The OP’s hostname.vlan* files never specify a vnetid.  I get an error trying 
to configure and bring up the second vlan interface the same way without vnetid 
specified.  Regardless of my error, the ifconfig(8) man page says without 
vnetid specified, vlan tag 0 will be used.  You need to specify two different 
vlan tags.

All of that aside: VLANs don’t give you any more security.  If the client host 
is on the same physical network as your two VLANs, the only thing stopping them 
from jumping between VLANs would be physical devices (switches, etc.) 
configured to prevent that.  From what I gathered, you don’t have this level of 
control.  Therefore, you gain nothing by segmenting the networks with VLANs.

-Brian

> On Feb 5, 2020, at 11:58 AM, Christian Weisgerber <na...@mips.inka.de> wrote:
> 
> On 2020-02-05, Janne Johansson <icepic...@gmail.com> wrote:
> 
>>> # /etc/hostname.vlan101
>>> description 'WLAN attached untrusted hosts'
>>> inet 192.168.156.0/24 255.255.255.0 vlandev run0
>> VLANs and wifi sounds like a non-starter.
> 
> Yep, if you're building your access point with OpenBSD.
> 
> More generally, though, any AP in the business segment has support
> for multiple SSIDs that can be assigned to different VLANs on the
> Ethernet side.
> 
> -- 
> Christian "naddy" Weisgerber                          na...@mips.inka.de

Reply via email to