This guest network situation has been bugging me for quite some time, esp. since ASUS made some changes to (presumably) accommodate AiMesh. FWIW, here's what I'm seeing on my ASUS RT-AC68U. Since that's the only router I have at the moment, I can't say for sure if this applies across all ASUS routers.
To keep things simple, I'm only going to refer to the 2.4GHz range at the moment. And besides, whatever I have to say about the 2.4GHz range applies similarly to the 5GHz range. They're basically a mirror image of each other.
If I enabled Guest #1 on 2.4GHz, and intranet access is disabled, I get an error message in response to the wifi connection attempt of "incorrect password". Of course, it *is* correct, but the router is purposely denying me access. It will only permit access to Guest #1 if I also enable intranet access.
And w/ Guest #1 configured as above (intranet disabled), here's the dump of the bridging table and ifconfig for br1 (192.168.101.x).
Code:
admin@lab-merlin1:/tmp/home/root# brctl show
bridge name bridge id STP enabled interfaces
br0 8000.1cb72ccb0960 yes vlan1
eth1
eth2
br1 8000.1cb72ccb0961 yes wl0.1
eth0.501
eth1.501
eth2.501
admin@lab-merlin1:/tmp/home/root# ifconfig br1
br1 Link encap:Ethernet HWaddr 1C:B7:2C:CB:09:61
inet addr:192.168.101.1 Bcast:192.168.101.255 Mask:255.255.255.0
UP BROADCAST RUNNING ALLMULTI MULTICAST MTU:1500 Metric:1
RX packets:225 errors:0 dropped:0 overruns:0 frame:0
TX packets:264 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:10350 (10.1 KiB) TX bytes:16384 (16.0 KiB)
Notice the the VAP (virtual AP) for Guest #1 (wl0.1) is assigned to the br1 bridge, which is configured w/ 192.168.101.x. And there are several other network interfaces assigned to that same bridge, presumably related to AiMesh.
Clearly the router is purposely locking me out under these conditions w/ some bogus error condition (which in and of itself is very confusing).
If I then enable intranet access on Guest #1, I get connected, no problem. And here's the dump of the bridging table and ifconfig for br1 again.
Code:
admin@lab-merlin1:/tmp/home/root# brctl show
bridge name bridge id STP enabled interfaces
br0 8000.1cb72ccb0960 yes vlan1
eth1
eth2
wl0.1
admin@lab-merlin1:/tmp/home/root# ifconfig br1
ifconfig: br1: error fetching interface information: Device not found
Guest #1's VAP (wl0.1) is bound to the private network (br0), and sure enough I get assigned an IP from the private network (192.168.1.x). And I have access to resources on the private network. And the br1 bridge and 192.168.101.x network vanish.
At no time do I ever receive an IP from the br1 bridge and its 192.168.101.x network. If I get connected at all, I *always* receive an IP from the private network. The same goes for Guest #2 and Guest #3. I can choose to have intranet access enabled or disabled (and both work as expected), and I'm assigned an IP from the private network (192.168.1.x), since those VAPs (wl0.2 and wl0.3) are also bridged to br0.
Code:
admin@lab-merlin1:/tmp/home/root# brctl show
bridge name bridge id STP enabled interfaces
br0 8000.1cb72ccb0960 yes vlan1
eth1
eth2
wl0.1
wl0.2
wl0.3
Note, I never get an incorrect password message w/ Guest #2 or Guest #3. This is strictly an issue w/ Guest #1. If I follow the same steps w/ the 5GHz band, it's exactly the same results, except the relevant bridge is br2, and the network is 192.168.102.x. But the behaviors are exactly the same.
So what's it all mean?
Presumably ASUS has mucked w/ Guest #1 for the benefit of AiMesh. And it's best that you avoid it, since to even use it requires you enable intranet access. I suppose if you have a situation where you want that type of access, it'll work. But for most ppl, Guest #1 is, for all intents and purposes, off limits for anyone but AiMesh users. Stay away from it and you'll be a happy camper.
And for anyone who was under the impression that ASUS was providing isolation at the ethernet/IP level because of these 192.168.101.x and 192.168.102.x networks, that's not happenin'. At least not on my RT-AC68U, and normal AP access. I can only assume disabling of intranet access on Guest #2 and Guest #3 is implemented using a layer 2 firewall (e.g., ebtables). And I personally don't like that approach. With intranet access disabled, it still allows network discovery of (if not necessarily access to) resources on the private network. I would have much preferred the 192.168.101.x and 192.168.102.x networks be used for guests, thus providing isolation at both the ethernet and IP levels. To mind, this is a noteworthy disadvantage when it comes to ASUS guest networks, which has now been compounded further by all this messing w/ Guest #1. Ugg.
Again, it's entirely possible other ASUS hardware behaves differently from my RT-AC68U. But my primary interest was finally getting to the bottom of these 192.168.101.x and 192.168.102.x networks. I think you can safely ignore them unless you're dealing w/ them from the perspective of AiMesh (I don't use it, so I can only speculate as to their usage). But it sure appears to me that br1/192.168.101.x and br2/192.168.102.x are AiMesh guest networks given they are otherwise inaccessible.
I'd be interested if other users w/ other hardware are seeing anything different in terms of guest networking behavior.