<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: standalone zoneflex 7372 - private / public wifi - pfsense firewall - cisco 
catyalst 3560 switch in Access Points - Indoor and Outdoor</title>
    <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35711#M10099</link>
    <description>Dionis, thanks for the reply it has indeed helped. &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; have a few more questions before i commit. &lt;BR /&gt;in the gui of the ap under ports&lt;BR /&gt;port 2 goes to the switch, and per your instructions i will set the switchport on the cisco to trunk, allowing the native vlan and the two wifi public/private vlans&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;should i change the port 2 on the 7372 to trunk i assume to match the trunk setting on the switch? &lt;BR /&gt;&lt;BR /&gt;should i change;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; Packet Forward
	

	
	
	
	&lt;BR /&gt;
&amp;nbsp;
&amp;nbsp;802.1X
	
	
	
	&lt;BR /&gt;

&amp;nbsp;
&amp;nbsp;VLAN&amp;nbsp; 
	


&amp;nbsp;
&lt;BR /&gt;&amp;nbsp;&amp;nbsp;
Insert DHCP Option 82 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; Client Fingerprinting &lt;BR /&gt;&lt;BR /&gt;would you please explain;&amp;nbsp; UNTAG ID, and members for the above VLAN setting.&lt;BR /&gt;&lt;BR /&gt;is it best practice to put all my devices on the same management VLAN? and add the mgt vlan to the trunk? &lt;BR /&gt;ie. - pfsense router firewall/cisco switch/wireless AP&lt;BR /&gt;&lt;BR /&gt;also do any changes need to be made in&amp;gt;&lt;BR /&gt;
Administration :: Management
&lt;BR /&gt;&lt;BR /&gt;Controller Discovery Agent (LWAPP)&lt;BR /&gt;Cloud Discovery Agent (FQDN) &lt;BR /&gt;Controller Address &lt;BR /&gt;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;TR069 / SNMP Management Choice&lt;BR /&gt;&lt;BR /&gt;as I have no zone director?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;thank you&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -+&amp;gt;Patrick</description>
    <pubDate>Sat, 30 Jul 2016 16:45:02 GMT</pubDate>
    <dc:creator>patrick_perotti</dc:creator>
    <dc:date>2016-07-30T16:45:02Z</dc:date>
    <item>
      <title>standalone zoneflex 7372 - private / public wifi - pfsense firewall - cisco 
catyalst 3560 switch</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35709#M10097</link>
      <description>just got my first ruckus access point ZF7372, would like to set up private wifi for family, and public wifi for guests.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; have Dell Poweredge 2950 Dual Xeon 5160 3GHz 8GB running pfSense Firewall&amp;nbsp; &lt;BR /&gt;with 6 x gigabit NICs and cisco catyalst 3560 switch.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;any suggestions how to accomplish this?&amp;nbsp; what is best practices on connecting the ZF7372 to the network and separating the public/private wifis,&amp;nbsp;&amp;nbsp; im assuming vlans set up in the switch, in the access point/ssids, and pfsense? kind of new to all this, eager to learn.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;current setup is&amp;nbsp; cable modem&amp;gt;pfsense wan&amp;gt;switch&amp;gt;ZF7372&amp;nbsp; &lt;BR /&gt;switch&amp;nbsp; is setup all ports vlan 1 default &lt;BR /&gt;&lt;BR /&gt;does the standalone ap get trunked to the switch?&lt;BR /&gt;does the pfsense router get trunked to the switch?</description>
      <pubDate>Sat, 30 Jul 2016 05:13:59 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35709#M10097</guid>
      <dc:creator>patrick_perotti</dc:creator>
      <dc:date>2016-07-30T05:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: standalone zoneflex 7372 - private / public wifi - pfsense firewall - cisco 
catyalst 3560 switch</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35710#M10098</link>
      <description>Patrick, congratulations on your Ruckus AP.   The configuration is actually pretty straight forward amd simple.  In your pfsense create two virtual interfaces for vlans.  IP them accordingly and make one your guest and one private.  Pass those VLANs onto the switch.  The port configured for the AP, make that a trunk port.  Pass the native VLAN and make that the VLAN that will give the AP it's IP address, this may be the private network VLAN if you want to make your life easier.  Then allow both, the VLANs for guest and for private on this port plus the native one if different to pss on this trunk port.
&lt;BR /&gt;&lt;BR /&gt;
That's it, your infrastructure is built.  Now, you can move on to configure the AP, that's pretty straight forward.  When it gets to the point of assigning a VLAN to the WLAN area, select the VLAN you created for guess and private and apply them to it's corresponding WLAN.
&lt;BR /&gt;&lt;BR /&gt;
Don't forget to secure your private network by preventing access to it from the guess network and to create your dhcp pools for each subnet on the pfsense.  
&lt;BR /&gt;&lt;BR /&gt;
Hope this helps.</description>
      <pubDate>Sat, 30 Jul 2016 07:02:18 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35710#M10098</guid>
      <dc:creator>dionis_taveras</dc:creator>
      <dc:date>2016-07-30T07:02:18Z</dc:date>
    </item>
    <item>
      <title>Re: standalone zoneflex 7372 - private / public wifi - pfsense firewall - cisco 
catyalst 3560 switch</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35711#M10099</link>
      <description>Dionis, thanks for the reply it has indeed helped. &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; have a few more questions before i commit. &lt;BR /&gt;in the gui of the ap under ports&lt;BR /&gt;port 2 goes to the switch, and per your instructions i will set the switchport on the cisco to trunk, allowing the native vlan and the two wifi public/private vlans&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;should i change the port 2 on the 7372 to trunk i assume to match the trunk setting on the switch? &lt;BR /&gt;&lt;BR /&gt;should i change;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; Packet Forward
	

