× NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Reply

WNDAP360 VLAN

Danielhainich
Aspirant

WNDAP360 VLAN

Hello,

 

i have WNDAP360 configured as Access-Point with Multi-SSID. I only found option to tag the SSID into one VLAN. What i have to do, to configure multiple tagged VLANs over a SSID? At the other Side, there is an CPE (TPLINK) in ClientMode. The Goal is, to carry 2 tagged VLANS over WLAN to the other Side.

Model: WNDAP360|ProSafe Wireless-N Access Point
Message 1 of 17

Accepted Solutions
RaghuHR
NETGEAR Expert

Re: WNDAP360 VLAN

Ensure both APs are in LoS (Line of Sight) since you are trying on 5 GHz radio. If yes and still if you see an issue we may have to do remote debugging. Let us know.

View solution in original post

Message 16 of 17

All Replies
DaneA
NETGEAR Employee Retired

Re: WNDAP360 VLAN

Hi @Danielhainich,

 

Welcome to the community! 🙂 

 

There is really no option to tag 2 or more VLANs to one SSID.  This is not a limitation, thus, this is by design.  I suggest you to create another SSID then tag it to another VLAN.  The ratio would be ► 1 VLAN : 1 SSID. 

 

 

Regards,

 

DaneA

NETGEAR Community Team

Message 2 of 17
Danielhainich
Aspirant

Re: WNDAP360 VLAN

Hi,

 

and what about the Bridge-Mode? A Bridge should do that, by design. But Documentation for BridgeMode with AP360 is very bad.

Is it possible to build an transparent Wireless Ethernet Bridge with AP360 as Root-Bridge?

Model: WNDAP360|ProSafe Wireless-N Access Point
Message 3 of 17
schumaku
Guru

Re: WNDAP360 VLAN

The ProSAFE Dual Band Wireless-N Access Point WNDAP360 Reference Manual does clearly document on how to configure Configure Wireless Bridging on p.89 ff. including a Point-to-Point Wireless Network for the point-to-point bridge mode conneciton of two generic LAN segments.

No practical experience if the for 802.1q VLAN TPID Bytes are correctly bridged between the segments - unlikley the AP does interfere with these additonal bytes. Only testing will tell. 

 

Good advise is to use the same or very similar similar products for participating in WDS bridges. Interoperability issues are predictable otherwise. 

Message 4 of 17
Danielhainich
Aspirant

Re: WNDAP360 VLAN

Hi,

 

thanks for reply. Do i have to configure an SSID for Bridge-Mode? The MAC-Address from Bridge-Mode is the same MAC as SSID-Profile1.

 

daniel

Model: WNDAP360|ProSafe Wireless-N Access Point
Message 5 of 17
schumaku
Guru

Re: WNDAP360 VLAN

Daniel,

 

The bridge mode does not depend on an SSID configuration. Very common that the bridge MAC is the same as the first ESSID MAC.

 

All information required to configure a Point-to-point bridge is listed in the Table 26 on p.92 ff. - the MAC address is always the other end bridge MAC - which must be configured to a bridge mode of course, too.

 

Regards,
-Kurt

Message 6 of 17
Danielhainich
Aspirant

Re: WNDAP360 VLAN

Hi,

 

i bought a second AP360 and setup the bridge with 2.4Ghz It works! But what about 5Ghz? i could not setup the bridge with 5Ghz and WPA2-PSK. Can you help again?

Model: WNDAP360|ProSafe Wireless-N Access Point
Message 7 of 17
schumaku
Guru

Re: WNDAP360 VLAN

Check WNDAP360 Reference Manual 2 Nov 2015 p.91 Figure 54 for configuring the 5 GHz interface with the 802.11a/na tab. SImilar, you have to configure the first MAC/ESSID of the remote 5 GHz unit.

Message 8 of 17
Danielhainich
Aspirant

Re: WNDAP360 VLAN

i did the setup similar to 2,4Ghz. but the bridge wont come up. there are any special settings like channel or something else? there is another thread where a user had the same problem with an wnd930. (https://community.netgear.com/t5/Business-Wireless/WND930-wireless-point-to-point-bridge-does-not-wo...)

