support/contact-technical-support/
First of all great content. Secondly, do you have a video demoing switch based MAC filtering using ACL?
hey @devlin2427, thanks for dropping by the channel and thanks for the kind words. as for your inquiry, i am not sure i fully understand the scenario so let me just answer it the way i interpret it.
For "filtering", if you mean to limit allowed devices to connect to physical ports, you can use 802.1X for that, and I do have video specific for Wired 802.1X implementation. As for wireless MAC, I do not have a video, but you can enable it using that check box if you open up any of your SSIDs.
For wired mac and 802.1x, check this video: th-cam.com/video/MLeOIasSzMM/w-d-xo.html
@@deadmeats 802.1x is not an option in my case. The working options is creating 2 rules, one that allows MAC addresses to get IPs and one that blocks all IPs from accessing protocols.
hello@@devlin2427 , by default, you don't need ACL to allow any devices (i.e. MAC addresses) to get IP addresses so you don't need any ACL to get IPs. As for blocking ALL IPs, this, you need to be very careful when blocking ALL IPs, as you may lose control of your network i.e. losing access to your all your network devices. Be safe when configuring and good hunting!
Great video. Solved part of my problem. My second problem is with wireguard vpn server. When you create the wireguard on Omada controler it ask you to write a local ip address. Let’s say I want it on another network. If i create a vlan from the same network as the vpn. As soon as I put acl rules, the vpn client get denied all access. Example: vpn network would be 192.168.140.1 in your exemple. I want to restrict those clients (192.168.140.2 , .3 , .4 , etc) from accessing vlan 110 and vlan 1 in your example.
How would you do this?
heya @BigPtace, thanks for dropping by the channel. I am not sure I understand the scenario, so let me just answer the way I interpret it. Disclaimer: I have not tested this with any VPN, but I remember when I was doing Wireguard, ACLs work the same way, and affects both local and remote clients, so I will have this assumption that ACLs work with VPNs.
Use Case Scenario (as I understand it): You want to block clients from Wireguard VPN clients (192.168.140.x Remote) from accessing VLAN 110 and VLAN 1 [LAN]. All you have to do is create an IP Profile Group with 192.168.140.0/24 (let's name with WG IP Pool, refer to 03:42 for the steps, focus on the /32 single client vs /24 whole network) and in your ACL, select IP Profile Group and make the necessary deny.
Happy hunting.
@@deadmeatshi, exactly what I did. Made an ip group then created an acl switch rule exactly as you mentioned.
But if after I want to create a vlan with this subnet (140), as soon as it’s created, my client can’t access anything.
Why creating a vlan? For now I don’t have a use case but I thought it would be easier to make acl rules with the vlan instead of an ip group.
Note: my main lan is 192.168.x.x. And vpn vlan I wanted to create was 172.16.x.x
heya@@BigPtace , the way I understand is that, as soon as you create the VLAN, the remote clients lose access. If this is what happens, you probably have conflict with your IP address. You have to make sure that the Wireguard Interface IP is unique (not in use in your LAN), even on the VLAN that you created.
Good hunting to you!
@@deadmeatsthanks! I have another question about WireGuard but I’m going to post it in the WireGuard video
@@deadmeatshi friend, i cant select ip group when in lan to lan direction on the acl menu on the controller, só i cant block WireGuard traffic to vlan 1 😭
I have an Apple TV in the ioT VLAN and my NAS in my Main Lan, I want to stream movies from my NAS to my Apple TV but Apple TV is blocked from accessing the NAS because I have a deny rule in switch ACL to deny all ioT access to main Lan. How can I grant access to ONLY the Apple TV and not the entire iOT network? When I disable the ACL rule, it works. Again, I only want to grant access to the Apple TV.
Hello @miguelmejias7234, thanks for dropping by the channel. TP Link ACL can either be simple or complex, yours is not as straight forward and will require that you know what port/protocols you want to pass thru between your NAS and your IoT VLANs. I have discussed and covered this more extensively in another topic and you can read the articles I posted in the official forum. I will also leave a link to a video where I covered cases similar to yours:
Article: community.tp-link.com/en/business/forum/topic/656428
Video: th-cam.com/video/yraDD9P-PZk/w-d-xo.htmlsi=q9paAQw40xhRUwmI&t=1456
Good hunting!
@@deadmeats Thanks, I was able to get it working thanks to you. Much Appreciated!
@@miguelfmsmac awesome. great job man!