Utilize ISP routes to manage a network through the firewall.
Utilize ISP routes to manage a network through the firewall.
I have an ISP router linked to the WAN and internet. It creates new subnetworks and VLANs, such as 192.168.5.1. The firewall splits these networks across different ports. You mentioned you can't use the Wi-Fi from the ISP router, so you might need a separate router. Even if you assign the same network to it or use bridge mode, it could cause conflicts with the firewall or stop the ISP router from working properly as a connection to the internet. This sounds confusing, but you don’t have access to those devices and can’t test them yourself.
It seems your ISP router likely doesn’t handle VLANs, so you might want to avoid it. Using an access point alone works fine—typically: Provider Device → Firewall → Switches/AP → PCs/WiFi Devices. You can even connect a device like the U6 Lite, use a POE adapter, and add your VLANs for a quick setup.
If VLANs aren't supported, using a dedicated port in the firewall and placing it in bridge mode might help. You could also connect to the WAN while doing so. If VLAN support were available, there would be no issues at all. This is just a theoretical idea—no direct experience or tested results.
After converting the ISP device to IP passthrough or bridge mode, the built-in access point is turned off, which may remove WiFi and some router capabilities. You’ll need to install your own router or firewall afterward. This allows you to customize your network by setting up VLANs, connecting multiple switches, or adding your own access points as desired.
That's frustrating. On the firewall side, it seems impossible to stop loops when using only a LAN port linked to any firewall port. Probably the issue is with the vendor, as they all seem to follow the same approach based on what I've observed.
It seems you're looking for clarification on network configuration. Could you explain your goal? I'm here to help with the best practices and troubleshooting steps.
In a business setting with sophisticated network/WiFi configurations, operations differ from home setups. I presume the configuration aims to enhance control and security within the LAN/WLAN. If you activate the ISP gateway, traffic would appear unencrypted and every device could potentially communicate freely. Note that running the gateway in its default mode functions but with some unexpected behaviors. Expect double-NAT when another router or firewall is present (which can lead to problems at home and definitely here). You may face intermittent connectivity whenever the gateway renews IP addresses unless you assign a static IP to the device. For the access point, a dedicated unit behind the router/firewall is necessary if the gateway’s AP is disabled.