Model: WNDAP360|ProSafe Wireless-N Access Point
Message 9 of 17
schumaku
Guru

Re: WNDAP360 VLAN

As I said before - no practical experience on my side with this product, and not often creating WDS systems anymore, too.

 

Have configured the 5 GHz radios on both sides to non-DFS channels as requested in the other thread? When I'm reading between the lines on the other thread, the problem (documented with some Logs btw.) appears when enabling security/encryption on that other legacy AP model.

 

@RaghuHR - that's another one for you.

Message 10 of 17
RaghuHR
NETGEAR Expert

Re: WNDAP360 VLAN

@Danielhainich Could you please share your two APs configurations? Also download the logs from the moniroting page ( we need logs for both APs)

 

Thanks,

Raghu

Message 11 of 17
Danielhainich
Aspirant

Re: WNDAP360 VLAN

Hi,

 

here is the config from both APs.

 

 

AP1:

wndap360#show configuration

ap information
    apname wndap360
    ProductId WNDAP360
    serialNo 2RJ64755004D6
    macaddress 6C:B0:CE:0D:4F:E8
    firmware-version 3.7.9.0

    country/region germany
    http-redirect-status disable
    http-redirect-url http://www.netgear.com
    spanning-tree enable
    cloud disable
    cloud-connectivity-status disconnected
    nbr_ap_min_rssi 75
    Wireless interface macaddress for 2.4GHz band     6c:b0:ce:0d:4f:e0
    Wireless interface macaddress for 5GHz band     6c:b0:ce:0d:4f:f0
    time-zone germany
    ntp-server 192.168.2.65
    ntp-client enabled
    custom-ntp-server enabled
    Fri Mar  9 07:47:39 CET 2018

remote
    ssh enable
    telnet disable

syslog information
    server-ip     0.0.0.0
    server-port     514
    syslog-status     disable

ip
    address 192.168.2.178
    netmask 255.255.255.0
    default-gateway 192.168.2.65
    dns-server-primary 192.168.2.86
    dns-server-secondary 192.168.2.86
    dhcp-client disable
    network-integrity-check disable
    igmp-snooping disable

current wireless settings for 802.11ng
    access-point-mode  point to point with client association(p2p-ap)
    current-channel/frequency  6
    rogue-ap-detection  disable
    rogue-ap-detection-policy  mild

current wireless settings for 802.11na
    access-point-mode  point to point with client association(p2p-ap)
    current-channel/frequency  48
    rogue-ap-detection  disable
    rogue-ap-detection-policy  mild

radius
    authentication-server primary     192.168.2.60 1812 ***********
    authentication-server secondary     0.0.0.0 1812 ***********
    accounting-server primary     0.0.0.0 1813 ************
    accounting-server secondary     0.0.0.0 1813 ************
    Reauthentication Time(Seconds)   3600
    Global Key Update Period(Seconds) 1800
    Update Condition   1

interface wlan 2.4GHz
    mode 11ng
    radio enabled
    apmode p2p-ap
    power full
    channel 6
    beacon-interval 100
    fragmentation-length 2346
    rts-threshold 2347
    dtim-interval 3
    ampdu enabled
    aggregation-length 65535
    mcsrate best
    guardinterval auto
    channelwidth 40Mhz
    rogue-ap-detection disabled
    rogue-ap-detection-policy mild
    macacl-database disabled
    trusted-mac-address-list:
         no mac address added
    preamble auto
    rifs-transmission disabled
    client-isolation disabled
    max-wireless-clients 64
    802.11d enabled
    antenna internal

    security-profile 1
        Not enabled

    security-profile 2
        Not enabled

    security-profile 3
        status enabled
        ssid Hainich.Connect
        hide-network-name disabled
        vlan-id 1
        dynamic-vlan disable
        vlan-access-control disable
        vlan-access-control-policy
        name Hainich.Connect
        security-separation disabled
        authentication wpa2psk
        encryption aes
        presharedkey ********************
        keyno 1
        wepkeytype 64
        wep-pass-phrase ************
        key1 **********
        key2 **********
        key3 **********
        key4 **********


