Christian_Haitian
Occasional Visitor
Thank you for the recommendation. I tried adding this firewall rule but it made no difference for my issue. Should I remove the previous rules first to ensure that those are not possibly interfering with this rule?This has been dug into in-depth in other threads, but here's the gist:
Guest Network Pro/Smart Home Master are for creating wireless VLANs (meaning you can only add wireless clients to a VLAN). Pro-series routers generally also support wired VLANs (meaning you can also add wired clients to a VLAN). Depending on your setup you may have AiMesh nodes that support wireless VLANs but not wired VLANs (my setup is like this), but the lack of wired VLAN support on an AiMesh node has nothing to do with wired clients being able to talk to wireless VLAN clients via a firewall rule: if there is a firewall rule that allows traffic from the main network into a VLAN it shouldn't matter if a given main network client is connected to the main router or a node.
iptables -I FORWARD -i br0 -s 192.168.1.0/24 -d 192.168.53.0/24 -j ACCEPT
Above is the rule I use in the firewall-start script to allow anything on the main network to initiate a connection to anything on the IoT VLAN I created in Guest Network Pro. Try something simple like that and see if it solves the problem.
The previous rules are as follows
iptables -I FORWARD -i br0 -o br1 -j ACCEPT
iptables -I FORWARD -i br1 -o br0 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -I FORWARD -i br0 -o br2 -j ACCEPT
iptables -I FORWARD -i br2 -o br0 -m state --state ESTABLISHED,RELATED -j ACCEPT