I am new to RoS and networking but not to computers. I own a rb4011 and uploaded a script to have the following services at home: ipTV, voIP and Internet. All of them are working but I need to customize my network.
I get a public dynamic address from the telecom company. I have 1 lan. I have 1 bridge (includes ether2 till ether10). In ether10 I connect my AP ACLite.
I want to isolate ether10 (ACLite) from my lan. What is the best approach to do it?
Post full configuration as shown by running command /export hide-sensitive from a terminal window … when posting config, put it into [__code] .. [/__code] environment. Combined that with the network schematics we might have an idea or two.
Nothing much points out to me as wrong in your configuration. One thing, that might affect how things behave: LAN2 IP address should be bount do interface bridge2 - now it’s bound to it’s slave interface ether10.
Im’ not sure you really need these set to yes:
/interface bridge settings
set use-ip-firewall=yes use-ip-firewall-for-pppoe=yes use-ip-firewall-for-vlan=yes
They only work if intra-LAN traffic passes bridge … which in your layout might if ACLite sends traffic between wireless clients to the main router instead of forwarding it locally. You don’t need those settings if traffic between different subnets has to pass router’s IP interface … The way things are configured now, you don’t need
As they say, there are many ways to skin the sheep … many forum users will argue that firewall filter rules as configured now are sub-optimal (myself included). The example rules I wrote above are supplementing what is currently configured …
LAN2 IP address should be bount do interface bridge2 - now it’s bound to it’s slave interface ether10.
and
If you want to block traffic between LAN and LAN2, you need a pair of firewall rules similar to this:
C
I rechecked and the rule was working as intended.
But I checked the setup of the Ubiquity AP and it was not correct. It was assigning to the connected devices IP´s in the range 172.16.24.xx BUT the AP itself was connected to 192.168.1.1. Once I tried to modified that in the Ubiquity software I was not allowed and the AP inmmediatly lost connection.
So I am now back to the original setup: 1 wan, 1bridge (ether2 till ether10), 1lan (192.168.1.0/24), 1 ip pool (192.168.1.210-250), AP connected to ether10.
Now that I can start from scratch, how would you recommend to design it in the optimal way? I want to isolate:
1)all the devices connected to the AP from a) each other and b) from the rest of the lan
2)some devices of the lan from the rest of the devices of the lan
Then I would like to create a vpn to connect to some devices in my lan from windows devices/android.
I use vlans for all subnets.
By their nature all vlans do not talk on layer 2
Thus all I do in the forward chain is state what I wish to allow, ie LAN to WAN for whatever vlans,
then Drop ALL as the last rule which kills any L3 routing between the vlans.
Done!
Forget VLANs. They are great when you want to have multiple separate networks on one cable, but you also need either a managed switch or end device (server) specifically configured for VLAN.
In your case, simply split router’s switch into separae ports and assign a subnet to each one. Then use firewall to allow traffic from each LAN to internet and block the rest, i.e. communucation between LANs
After further looking into the options of RoS and the rb4011, I found “switch”. In the case of the rb4011 it has 2 switches and each 5 ports assigned. There is an option called “port isolation” which allows to forward a port to any of the other ports or switches (not bridges).
How can I “split router’s switch into separate ports and assign a subnet to each one”? After further reading this post, he mentions:
Thank you so much for your reply. Today I have been working with different subnets and for now it seems to work somehow.
ETH1=WAN (Address: Public Static IP)
ETH2=LAN (Address: 192.168.1.1/24 Network: 192.168.1.0 Subnet: 255.255.255.0)
ETH3=DISABLED
ETH4=DISABLED
ETH5=SERVER (Address 192.168.5.1/30 Network: 192.168.5.0 Subnet: 255.255.255.252)
All ETH ports are not linked and only acting as stand-alone ports.
Since I have bridge1 configured (includes ether2-ether10), should I create a new bridge2 and assign eth10 for my AP or just take eth10 out of bridge1? How can I make eth10 to be a stand alone port?
Still a bit confused which way to go.
EDIT1: also, can I run only VLANS using my rb4011 without using a switch?
No, you don’t need anything special to set-up VLANs on RB4011, they are dealt by router’s CPU. The price for that functionality is performance hit for traffic between different ethernet ports carrying same VLAN, which would be carried by switch chip if switch chip was at least half-decent. In your case with single ether port dedicated for second LAN performance won’t degrade (all traffic will have to pass CPU anyways), but makes use of VLANs just for subnet separation meaningless.
N.b.: using VLANs seem to be answer to all questions for my buddy @anav
My guess is that you actually were on the right track, I just don’t understand details of the problem you described with the following paragraph:
But I checked the setup of the Ubiquity AP and it was not correct. It was assigning to the connected devices IP´s in the range 172.16.24.xx > BUT the AP itself was connected to 192.168.1.1> . Once I tried to modified that in the Ubiquity software I was not allowed and the AP inmmediatly lost connection.
I must misunderstanding some basics. I have everything up and running except isolating the traffic from the clients connected to the Access Point from the rest of the LAN. Basically (and not taking vlans into account ) I want to learn how to isolate some clients from others. I know there are several ways of doing it but I need to understand the basics. Let me explain what I tried so far:
I created bridge-ISP (includes all ether ports).
I connected to ether10 the access point. I configured the AP to have a static Ip (192.168.1.45).
I created 1 dhcp server in bridge-isp:
“dhcp1_LAN” and it uses “pool1_LAN (192.168.1.70-192.168.1.80)”.
I created another pool for guests using wifi (dhcp_pool2_guests) us.ing 192.168.1.229-192.168.1.249
When I tried to create a 2nd dhcp server to assign “dhcp_pool2_guests” it tells me I can´t create it on bridge-isp neither on ether10 (since it is a slave of brigde-isp).
How can I do it?
I wanted then to create in Firewall>address list a “guests list” (with users onlyusing the ip pool of the access point).
Sigh… one can lead a horse to water… A ‘sob’ story for sure!!
I started off using bridges and quickly discovered that one was limited in that the bridge could only be assigned one subnet.
In addition one starts loading the bridge to do everything and it just gets in the way in the long run.
Assign your vlans to the bridge, assign subnets to the vlans (with the required dhcp pools etc) and then all you need is firewall rules that are appropriate.
{forward chain}
the default rules (established related, ipsec if you need it, drop invalid traffic)
then add L3 rules where you want traffic flow examples are vlan to wan traffic, adminpc to vlans so that you can administer the Access points, etc.
Last rule should be drop all other traffic to curtail any L3 connectivity between vlans etc…
Anav, I tried to config the vlans. I did not post it before because I realised today that they did not work due to the lack proper firewall rules. I even tested yesterday a TP-SG108PE I had around.
I had to ask … but I thought that would be the answer.
I have already 3 vlans running on ether1(WAN): each one for IPTV, VOIP and Internet (PPPoe on vlan6).
Can I still create the new vlans on the bridge (instead of ether1)?
I have my internet coming in on vlanxx on my ether1 (bell fiber). IT HAS NOTHING TO DO WITH MY BRIDGES OR VLANS ON MY NETWORK.
You may have a more complicated setup?