	
	
	
	&lt;BR /&gt;
&amp;nbsp;
&amp;nbsp;802.1X
	
	
	
	&lt;BR /&gt;

&amp;nbsp;
&amp;nbsp;VLAN&amp;nbsp; 
	


&amp;nbsp;
&lt;BR /&gt;&amp;nbsp;&amp;nbsp;
Insert DHCP Option 82 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; Client Fingerprinting &lt;BR /&gt;&lt;BR /&gt;would you please explain;&amp;nbsp; UNTAG ID, and members for the above VLAN setting.&lt;BR /&gt;&lt;BR /&gt;is it best practice to put all my devices on the same management VLAN? and add the mgt vlan to the trunk? &lt;BR /&gt;ie. - pfsense router firewall/cisco switch/wireless AP&lt;BR /&gt;&lt;BR /&gt;also do any changes need to be made in&amp;gt;&lt;BR /&gt;
Administration :: Management
&lt;BR /&gt;&lt;BR /&gt;Controller Discovery Agent (LWAPP)&lt;BR /&gt;Cloud Discovery Agent (FQDN) &lt;BR /&gt;Controller Address &lt;BR /&gt;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;TR069 / SNMP Management Choice&lt;BR /&gt;&lt;BR /&gt;as I have no zone director?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;thank you&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -+&amp;gt;Patrick</description>
      <pubDate>Sat, 30 Jul 2016 16:45:02 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35711#M10099</guid>
      <dc:creator>patrick_perotti</dc:creator>
      <dc:date>2016-07-30T16:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: standalone zoneflex 7372 - private / public wifi - pfsense firewall - cisco 
catyalst 3560 switch</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35712#M10100</link>
      <description>Ok, first, only change client fingerprinting, if you want to have clients OS identified and such, no change for dhcp option 82 and 802.1x but do change the VLAN to the ine that correspond to that network.  &lt;BR /&gt;&lt;BR /&gt;
Don't change the physical port on the AP and leave it as default.  By adding the VLAN to the WLAN you are already doing this.  &lt;BR /&gt;&lt;BR /&gt;
No changes to zone director area.  Untagged means it won't be passed forward, it stays there as access only (in the simplest way I can explain it).&lt;BR /&gt;&lt;BR /&gt;
Management changes could include the port to access the AP and secured or unsecured access and things like that.  Also user and password to manage the AP.  In your case, no SNMP or any of that.</description>
      <pubDate>Sun, 31 Jul 2016 17:11:12 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35712#M10100</guid>
      <dc:creator>dionis_taveras</dc:creator>
      <dc:date>2016-07-31T17:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: standalone zoneflex 7372 - private / public wifi - pfsense firewall - cisco 
catyalst 3560 switch</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35713#M10101</link>
      <description>Current setup;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Cable modem to WAN interface of PFSENSE box set to dchp from comcast&lt;BR /&gt;&amp;nbsp;&amp;nbsp; PFSENSE LAN interface set to static address 192.168.1.9 to port 0/1 on cisco caytalyst 3560 switch&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Ruckus ZF7372 Port 2 set Trunk Port, Bridge to WAN, UNTAG ID 1 &lt;BR /&gt;to port 0/2 of switch. &lt;BR /&gt;&lt;BR /&gt;interface FastEthernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 1-99&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;switchport mode trunk&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;interface FastEthernet0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 1-99&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; in pfsense i have