Hi everyone
I’m fighting with a network issue, where my synology nas doesn’t accept any connection from outside it’s subnet.
So, here’s my setup:
Unifi Infrastructure with three separated subnets:
xxx.xxx.2.0/24
- no vlan - pool with all “safe” devices (notebooks, mobiles, servers etc.)xxx.xxx.83.0/24
- vlan 83 - here are all the IoT devices, including nvidia shield, multiple chromecast music devices etc.)xxx.xxx.20.0/20
- vlan 20 - quarantined guest wlanxxx.xxx.2.42 and 43
my I got a new NAS and i designated my old DS214play (running DSM 7.1.1-42962 Update 6) as a Mediaserver that gets to live in the IoT net:
xxx.xxx.2.50
to xxx.xxx.83.50
The Firewall on the NAS is not activated
Issue:
What I tried:
unifi firewall logs
--> requests get sent from the nas and answers from the other devicelogs of other devices (DNS, NetCat etc.)
--> they receive the requests outside of the subnet, and return their anser but the NAS seems to block/ignore any incoming packages.What I didn’t try:
"Network Interface" > "LAN" > "Enable VLAN(802.1Q)"
since, as far as I understand, the Unifi VLAN implementation terminates the VLAN tag at the port of the switch (and all other devices work without specifying it locally)I’m completely stuck how to solve the issue, so I have moved the NAS back to the default net, but some use cases are not working properly that way, so I’d really like to move it to the IoT subnet. Does anybody have (has?) any hints or knows of some obscure settings which need to be updated? I’d be really grateful for any pointers.
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.
Rules:
Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.
No spam posting.
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.
Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
No trolling.
Resources:
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
doesn’t the switch terminate any VLAN tagging at the port? so if I add the VLAN to the DSM configuration it doesn’t receive any tagged packages and refuses them?
with all the other devices in the IoT subnet it works with setting the VLAN on the port of the switch. If I check back on the unifi site, I found this:
if I understand that in combination with your comment correctly: I set the native VLAN to
83
so everything tagged with83
is correctly forwarded to the NAS and accepted there, stuff tagged with1
are non native, the tag stays on and the NAS doesn’t accept it?But that would make the Synology NAS quite hard to use in any corporate setting with multiple VLANs which need to interconnect and why does it work the other way around? while being in the default net
1
it does accept stuff from VLAN83
which would mean, I can’t put it in the IoT net?
Did you change the native VLAN to IoT or just added the tag and left the native VLAN on the switch port set to default? You should be able to change the native VLAN and leave tagged VLANs as “allow all”.
My only other thought is how did you isolate the IoT network and are you able to access other devices from default to IoT?
I changed the native vlan to ‘83’ and allowed all others
The isoöation is done with firewall rules blocking access from the IoT net to default, with some exceptions (dns, media nas (currently), etc.)