CornfieldWin
Occasional Visitor
I have two prototype Guest Pro vlans, one for cafe style login and one for IOT use case, set up on my AX88U Pro with Merlin 3006.102.5 (autoupdate) and likewise the bulk of AMTM scripts and services including unbound, YaxDHCP, Diversion, and Skynet , and others for curiosity. Very nice, will stay away from OPsense, Promox and fancy home lab stuff for now. Long run I only want to support far more IOT devices than is good for me and a robust media and NAS capability. An immediate goals is to take IP control over the 53 devices I already have through manual DHCP assignments. Eventually I will back haul to my currently mothballed GS-AX5400 (lan to wan or lan to lan) which may take on main IOT role, and do away with relying on Vlans for that use case(s). Maybe. My current problems appear to be with dnsmasq interaction with unbound. I found dnsmasq instances hanging out on every conceivable Port 53 network setting and unbound on the host network Port 53535 like this:
netstat -tulpn |grep :53
netstat: showingonly processes with your user ID
tcp 0 0 127.0.0.1:53535 0.0.0.0:* LISTEN 11988/unbound
tcp 0 0 192.168.53.1:53 0.0.0.0:* LISTEN 21828/dnsmasq
tcp 0 0 192.168.52.1:53 0.0.0.0:* LISTEN 21820/dnsmasq
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 21811/dnsmasq
tcp 0 0 72.230.103.33:53 0.0.0.0:* LISTEN 21811/dnsmasq
tcp 0 0 192.168.1.1:53 0.0.0.0:* LISTEN 21811/dnsmasq
udp 0 0 192.168.53.1:53 0.0.0.0:* 21828/dnsmasq
udp 0 0 192.168.52.1:53 0.0.0.0:* 21820/dnsmasq
udp 0 0 127.0.0.1:53 0.0.0.0:* 21811/dnsmasq
udp 0 0 72.230.103.33:53 0.0.0.0:* 21811/dnsmasq
udp 0 0 192.168.1.1:53 0.0.0.0:* 21811/dnsmasq
udp 0 0 0.0.0.0:5353 0.0.0.0:* 13187/avahi-daemon:
udp 0 0 127.0.0.1:53535 0.0.0.0:* 11988/unbound
So the multiple dnsmasq individual instances are first up for normal DNS requests, but they aren't all following the same configuration rules. I believe unbound may make back references to some them on the main LAN (how to avoid circularity?). By main LAN I mean the main host bridge. Both vlans are running YazDHCPifized dnsmaq and I found all three configuration scripts. Access to main network only is enabled for the vlans, DNS set on each Vlan to gateway subnet address followed by secondary router address.
I can ping successfully resolving local and internet names from a client on the main LAN and through SSH, but on a Vlan I can only ping the router name and the Internet while also being unable SSH in on a Vlan. Local names on the vlan don't work either even for its own Vlan DHCP settings. How to handle Vlan domains is an open question - subdomains or don't bother? I know that dnsmasq and unbound have an entangled relationship but google searches and the dreaded google AI advice create much confusion how to get them to play nicer together with Guest Pro style Vlans. Do I need forward zones and listener ports to make them aware of each other (not the Vlans directly seeing each other but they do share the access to the main network)? Maybe Iptables updates (genuflect and rub those beads!)? Something else (perfer config files over scripts in general)?
Thanks.
netstat -tulpn |grep :53
netstat: showingonly processes with your user ID
tcp 0 0 127.0.0.1:53535 0.0.0.0:* LISTEN 11988/unbound
tcp 0 0 192.168.53.1:53 0.0.0.0:* LISTEN 21828/dnsmasq
tcp 0 0 192.168.52.1:53 0.0.0.0:* LISTEN 21820/dnsmasq
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 21811/dnsmasq
tcp 0 0 72.230.103.33:53 0.0.0.0:* LISTEN 21811/dnsmasq
tcp 0 0 192.168.1.1:53 0.0.0.0:* LISTEN 21811/dnsmasq
udp 0 0 192.168.53.1:53 0.0.0.0:* 21828/dnsmasq
udp 0 0 192.168.52.1:53 0.0.0.0:* 21820/dnsmasq
udp 0 0 127.0.0.1:53 0.0.0.0:* 21811/dnsmasq
udp 0 0 72.230.103.33:53 0.0.0.0:* 21811/dnsmasq
udp 0 0 192.168.1.1:53 0.0.0.0:* 21811/dnsmasq
udp 0 0 0.0.0.0:5353 0.0.0.0:* 13187/avahi-daemon:
udp 0 0 127.0.0.1:53535 0.0.0.0:* 11988/unbound
So the multiple dnsmasq individual instances are first up for normal DNS requests, but they aren't all following the same configuration rules. I believe unbound may make back references to some them on the main LAN (how to avoid circularity?). By main LAN I mean the main host bridge. Both vlans are running YazDHCPifized dnsmaq and I found all three configuration scripts. Access to main network only is enabled for the vlans, DNS set on each Vlan to gateway subnet address followed by secondary router address.
I can ping successfully resolving local and internet names from a client on the main LAN and through SSH, but on a Vlan I can only ping the router name and the Internet while also being unable SSH in on a Vlan. Local names on the vlan don't work either even for its own Vlan DHCP settings. How to handle Vlan domains is an open question - subdomains or don't bother? I know that dnsmasq and unbound have an entangled relationship but google searches and the dreaded google AI advice create much confusion how to get them to play nicer together with Guest Pro style Vlans. Do I need forward zones and listener ports to make them aware of each other (not the Vlans directly seeing each other but they do share the access to the main network)? Maybe Iptables updates (genuflect and rub those beads!)? Something else (perfer config files over scripts in general)?
Thanks.