DSA - Multiple Bridges vs Multiple VLANs on a single bridge

I recently bumped into the excellent DSA tutorial in Openwrt's documentation here: https://openwrt.org/docs/guide-user/network/dsa/dsa-mini-tutorial

I have been using DSA for a while now with no issues whatsoever, and I am using two different subnets:

  • One trusted zone for my known secure devices
  • One untrusted zone for IOT devices, TVs, and a server. Devices within that network cannot communicate with each other, and cannot connect to devices in the trusted zone either. They can ONLY connect to the internet.

I have it setup as per the "Multiple bridged networks" configuration (one bridge for each zone), but from what I understand I can set it up via the "Multiple networks using VLANs" configuration as well. Now my question is: What are the differences? In terms of functionality, performance or anything I might be forgetting?

I know it's a bit of a strange question, since everything works just fine in its current configuration. But I am always interested in learning more. So if multiple solutions can be used, I am very much interested to see exactly what the differences are. Thank you very much in advance :slight_smile:

1 Like

Is there anyone that has experience with both setups?

"Multiple bridged networks" can pass through VLAN-tagged frames as is (VLAN filtering is disabled), while "Multiple VLANs on a single bridge" cannot.

I've actually decided to go the multiple bridges way with DSA on mvebu/WRT1200AC though failed badly.. spent 4 hours troubleshooting why the second bridge is not bringing up its interfaces, to find there is a bug in 21.02 with DSA causing mutliple bridges apparently don't work yet with DSA as documented.

You can read more also here [Solved] DSA Multiple Networks on 21.02 not bridging to lan ports

1 Like

I have also submitted a bug report for this issue, so that it gets some visibility https://bugs.openwrt.org/index.php?do=details&task_id=4171

1 Like

I have the same problem decribed here DSA with two VLAN on one Network. I thought I just do it wrong but it seems as if I'm not the only one with this problem.

On 19.07.8 I created an interface (DMZ) where I could easily add multiple VLANs to the interface (which itself created a bridge).
I installed kmod-br-netfilter to separate the bridge ports on the bridge (so they could not talk to each other, which is what I wanted)
I added some traffic rules so that the pi-hole on one port/VALN was accessible on port 53, the reverse proxy on 80 and 443, the mail server on 25, 587.
As the bridge with kmod-br-netfilter did not allow direct connection, only the desired ports have been accessible even for the other devices in the same network / interface.

Now in 21.02 I did not get something like this working. :frowning:

Are you sure this is a actual bug and not a feature with the more modern and standardized 21.02?
Interfaces and firewall is at L3 routing and VLAN filtering is done at L2 level.
And you want multiple L2 bridges on a single L3 routing interface?
In 19.07 L2 and L3 was a mess without any real distinction what so ever.

I have the same question as OP, bump!

"Multiple bridged networks" can pass through VLAN-tagged frames as is (VLAN filtering is disabled), while "Multiple VLANs on a single bridge" cannot.

I'm not sure I understand what you mean by this, could you please explain? Are you referring to the situation where some port, e.g. "lan1", is a member of a bridge, "br-lan", and it receives a packet with the vlan tag 20? Will that packet get forwarded to other ports on the same bridge? What if some of those other ports are vlan devices, e.g. "lan2.30" is also a member of "br-lan"?

1 Like

What I would like to know is

what perfomance gain do i get (or don't) if i use bridge for every wifi interface ?

Or should i use separate VLANs on same bridge ?

Some of my APs only have one eth port so there is no "switch" section
(i use network.@device[4].ports='eth0.10'

Some have eth0 as switch and eth1 as WAN

what is your preference or what is the 'correct' way ?