PORT isolation stopped work - Omada SW controller

Hi,
first i try port isolation future and it work.
After that, i try setup some VLANs on network with OMADA software Controller.
VLAN works, but i decide to return to configuration without VLAN and use PORT ISOLATION, so i switch to default PORT configuration (LAN1).
After removing all my "custom" vlan settings, PORT ISOLATION not work. So Port with isolation turned on, can see other isolated ports.
What i set wrong, when remove all custom vlans? Where is problem?
First, this is about Omada controller windows, not switch. So sorry for this.
So, for all ports set port profile to LAN1 (default profile, not editable). Have assigned VLAN1 by default.
1. set Port Isolation on two ports on 2 switch devices
2. connect to these ports 2 PCs
3. normally, this 2 PCs cant ping or RDP to each other. But, i CAN.
I sended some pictures about my config:
- Copy Link
- Subscribe
- Bookmark
- Report Inappropriate Content
you are using a non tp-link router? does it support vlans?
that router might also be the cause of your performance drops, since in your case the router is doing the routing between vlans, and they vary from being excellent at it, to being slow at it, depending on the model and its capabilities.
IF the router doesnt support vlans, you have some more complex things to set up (switch only vlans with static routes to and from your router)
- Copy Link
- Report Inappropriate Content
Why are you not supernetting IP ranges into IP groups to cover more with less rules?
EG:
I want to block 2 vlans to. range of servers
192.168.10.0 /24
192.168.11.0 /24
block to
192.168.100.254
192.168.100.253
192.168.100.252
192.168.100.251
192.168.100.250
You can do this with one rule, one line a side
192.168.10.0/23 > deny > 192.168.100.254 /29
Also, MAC addresses are still valid over LACP, its still coming from one MAC interface, not multilple per port-link in the LAG
And i really have no idea whay you are on about when you say you need a final deny rule after permit rules in the ACLs ?
Please dont take offense, but you seem to be throwing everything at what is a relatively simple problem without really understanding what is going on or how anything works.
Take a step back and do some reading first.
- Copy Link
- Report Inappropriate Content
Because i want use only 1 subnet (because TEHNICAL problems and AUTOMATIONS paths that already in use in factory) and also, i want isolate stations. How to isolate stations, if they are in same subnet (L3)?
One is ACL between groups and another is ACL to isolete stations in one group.
So, i want isolate all stations that not share any resources and next create groups of servers/stations, that share any resources to add granular acces to them from isolated stations.
Idealy, if i can do MAC acls (L2) and also IP-port (L3). BUT, if i want setup L3 IP-PORT, i cant do that for example for KODAK or ESKO rips, because they use to many port groups, more than 8, that i cant setup in Omada IP-Port group. So must divide IP-PORT to 3, BUT i cant, because ACL for IP-port have also row limiti to 8/16....
- Copy Link
- Report Inappropriate Content
"routing" on same subnet is on switches. That is why i want use ACL as second solution and not VLANs (that was first solution i want use).
I use many (10 more) 10Gb SFP+ servers, so router cand handle that. Also, i see drop on same switch, when i use vlans configured on omada software controller on that same switch.
- Copy Link
- Report Inappropriate Content
Can you give us an overiew of IP ranges, what you want blocked from what, and a topology of the network hardware so we can at least get some idea of what you are trying to do here
Also, i wil re-iterate - vlans do not effect switch performance at all. they are designed for it.. Any drop is due to loops, circular routing tables, or just poor network design.
- Copy Link
- Report Inappropriate Content
Also, i wil re-iterate - vlans do not effect switch performance at all. they are designed for it - so i tested on 3 PC, bese network setup and TP-link exact steb-by-step documentation. AND, i measured drop in traffic between swtiches and also small drop between ports on same switch. Maybe Omada controller implementation of VLANs cause drop. I dont tested on unmanaged switches.
My network for example: only one subnet 192.168.0.0/24, 60 clients, 20 servers, some IoTs, CAMs, DVRs.
groups of clients pc base on deny rule to servers: 10-20
each group can have 1 to 60 rows of IP or IP-port or MAC
so example L2 (MAC base):
clientgroup1 - all clients without any shared services
group2 - some servers with only SMB share
group2 - some servers with SQL services
group3 - some servers with other services1
group4 - some servers with other services2
group5 - some servers with other services3
clientgroup2 - all denyed clients without any access to group2
clientgroup3 - all denyed clients without any access to group3
clientgroup4 - all denyed clients without any access to group4
clientgroup5 - all denyed clients without any access to group5
ACL MAC base to deny :
clientgroup1 deny access to clientgroup1 - cant setup, too many ACLs
clientgroup2 deny access to group2 - cant setup, too many ACLs
clientgroup3 deny access to group3 - cant setup, too many ACLs
clientgroup4 deny access to group4 - cant setup, too many ACLs
clientgroup5 deny access to group5 - cant setup, too many ACLs
example L2+L3
same as L2 but IP-PORT or IP base, with first L2 clientgroup1 deny access to clientgroup1
IP-port groupr
IPport1 - some SMB servers (IP x.x.x.x/32, port 445, 139) - cant do that for more than 8/8 rows, if i have 10 servers (must create 2 groups, but im limited witch ACL rows to max 8 pre type of group (8x group IPsubnets, 8x IP-port, 8xMAC)....
