Hello all!
I'm using an RT-AC86U with Merlin and I would like to have three different wireless networks (all with different SSIDs and passwords): one for trusted devices, one for guests, and one for IoT devices. On the guest and IoT networks, I want all devices to be isolated.
At this point, using the "Guest Network" feature in the GUI has me all set! However, I have a few additional requirements...
1. I would like devices on the trusted subnet to be able to connect to devices on the IoT subnet.
2. I would like devices on the guest subnet to connect to a server I'm hosting on the trusted subnet. (Port forward?)
And a few strech-goal requirements:
3. I would like to have guest devices be able to connect to a single device on the IoT subnet. (a chromecast with a static ip)
4. I would like to be able to enforce firewall rules on the IoT subnet to prevent them from connecting to there respective services when possible. (I know I have to be careful with this as some IoT devices will throw a fit if they can't phone home)
5. I would like to utilize any bonus security features to strictly lock down the guest and IoT subnet (IDS, etc.).
I tried to figure this out myself by trying to figure out what exactly is getting set up by the "guest network" gui feature. I see that it creates a new br interface, as well as a bunch of ethX.0 and ethX.501 interfaces that connect to the trusted bridge and the guest bridge respectively. I don't see via "brctl", "ip", "iptables", "ebtables" commands how it is enforcing isolation between clients on that interface, so now I'm stuck reverse engineering how the guest networks are set up. I also don't understand why there is still just one wl interface (wl0.1). I would expect there to be two wl interfaces for the two different SSIDs?
Also, based on the "ethX.501" naming convention, am I understanding correctly that this is a "Tagged VLAN" sort of network setup? I'm a total rookie with this sort of stuff, so I'd appreciate any lessons/info/reading anyone can give or point me to!
Lastly, in absence of any other suggestions, I was going to somewhat follow this dude's procedure (https://wu.renjie.im/blog/network/ax88u-vlan/) to set up VLANs via iptables. I am somewhat comfortable with iptables, so that seemed like an accessible type of solution.
I'm using an RT-AC86U with Merlin and I would like to have three different wireless networks (all with different SSIDs and passwords): one for trusted devices, one for guests, and one for IoT devices. On the guest and IoT networks, I want all devices to be isolated.
At this point, using the "Guest Network" feature in the GUI has me all set! However, I have a few additional requirements...
1. I would like devices on the trusted subnet to be able to connect to devices on the IoT subnet.
2. I would like devices on the guest subnet to connect to a server I'm hosting on the trusted subnet. (Port forward?)
And a few strech-goal requirements:
3. I would like to have guest devices be able to connect to a single device on the IoT subnet. (a chromecast with a static ip)
4. I would like to be able to enforce firewall rules on the IoT subnet to prevent them from connecting to there respective services when possible. (I know I have to be careful with this as some IoT devices will throw a fit if they can't phone home)
5. I would like to utilize any bonus security features to strictly lock down the guest and IoT subnet (IDS, etc.).
I tried to figure this out myself by trying to figure out what exactly is getting set up by the "guest network" gui feature. I see that it creates a new br interface, as well as a bunch of ethX.0 and ethX.501 interfaces that connect to the trusted bridge and the guest bridge respectively. I don't see via "brctl", "ip", "iptables", "ebtables" commands how it is enforcing isolation between clients on that interface, so now I'm stuck reverse engineering how the guest networks are set up. I also don't understand why there is still just one wl interface (wl0.1). I would expect there to be two wl interfaces for the two different SSIDs?
Also, based on the "ethX.501" naming convention, am I understanding correctly that this is a "Tagged VLAN" sort of network setup? I'm a total rookie with this sort of stuff, so I'd appreciate any lessons/info/reading anyone can give or point me to!
Lastly, in absence of any other suggestions, I was going to somewhat follow this dude's procedure (https://wu.renjie.im/blog/network/ax88u-vlan/) to set up VLANs via iptables. I am somewhat comfortable with iptables, so that seemed like an accessible type of solution.