The "problem" created in the 386 builds is that Asus changed the behavior of the GUI settings.what about the gui settings? And so i guess a minor issues then.
You are a smart cookie @john9527 and you excel also in perseverance. Is the whole function closed source or did Asus make some parts of the source code available for the guest network?I found where it's being forced!!!! (Well, pretty sure )
Will have a new test build for you in about an hour.....
The "problem" created in the 386 builds is that Asus changed the behavior of the GUI settings.
So in a 386 build, if you select "Access Intranet" = "Disable" and click "Apply", the Guest Network function turns on AP isolation and also updates routing. If "Access Intranet" = "Enable" then AP Isolation is off but your guest network devices now have full run of your LAN.
View attachment 28601
What is wanted is a setting as in the 384 builds where the devices on the guest network can communicate with other devices on that guest network, but cannot access the LAN. The workaround is to set "Access Intranet" = "Disable" and then manually set the AP isolation parameter = 0. That gives the same behavior as on the 384 builds. As others on this thread have suggested, the ideal permanent solution would be a 3rd option on "Access Intranet" which the devices on the guest network cannot access the LAN, but can talk with each other on that guest network.
Agree with you 100%. Sorry for recapping the problem, again.. From my experiences on the 384 and 386 builds, AP isolation on the guest network does not impact the main network. As you state, this is definitely an issue for the less tech savvy because when they run the 386 builds their ChromeCast will likely break. In my own case, I had recently updated firmware on most of the IoT devices so took a bit to discern the router as causing the ChromeCast to not work.yes I understand the issue. but those ap isolation settings are not found in the gui is what I was saying. a minor issue for you, but not for the less savvy. I myself haven't noticed any problems with my guest network devices talking to each other on guest 2 and 3 but maybe i'm wrong? I was also wondering if setting that to disable on a guest network also affects ap isolation setting on the main network. But you have just pointed out in your other post those are separate settings so I'm assuming not, and probably why i haven't noticed issues there either.
Agree with you 100%. Sorry for recapping the problem, again.. From my experiences on the 384 and 386 builds, AP isolation on the guest network does not impact the main network. As you state, this is definitely an issue for the less tech savvy because when they run the 386 builds their ChromeCast will likely break. In my own case, I had recently updated firmware on most of the IoT devices so took a bit to discern the router as causing the ChromeCast to not work.
yep nice catch.
Here is the result of patch testing.@JWoo @L&LD
There's a new AX58 build in my development folder
https://1drv.ms/f/s!Ainhp1nBLzMJiF2l3WjM46lSmxrH
Fingers crossed....
Our cat is also great at hiding in plain site. Sometimes that is the best place to hide. Really looking forward to your GUI addition!@JWoo
Thanks for the quick check!
I have another compile going right now which adds 'AP Isolation' to the gui.....
PS - They hid the 'force' of ap_isolate in plain sight....in the gui code of all places
How does your build interact with YazFi's setting of the ap_isolate , if at all? YazFi already makes these configurable per guest network.@JWoo
Thanks for the quick check!
I have another compile going right now which adds 'AP Isolation' to the gui.....
PS - They hid the 'force' of ap_isolate in plain sight....in the gui code of all places
Shouldn't behave any different than it behaved on 384 codeHow does your build interact with YazFi's setting of the ap_isolate , if at all? YazFi already makes these configurable per guest network.
currently it will be applied on either firewall-start or a restart_wireless eventShouldn't behave any different than it behaved on 384 code
But, since it wasn't in the gui on 384 either, depending on where you intercept the setup to make your changes, it may be possible that someone could override your setting by changing the gui. Not sure where you do your magic.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!