The seems to be some confusion in this thread about some terminology.
1. Asus doesn't use VLANs to create guest WiFi networks.
2. "Access Intranet - enable/disable" is achieved by using packet filtering rules. (And now has the added complication of using a separate subnet for the first guest network per band.)
3. ap_isolate is a WiFi driver setting which only effects client to client communication between devices connected to the same BSSID. This value is usually set per band in Wireless > Professional.
John added this to his firmware some time ago.
# brctl show
bridge name bridge id STP enabled interfaces
br0 8000.88d7f6xxxxxx yes vlan1
eth1
eth2
wl0.2
wl1.2
br1 8000.88d7f6xxxxxx yes wl0.1
eth0.501
eth1.501
eth2.501
br2 8000.88d7f6xxxxxx yes wl1.1
eth0.502
eth1.502
eth2.502
# robocfg show
...
501: vlan501: 0t 1t 2t 3t 4t 5t
502: vlan502: 0t 1t 2t 3t 4t 5t
# brctl show
bridge name bridge id STP enabled interfaces
br0 8000.40167exxxxxx no vlan1
wl0.1
wl1.1
vlan2
br1 8000.40167exxxxxx yes wl0.2
eth0.501
wl0.1.501
wl1.1.501
br2 8000.40167exxxxxx yes wl1.2
eth0.502
wl0.1.502
wl1.1.502
# robocfg show
...
501: vlan501: 0t 1t 2t 3t 4t 5t
502: vlan502: 0t 1t 2t 3t 4t 5t
Waiting for Asus to fix VLANs on the HND platform before I work on anything. While I could likely integrate YazFi with AiMesh 2.0 for non-HND routers, I want to be able to support HND routers at the same time. While I have a "working" setup, my AC86U picks up a lot of "protocol is buggy" messages in syslog and does unfortunately seem to produce lost packets. It's possible I could force off h/w acceleration to see if this improves things, but I see that as a non-starter and am waiting to see if Asus develop an approach that doesn't produce these errors. Perhaps if we hit 386.4/a few GPL merges and the issue is still present in Asus' stock code I will bite the bullet and develop anywayI know this posted is a few months old and is probably old news, but just to be clear, ASUS is setting up VLANs for guest network #1 (at least on the AC68U). I know early on there was some contention about AP isolation, VLAN isolation, and iptables isolation. In any case, guest network #1 is setup by ASUS using VLAN 501 for 2.4GHz interface and VLAN 502 for 5GHz interface.
These WLAN interfaces are configured on the AiMesh router node bridges br1 and br2 respectively (this configuration shows one main 2.4/5GHz network (eth1/eth2), guest network #1 (w0.1/w1.1) , and guest network #2 (w0.2/w1.2)):
Code:# brctl show bridge name bridge id STP enabled interfaces br0 8000.88d7f6xxxxxx yes vlan1 eth1 eth2 wl0.2 wl1.2 br1 8000.88d7f6xxxxxx yes wl0.1 eth0.501 eth1.501 eth2.501 br2 8000.88d7f6xxxxxx yes wl1.1 eth0.502 eth1.502 eth2.502 # robocfg show ... 501: vlan501: 0t 1t 2t 3t 4t 5t 502: vlan502: 0t 1t 2t 3t 4t 5t
When in an AiMesh configuration, this VLAN configuration is propagated to the AiMesh node (confusingly, on the AiMesh node, the main SSID is wl0.1/wl1.1, which is guest network #1 on the AiMesh router, guest network #2 not automatically propagated to the AiMesh nodes):
Code:# brctl show bridge name bridge id STP enabled interfaces br0 8000.40167exxxxxx no vlan1 wl0.1 wl1.1 vlan2 br1 8000.40167exxxxxx yes wl0.2 eth0.501 wl0.1.501 wl1.1.501 br2 8000.40167exxxxxx yes wl1.2 eth0.502 wl0.1.502 wl1.1.502 # robocfg show ... 501: vlan501: 0t 1t 2t 3t 4t 5t 502: vlan502: 0t 1t 2t 3t 4t 5t
I've tested with my managed switches and it properly isolates LAN/WLAN clients on my other VLANs LAN/WLAN clients (previously, only wireless clients were isolated with ap_isolation). Notice that my guest network #2 is setup on br0 on the router
+1 to get a GUI update for enabling / disabling the ap_isolation field for guest network 1. I use this network as my IoT network and I want these devices to be able to communicate with each other and the internet, but not the intranet LAN clients. This works on VLANs 501 and separately for VLAN 502 LAN clients, but the ap_isolation breaks guest wifi client <-> guest wifi client and guest wifi client <-> lan client on the same AP switch. Thanks to @JWoo for the work-around!
As a side note, I have also enabled VLAN 501 and 502 to communicate with each other using iptables FORWARD filter rules on the main router. However, I really wish ASUS would merge the two VLANs for a single guest wifi column. I may end up scripting some bridge re-configuration to move the guest wifi #1 2.4 GHz and 5 GHz networks to VLAN 501 and hijack VLAN 502 for guest wifi #2 configuration. The AiMesh configuration makes that harder to automate and just haven't found the time to test the reconfiguration. I was hoping @Jack Yaz might come to GUI-based solution there before I get to it
That's what I suspect.Ah makes sense. I'm not seeing any packet loss on my two AC68Us using 2x managed Netgear GS108Tv3s in between. I assume this is just something buggy in the Asus broadcom HND switch driver and doesn't affect the non-HND router configurations?
Thanks for your explain.386.1 firmware sets up VLAN 501 for guest network #1 2.4Ghz and VLAN 502 for guest network #1 5GHz across both the AiMesh router and AiMesh node. This is when the main router is in Router Mode and has the 2nd “router” as an AiMesh node, which is essentially AP mode.
Guest network #2 and #3 (as of right now) do not use VLANs and they are not sync’d to the AiMesh node (only show up on the main router). The only isolation you get is AP isolation (the whole topic of this thread). With VLAN isolation on guest network #1, the AP isolation isn’t absolutely necessary if you want those clients to be able to communicate (e.g. IoT devices).
Yes, while I haven't setup port mirroring with a network capture to confirm the VLAN tag is on the frames hitting the external managed switch, the guest network #1 would not function (couldn't get an IP) until I setup the two ports on my managed switch with my AC68Us connected as a trunked ports for VLAN 501 and 502 between the AiMesh node port and AiMesh router port (I also left those ports as untagged management VLAN 1).
+1 for me too. I’m not sure if @john9527 ever got @JWoo manual AP Isolation solution working but I’m in the same boat, Guest Wi-Fi for which I do not want Intranet Access enabled but I would very much like AP Isolation disabled so Guests can use a Chromecast attached to the same Wi-Fi.+1 to get a GUI update for enabling / disabling the ap_isolation field for guest network 1.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!