I'm running Asuswrt-Merlin 380.57 and I want to allow users in the wireless guest network (wl0.1), which is not allowed access to the intranet, to access the DNS server on the intranet. It appears that segregation of the wireless guest network is done by ebtables rules:
Bridge chain: FORWARD, entries: 2, policy: ACCEPT
-i wl0.1 -j DROP
-o wl0.1 -j DROP
Therefore, I tried adding ebtables ALLOW rules at the top of the FORWARD chain of the filter table to allow traffic to and from the appropriate protocol/IP/port since it was clear by looking at the counts that the above rules were doing the blocking. (Note: there is also an entry in the BROUTING chain of the broute table but according to the counts, the traffic isn't making it to that table.) I then realized that I needed to allow ARP packets accross the bridge for the segregated interfaces (I'm used to iptables, not ebtables). However, once I did that (before I added the custom rules described above for the DNS traffic), it appears that all traffic to/from the wireless guest network was allowed on the intranet. I don't understand why this is happening. The DROP rules from above are still in place it's just that I added two rules above them to allow ARP to and from wl0.1. Shouldn't non-ARP traffic from wl0.1 to/from the intranet still be blocked?
Any insight is appreciated.
Thanks!
Bridge chain: FORWARD, entries: 2, policy: ACCEPT
-i wl0.1 -j DROP
-o wl0.1 -j DROP
Therefore, I tried adding ebtables ALLOW rules at the top of the FORWARD chain of the filter table to allow traffic to and from the appropriate protocol/IP/port since it was clear by looking at the counts that the above rules were doing the blocking. (Note: there is also an entry in the BROUTING chain of the broute table but according to the counts, the traffic isn't making it to that table.) I then realized that I needed to allow ARP packets accross the bridge for the segregated interfaces (I'm used to iptables, not ebtables). However, once I did that (before I added the custom rules described above for the DNS traffic), it appears that all traffic to/from the wireless guest network was allowed on the intranet. I don't understand why this is happening. The DROP rules from above are still in place it's just that I added two rules above them to allow ARP to and from wl0.1. Shouldn't non-ARP traffic from wl0.1 to/from the intranet still be blocked?
Any insight is appreciated.
Thanks!