- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
WNDAP360 VLAN
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
i have WNDAP360 configured as Access-Point with Multi-SSID. I only found option to tag the SSID into one VLAN. What i have to do, to configure multiple tagged VLANs over a SSID? At the other Side, there is an CPE (TPLINK) in ClientMode. The Goal is, to carry 2 tagged VLANS over WLAN to the other Side.
Solved! Go to Solution.
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
All Replies
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
Hi @Danielhainich,
Welcome to the community! 🙂
There is really no option to tag 2 or more VLANs to one SSID. This is not a limitation, thus, this is by design. I suggest you to create another SSID then tag it to another VLAN. The ratio would be ► 1 VLAN : 1 SSID.
Regards,
DaneA
NETGEAR Community Team
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
Hi,
and what about the Bridge-Mode? A Bridge should do that, by design. But Documentation for BridgeMode with AP360 is very bad.
Is it possible to build an transparent Wireless Ethernet Bridge with AP360 as Root-Bridge?
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
The ProSAFE Dual Band Wireless-N Access Point WNDAP360 Reference Manual does clearly document on how to configure Configure Wireless Bridging on p.89 ff. including a Point-to-Point Wireless Network for the point-to-point bridge mode conneciton of two generic LAN segments.
No practical experience if the for 802.1q VLAN TPID Bytes are correctly bridged between the segments - unlikley the AP does interfere with these additonal bytes. Only testing will tell.
Good advise is to use the same or very similar similar products for participating in WDS bridges. Interoperability issues are predictable otherwise.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
Hi,
thanks for reply. Do i have to configure an SSID for Bridge-Mode? The MAC-Address from Bridge-Mode is the same MAC as SSID-Profile1.
daniel
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
Daniel,
The bridge mode does not depend on an SSID configuration. Very common that the bridge MAC is the same as the first ESSID MAC.
All information required to configure a Point-to-point bridge is listed in the Table 26 on p.92 ff. - the MAC address is always the other end bridge MAC - which must be configured to a bridge mode of course, too.
Regards,
-Kurt
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
Hi,
i bought a second AP360 and setup the bridge with 2.4Ghz It works! But what about 5Ghz? i could not setup the bridge with 5Ghz and WPA2-PSK. Can you help again?
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
Check WNDAP360 Reference Manual 2 Nov 2015 p.91 Figure 54 for configuring the 5 GHz interface with the 802.11a/na tab. SImilar, you have to configure the first MAC/ESSID of the remote 5 GHz unit.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
i did the setup similar to 2,4Ghz. but the bridge wont come up. there are any special settings like channel or something else? there is another thread where a user had the same problem with an wnd930. (https://community.netgear.com/t5/Business-Wireless/WND930-wireless-point-to-point-bridge-does-not-wo...)
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
As I said before - no practical experience on my side with this product, and not often creating WDS systems anymore, too.
Have configured the 5 GHz radios on both sides to non-DFS channels as requested in the other thread? When I'm reading between the lines on the other thread, the problem (documented with some Logs btw.) appears when enabling security/encryption on that other legacy AP model.
@RaghuHR - that's another one for you.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
@Danielhainich Could you please share your two APs configurations? Also download the logs from the moniroting page ( we need logs for both APs)
Thanks,
Raghu
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
Hi,
here is the config from both APs.
