Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Isolate Guest Network on AP

    Scheduled Pinned Locked Moved Wireless
    32 Posts 5 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      A Former User
      last edited by A Former User

      OK, spent a minute in the emulator. I didn't see what I was hoping to see. It says you can create a Guest network when in access point mode but there are no settings beyond those simple few things. I do wonder what is a Guest (or other) network on that thing...

      So, wish I could offer you more. But sorry to say I have no idea if you bend that router/access point to you will...

      DDWRT or openwrt may be an option. I'm not going to say you should do that because you can brick devices when installing it and then you will be mad at me...

      Maybe Santa will deliver a shiny new dedicated access point? Ones worth having don't come cheap. Unifi is cheap but the company is a dumpster fire. Netgear can be OK. Splash out some bigger bucks, Ruckus, Aruba, Cisco. I'd want to know a lot more about your environment before pointing you at that kind of money. That said, something like a Ruckus would be a long term item. You'd be very happy with that for many years to come...

      C 1 Reply Last reply Reply Quote 0
      • C
        cburbs @A Former User
        last edited by

        @jwj Yeah once it goes into AP mode you lose most of its functionality.

        So I have an older Asus RT-N66R that I am going to throw DDWRT on it and see if I can play around with it.
        Though I need a replacement for the Asus as it was getting old and the signal strength wasn't the greatest in the opposite corner of the house upstairs. The AX1800 helped resolve that issue but now that I am looking to isolate things more I need a different solution.

        Again any suggestions on one that can do Vlans with ddwrt,openwrt, etc?

        Also new to VLANS so is this a good article to follow on getting the Asus setup as a test for now....https://netosec.com/protect-home-network/ and part of this article https://netosec.com/dd-wrt-wifi-vlans/ or is there an easier way to do this?

        ? 2 Replies Last reply Reply Quote 0
        • ?
          A Former User @cburbs
          last edited by

          @cburbs I edited my post above with some more thoughts...

          C 1 Reply Last reply Reply Quote 0
          • C
            cburbs @A Former User
            last edited by

            @jwj Yeah this has been an interesting adventure and now has me rethinking my whole envrionment. So besides this isolation I want to do some more if possible but need to put all my items in a list and figure out how I want them isolated, etc. That article at netosec is the one that made me rethink everything.

            1 Reply Last reply Reply Quote 0
            • ?
              A Former User
              last edited by A Former User

              As far as how good your WiFi is often has more to do with placement than the hardware itself. Most dedicated access points are ceiling mount. Find the optimal location and it can work miracles for your WLAN.

              Unifi stuff uses cheap consumer components in their products. It's just bundled up like enterprise gear. Mount it on the ceiling in a good spot, make sure you set it up to minimize adjacent channel interference and it almost works like enterprise gear. Until you have more than just a few users... That is probably good enough for most home situations. This hits the sweet spot for almost every home network. https://www.ui.com/unifi/unifi-ap-ac-pro/

              Find the firmware version that works best, not always the latest stable version and don't upgrade it unless you have a real reason to do so. It's the software that can be terrible with their stuff...

              I'm going to upgrade from Unifi soon. 99% sure it will be Ruckus. I hope to find 3 AP's (R710) used for around 3 or 4 hundred a piece. It's a good chunk of change but I know I will enjoy not have to mess with them for a long time...

              1 Reply Last reply Reply Quote 0
              • ?
                A Former User @cburbs
                last edited by

                @cburbs Have a look at the vlans section of the pfsense documentation. Good stuff. Also LOTS of good threads here on the forum. You have to sort through the noise a bit, but lots of good advice can be found.

                1 Reply Last reply Reply Quote 0
                • JKnottJ
                  JKnott
                  last edited by

                  @jwj said in Isolate Guest Network on AP:

                  I have heard, never seen pcaps to demonstrate, that some TP link switches and AP's leak packets to the default vlan. That's a problem. Question is which switches and AP's have this problem? Has the firmware been updated to fix it for some models. Which ones.
                  In the end, you get what you pay for.

                  I don't know the problem exists with all models, but certainly the low end managed switches and AP have it. You can get similarly priced gear from other makes. The problem I experienced with my AP is that multicasts leaked from the main LAN/SSID to VLAN/2nd SSID. This made it impossible to use IPv6 on my guest network.

