-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VLAN 42 bridging on Ubiquiti 60 GHz devices #299
Comments
thanks for the writeup. Why not use unique MGMT VLAN IDs? |
Keep in mind that we want to query statistics from the devices. So we need proper adressing. :)
Can you give an example how that should work? |
That's an option too, but I'm assuming that Site A's mgmt packets would still be bridged over to Site B, where they'd be dropped. This would successfully break the inter-site mgmt network, but it'd waste a bit of airtime. Ideally A's mgmt packets would never leave A. Is that correct?
The switch would exclude the 60 GHz ports from VLAN 42. Bigger switches like the one at RHNK can do this, but I'm not sure yet how smaller sites with dumb switches (or with only a corerouter) would do it. |
The AirOS web UI stuff does work over link-local addresses, but we'd need to check that the metrics tools can deal with that. |
Smaller switches like EdgeSwitch10XP can do this too: https://help.ui.com/hc/en-us/articles/360039311974-EdgeSwitch-EdgeSwitch-X-Port-Isolation. However, the router could then become a bottleneck if it is not potent enough. |
I would recommend against using features like "port based acl" aka port isolation in standard setups. IMOT this increases complexity which is simply not necessary.
Well, that applies to broadcast frames, but in my opinion the wasted airtime is negligible. At my wilgu10 its on average about less then 10-20 frames in a minute.
|
Let's do the unique-VLAN-ID-per-location thing. Count up from 420?
You're right, I've thought about how this would be maintained and it seems very complex and fragile. Suddenly it would matter which port an antenna is plugged into, etc. Very easy to break the setup if one isn't super careful. |
We need a way to monitor the overview of the used VLANs. If we build new sites and have to go through the letter order each time and look at the respective network config, then we have more effort than necessary. Can anyone think of a solution for that - also the possibility that a location will be missing/dissembled? Otherwise, I can live with the solution and this problem will be solved for the next 50 years. |
For now we can maintain a list somewhere, IMO. Once we migrated to some IPAM like netbox, we can write it down there. |
RHNK has been changed to VLAN 420: #369 |
I have a suggestion. Could we generate the VLAN automatically in ansible? Something along the lines of using the location name to create a number. The only downsides I see are:
|
To list all mgmt VIDs in bbb-configs: |
On RHNK we ended up doing two things:
Step one ^ means we need switches capable of VLAN port isolation wherever we have 60g Ubiquiti devices. Until Ubiquiti re-introduces adequate VLAN settings like back in AirOS, but that's probably never going to happen... |
|
|
|
|
437 teufelsberg |
438 philmel |
I consolidated this into a new issue that has a table so we won't have unused VLANs in the future and could keep track of the state of migration: #983 I also pinned the new issue and will therefore close this one. |
In the past few months we deployed a number of Ubiquiti 60 GHz devices.
These are mostly AirFiber 60-LR point-to-point devices,
and recently also one pair the new Wave AP and Wave Nano.
The management VLAN 42 is supposed to not cross site boundaries.
In previous versions of AirOS, this was achieved by having the management VLAN
only on eth0/lan0. However AirOS on these 60 GHz devices doesn't currently
have this option. Instead it creates a bridge over wifi0 and eth0 and puts
VLAN 42 on this bridge.
The result is one big L2 management network between all sites with Ubiquiti 60 GHz.
See for yourself, for example:
ssh [email protected] ping ff02::1%switch0.42
Disabling the management VLAN on the device doesn't help,
because then it still bridges eth0 and wifi0.
This large L2 network might also be the cause of various looping and reflection issues
which we've been experiencing in recent weeks.
Reports about this:
Which sites are affected?
According to the various
snmp.yml
definitions, the following 60 GHz links exist:What can we do?
This is a possible plan to mitigate the problem:
At some sites this can be handled on the managed switch,
at other sites it needs to be handled on the corerouter.
so that SSH and the Web UI can accessed by other means,
e.g. via link-local tunneling:
ssh -L 8080:[fe80::265a:4cff:fe2f:f7e0%switch0.24]:443 [email protected]
Additionally we should:
The text was updated successfully, but these errors were encountered: