Building an IT Home-Lab Network | Part 5: Adding an Access Point (**DRAFT**)

#Wi-Fi

Table of Contents

Previously: Building an IT Home-Lab Network | Part 4: Cisco SG500 switch configuration

Time to set up wireless connectivity with our AP (DRAFT)


Hardware Used

Here is what I am working with: a TP-Link WA1801.
It’s an alright AP but it lacks some more advanced features that would be useful.


Switch Configuration

To access it we will plug it into port 13 of our switch and set up the port as follows:

  • Keep it as an Access Port
  • Change the VLAN to 11

Checking DHCP Leases

Let’s take a look at pfSense under
Status --> DHCP Leases:

Here it is!
Let’s try for a web interface.


Initial Setup

What follows is a simple initial setup.

Now let’s head back to pfSense rules real quick and allow the AP to:

  • Access the internet
  • Utilize the DNS protocol
  • Reach our NTP server

This way we can check for any updates the easy way.

I will also have to mark the APManagement interface under DNS Resolver settings.
Because I set the interfaces explicitly.


Updating Firmware

With auto-update checked we now get this popup, so let’s update the firmware.

After some time and a reboot we are now up to date!


Switching to SSID Mode

First let’s switch to SSID mode and reboot to apply.

We are asked to set up some things again from scratch, so let’s do that.


Configuration Summary

Settings to apply:

Setting Description
Local Management via HTTPS
Time Get time from our NTP server
SSIDs Separate for Guest, LAN, and Lab networks
Security WPA3 Personal / WPA2 PSK
Hidden SSIDs Enabled (for decluttering)
Channel Widest available
Frequency Configure both 2.4 GHz and 5 GHz

pfSense Rules

Great, now let’s revert pfSense back to our original settings.
I will keep the rules as disabled for easy re-enabling in the future.


SwitchPort Tweaks (SG500)

Now let’s tweak the port settings on the SG500:

  1. Change the Interface VLAN Mode to General.
  1. Add our SSID-related VLANs to the allowed list.

VLAN Isolation Overview

As you can see more clearly now, with this setup we can isolate the management interface to its own VLAN, even though it’s sent untagged by the AP.

I could make it tag natively with the management VLAN (10),
but the more secure approach is not to allow untagged access to VLAN 10.


Testing Connectivity

All we need to do is test with some wireless device.

Here is my phone connected to the SSID corresponding to the LAN network (VLAN 30).
You can see it successfully gets an IP address from the DHCP server (pfSense) in the network as we have defined it and has internet connectivity.

It seems to be working well!


Next part, coming soon: Setting up VoIP end-to-end