How to implement unidirectional VLAN access through ACL configuration on the Omada Gateway in Controller mode

TL-ER7206 , TL-R605 , ER7206 , ER8411 , ER707-M2 , ER7406 , ER605
Recent updates may have expanded access to feature(s) discussed in this FAQ. Visit your product's support page, select the correct hardware version for your device, and check either the Datasheet or the firmware section for the latest improvements added to your product. Please note that product availability varies by region, and certain models may not be available in your region.
Application scenario
The objective of this configuration is to restrict access from the IoT devices to the LAN network. This means that devices connected to the IoT network, such as smart devices or sensors, will not be able to communicate with or access devices within the LAN network, which typically consists of computers, servers, and other devices used by users.
On the other hand, the LAN network retains the ability to access and communicate with the IoT devices. This allows users within the LAN network to control and interact with the IoT devices, gather data, or perform monitoring tasks.
Applicable Devices
ER605 V2
TL-SG2210MP V4
EAP660 HD V3
Omada Software Controller V5.9
Configuration Scheme
To meet these requirements, we can configure unidirectional/Stateful ACL rules on the router to block IoT devices from accessing the LAN and allow the LAN to access the IoT devices. The configuration overview is as follows:
1) Create a VLAN interface
2) Create Stateful ACL rule
3) Create SSID with VLAN for IOT devices
4) Verification
Configuration Procedure
Before starting the configuration, we need to manage the Omada devices using the controller. If you encounter any issues with adoption, please refer to the following FAQs for troubleshooting:
- What should I do when the Omada Software Controller (V4) fails to discover the devices?
- What Should I Do if Omada Software Controller OC200 Cannot Adopt Omada EAP
Step 1. Go to Settings> Wired networks> LAN to click +Create New LAN to create VLAN interfaces for IOT devices.
Step 2. Go to Settings> Network Security> ACL> Gateway ACL to create a new rule
Direction: LAN-> LAN
Policy: Deny
Protocols: All
Source: IOT
Destination: LAN
States Type: Auto
Note: We recommend keeping the states type as Auto. If you select Manual, please refer to the following picture.
Match State New: Match the connections of the initial state. For example, a SYN packet arrives in a TCP connection, or the router only receives traffic in one direction.
Match State Established: Match the connections that have been established. In other words, the firewall has seen the bidirectional communication of this connection.
Match State Related: Match the associated sub-connections of a main connection, such as a connection to a FTP data channel.
Match State Invalid: Match the connections that do not behave as expected.
Step 3. Go to Settings> Wireless network> WLAN> to click Create new SSID and set VLAN ID as 20 for IOT devices.
Step 4. Verification
The cellphone is connecting the 'IOT' SSID with the IP address 192.168.20.99, while the computer has the IP address 192.168.0.100. The cellphone is unable to ping the computer, but the computer can ping the cellphone.
A fost util acest FAQ?
Părerea ta ne ajută să îmbunătățim acest site.
Ce probleme ai avut cu acest articol?
- Nemulțumit de produs
- Prea complicat
- Titlu confuz
- Nu se aplică pentru mine
- Prea vag
- Alt motiv
Mulțumim
Apreciem părerea ta.
Acest site web folosește cookie-uri pentru a îmbunătăți experiența navigării web, a analiza activitățile online și a oferi utilizatorilor cea mai bună experiență pe site-ul nostru. Te poți opune utilizării cookie-urilor în orice moment. Poți afla mai multe informații în politica de confidențialitate .
Acest site web folosește cookie-uri pentru a îmbunătăți experiența navigării web, a analiza activitățile online și a oferi utilizatorilor cea mai bună experiență pe site-ul nostru. Te poți opune utilizării cookie-urilor în orice moment. Poți afla mai multe informații în politica de confidențialitate .
Cookie-uri de bază
Aceste cookie-uri sunt necesare pentru funcționarea site-ului web și nu pot fi dezactivate în sistemele tale
TP-Link
accepted_local_switcher, tp_privacy_base, tp_privacy_marketing, tp_smb-select-product_scence, tp_smb-select-product_scenceSimple, tp_smb-select-product_userChoice, tp_smb-select-product_userChoiceSimple, tp_smb-select-product_userInfo, tp_smb-select-product_userInfoSimple, tp_top-banner, tp_popup-bottom, tp_popup-center, tp_popup-right-middle, tp_popup-right-bottom, tp_productCategoryType
Chat live
__livechat, __lc2_cid, __lc2_cst, __lc_cid, __lc_cst, CASID
Youtube
id, VISITOR_INFO1_LIVE, LOGIN_INFO, SIDCC, SAPISID, APISID, SSID, SID, YSC, __Secure-1PSID, __Secure-1PAPISID, __Secure-1PSIDCC, __Secure-3PSID, __Secure-3PAPISID, __Secure-3PSIDCC, 1P_JAR, AEC, NID, OTZ
Cookie-uri de analiză și marketing
Cookie-urile de analiză ne permit să analizăm activitățile tale de pe site-ul nostru web a îmbunătăți și ajusta funcționalitatea site-ului.
Cookie-urile de marketing pot fi setate prin intermediul site-ului nostru web de către partenerii noștri publicitari pentru a crea un profilul intereselor tale și a-ți afișeze reclame relevante pe alte site-uri web.
Google Analytics, Google Tag Manager
_gid, _ga_<container-id>, _ga, _gat_gtag_<container-id>
Google Ads și DoubleClick
test_cookie, _gcl_au
Meta Pixel
_fbp
Crazy Egg
cebsp_, _ce.s, _ce.clock_data, _ce.clock_event, cebs
lidc, AnalyticsSyncHistory, UserMatchHistory, bcookie, li_sugr, ln_or
TikTok
_ttp