AP1:
wndap360#show configuration
ap information
apname wndap360
ProductId WNDAP360
serialNo 2RJ64755004D6
macaddress 6C:B0:CE:0D:4F:E8
firmware-version 3.7.9.0
country/region germany
http-redirect-status disable
http-redirect-url http://www.netgear.com
spanning-tree enable
cloud disable
cloud-connectivity-status disconnected
nbr_ap_min_rssi 75
Wireless interface macaddress for 2.4GHz band 6c:b0:ce:0d:4f:e0
Wireless interface macaddress for 5GHz band 6c:b0:ce:0d:4f:f0
time-zone germany
ntp-server 192.168.2.65
ntp-client enabled
custom-ntp-server enabled
Fri Mar 9 07:47:39 CET 2018
remote
ssh enable
telnet disable
syslog information
server-ip 0.0.0.0
server-port 514
syslog-status disable
ip
address 192.168.2.178
netmask 255.255.255.0
default-gateway 192.168.2.65
dns-server-primary 192.168.2.86
dns-server-secondary 192.168.2.86
dhcp-client disable
network-integrity-check disable
igmp-snooping disable
current wireless settings for 802.11ng
access-point-mode point to point with client association(p2p-ap)
current-channel/frequency 6
rogue-ap-detection disable
rogue-ap-detection-policy mild
current wireless settings for 802.11na
access-point-mode point to point with client association(p2p-ap)
current-channel/frequency 48
rogue-ap-detection disable
rogue-ap-detection-policy mild
radius
authentication-server primary 192.168.2.60 1812 ***********
authentication-server secondary 0.0.0.0 1812 ***********
accounting-server primary 0.0.0.0 1813 ************
accounting-server secondary 0.0.0.0 1813 ************
Reauthentication Time(Seconds) 3600
Global Key Update Period(Seconds) 1800
Update Condition 1
interface wlan 2.4GHz
mode 11ng
radio enabled
apmode p2p-ap
power full
channel 6
beacon-interval 100
fragmentation-length 2346
rts-threshold 2347
dtim-interval 3
ampdu enabled
aggregation-length 65535
mcsrate best
guardinterval auto
channelwidth 40Mhz
rogue-ap-detection disabled
rogue-ap-detection-policy mild
macacl-database disabled
trusted-mac-address-list:
no mac address added
preamble auto
rifs-transmission disabled
client-isolation disabled
max-wireless-clients 64
802.11d enabled
antenna internal
security-profile 1
Not enabled
security-profile 2
Not enabled
security-profile 3
status enabled
ssid Hainich.Connect
hide-network-name disabled
vlan-id 1
dynamic-vlan disable
vlan-access-control disable
vlan-access-control-policy
name Hainich.Connect
security-separation disabled
authentication wpa2psk
encryption aes
presharedkey ********************
keyno 1
wepkeytype 64
wep-pass-phrase ************
key1 **********
key2 **********
key3 **********
key4 **********
security-profile 4
Not enabled
security-profile 5
status enabled
ssid Gastnetz
hide-network-name disabled
vlan-id 140
dynamic-vlan disable
vlan-access-control disable
vlan-access-control-policy
name Gastnetz
security-separation disabled
authentication wpa2psk
encryption aes
presharedkey ************
keyno 1
wepkeytype 64
wep-pass-phrase ************
key1 **********
key2 **********
key3 **********
key4 **********
security-profile 6
status enabled
ssid Hainich
hide-network-name disabled
vlan-id 110
dynamic-vlan disable
vlan-access-control disable
vlan-access-control-policy
name Hainich
security-separation disabled
authentication wpa2psk
encryption aes
presharedkey ***************
keyno 1
wepkeytype 64
wep-pass-phrase ************
key1 **********
key2 **********
key3 **********
key4 **********
security-profile 7
Not enabled
security-profile 8
Not enabled
wmm
wmm-status enable
wmm-powersave enable
ap-data0-best-effort 3 15 63 0
ap-data1-background 7 15 1023 0
ap-data2-video 1 7 15 3008
ap-data3-voice 1 3 7 1504
sta-data0-best-effort 3 15 1023 0
sta-data1-background 7 15 1023 0
sta-data2-video 2 7 15 3008
sta-data3-voice 2 3 7 1504
wireless-bridge
security-profile 1
status enable
name Bridge1
remote-mac 2c-b0-5d-a0-28-60
authentication wpa2psk
encryption aes
wepkeytype hex64
presharedkey ********
wepkey **********
wep-pass-phrase ************
(null)
security-profile 2