                  PfSense running on Qotom mini PC
                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                  UniFi AC-Lite access point

                  I haven't lost my mind. It's around here...somewhere...

                  ? 1 Reply Last reply Reply Quote 0
                  • ?
                    A Former User @JKnott
                    last edited by

                    @jknott Well that is a problem. Goes beyond just sloppy...

                    I have a couple of unused TP-Link switches in a closet. Kinda want to sell them off but also don't want to pawn them off on someone who will then have problems. I'd just trash them but that's not very responsible either.

                    JKnottJ 1 Reply Last reply Reply Quote 0
                    • JKnottJ
                      JKnott @A Former User
                      last edited by

                      @jwj

                      One application where they're fine is as a data tap. Since it uses port based VLANs and not tagged, the problem doesn't arise.

                      PfSense running on Qotom mini PC
                      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                      UniFi AC-Lite access point

                      I haven't lost my mind. It's around here...somewhere...

                      1 Reply Last reply Reply Quote 0
                      • C
                        cburbs
                        last edited by

                        Ok so I now have 2 Wireless networks setup on the DDWRT AP.

                        0d82ec91-b59c-478f-8db5-3ca9619674f4-image.png

                        On the pfSense box I setup the two Vlans
                        8552ef50-d6aa-42fd-962c-146e0f0498b5-image.png

                        On the switch I want to plug the AP into port 7.

                        212cc761-fe31-4cb0-ba3b-b102ca9b0aea-image.png

                        But when I do the above I am still getting an IP from the pfSense DHCP and not from either of the Vlans.

                        JKnottJ 1 Reply Last reply Reply Quote 0
                        • JKnottJ
                          JKnott @cburbs
                          last edited by

                          @cburbs

                          Did you set up DHCP servers on each of the VLANs? I assume you have different SSIDs for the VLANs.

                          PfSense running on Qotom mini PC
                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                          UniFi AC-Lite access point

                          I haven't lost my mind. It's around here...somewhere...

                          C 1 Reply Last reply Reply Quote 0
                          • C
                            cburbs @JKnott
                            last edited by cburbs

                            @jknott

                            Correct - Vlan 50, enable DHCP, set IP Range, etc

                            Different SSIDs for the vlans as well.

                            can I connect any port from the AP to Port 7 on the switch?

                            JKnottJ 1 Reply Last reply Reply Quote 0
                            • JKnottJ
                              JKnott @cburbs
                              last edited by

                              @cburbs

                              The ports connected to both pfsense and the AP have to be able to pass the VLANs. For example, my guest WiFi is on VLAN3. So, I configured VLAN3 on pfsense, my AP and on the appropriate switch ports.

                              PfSense running on Qotom mini PC
                              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                              UniFi AC-Lite access point

                              I haven't lost my mind. It's around here...somewhere...

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                In the switch you need those VLANs to be tagged on both the port connected to the AP and the port connected to pfSense.

                                And you need to remove port 7 from the default vlan, unless you have a third SSID there that's untagged.

                                However the fact you were still pulling an IP from the LAN subnet also suggests those new SSIDs are now using the VLANs correctly in the AP.
                                Can we see an ifconfig output from the AP?

                                Steve

                                C 1 Reply Last reply Reply Quote 0
                                • C
                                  cburbs @stephenw10
                                  last edited by cburbs

                                  @stephenw10 Sorry I was wrong on that no IPs while connected to the ddwrt ap wireless.

                                  Something still wrong with my config and trying to look at this as somewhat of a reference point - https://www.tp-link.com/us/support/faq/788/.

                                  This is what I am after as a test ....
                                  122e77fb-ab34-4b2b-953f-65b4c543daab-image.png

                                  So Pfsense plugs into Port 1 on Switch.
                                  Asus AP(DDWRT) plugs into Port 7 on Switch.

                                  Two Vlans setup on DDWRT
                                  SSID: Mobile - Vlan 50
                                  SSID: Guest - Vlan60

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    Yes, so the in the switch config VLAN IDs 50 and 60 need to have both ports 1 and 7 as members and tagged.

