Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Guest WLAN on DD-WRT AP via VLAN

    Scheduled Pinned Locked Moved General pfSense Questions
    18 Posts 4 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      " However, if pfSense and the AP are configured for VLANs, it should work."

      Why do you keep suggesting borked configurations.. Sending vlan tags over a dumb switch is not good practice…

      I really need to grab a dumb switch off my shelf.. How does the dumb switch open the 802.1Q frame and look at the dest mac?  if doesn't know the dest mac - would it not just flood every port..  So you basically turned your switch into a hub?  So while the switch might pass the tagged traffic, won't it be passing the tagged traffic out every port since it doesn't know what its dest mac is?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott
        last edited by

        @johnpoz:

        " However, if pfSense and the AP are configured for VLANs, it should work."

        Why do you keep suggesting borked configurations.. Sending vlan tags over a dumb switch is not good practice…

        I really need to grab a dumb switch off my shelf.. How does the dumb switch open the 802.1Q frame and look at the dest mac?  if doesn't know the dest mac - would it not just flood every port..  So you basically turned your switch into a hub?  So while the switch might pass the tagged traffic, won't it be passing the tagged traffic out every port since it doesn't know what its dest mac is?

        It does work.  If you have no need to manage a VLAN on a switch, an unmanaged switch works fine.  As for the MAC address, it's in the same place as with any other Ethernet frame.

        Here's a link to some VLAN info:
        https://en.wikipedia.org/wiki/IEEE_802.1Q

        Notice there is absolutely no difference in where the MAC addresses are.  That's all the switch worries about, when forwarding frames.  The 802.1Q VLAN tag is inserted between the source MAC and Ethertype/Length fields.  Since Ethernet is designed to have any value, either type or length, in those 2 bytes, this is not a problem.  Switches that can manage VLANs recognize the contents of the tag and handle the frame appropriately and unmanaged switches just pass on the frame as is.  The only issue might be with older equipment that expect the frame to be no longer than 1518 byes.  These days, with VLANs, MPLS and jumbo frames, switches are expected to pass any valid Ethernet frames without issue.  Also, if you think the VLAN somehow obscures the MAC, you really don't understand Ethernet.  Incidentally, gigabit equipment is expected to be able to handle jumbo frames, which can be 9KB or more.  Those switches are not going to worry about the extra 4 bytes a VLAN tag adds to the frame.

        You may be interested in a good Ethernet book.  It's "Ethernet The Definitive Guide" from O'Reilly.  It covers all this and more.
        http://shop.oreilly.com/product/0636920028987.do

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        1 Reply Last reply Reply Quote 0
        • D
          dvs23
          last edited by

          Hey!

          I simply tried today - and partly it seems to work. The part that's wirking is that the DHCP DISCOVERs and REQUESTs reach my pfsense-router at the right vlan-interface (capturable via diagnostics, also visible in DHCP system logs) and sends a nice OFFER back, but somehow it does not reach the client… SPI firewall is already disabled at DD-WRT...

          What data do you need?

          Again thanks in advance
          dvs23

          1 Reply Last reply Reply Quote 0
          • JKnottJ
            JKnott
            last edited by

            Are you using the DD-WRT as a router with the clients on the LAN side and pfSense on the WAN?  If so, the DHCP requests will not reach pfSense and the ones you see must be coming from  somewhere else.  Are you certain they're coming from the client?

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            1 Reply Last reply Reply Quote 0
            • D
              dvs23
              last edited by

              The requests definitely come from the clients, MAC and hostname match…
              I followed this guide to make it an access point after reseting to factory defaults:
              https://www.dd-wrt.com/wiki/index.php/Wireless_Access_Point

              and this guide for the guest network (unfortunately in german, but there are pictures with the configuration):
              https://www.flashsystems.de/articles/ddwrtguestlan-index/

              I loose my access while setting up VLAN's ("Kapitel 3"), because the DHCP requests do not reach my clients... By the way, the router itself seems to have no IP after this - Pfsense only tells me about one client at DHCP Leases - pfsense itself, no DD-WRT router...