IPport2 - some SQL servers (IP x.x.x.x/32, port yyyy) - cant do that for more than 8/8 rows, if i have 10 servers (must create 2 groups, but im limited witch ACL rows to max 8 pre type of group (8x group IPsubnets, 8x IP-port, 8xMAC)....
IPport3 - some RDP servers (IP x.x.x.x/32, port 3389) - cant do that for more than 8/8 rows, if i have 10 servers (must create 2 groups, but im limited witch ACL rows to max 8 pre type of group (8x group IPsubnets, 8x IP-port, 8xMAC)....
IPport4 - some other services1 (IP x.x.x.x/32, port aaa.bbb-ccc,ddd,eee-fff,ggg,hhh-hhh,iii-iii,lll,mmm,nnn-ooo,......) - cant do that for more than 8/8 rows, if i have 10 servers and 16 port groups on that servers (cant create group with more than 8 port group)
IPport5 - some other services1 (IP x.x.x.x/32, port aaa.bbb-ccc,ddd,eee-fff,ggg,hhh-hhh,iii-iii,lll,mmm,nnn-ooo,......) - cant do that for more than 8/8 rows, if i have 10 servers and 16 port groups on that servers (cant create group with more than 8 port group)
IPport6 - some other services1 (IP x.x.x.x/32, port aaa.bbb-ccc,ddd,eee-fff,ggg)
clientIPgroup1 - some clienst that cant access IPport1 - so more than 16 IP clients, cant create
clientIPgroup2 - some clienst that cant access IPport2 - so more than 16 IP clients, cant create
clientIPgroup3 - some clienst that cant access IPport3 - so more than 16 IP clients, cant create
clientIPgroup4 - some clienst that cant access IPport4 - so more than 16 IP clients, cant create
clientIPgroup5 - some clienst that cant access IPport5 - so more than 16 IP clients, cant create
clientIPgroup6 - some clienst that cant access IPport6 - so more than 16 IP clients, cant create
next ACL
clientgroup1 deny access to clientgroup1
clientIPgroup1 deny access to IPport1
clientIPgroup2 deny access to IPport2
clientIPgroup3 deny access to IPport3
clientIPgroup4 deny access to IPport4
clientIPgroup5 deny access to IPport5
clientIPgroup6 deny access to IPport6
And must use x.x.x.x/32 in IP/IP-port groups (bese on devices in network). I only have ip range segmented for IP with and without internet. Other rules are on firewall base on IP adreses. Because some servers/clients/printers/iot/work devices need internet and some not.
M.
- Copy Link
- Report Inappropriate Content
yes I understand what you mean, 16 ip groups or 16 ip port groups are a problem, sometimes you have to use an ip group on just one ip, it is not always possible to fill all the groups with ip or ports. it is far too small if you are going to build a larger network. so this is a big limitation if you are going to build a secure network, there are simply not enough groups. 16 groups are in the worst case only 16 ip addresses. it is also not possible to use ip range which is also a big problem.
- Copy Link
- Report Inappropriate Content
yes, that is limitation. An it is limitation if you have for example 1 x 24port switch, so also for SMALL, VERY SMALL networks. So THIS IS THE problem, 8/8 or 16. And also VLAN drop is limitation. Maybe on not managed switches this drop dont exist.
- Copy Link
- Report Inappropriate Content
I have been struggling with this ever since Omada was launched. I have a number of remote networks that I am trying to create ACLs for but had to give up, there are not enough IP groups. So why only 16 is strange. Even with a small home network there can be problems if you want to make it secure. Using CIRD is almost impossible, none of my remote networks have IPs in a row.
You can crete a request on Requests & Suggestions and I will vote on it.
- Copy Link
- Report Inappropriate Content
I start communication with support over email. But, this not solve my problem. I think, that will end with "maybe in some next release.....". So i will see. For now, OMADA is useles for more than 8 port and 16 devices if you want sometning normal. Omada have big potencial, but for now is the problem.
- Copy Link
- Report Inappropriate Content

Information
Helpful: 0
Views: 402
Replies: 25
Voters 0
No one has voted for it yet.