Not enabled
security-profile 3
Not enabled
security-profile 4
Not enabled
interface wlan 5GHz
mode 11na
radio enabled
apmode p2p-ap
power full
channel 48
beacon-interval 100
fragmentation-length 2346
rts-threshold 2347
dtim-interval 3
ampdu enabled
aggregation-length 65535
mcsrate best
guardinterval auto
channelwidth 40Mhz
rogue-ap-detection disabled
rogue-ap-detection-policy mild
macacl-database disabled
trusted-mac-address-list:
no mac address added
rifs-transmission disabled
client-isolation disabled
max-wireless-clients 64
security-profile 1
Not enabled
security-profile 2
status enabled
ssid Gastnetz5G
hide-network-name disabled
vlan-id 140
dynamic-vlan disable
vlan-access-control disable
vlan-access-control-policy
name Gastnetz5G
security-separation disabled
authentication wpa2psk
encryption aes
presharedkey ************
keyno 1
wepkeytype 64
wep-pass-phrase ************
key1 **********
key2 **********
key3 **********
key4 **********
security-profile 3
status enabled
ssid Hainich5G
hide-network-name disabled
vlan-id 110
dynamic-vlan disable
vlan-access-control disable
vlan-access-control-policy
name Hainich5G
security-separation disabled
authentication wpa2psk
encryption aes
presharedkey ***************
keyno 1
wepkeytype 64
wep-pass-phrase ************
key1 **********
key2 **********
key3 **********
key4 **********
security-profile 4
Not enabled
security-profile 5
Not enabled
security-profile 6
Not enabled
security-profile 7
Not enabled
security-profile 8
Not enabled
wmm
wmm-status enable
wmm-powersave enable
ap-data0-best-effort 3 15 63 0
ap-data1-background 7 15 1023 0
ap-data2-video 1 7 15 3008
ap-data3-voice 1 3 7 1504
sta-data0-best-effort 3 15 1023 0
sta-data1-background 7 15 1023 0
sta-data2-video 2 7 15 3008
sta-data3-voice 2 3 7 1504
wireless-bridge
security-profile 1
status enable
name test1
remote-mac 2C-B0-5D-A0-28-70
authentication open
encryption none
wepkeytype hex64
presharedkey ***********
wepkey **********
wep-pass-phrase ************
(null)
security-profile 2
Not enabled
security-profile 3
Not enabled
security-profile 4
Not enabled
vlan
management-vlan 1
untagged-vlan-status enable
untagged-vlan 1
dhcp-server
ip-address 192.168.0.2 192.168.0.50
subnet-mask 255.255.255.0
gateway 192.168.0.1
dns-server-primary 0.0.0.0 0.0.0.0
wins-server-primary 0.0.0.0 0.0.0.0
lease-time 1 0 0
status disable
vlan-id 1
snmp
status enable
trap-server-ip 0.0.0.0
trap-server-community trap
read-community public
read-write-community private
trap-port 162
wndap360#
AP2:
wndap360-2#show configuration
ap information
apname wndap360-2
ProductId WNDAP360
serialNo 2RJ3235700603
macaddress 2C:B0:5D:A0:28:68
firmware-version 3.7.9.0
country/region germany
http-redirect-status disable
http-redirect-url http://www.netgear.com
spanning-tree enable
cloud disable
cloud-connectivity-status disconnected
nbr_ap_min_rssi 75
Wireless interface macaddress for 2.4GHz band 2c:b0:5d:a0:28:60
Wireless interface macaddress for 5GHz band 2c:b0:5d:a0:28:70
time-zone germany
ntp-server 192.168.2.65
ntp-client enabled
custom-ntp-server enabled
Fri Mar 9 07:46:58 CET 2018
remote
ssh enable
telnet disable
syslog information
server-ip 0.0.0.0
server-port 514
syslog-status disable
ip
address 192.168.2.177
netmask 255.255.255.0
default-gateway 192.168.2.65
dns-server-primary 192.168.2.86
dns-server-secondary 0.0.0.0
dhcp-client disable
network-integrity-check disable
igmp-snooping disable
current wireless settings for 802.11ng
access-point-mode point to point with client association(p2p-ap)
current-channel/frequency 6
rogue-ap-detection disable
rogue-ap-detection-policy mild
current wireless settings for 802.11na
access-point-mode point to point with client association(p2p-ap)
current-channel/frequency 48
rogue-ap-detection disable
rogue-ap-detection-policy mild
radius
authentication-server primary 0.0.0.0 1812 ************
authentication-server secondary 0.0.0.0 1812 ************
accounting-server primary 0.0.0.0 1813 ************