                                    C 1 Reply Last reply Reply Quote 1
                                    • C
                                      cburbs @stephenw10
                                      last edited by cburbs

                                      @stephenw10

                                      Ok got a step further and I have the Vlan60 working which would be my guest network.

                                      So Vlan60 just needs internet access nothing else.

                                      Right now I just have two rules in my test bed on this Vlan.
                                      Allowing Vlan 60 clients Internet Access
                                      Block Access to Lan when on Vlan60.
                                      Allow Access within Subnet

                                      f4965900-9a84-41ba-8023-4e969b0c3d7b-image.png

                                      Am I missing anything on this?

                                      1 Reply Last reply Reply Quote 0
                                      • stephenw10S
                                        stephenw10 Netgate Administrator
                                        last edited by stephenw10

                                        Access between devices in the same subnet is not required, that doesn't go through the firewall.
                                        Devices there may need access to the firewall itself (VLAN60 address) for DNS and NTP etc. Otherwise you probably want to block access the all other IPs on the firewall itself and all other local subnets.

                                        Something like this:
                                        wifi rules.png

                                        The Private_Networks alias there is just 192.168.0.0/16 in my case. If you have mutltiple subnets in an alias I would recomend using block then pass rather than pass invert like that.

                                        Steve

                                        C 1 Reply Last reply Reply Quote 0
                                        • C
                                          cburbs @stephenw10
                                          last edited by

                                          @stephenw10
                                          Great I will have to look into that a little later.

                                          Thanks for everyones help on this so far!

                                          C 1 Reply Last reply Reply Quote 0
                                          • C
                                            cburbs @cburbs
                                            last edited by

                                            @cburbs

                                            Wow way too much time spent on this lately but finally getting it to where I want it to be.

                                            Vlan.jpg
                                            Vlan1: Management
                                            This is the Lan off the pfsense firewall. It has access to pfsense gui, all switches, ap, vlans.

                                            Vlan3: Server
                                            Unraid server running plex, LMS, a few other things
                                            Allowed: pfBLockerNG, DNS, Plex to HDHomeRun tuner on Vlan4, Internet
                                            Blocked: Firewall & Internal communication.

                                            Vlan4: Home Theater
                                            Denon Receiver, (3) piCorePlayers, (2) Nvidia Shields, Xbox, (2) HDHomeRun Tuners
                                            Allowed: pfBLockerNG, DNS, Plex players to Plex on unraid, piCorePlayer to LMS on unraid, Internet
                                            Blocked: Firewall & Internal communication.

                                            Vlan5: Work
                                            Work laptop, (2) VOIPs
                                            Allowed: pfBLockerNG, DNS, Internet
                                            Blocked: Firewall & Internal communication.

                                            Vlan8: Wireless
                                            (2) Iphones
                                            Allowed: pfBLockerNG, DNS, Internet
                                            Blocked: Firewall & Internal communication.

                                            Vlan9: Guest Wireless
                                            (2) Chrome books, (2) iphones, (2) kindles, PicorePlayer, roku, PC
                                            Allowed: pfBLockerNG, DNS, Internet
                                            Blocked: Firewall & Internal communication.

                                            Equipment:
                                            Pfsense box: HP Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz, 16 gigs of ram, HP 4 port ethernet card - Packages running: aprwatch, iperf, nmap, ntopng, pfBlockerNG, RRD_Summary, Status_Traffic_Totals, Telegraf

                                            Access Point: Netgear R7800 running Openwrt

                                            Switches: TP-Link TL-SG1024DE, (2) TP-Link TL-SG108PE

                                            Server: ASRock X99 Extreme3, CPU 2GHz 12 cores(24 HT), 32gigs ram
                                            Unraid
                                            Parity Drive: 4tb
                                            15TB HD Space
                                            Cache Drive for Dockers
                                            Unassigned drive for VMs (Windows, Hassio, Linux)

                                            Things still testing:
                                            Iphone control while on Vlan8 to items in Vlan3(plex), Vlan4(Receiver, PiCorePlayers, Shields, Roku).

                                            Verify anything in Vlans 3+ can't get to pfsense box, switches, APs, Server.

                                            I am sure I am forgetting something.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.