Quote from: defaultuserfoo on June 05, 2022, 02:20:43 pmUsing a different network on the remote site with its own DHCP server probably won't work, at least not easily. I'm pretty sure that the access point controller uses DHCP options to tell the access points where to find itself so that they can establish a tunnel to the controller. Maybe that won't work anyway when MSS settings interfere ...Never said use a different network. What I said was split the network between the two sites just to keep things clear. You'll still use the same /24 (or whatever the local is) but set the remote to specific IP's. This suggestion is basically just for "record keeping" and not a necessity at all.
Using a different network on the remote site with its own DHCP server probably won't work, at least not easily. I'm pretty sure that the access point controller uses DHCP options to tell the access points where to find itself so that they can establish a tunnel to the controller. Maybe that won't work anyway when MSS settings interfere ...
QuoteThere will be about 20 access points on the remote site (and there are about 20 locally). [...]With these access points, I probably can't give them static addresses because that would involve to configure them manually. I think there's some option to tell them where the access point controller is. That would also require to pre-configure them all manually first, and I don't know if that would work.Quote20 AP's means a lot of clients I would think. Both of my sites have a symmetrical gig for internet. I have no problems whatsoever with bandwidth so don't believe the warnings you hear. That said I only have 2 servers and 10 cameras at the remote site. Cameras are nothing when it comes to bandwidth but the servers do use a bit, as I said, no problems though.
There will be about 20 access points on the remote site (and there are about 20 locally). [...]With these access points, I probably can't give them static addresses because that would involve to configure them manually. I think there's some option to tell them where the access point controller is. That would also require to pre-configure them all manually first, and I don't know if that would work.
20 AP's means a lot of clients I would think. Both of my sites have a symmetrical gig for internet. I have no problems whatsoever with bandwidth so don't believe the warnings you hear. That said I only have 2 servers and 10 cameras at the remote site. Cameras are nothing when it comes to bandwidth but the servers do use a bit, as I said, no problems though.
QuoteIs it not possible to just extend the VLAN as if there was a network between the two sites? What's the problem with DHCP? If I need to, I can set a long lease time, and the APs tend to keep their IPs even when they can't reach the controller and continue to work once they are configured.Vlans are layer 2. Can't route them so I'm not sure what you mean by "a network in between".DHCP, not really a problem but I found you can't assign a DHCP range to just the remote site and addresses were being handed out to the local site as well. If you don't care what address goes where, then just leave one DHCP pool and let it go.If opnsense can do this correctly, you'll find that it's exactly what you wanted.
Is it not possible to just extend the VLAN as if there was a network between the two sites? What's the problem with DHCP? If I need to, I can set a long lease time, and the APs tend to keep their IPs even when they can't reach the controller and continue to work once they are configured.
What do you mean by having to register the Unifi devices mandatorily? I used those devices for years and never had to do anything like that.
Since you chose to use a professional solution by HP, what makes you think you need to try to extend a broadcast domain in order to have the APs configured? I would assume even HP has seen some kind of routed enterprise network over the years.If you look at the HP manuals (https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c02704528), they describe discovery procedures over routed networks, like a means for DHCP- or DNS-based discovery (see page 6-6 onwards).
But I'll take a look at the documentation. Maybe it shows a better way.
I was told you can't use a VM anymore.
Are you saying that stuff happening on layer 2 is designed and/or required to work with the bandwidths and delays only layer 1 provides and that when you introduce bandwidth limitations and delays by tunneling the connection over some kind of VPN, the ghosts residing in the wires hit the fan and it all comes apart?
PS: https://docs.opnsense.org/manual/dhcp.html :"To configure options that are not available in the GUI one can add custom configuration files on the firewall itself. Files can be added in /usr/local/etc/dhcpd.opnsense.d/ for IPv4"
Won't it listen when it's not enabled in the GUI for that interface? I can't enable it in the GUI because my configuration file won't work when it is.
Quote from: defaultuserfoo on June 05, 2022, 09:03:15 pmWon't it listen when it's not enabled in the GUI for that interface? I can't enable it in the GUI because my configuration file won't work when it is.As far as I know it doesn't. Why do you need an extra configuration file? What precisely do you need to set in the DHCP server that you cannot achieve through advanced options in the UI?
Docker or any container allowes you to install software natively regardless which OS you use (for example Steam uses container to install games to Linux and SteamOS), so ease of use is down to which OS you run the container in.
What comes to Ubiqity, you can either buy cloud key (physical device with Ubiqitys own OS installed on it) and connect that to Ubiqity switch.
If you don't have a switch from Ubiqity, then you can install the free software and run it on either physical machine or VM image of windows, Linux or Mac OS (just read the instructions)
Yes, you have to register a local user for Ubiqity (without it Web GUI won't work), but you don't have to register online.
VLANs share their bandwidth and delay on physical ports (for example if you have 200 computers on VLAN 20 and 100 computers on VLAN 30 and both VLANs are signed to 1 single 10Gb port, overall bandwidth of both VLANs is 20Gb/s, then it can go below 10Gb/s due to physical limitation of the NIC, you can't exceed physical hardware limitations with VLANs.)
Delay depends on the length and type of the cable and hardware your firewall has. Now you can improve delay and bandwidth within internal networks by adding switch, then firewall only needs to take care of internet side of things.
VLANs are generally used by schools and corporates to separate networks (1 example would be 1 VLAN to manage your network including having SSH and Webgui access to switch and firewall, 2nd which has access to only internet and 3rd which has access to intranet stuff like IP phones and internet)You certainly can setup VLAN for VPN, but unless you have speciffic requirement (for example you would have to allow internet and / or intranet access, but blog web and SSH access to firewall etc.), it's pretty pointless.
If you are trying to achieve something on home network and instructions won't make any sense to you, then just leave it there, read more documents about things in question, so that you have general knowledge of things and try again.VPN doesn't require much knowledge, but VLANs require NIC that supports 802.1q Tagging (IEE 802.1q) and switches with VLAN tagg support and quite a bit knowledge to get them up and runnign well.
What is a "mobile app"? Don't they have a cli built in or at least a WEB GUI?Even if they do, I don't want to configure more than 3--5 APs individually. More than 2 is already bad enough ...
VLANs are generally used by schools and corporates to separate networks (1 example would be 1 VLAN to manage your network including having SSH and Webgui access to switch and firewall, 2nd which has access to only internet and 3rd which has access to intranet stuff like IP phones and internet)You certainly can setup VLAN for VPN, but unless you have speciffic requirement (for example you would have to allow internet and / or intranet access, but blog web and SSH access to firewall etc.), it's pretty pointless.If you are trying to achieve something on home network and instructions won't make any sense to you, then just leave it there, read more documents about things in question, so that you have general knowledge of things and try again.VPN doesn't require much knowledge, but VLANs require NIC that supports 802.1q Tagging (IEE 802.1q) and switches with VLAN tagg support and quite a bit knowledge to get them up and runnign well.