bengalih
Senior Member
I just spend this evening reloading my RT-AC68U with the latest firmware (384.13).
Decided to try to setup my guest networks again as I had issues last time I attempted this because I don't use the built-in DHCP server for my LAN, but rather a server on my internal network. This caused issues because the client's on my guest SSID(s) were not able to get IP addresses.
After tinkering around through various posts and configurations here I was able to create a proper dnsmasq.postconf file which allows my two guest networks to get DHCP from the local dnsmasq server to get Internet access while still being blocked from my local LAN.
However, I am unable to use NAT loopback on those devices to allow me access to my internal servers using my public IP. For instance, I have several NAT mappings such as:
myserver.mydomain.com:12345 > 10.10.10.102:8000
On my internal LAN network (10.10.10.0/24) I am able to access this box using either of the above addresses. I tend to use the public IP via myserver.mydomain.com since NAT loopback works great on my internal LAN and I can more easily use/remember this even when remote.
However, when I attempt to access this server via my guest wifi I am not able to reach it. Obviously I wouldn't expect to be able to get it via the local 10.10.10.102 address, as I turned off Intranet access from these networks.
However, because the NAT loopback isn't working/configured appropriately I am unable to reach it even using the public address. I am hoping there is a way to fix/disable NAT loopback on these guest networks so devices on them can at least access my internal servers - at least by going out, and then back in again over the WAN interface.
In addition to the proper DHCP configuration for the guest wifi networks, the hardest part to figure out was the iptables/ebtable rules which ended up looking something like this (for my wl0.1 guest wifi):
I can provide more in-depth iptables configuration if needed, but everything else should be default apart from what I have configured for my various port-forwards and the above rules needed for the guest wifi.
Do I have any options to allow the devices on my guest wifi networks to access my servers via public interface while still restricting them from access the local intranet?
Decided to try to setup my guest networks again as I had issues last time I attempted this because I don't use the built-in DHCP server for my LAN, but rather a server on my internal network. This caused issues because the client's on my guest SSID(s) were not able to get IP addresses.
After tinkering around through various posts and configurations here I was able to create a proper dnsmasq.postconf file which allows my two guest networks to get DHCP from the local dnsmasq server to get Internet access while still being blocked from my local LAN.
However, I am unable to use NAT loopback on those devices to allow me access to my internal servers using my public IP. For instance, I have several NAT mappings such as:
myserver.mydomain.com:12345 > 10.10.10.102:8000
On my internal LAN network (10.10.10.0/24) I am able to access this box using either of the above addresses. I tend to use the public IP via myserver.mydomain.com since NAT loopback works great on my internal LAN and I can more easily use/remember this even when remote.
However, when I attempt to access this server via my guest wifi I am not able to reach it. Obviously I wouldn't expect to be able to get it via the local 10.10.10.102 address, as I turned off Intranet access from these networks.
However, because the NAT loopback isn't working/configured appropriately I am unable to reach it even using the public address. I am hoping there is a way to fix/disable NAT loopback on these guest networks so devices on them can at least access my internal servers - at least by going out, and then back in again over the WAN interface.
In addition to the proper DHCP configuration for the guest wifi networks, the hardest part to figure out was the iptables/ebtable rules which ended up looking something like this (for my wl0.1 guest wifi):
Code:
/usr/sbin/ebtables -t broute -I BROUTING -p arp -i wl0.1 -j DROP
/usr/sbin/ebtables -t broute -I BROUTING -p ipv4 -i wl0.1 -j DROP
/usr/sbin/ebtables -t broute -I BROUTING -p ipv6 -i wl0.1 -j DROP
/usr/sbin/iptables -I FORWARD -i wl0.1 -j ACCEPT
/usr/sbin/iptables -I FORWARD -i wl0.1 -d 10.10.10.1/24 -j DROP
/usr/sbin/iptables -I INPUT -i wl0.1 -j ACCEPT
/usr/sbin/iptables -I INPUT -i wl0.1 -d 10.10.10.1/24 -j DROP
I can provide more in-depth iptables configuration if needed, but everything else should be default apart from what I have configured for my various port-forwards and the above rules needed for the guest wifi.
Do I have any options to allow the devices on my guest wifi networks to access my servers via public interface while still restricting them from access the local intranet?