created two virtual interfaces; wifi, and wifipub&lt;BR /&gt;&amp;nbsp;WIFI &amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN1 on lan interface&amp;nbsp;&amp;nbsp;&amp;nbsp; 100baseTX &lt;FULL-DUPLEX&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.1&lt;BR /&gt;WIFIPUB VLAN20 on lan interface&amp;nbsp;&amp;nbsp;&amp;nbsp; 100baseTX &lt;FULL-DUPLEX&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.20.1 &lt;BR /&gt;&lt;BR /&gt;Enabled DHCP server on WIFI interface&lt;BR /&gt;&lt;BR /&gt;Subnet&lt;BR /&gt;192.168.10.0&lt;BR /&gt;Subnet mask&lt;BR /&gt;255.255.255.0&lt;BR /&gt;Available range&lt;BR /&gt;192.168.10.1 - 192.168.10.254&lt;BR /&gt;&lt;BR /&gt;Enabled DHCP server on WIFIPUB interface&lt;BR /&gt;&lt;BR /&gt;Subnet&lt;BR /&gt;192.168.20.0&lt;BR /&gt;Subnet mask&lt;BR /&gt;255.255.255.0&lt;BR /&gt;Available range&lt;BR /&gt;192.168.20.1 - 192.168.20.254&lt;BR /&gt;&lt;BR /&gt;in Ruckus ZF7372 AP webui &lt;BR /&gt;&lt;BR /&gt;Status :: Internet&lt;BR /&gt;&lt;BR /&gt;IPv4 Status: &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Connection Type: &amp;nbsp;&amp;nbsp;&amp;nbsp; dhcp&lt;BR /&gt;IPv4 Address: &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.141&lt;BR /&gt;IPv4 Subnet Mask: &amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&lt;BR /&gt;IPv4 Gateway: &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&lt;BR /&gt;Primary DNS Server: &amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&lt;BR /&gt;IPv6 Status: &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Connection Type: &amp;nbsp;&amp;nbsp;&amp;nbsp; autoconfig&lt;BR /&gt;&lt;BR /&gt;Question: should I set the AP to a static IP?&lt;BR /&gt;&lt;BR /&gt;in Configuration :: Internet&lt;BR /&gt;&lt;BR /&gt;Management VLAN 1&lt;BR /&gt;IPV4 Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DHCP&lt;BR /&gt;IPV4 DNS Mode Auto&lt;BR /&gt;&lt;BR /&gt;IPv6 Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auto Config&lt;BR /&gt;&lt;BR /&gt;in Configuration :: Radio 2.4G :: wifi&lt;BR /&gt;&lt;BR /&gt;ssid wifi&lt;BR /&gt;packet forward&amp;nbsp; Bridge to WAN&lt;BR /&gt;access VLAN 1&lt;BR /&gt;&lt;BR /&gt;in Configuration :: Radio 2.4G :: wifi-pub&lt;BR /&gt;&lt;BR /&gt;ssid wifi-pub&lt;BR /&gt;packet forward Bridge to WAN&lt;BR /&gt;access VLAN 20&lt;BR /&gt;&lt;BR /&gt;in the switch i have only configured the port that the AP connects to as TRUNK&lt;BR /&gt;and added VLAN 20 named wifipub&lt;BR /&gt;on the AP i have left the default port as ACCESS&lt;BR /&gt;&lt;BR /&gt;connecting to wifi-pub ssid , gets ip address 192.168.20.101 can access both the pfsense webui and the ruckus ap webui from here, but no Internet. &lt;BR /&gt;( LOL, this is the reverse of what i would like to accomplish XD )&lt;BR /&gt;I thought having these on different vlans would do this&lt;BR /&gt;when i goto 192.168.20.1 it now takes me to the pfsense login page =(&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;connecting to ssid wifi&amp;nbsp;&amp;nbsp;&amp;nbsp; - can connect to both the local network and the internet&lt;BR /&gt;&lt;BR /&gt;I have not made any firewall rules&lt;BR /&gt;&lt;BR /&gt;also i know this is a layer 3 switch, how can I make sure that pfsense handles the routing?&lt;BR /&gt;&lt;BR /&gt;do i need to change anything in the Local Subnets category in the AP webui config? currently they are disabled &lt;BR /&gt;&lt;BR /&gt;thank you for your help, please let me know if i can provide more information to find a solution.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -+&amp;gt;Patrick&lt;/FULL-DUPLEX&gt;&lt;/FULL-DUPLEX&gt;</description>
