FernandoF
Regular Contributor
With the introduction of firmware 3006.102.x, many of us have been trying to understand what Guest Network Pro can and cannot do. In my particular case, the requirements for visitors using the guest network are the following:
Despite my inexperience, after lots of reading and experimentation, I believe I’ve finally succeeded to replicate that behavior with 3006.102.4, which I’d like to share in case anybody has a similar use case. The starting point is a Customized Guest Network Pro with
I hope this may help others (please adjust the subnet and guest network ID appropriately). I realize this approach may not be as tight as fully segregating the guest network with a different VLAN, but I still feel it's probably good enough.
Any comments or results will be greatly appreciated. Thanks in advance!
- Devices must use the same subnet as the main network
- Devices must be able to access the internet
- Devices must not be able to access the intranet
Access Intranet
disabled. With 3006.102.x, however, that doesn’t seem to be possible.Despite my inexperience, after lots of reading and experimentation, I believe I’ve finally succeeded to replicate that behavior with 3006.102.4, which I’d like to share in case anybody has a similar use case. The starting point is a Customized Guest Network Pro with
Use same subnet as main network
enabled. I also have Set AP isolated
enabled, although I suspect that setting is not doing anything. Then I had to manually (or using a script) set 4 "ebtables" firewall rules:
Code:
ebtables -t broute -A BROUTING -p IPv4 -i wl0.1 --ip-dst 192.168.50.1 --ip-proto udp --ip-dport 53 -j ACCEPT # Allows connections with udp protocol from the guest network to the router, via port 53, for DNS queries
ebtables -t broute -A BROUTING -p IPv4 -i wl0.1 --ip-dst 192.168.50.0/24 -j DROP # Blocks connections with all other protocols from the guest network to the local network (intranet)
ebtables -A FORWARD -i wl0.1 -j DROP # Blocks outgoing packets from the guest network
ebtables -A FORWARD -o wl0.1 -j DROP # Blocks incoming packets to the guest network
service restart_firewall # Restarts the firewall
I hope this may help others (please adjust the subnet and guest network ID appropriately). I realize this approach may not be as tight as fully segregating the guest network with a different VLAN, but I still feel it's probably good enough.
Any comments or results will be greatly appreciated. Thanks in advance!