Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Isolate Guest Network on AP

    Scheduled Pinned Locked Moved Wireless
    32 Posts 5 Posters 4.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      A Former User @JKnott
      last edited by

      @jknott Well that is a problem. Goes beyond just sloppy...

      I have a couple of unused TP-Link switches in a closet. Kinda want to sell them off but also don't want to pawn them off on someone who will then have problems. I'd just trash them but that's not very responsible either.

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @A Former User
        last edited by

        @jwj

        One application where they're fine is as a data tap. Since it uses port based VLANs and not tagged, the problem doesn't arise.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        1 Reply Last reply Reply Quote 0
        • C
          cburbs
          last edited by

          Ok so I now have 2 Wireless networks setup on the DDWRT AP.

          0d82ec91-b59c-478f-8db5-3ca9619674f4-image.png

          On the pfSense box I setup the two Vlans
          8552ef50-d6aa-42fd-962c-146e0f0498b5-image.png

          On the switch I want to plug the AP into port 7.

          212cc761-fe31-4cb0-ba3b-b102ca9b0aea-image.png

          But when I do the above I am still getting an IP from the pfSense DHCP and not from either of the Vlans.

          JKnottJ 1 Reply Last reply Reply Quote 0
          • JKnottJ
            JKnott @cburbs
            last edited by

            @cburbs

            Did you set up DHCP servers on each of the VLANs? I assume you have different SSIDs for the VLANs.

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            C 1 Reply Last reply Reply Quote 0
            • C
              cburbs @JKnott
              last edited by cburbs

              @jknott

              Correct - Vlan 50, enable DHCP, set IP Range, etc

              Different SSIDs for the vlans as well.

              can I connect any port from the AP to Port 7 on the switch?

              JKnottJ 1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott @cburbs
                last edited by

                @cburbs

                The ports connected to both pfsense and the AP have to be able to pass the VLANs. For example, my guest WiFi is on VLAN3. So, I configured VLAN3 on pfsense, my AP and on the appropriate switch ports.

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  In the switch you need those VLANs to be tagged on both the port connected to the AP and the port connected to pfSense.

                  And you need to remove port 7 from the default vlan, unless you have a third SSID there that's untagged.

                  However the fact you were still pulling an IP from the LAN subnet also suggests those new SSIDs are now using the VLANs correctly in the AP.
                  Can we see an ifconfig output from the AP?

                  Steve

                  C 1 Reply Last reply Reply Quote 0
                  • C
                    cburbs @stephenw10
                    last edited by cburbs

                    @stephenw10 Sorry I was wrong on that no IPs while connected to the ddwrt ap wireless.

                    Something still wrong with my config and trying to look at this as somewhat of a reference point - https://www.tp-link.com/us/support/faq/788/.

                    This is what I am after as a test ....
                    122e77fb-ab34-4b2b-953f-65b4c543daab-image.png

                    So Pfsense plugs into Port 1 on Switch.
                    Asus AP(DDWRT) plugs into Port 7 on Switch.

                    Two Vlans setup on DDWRT
                    SSID: Mobile - Vlan 50
                    SSID: Guest - Vlan60

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Yes, so the in the switch config VLAN IDs 50 and 60 need to have both ports 1 and 7 as members and tagged.

                      C 1 Reply Last reply Reply Quote 1
                      • C
                        cburbs @stephenw10
                        last edited by cburbs

                        @stephenw10

                        Ok got a step further and I have the Vlan60 working which would be my guest network.

                        So Vlan60 just needs internet access nothing else.

                        Right now I just have two rules in my test bed on this Vlan.
                        Allowing Vlan 60 clients Internet Access
                        Block Access to Lan when on Vlan60.
                        Allow Access within Subnet

                        f4965900-9a84-41ba-8023-4e969b0c3d7b-image.png

                        Am I missing anything on this?

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by stephenw10

                          Access between devices in the same subnet is not required, that doesn't go through the firewall.
                          Devices there may need access to the firewall itself (VLAN60 address) for DNS and NTP etc. Otherwise you probably want to block access the all other IPs on the firewall itself and all other local subnets.

                          Something like this:
                          wifi rules.png

                          The Private_Networks alias there is just 192.168.0.0/16 in my case. If you have mutltiple subnets in an alias I would recomend using block then pass rather than pass invert like that.

                          Steve

                          C 1 Reply Last reply Reply Quote 0
                          • C
                            cburbs @stephenw10
                            last edited by

                            @stephenw10
                            Great I will have to look into that a little later.

                            Thanks for everyones help on this so far!

                            C 1 Reply Last reply Reply Quote 0
                            • C
                              cburbs @cburbs
                              last edited by

                              @cburbs

                              Wow way too much time spent on this lately but finally getting it to where I want it to be.

                              Vlan.jpg
                              Vlan1: Management
                              This is the Lan off the pfsense firewall. It has access to pfsense gui, all switches, ap, vlans.

                              Vlan3: Server
                              Unraid server running plex, LMS, a few other things
                              Allowed: pfBLockerNG, DNS, Plex to HDHomeRun tuner on Vlan4, Internet
                              Blocked: Firewall & Internal communication.

                              Vlan4: Home Theater
                              Denon Receiver, (3) piCorePlayers, (2) Nvidia Shields, Xbox, (2) HDHomeRun Tuners
                              Allowed: pfBLockerNG, DNS, Plex players to Plex on unraid, piCorePlayer to LMS on unraid, Internet
                              Blocked: Firewall & Internal communication.

                              Vlan5: Work
                              Work laptop, (2) VOIPs
                              Allowed: pfBLockerNG, DNS, Internet
                              Blocked: Firewall & Internal communication.

                              Vlan8: Wireless
                              (2) Iphones
                              Allowed: pfBLockerNG, DNS, Internet
                              Blocked: Firewall & Internal communication.

                              Vlan9: Guest Wireless
                              (2) Chrome books, (2) iphones, (2) kindles, PicorePlayer, roku, PC
                              Allowed: pfBLockerNG, DNS, Internet
                              Blocked: Firewall & Internal communication.

                              Equipment:
                              Pfsense box: HP Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz, 16 gigs of ram, HP 4 port ethernet card - Packages running: aprwatch, iperf, nmap, ntopng, pfBlockerNG, RRD_Summary, Status_Traffic_Totals, Telegraf

                              Access Point: Netgear R7800 running Openwrt

                              Switches: TP-Link TL-SG1024DE, (2) TP-Link TL-SG108PE

                              Server: ASRock X99 Extreme3, CPU 2GHz 12 cores(24 HT), 32gigs ram
                              Unraid
                              Parity Drive: 4tb
                              15TB HD Space
                              Cache Drive for Dockers
                              Unassigned drive for VMs (Windows, Hassio, Linux)

                              Things still testing:
                              Iphone control while on Vlan8 to items in Vlan3(plex), Vlan4(Receiver, PiCorePlayers, Shields, Roku).

                              Verify anything in Vlans 3+ can't get to pfsense box, switches, APs, Server.

                              I am sure I am forgetting something.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.