Different network types w/ same SSID and vlan?

Stumbled across a unique use case as I’ve been transitioning to Alta, curious if the solution I’ve implemented is supported (or counter-productive).

Config:

  • Firewalla Gold
  • AP6 Pro
  • Three SSIDs (trusted, guest, IoT)
  • Separate vlan for each of the three SSIDs

Connecting Sonos to the IoT SSID I found that the Sonos app (via mobile device on the wireless trusted network) was not able to see the Sonos speakers even with IGMP Proxy enabled on the SSID. Setting the network type to Standard solved the problem, and that got me thinking…so I added a second network to the SSID with a Standard network type, different password, same vlan.

End result is a mix of devices on the IoT SSID (part network type IoT, part network type Standard), all with the same vlan. It solved the functional issue I was troubleshooting, but I’m curious if that’s considered a poor implementation, more risky, etc.

This is totally acceptable and supported configuration. It really depends on the requirements for the network, and some devices while they are more of the IoT variety do still rely on two-way communication (e.g. Sonos).

What if a user didn’t have a router capable of VLANs, but wanted to still leverage segregation? That’s one of the great features of AltaPass, you can have different levels of access within the same network, whether flat, or using VLANs.

1 Like