    security-profile 4
        Not enabled

    security-profile 5
        status enabled
        ssid Gastnetz
        hide-network-name disabled
        vlan-id 140
        dynamic-vlan disable
        vlan-access-control disable
        vlan-access-control-policy
        name Gastnetz
        security-separation disabled
        authentication wpa2psk
        encryption aes
        presharedkey ************
        keyno 1
        wepkeytype 64
        wep-pass-phrase ************
        key1 **********
        key2 **********
        key3 **********
        key4 **********


    security-profile 6
        status enabled
        ssid Hainich
        hide-network-name disabled
        vlan-id 110
        dynamic-vlan disable
        vlan-access-control disable
        vlan-access-control-policy
        name Hainich
        security-separation disabled
        authentication wpa2psk
        encryption aes
        presharedkey ***************
        keyno 1
        wepkeytype 64
        wep-pass-phrase ************
        key1 **********
        key2 **********
        key3 **********
        key4 **********


    security-profile 7
        Not enabled

    security-profile 8
        Not enabled

    wmm
        wmm-status        enable
        wmm-powersave        enable
        ap-data0-best-effort     3     15     63     0
        ap-data1-background     7     15     1023     0
        ap-data2-video         1     7     15     3008
        ap-data3-voice         1     3     7     1504
        sta-data0-best-effort     3     15     1023     0
        sta-data1-background     7     15     1023     0
        sta-data2-video         2     7     15     3008
        sta-data3-voice         2     3     7     1504

    wireless-bridge
        security-profile 1
            status enable
            name Bridge1
            remote-mac 2c-b0-5d-a0-28-60
            authentication wpa2psk
            encryption aes
            wepkeytype hex64
            presharedkey ********
            wepkey **********
            wep-pass-phrase ************
            (null)
        security-profile 2
            Not enabled
        security-profile 3
            Not enabled
        security-profile 4
            Not enabled


interface wlan 5GHz
    mode 11na
    radio enabled
    apmode p2p-ap
    power full
    channel 48
    beacon-interval 100
    fragmentation-length 2346
    rts-threshold 2347
    dtim-interval 3
    ampdu enabled
    aggregation-length 65535
    mcsrate best
    guardinterval auto
    channelwidth 40Mhz
    rogue-ap-detection disabled
    rogue-ap-detection-policy mild
    macacl-database disabled
    trusted-mac-address-list:
         no mac address added
    rifs-transmission disabled
    client-isolation disabled
    max-wireless-clients 64

    security-profile 1
        Not enabled

    security-profile 2
        status enabled
        ssid Gastnetz5G
        hide-network-name disabled
        vlan-id 140
        dynamic-vlan disable
        vlan-access-control disable
        vlan-access-control-policy
        name Gastnetz5G
        security-separation disabled
        authentication wpa2psk
        encryption aes
        presharedkey ************
        keyno 1
        wepkeytype 64
        wep-pass-phrase ************
        key1 **********
        key2 **********
        key3 **********
        key4 **********


    security-profile 3
        status enabled
        ssid Hainich5G
        hide-network-name disabled
        vlan-id 110
        dynamic-vlan disable
        vlan-access-control disable
        vlan-access-control-policy
        name Hainich5G
        security-separation disabled
        authentication wpa2psk
        encryption aes
        presharedkey ***************
        keyno 1
        wepkeytype 64
        wep-pass-phrase ************
        key1 **********
        key2 **********
        key3 **********
        key4 **********


    security-profile 4
        Not enabled

    security-profile 5
        Not enabled

    security-profile 6
        Not enabled

    security-profile 7
        Not enabled

    security-profile 8
        Not enabled

    wmm
        wmm-status        enable
        wmm-powersave        enable
        ap-data0-best-effort     3     15     63     0
        ap-data1-background     7     15     1023     0
        ap-data2-video         1     7     15     3008
        ap-data3-voice         1     3     7     1504
        sta-data0-best-effort     3     15     1023     0
        sta-data1-background     7     15     1023     0
        sta-data2-video         2     7     15     3008
        sta-data3-voice         2     3     7     1504

    wireless-bridge
        security-profile 1
            status enable
            name test1
            remote-mac 2C-B0-5D-A0-28-70
            authentication open
            encryption none
            wepkeytype hex64
            presharedkey ***********
            wepkey **********
            wep-pass-phrase ************
            (null)
        security-profile 2
            Not enabled
        security-profile 3
            Not enabled
        security-profile 4
            Not enabled

