Martin - SNBuser
Regular Contributor
Hi all
I don't have too much experience with vlan and iptables, so please bear on with me (I tried to search in the older posts, but found it to be difficult to find exactly the answers I've been thinking about). I'm running asuswrt-merlin on Asus RT-AC87U (with entware installed). First, I wish to understand and therefore I have some questions:
Please point me in the right direction, thanks!
I don't have too much experience with vlan and iptables, so please bear on with me (I tried to search in the older posts, but found it to be difficult to find exactly the answers I've been thinking about). I'm running asuswrt-merlin on Asus RT-AC87U (with entware installed). First, I wish to understand and therefore I have some questions:
- When I change something in the webgui 192.168.1.1, the router automatically changes IPtables, right (e.g. add new wireless channel)? If I then log in with SSH and change iptables-routes, does the webgui gets confused? When is it recommended to use webgui and when is it a good idea to log in with ssh/telnet and manually modify iptables-rules?
- Why are there so many default iptables-rules? At least I don't completely understand them...
- When should I use commands such as robocfg and nvram? I'm a little confused about when it's advisable to use this instead of what can be done through the webgui...?
- Is there only 1 log-file for the iptables-rules or are there several log-files to look into?
- In addition to my RT-AC87U router which takes care of wireless clients, I have a managed switch for wired clients (but I haven't used the managed features yet, however I know it can also do something with VLANs). I'm very confused about VLAN's, I mean: If I setup something about VLAN in the router should I then also make the same changes in the managed switch? This confuses me a lot...
- I wish to setup a VLAN for trusted MAC-addresses (we could maybe call this an administration VLAN). This VLAN should have access to my router at 192.168.1.1 - as the only VLAN - the other VLANs should not be able to access my router.
- Then I wish to have a VLAN for known MAC-addresses where the connected devices should not be able to see each other, but just be able to connect to the internet through the router (it means if there's a security problem with one of the devices, it's not a problem as they have no access to any other machine).
- Finally I wish to have a guest VLAN for unknown MAC-addresses ("guests"). These clients should be able to see each other but no machines on the other VLANs.
Please point me in the right direction, thanks!