- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Using built-in DHCP server to serve guest WiFi
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You can create a new VLAN for the guest SSID on your MS250. This will logically separate the guest network traffic from your main network (VLAN 60).
The MS250 switches have a built-in DHCP server. You can configure this to provide IP addresses in the range 172.16.83.1-172.16.83.100 for VLAN 61.
You can configure your Layer 3 switch to route traffic from VLAN 61 to VLAN 60. This is done by creating Layer 3 interfaces or Switch Virtual Interfaces (SVIs) for each VLAN.
You can configure the guest SSID on your MR44 WiFi access points to use VLAN 61. This means any device connecting to the guest SSID will be given an IP address in the 172.16.83.x range and will be logically separated on VLAN 61.
As the traffic is now being routed through your switch, you should be able to monitor and log what is accessed using the school’s local filtering equipment.
Please note that while this setup should theoretically work, it’s always a good idea to test it in a controlled environment before deploying it in a live network. Also, remember to secure the guest network appropriately to prevent unauthorized access.
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks so much Alemabrahao, now that I know that it is in theory possible, I'll have a little tinker with it all. I think I've got it giving out the correct IP addresses on my new guest VLAN, but the part of routing that to the other VLAN is something that I will have to have a good think about. If I get stuck, any chance of a few pointers (please!)?
Thanks,
IJ
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You really should put the layer 3 VLAN on your firewall so you can keep the guest traffic separate from everything else.