vlan
    management-vlan 1
    untagged-vlan-status enable
    untagged-vlan 1

dhcp-server
    ip-address 192.168.0.2 192.168.0.50
    subnet-mask 255.255.255.0
    gateway 192.168.0.1
    dns-server-primary 0.0.0.0 0.0.0.0
    wins-server-primary 0.0.0.0 0.0.0.0
    lease-time 1 0 0
    status disable
    vlan-id 1

snmp
    status enable
    trap-server-ip 0.0.0.0
    trap-server-community trap
    read-community public
    read-write-community private
    trap-port 162
wndap360#

 

 

 

AP2:

wndap360-2#show configuration

ap information
    apname wndap360-2
    ProductId WNDAP360
    serialNo 2RJ3235700603
    macaddress 2C:B0:5D:A0:28:68
    firmware-version 3.7.9.0

    country/region germany
    http-redirect-status disable
    http-redirect-url http://www.netgear.com
    spanning-tree enable
    cloud disable
    cloud-connectivity-status disconnected
    nbr_ap_min_rssi 75
    Wireless interface macaddress for 2.4GHz band     2c:b0:5d:a0:28:60
    Wireless interface macaddress for 5GHz band     2c:b0:5d:a0:28:70
    time-zone germany
    ntp-server 192.168.2.65
    ntp-client enabled
    custom-ntp-server enabled
    Fri Mar  9 07:46:58 CET 2018

remote
    ssh enable
    telnet disable

syslog information
    server-ip     0.0.0.0
    server-port     514
    syslog-status     disable

ip
    address 192.168.2.177
    netmask 255.255.255.0
    default-gateway 192.168.2.65
    dns-server-primary 192.168.2.86
    dns-server-secondary 0.0.0.0
    dhcp-client disable
    network-integrity-check disable
    igmp-snooping disable

current wireless settings for 802.11ng
    access-point-mode  point to point with client association(p2p-ap)
    current-channel/frequency  6
    rogue-ap-detection  disable
    rogue-ap-detection-policy  mild

current wireless settings for 802.11na
    access-point-mode  point to point with client association(p2p-ap)
    current-channel/frequency  48
    rogue-ap-detection  disable
    rogue-ap-detection-policy  mild

radius
    authentication-server primary     0.0.0.0 1812 ************
    authentication-server secondary     0.0.0.0 1812 ************
    accounting-server primary     0.0.0.0 1813 ************
    accounting-server secondary     0.0.0.0 1813 ************
    Reauthentication Time(Seconds)   3600
    Global Key Update Period(Seconds) 1800
    Update Condition   1

interface wlan 2.4GHz
    mode 11ng
    radio enabled
    apmode p2p-ap
    power full
    channel 6
    beacon-interval 100
    fragmentation-length 2346
    rts-threshold 2347
    dtim-interval 3
    ampdu enabled
    aggregation-length 65535
    mcsrate best
    guardinterval auto
    channelwidth 40Mhz
    rogue-ap-detection disabled
    rogue-ap-detection-policy mild
    macacl-database disabled
    trusted-mac-address-list:
         no mac address added
    preamble auto
    rifs-transmission disabled
    client-isolation disabled
    max-wireless-clients 64
    802.11d enabled
    antenna internal

    security-profile 1
        Not enabled

    security-profile 2
        Not enabled

    security-profile 3
        Not enabled

    security-profile 4
        Not enabled

    security-profile 5
        Not enabled

    security-profile 6
        Not enabled

    security-profile 7
        Not enabled

    security-profile 8
        Not enabled

    wmm
        wmm-status        enable
        wmm-powersave        enable
        ap-data0-best-effort     3     15     63     0
        ap-data1-background     7     15     1023     0
        ap-data2-video         1     7     15     3008
        ap-data3-voice         1     3     7     1504
        sta-data0-best-effort     3     15     1023     0
        sta-data1-background     7     15     1023     0
        sta-data2-video         2     7     15     3008
        sta-data3-voice         2     3     7     1504