              1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott
                last edited by

                You still haven't answered my question, is the DD-WRT being used as a router?  When you see those DHCP requests, do they contain the MAC address of the originating device?

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                1 Reply Last reply Reply Quote 0
                • D
                  dvs23
                  last edited by

                  @dvs23:

                  The requests definitely come from the clients, MAC and hostname match…

                  Yes, MAC addresss matches the address of the originating device, so they obviously also contain the address.

                  The  long guide tells me to change the mode from gateway to router, so yes somehow it's still a router - but with wan connection type: disabled and without a dhcp server.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    "unmanaged switches just pass on the frame as is."

                    That is the PROBLEM!!!  Dude I just plugged in a dumb netgear gs108 between my trunk on pfsense to my smart switch…

                    Then I plugged in a laptop to another port - seeing every broadcast packet for EVERY vlan...  What your suggesting is just BORKED!!  Please do not suggest people do such things - especially those new to what vlans even are!!

                    And I didn't leave it long enough to figure out exactly why - but the laptop was not getting IP via dhcp either..  Running vlan tags over a dumb switch is pretty much the worst advice you could ever give.. Its just plain WRONG!!  Please stop suggesting people can do it.. If you want to do it on your own network - have at it.. But please do not pass along such nonsense here.. Please!!!

                    problem.png
                    problem.png_thumb

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • D
                      dvs23
                      last edited by

                      Here is the packet capture file :)
                      Please tell me when you downloaded it so I can remove the attachment

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        I do not see any vlan tags in that sniff.. But seeing 192.168.1 and dhcp for 192.168.2..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • JKnottJ
                          JKnott
                          last edited by

                          Then I plugged in a laptop to another port - seeing every broadcast packet for EVERY vlan…  What your suggesting is just BORKED!!  Please do not suggest people do such things - especially those new to what vlans even are!!

                          Yes, every frame, including VLAN will appear on the wire, no doubt about that.  Now, how many devices will actually receive the VLAN frames?  Only the ones that have been configured to receive it.  If it's not been configured for the VLAN, the VLAN frame will be discarded.

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          1 Reply Last reply Reply Quote 0
                          • D
                            dvs23
                            last edited by

                            The capture has been made by Diagnostics->Package capture from the VLAN-Interface "HOME", so pfsense seems to strip the vlan tags, but the package seemingly arrives at the correct interface (VLAN1) When I capture directly from a cable to the wan port of my router, the VLAN tags are there. If it helps I can post a cap file of that later, too.

                            1 Reply Last reply Reply Quote 0
                            • JKnottJ
                              JKnott
                              last edited by

                              The capture has been made by Diagnostics->Package capture from the VLAN-Interface "HOME", so pfsense seems to strip the vlan tags

                              That's why I like to use a managed switch, configured for port mirroring, and a computer running Wireshark to analyze network issues.  If you used packet capture on the real interface, then you should see VLAN frames, as well as the native LAN traffic.

                              PfSense running on Qotom mini PC
                              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                              UniFi AC-Lite access point

                              I haven't lost my mind. It's around here...somewhere...

                              1 Reply Last reply Reply Quote 0
                              • D
                                dvs23
                                last edited by

                                Well, buying a managed switch is no problem, I just cannot add a second wire to the APs… So I thought it would be unnecessary..

                                1 Reply Last reply Reply Quote 0
                                • JKnottJ
                                  JKnott
                                  last edited by

                                  @dvs23:

                                  Well, buying a managed switch is no problem, I just cannot add a second wire to the APs… So I thought it would be unnecessary..

                                  A VLAN to an access point is the usual method for multiple SSIDs.  A common configuration is to have the native LAN used for normal users and the VLAN for guests, who are only allowed to access the Internet.

                                  PfSense running on Qotom mini PC
                                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                  UniFi AC-Lite access point

                                  I haven't lost my mind. It's around here...somewhere...

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.