accounting-server secondary 0.0.0.0 1813 ************
Reauthentication Time(Seconds) 3600
Global Key Update Period(Seconds) 1800
Update Condition 1
interface wlan 2.4GHz
mode 11ng
radio enabled
apmode p2p-ap
power full
channel 6
beacon-interval 100
fragmentation-length 2346
rts-threshold 2347
dtim-interval 3
ampdu enabled
aggregation-length 65535
mcsrate best
guardinterval auto
channelwidth 40Mhz
rogue-ap-detection disabled
rogue-ap-detection-policy mild
macacl-database disabled
trusted-mac-address-list:
no mac address added
preamble auto
rifs-transmission disabled
client-isolation disabled
max-wireless-clients 64
802.11d enabled
antenna internal
security-profile 1
Not enabled
security-profile 2
Not enabled
security-profile 3
Not enabled
security-profile 4
Not enabled
security-profile 5
Not enabled
security-profile 6
Not enabled
security-profile 7
Not enabled
security-profile 8
Not enabled
wmm
wmm-status enable
wmm-powersave enable
ap-data0-best-effort 3 15 63 0
ap-data1-background 7 15 1023 0
ap-data2-video 1 7 15 3008
ap-data3-voice 1 3 7 1504
sta-data0-best-effort 3 15 1023 0
sta-data1-background 7 15 1023 0
sta-data2-video 2 7 15 3008
sta-data3-voice 2 3 7 1504
wireless-bridge
security-profile 1
status enable
name NETGEAR-WDS-1
remote-mac 6c-b0-ce-0d-4f-e0
authentication wpa2psk
encryption aes
wepkeytype hex64
presharedkey ********
wepkey **********
wep-pass-phrase ************
(null)
security-profile 2
Not enabled
security-profile 3
Not enabled
security-profile 4
Not enabled
interface wlan 5GHz
mode 11na
radio enabled
apmode p2p-ap
power full
channel 48
beacon-interval 100
fragmentation-length 2346
rts-threshold 2347
dtim-interval 3
ampdu enabled
aggregation-length 65535
mcsrate best
guardinterval auto
channelwidth 40Mhz
rogue-ap-detection disabled
rogue-ap-detection-policy mild
macacl-database disabled
trusted-mac-address-list:
no mac address added
rifs-transmission disabled
client-isolation disabled
max-wireless-clients 64
security-profile 1
Not enabled
security-profile 2
Not enabled
security-profile 3
Not enabled
security-profile 4
Not enabled
security-profile 5
Not enabled
security-profile 6
Not enabled
security-profile 7
Not enabled
security-profile 8
Not enabled
wmm
wmm-status enable
wmm-powersave enable
ap-data0-best-effort 3 15 63 0
ap-data1-background 7 15 1023 0
ap-data2-video 1 7 15 3008
ap-data3-voice 1 3 7 1504
sta-data0-best-effort 3 15 1023 0
sta-data1-background 7 15 1023 0
sta-data2-video 2 7 15 3008
sta-data3-voice 2 3 7 1504
wireless-bridge
security-profile 1
status enable
name test1
remote-mac 6C-B0-CE-0D-4F-F0
authentication open
encryption none
wepkeytype hex64
presharedkey ***********
wepkey **********
wep-pass-phrase ************
(null)
security-profile 2
Not enabled
security-profile 3
Not enabled
security-profile 4
Not enabled
vlan
management-vlan 1
untagged-vlan-status enable
untagged-vlan 1
dhcp-server
ip-address 192.168.0.2 192.168.0.50
subnet-mask 255.255.255.0
gateway 192.168.0.1
dns-server-primary 0.0.0.0 0.0.0.0
wins-server-primary 0.0.0.0 0.0.0.0
lease-time 1 0 0
status disable
vlan-id 1
snmp
status enable
trap-server-ip 0.0.0.0
trap-server-community trap
read-community public
read-write-community private
trap-port 162
wndap360-2#
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
log-attachment
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
Can you reconfirm WDS is enabled or not? We could see it is disabled from the configuration that you have shared?
Please check the attached and share your screen shot of your both AP.
Thanks,
Raghu
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
yes, bridge ist enabled on both radios. i have tested it with only 5ghz-radio, but its the same result.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: WNDAP360 VLAN
Hi,
thanks for our help. i had both AP´s in LoS. they did not bridge on 5ghz radio. for now i bridge on 2,4ghz radio. maybe you can help with my DHCP-Problem and this bridge.
thanks
daniel