Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    TP-Link AC1750 - What's wrong with LAN/AP?

    Scheduled Pinned Locked Moved General pfSense Questions
    12 Posts 3 Posters 1.1k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L Offline
      lewis
      last edited by lewis

      When I started looking for a version that runs on this old wifi router, I came across many posts saying always use an internal AP, never use this kind of device as your Internet connected one.

      I'm wondering why? I mean, I totally understand that wifi is more reachable than wired but if you properly set things up, what is the problem really? How is it any different than putting an AP inside your LAN? Now you have someone that could in theory already be inside your LAN if they were able to get into your AP from remote.

      To me, it seems as simple as setting up a dual LAN, one for wired and one for the wifi stuff then the WAN is connected to the provider.

      Both LAN's would be separated, rules used for any communications between them, the usual.

      What am I not seeing?

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ Offline
        JKnott @lewis
        last edited by

        @lewis

        Around here, the advice has been to use an external AP, as support for WiFi NICs is poor in FreeBSD. I use a Unifi AP. Many people use a router as an AP by connecting the LAN side to the LAN and ignoring the WAN side.

        My AP is connected to my main LAN and also, with a 2nd SSID, to a VLAN for my guest WiFi.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        L 1 Reply Last reply Reply Quote 1
        • L Offline
          lewis @JKnott
          last edited by lewis

          @jknott

          Oh, I must have missed that in the posts I found. I didn't notice they suggested putting the AP outside of the LAN.

          That makes sense however, because it's a wifi device, easy to access, always possible to exploit.

          To be sure I understand...

          One setup I have looks like this.

          Wired LAN to LAN side of pfsense. pfsense LAN side to provider.
          wifi router WAN goes to the LAN side of the above pfsense.

          Suggested;

          Wired LAN to LAN side of pfsense. pfsense LAN side to provider.
          wifi router WAN goes to the LAN side of the provider.

          This effectively prevents a wifi hack from already being on the LAN.
          Then, if I want any wifi traffic allowed back to the wired LAN, I can set up rules that allow the LAN IP from the provider side to be allowed to specific things on the wired LAN side.

          2021-10-27_142454.png
          Not sure I'm explaining this well. Have I got this?

          JKnottJ 1 Reply Last reply Reply Quote 0
          • JKnottJ Offline
            JKnott @lewis
            last edited by

            @lewis

            WiFi is normally on the LAN, as it makes accessing various devices easier. I haven't had my WiFi on a different subnet since the days of 802.11b WiFi, with the crappy WEP encryption. With WPA2 or 3, that's not much of a worry. So my access point is on the same subnet as my main LAN, with only the guest WiFi on a different subnet.

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            1 Reply Last reply Reply Quote 0
            • stephenw10S Offline
              stephenw10 Netgate Administrator
              last edited by

              I would put wifi on a different interface on pfSense if you can. That way you can filter between the wifi and wired subnets. If you need them to be on the same subnet you can always bridge the interfaces and still filter traffic if required.
              https://docs.netgate.com/pfsense/en/latest/wireless/bridges.html

              Steve

              L JKnottJ 3 Replies Last reply Reply Quote 0
              • L Offline
                lewis @stephenw10
                last edited by

                @stephenw10

                Great input, thanks.

                What about my thinking above? That could work well too and I would not need an additional interface and still keep it all separate.

                1 Reply Last reply Reply Quote 0
                • stephenw10S Offline
                  stephenw10 Netgate Administrator
                  last edited by

                  Yes, that would work. But if would be much harder to allow connections between WIFI and LAN if you ever needed to.

                  Steve

                  L 1 Reply Last reply Reply Quote 1
                  • L Offline
                    lewis @stephenw10
                    last edited by

                    @stephenw10

                    Hmm, yes, I see that now.

                    1 Reply Last reply Reply Quote 0
                    • L Offline
                      lewis @stephenw10
                      last edited by

                      @stephenw10 said in TP-Link AC1750 - What's wrong with LAN/AP?:

                      I would put wifi on a different interface on pfSense if you can. That way you can filter between the wifi and wired subnets. If you need them to be on the same subnet you can always bridge the interfaces and still filter traffic if required.
                      https://docs.netgate.com/pfsense/en/latest/wireless/bridges.html

                      Steve

                      I think I'll go this route. Thanks for all the input.

                      1 Reply Last reply Reply Quote 0
                      • JKnottJ Offline
                        JKnott @stephenw10
                        last edited by

                        @stephenw10 said in TP-Link AC1750 - What's wrong with LAN/AP?:

                        I would put wifi on a different interface on pfSense if you can. That way you can filter between the wifi and wired subnets. If you need them to be on the same subnet you can always bridge the interfaces and still filter traffic if required.

                        Why would you even do that if you're just a regular LAN user? If you're worried about guests, put them on their own SSID/subnet and allow only access to the Internet, as I have done.

                        Many people might use a computer on WiFi sometimes and directly connected others. Why should there be a difference for them?

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S Offline
                          stephenw10 Netgate Administrator
                          last edited by

                          Well it depends how you have your devices setup I guess. For me I have a bunch of things on wifi that have no good reason to be able to access everything on LAN but need to be on the same subnet as general wifi clients to be 'discoverable'.
                          But however you have it setup using a separate interface (if you have one) gives you the most flexibility.

                          Steve

                          1 Reply Last reply Reply Quote 0
                          • L Offline
                            lewis
                            last edited by

                            I always used separate interfaces in the past, I'm not sure why I didn't think of doing that with pfsense and that's what I'll be doing. Then I can allow only the ports I want and if someone ever gets in via wifi, they won't get access to much.

                            1 Reply Last reply Reply Quote 1
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.