    wireless-bridge
        security-profile 1
            status enable
            name NETGEAR-WDS-1
            remote-mac 6c-b0-ce-0d-4f-e0
            authentication wpa2psk
            encryption aes
            wepkeytype hex64
            presharedkey ********
            wepkey **********
            wep-pass-phrase ************
            (null)
        security-profile 2
            Not enabled
        security-profile 3
            Not enabled
        security-profile 4
            Not enabled


interface wlan 5GHz
    mode 11na
    radio enabled
    apmode p2p-ap
    power full
    channel 48
    beacon-interval 100
    fragmentation-length 2346
    rts-threshold 2347
    dtim-interval 3
    ampdu enabled
    aggregation-length 65535
    mcsrate best
    guardinterval auto
    channelwidth 40Mhz
    rogue-ap-detection disabled
    rogue-ap-detection-policy mild
    macacl-database disabled
    trusted-mac-address-list:
         no mac address added
    rifs-transmission disabled
    client-isolation disabled
    max-wireless-clients 64

    security-profile 1
        Not enabled

    security-profile 2
        Not enabled

    security-profile 3
        Not enabled

    security-profile 4
        Not enabled

    security-profile 5
        Not enabled

    security-profile 6
        Not enabled

    security-profile 7
        Not enabled

    security-profile 8
        Not enabled

    wmm
        wmm-status        enable
        wmm-powersave        enable
        ap-data0-best-effort     3     15     63     0
        ap-data1-background     7     15     1023     0
        ap-data2-video         1     7     15     3008
        ap-data3-voice         1     3     7     1504
        sta-data0-best-effort     3     15     1023     0
        sta-data1-background     7     15     1023     0
        sta-data2-video         2     7     15     3008
        sta-data3-voice         2     3     7     1504

    wireless-bridge
        security-profile 1
            status enable
            name test1
            remote-mac 6C-B0-CE-0D-4F-F0
            authentication open
            encryption none
            wepkeytype hex64
            presharedkey ***********
            wepkey **********
            wep-pass-phrase ************
            (null)
        security-profile 2
            Not enabled
        security-profile 3
            Not enabled
        security-profile 4
            Not enabled

vlan
    management-vlan 1
    untagged-vlan-status enable
    untagged-vlan 1

dhcp-server
    ip-address 192.168.0.2 192.168.0.50
    subnet-mask 255.255.255.0
    gateway 192.168.0.1
    dns-server-primary 0.0.0.0 0.0.0.0
    wins-server-primary 0.0.0.0 0.0.0.0
    lease-time 1 0 0
    status disable
    vlan-id 1

snmp
    status enable
    trap-server-ip 0.0.0.0
    trap-server-community trap
    read-community public
    read-write-community private
    trap-port 162
wndap360-2#

 

 

 

 

Model: WNDAP360|ProSafe Wireless-N Access Point
Message 12 of 17
Danielhainich
Aspirant

Re: WNDAP360 VLAN

log-attachment

Model: WNDAP360|ProSafe Wireless-N Access Point
Message 13 of 17
RaghuHR
NETGEAR Expert

Re: WNDAP360 VLAN

Can you reconfirm WDS is enabled or not? We could see it is disabled from the configuration that you have shared?

Please check the attached and share your screen shot of your both AP.  

 

Thanks,

Raghu

Message 14 of 17
Danielhainich
Aspirant

Re: WNDAP360 VLAN

yes, bridge ist enabled on both radios. i have tested it with only 5ghz-radio, but its the same result.

Model: WNDAP360|ProSafe Wireless-N Access Point
Message 15 of 17
RaghuHR
NETGEAR Expert

Re: WNDAP360 VLAN

Ensure both APs are in LoS (Line of Sight) since you are trying on 5 GHz radio. If yes and still if you see an issue we may have to do remote debugging. Let us know.
Message 16 of 17
Danielhainich
Aspirant

Re: WNDAP360 VLAN

Hi,

 

thanks for our help. i had both AP´s in LoS. they did not bridge on 5ghz radio. for now i bridge on 2,4ghz radio. maybe you can help with my DHCP-Problem and this bridge.

 

thanks

daniel

Model: WNDAP360|ProSafe Wireless-N Access Point
Message 17 of 17
Top Contributors
Discussion stats
  • 16 replies
  • 6630 views
  • 1 kudo
  • 4 in conversation
Announcements