Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Guest WLAN on DD-WRT AP via VLAN

    Scheduled Pinned Locked Moved General pfSense Questions
    18 Posts 4 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JKnottJ
      JKnott
      last edited by

      You still haven't answered my question, is the DD-WRT being used as a router?  When you see those DHCP requests, do they contain the MAC address of the originating device?

      PfSense running on Qotom mini PC
      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
      UniFi AC-Lite access point

      I haven't lost my mind. It's around here...somewhere...

      1 Reply Last reply Reply Quote 0
      • D
        dvs23
        last edited by

        @dvs23:

        The requests definitely come from the clients, MAC and hostname match…

        Yes, MAC addresss matches the address of the originating device, so they obviously also contain the address.

        The  long guide tells me to change the mode from gateway to router, so yes somehow it's still a router - but with wan connection type: disabled and without a dhcp server.

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          "unmanaged switches just pass on the frame as is."

          That is the PROBLEM!!!  Dude I just plugged in a dumb netgear gs108 between my trunk on pfsense to my smart switch…

          Then I plugged in a laptop to another port - seeing every broadcast packet for EVERY vlan...  What your suggesting is just BORKED!!  Please do not suggest people do such things - especially those new to what vlans even are!!

          And I didn't leave it long enough to figure out exactly why - but the laptop was not getting IP via dhcp either..  Running vlan tags over a dumb switch is pretty much the worst advice you could ever give.. Its just plain WRONG!!  Please stop suggesting people can do it.. If you want to do it on your own network - have at it.. But please do not pass along such nonsense here.. Please!!!

          problem.png
          problem.png_thumb

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • D
            dvs23
            last edited by

            Here is the packet capture file :)
            Please tell me when you downloaded it so I can remove the attachment

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              I do not see any vlan tags in that sniff.. But seeing 192.168.1 and dhcp for 192.168.2..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott
                last edited by

                Then I plugged in a laptop to another port - seeing every broadcast packet for EVERY vlan…  What your suggesting is just BORKED!!  Please do not suggest people do such things - especially those new to what vlans even are!!

                Yes, every frame, including VLAN will appear on the wire, no doubt about that.  Now, how many devices will actually receive the VLAN frames?  Only the ones that have been configured to receive it.  If it's not been configured for the VLAN, the VLAN frame will be discarded.

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                1 Reply Last reply Reply Quote 0
                • D
                  dvs23
                  last edited by

                  The capture has been made by Diagnostics->Package capture from the VLAN-Interface "HOME", so pfsense seems to strip the vlan tags, but the package seemingly arrives at the correct interface (VLAN1) When I capture directly from a cable to the wan port of my router, the VLAN tags are there. If it helps I can post a cap file of that later, too.

                  1 Reply Last reply Reply Quote 0
                  • JKnottJ
                    JKnott
                    last edited by

                    The capture has been made by Diagnostics->Package capture from the VLAN-Interface "HOME", so pfsense seems to strip the vlan tags

                    That's why I like to use a managed switch, configured for port mirroring, and a computer running Wireshark to analyze network issues.  If you used packet capture on the real interface, then you should see VLAN frames, as well as the native LAN traffic.

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    1 Reply Last reply Reply Quote 0
                    • D
                      dvs23
                      last edited by

                      Well, buying a managed switch is no problem, I just cannot add a second wire to the APs… So I thought it would be unnecessary..

                      1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott
                        last edited by

                        @dvs23:

                        Well, buying a managed switch is no problem, I just cannot add a second wire to the APs… So I thought it would be unnecessary..

                        A VLAN to an access point is the usual method for multiple SSIDs.  A common configuration is to have the native LAN used for normal users and the VLAN for guests, who are only allowed to access the Internet.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.