      <pubDate>Sun, 31 Jul 2016 20:12:02 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35713#M10101</guid>
      <dc:creator>patrick_perotti</dc:creator>
      <dc:date>2016-07-31T20:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: standalone zoneflex 7372 - private / public wifi - pfsense firewall - cisco 
catyalst 3560 switch</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35714#M10102</link>
      <description>ok thanks , the issue was the dhcp server, once i stopped on all interfaces and brought back up, ip assignment took place on the virtual interfaces,now everything is working as expected.</description>
      <pubDate>Tue, 02 Aug 2016 15:22:54 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35714#M10102</guid>
      <dc:creator>patrick_perotti</dc:creator>
      <dc:date>2016-08-02T15:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: standalone zoneflex 7372 - private / public wifi - pfsense firewall - cisco 
catyalst 3560 switch</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35715#M10103</link>
      <description>Glad everything is working.&amp;nbsp; Let us know if you need anything else.&amp;nbsp; Enjoy your Ruckus AP &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Tue, 02 Aug 2016 15:32:47 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35715#M10103</guid>
      <dc:creator>dionis_taveras</dc:creator>
      <dc:date>2016-08-02T15:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: standalone zoneflex 7372 - private / public wifi - pfsense firewall - cisco 
catyalst 3560 switch</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35716#M10104</link>
      <description>Hello ,&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;this is not really ruckus related , i asked for some help in the pfsense forum with no replys.&lt;BR /&gt;&lt;BR /&gt;I have the same setup;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;cable modem &amp;gt;&amp;gt; pfsense wan interface&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;pfsense LAN interface &amp;gt;&amp;gt; Cisco 3560 switch&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Ruckus 7372 &amp;gt;&amp;gt; Switch&lt;BR /&gt;have recently come across a cisco 2851 router 2 7960 ip phones, and 10 7920 wireless ip phones&lt;BR /&gt;&lt;BR /&gt;could use some help getting them online.&lt;BR /&gt;&amp;nbsp; &amp;nbsp;funny story , when i first got the router and phones, i had them connecting to the router, and they could all call each other by extension, even got as far as registering the call manager to flowroute. &amp;nbsp;and then the router lost power, and the config was not saved.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; thanks,&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Patrick&lt;BR /&gt;&lt;BR /&gt;btw ruckus is awesome, i watched this video on&amp;nbsp;beamforming, antennas and waves. &amp;nbsp;&lt;BR /&gt;&lt;A href="https://www.youtube.com/watch?v=kcIkgyRGFQE" rel="nofollow" target="_blank" title="Link https//wwwyoutubecom/watchvkcIkgyRGFQE"&gt;https://www.youtube.com/watch?v=kcIkgyRGFQE&lt;/A&gt;&lt;BR /&gt;awesome technology and company</description>
      <pubDate>Sat, 03 Sep 2016 22:59:16 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/standalone-zoneflex-7372-private-public-wifi-pfsense-firewall/m-p/35716#M10104</guid>
      <dc:creator>patrick_perotti</dc:creator>
      <dc:date>2016-09-03T22:59:16Z</dc:date>
    </item>
  </channel>
</rss>

