Hi,
PBIX, your explanation was very handy to me. Thanks.
I managed to configure isolation of
guest network on my router: WNDR3700 (v1) from: 2.4GHz WLAN, 5GHz WLAN and LAN by using these ebtables entries:
Code: Select all
#Add the below lines to isolate the guest wifi from your LAN.
ebtables -I FORWARD -i wlan0-1 -o wlan0 -j DROP
ebtables -I FORWARD -i wlan0-1 -o wlan1 -j DROP
ebtables -I FORWARD -i wlan0-1 -o eth0.1 -j DROP
Like in previous posts it needs to be configured in this file:
Code: Select all
/usr/lib/gargoyle_firewall_util/gargoyle_firewall_util.sh
There are however two things I noticed which could be worth mentioning:
1. Every time the firewall is restarted this file:
Code: Select all
/usr/lib/gargoyle_firewall_util/gargoyle_firewall_util.sh
it is executed again and then above 3 rules are added to ebtables again while old ones are stil there. It means that ebtables keeps on growing with duplicated entries.
It's not that bad, the solution still works and 'resets' back to 3 rules after a router restarts. It's just not too clean.
2. If you have openvpn configured, then the clients in isolated network can still see other clients connected through VPN.
I tried using firewall to configure additional zone for isolated wlan and denying access to vpn zone, but I had no luck with that approach. Maybe someone else has a better idea how to do it?
I tried to use this code to block forwarding from
guest wlan to VPN, (but this approach did not work)
Code: Select all
config zone
option name 'wlan_guest_zone'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
option device 'wlan0-1'
config rule
option name 'Deny-Wlan-VPN-Input'
option src 'wlan_guest_zone'
option dst 'vpn'
option target 'DROP'
Source:
http://wiki.openwrt.org/doc/uci/firewall