Although I do realize you’re joking, I took it as a hint that the PSK example should be clearer that it is an example and not passphrase selection advice to be taken literally. It’s there because I don’t want the opposite misunderstanding to occur by implication: that the guest network should have no PSK at all.
I think even Quickset allows it
Why, so it does! I didn’t even think to try returning to QS, risking my other custom configuration being overwritten/erased.
I considered relying on my backups to try this out, but then I recalled that I’ve got a hAP ax lite on the shelf waiting for a job to do, so I pulled it down and applied that setting. I got this essential difference:
/interface wifi add … master-interface=wifi1 name=wifi2 …
/interface bridge filter add action=drop chain=forward in-interface=wifi2
/interface bridge filter add action=drop chain=forward out-interface=wifi2
/interface bridge port add bridge=bridge interface=wifi2
I was briefly confused by the use of bridge filters in the “forward” chain and IP filters, but what I think this says is that guest network hosts aren’t allowed to interact with anyone else on the bridge, but implicitly, IP traffic might be forwarded away via NAT. Is that correct?
Anyone care to weigh in on the pros and cons of these two approaches?
If this one does what I think it does, it’s probably more efficient, but I’m not certain it’s as secure. If nothing else, I find my configuration clearer, and one of the biggest enemies of security is an obscure configuration, leaving you unable to reason about it properly.
If however your main router is another device, it can become rather complicated to achieve the same if you’re not using VLAN.
I understand your point, but @bpwl’s idea about tunnels gets us past this obstacle, too. I’ve updated the article to mention this restriction and solution, so thank you for thinking of it. The article is now stronger for it.
And for future expansion
One AP covers my domicile adequately, and I have no plans for adding rooms.
If I did put in other APs to cover the corners better, the guest network would remain on the central AP only. I have no problem restricting guests wanting high bandwidth to the living room and IoT devices to the central AP’s range. Bandwidth does drop off at the edges, but with this router’s strong 802.11ax-1800 radios, it doesn’t drop below my Internet downlink speed until you get into the corners of the house. Even that isn’t a problem when we’re talking about things like smart power plugs, where even all the overhead of TCP/IP + TLS + HTTP + JSON can’t turn the device’s core changeable state — a one-bit on/off value — into more than a few kB per day.