But this would not help? Also, some of my Chromecast devices are ethernet (Android TV boxes). So I cannot connect them to a guest network.Some routers will let you create multiple guest networks on each band.
Try creating a second guest network that allows access to the intranet as well as the internet. Devices connected to this guest network should be able to communicate will all devices on your network.
admin@RT-AC68U-0960:/tmp/home/root# find / -iname *avahi*
/tmp/avahi
/tmp/avahi/avahi-daemon.conf
/tmp/var/run/avahi-daemon
/usr/lib/libavahi-common.so.3
/usr/lib/libavahi-common.so.3.5.3
/usr/lib/libavahi-core.so.7
/usr/lib/libavahi-core.so.7.0.2
/usr/sbin/avahi-daemon
admin@RT-AC68U-0960:/tmp/home/root# ps | grep -i avahi
282 nobody 1540 S avahi-daemon: running [RT-AC68U-0960.local]
Nice, I have tried reading up on Avahi, but I haven't found any good guides for setting up this:The issue is NOT whether you can or can't forward an IP. The problem is that the private and guest networks are on different ethernet networks. And Chromecast relies on network discovery to locate devices to which is can broadcast. But network discovery, by definition, is limited to its own ethernet network! It can't cross network boundaries at the ethernet level, so it just doesn't work when you have separate ethernet networks like the primary and guest.
IOW, you can't have it both ways, at least at the ethernet level. Either devices share the same ethernet network (i.e, they're bridged) and the same broadcast domain, OR, they use different ethernet networks and broadcast domains. What you're asking for is basically an exception to be made for Chromecast.
The only thing I know that's likely to work is Avahi. This acts as a sort of replicator, allowing network discovery to traverse ethernet boundaries.
FWIW, I did a search for *avahi* from a shell (ssh) and got the following results:
Code:admin@RT-AC68U-0960:/tmp/home/root# find / -iname *avahi* /tmp/avahi /tmp/avahi/avahi-daemon.conf /tmp/var/run/avahi-daemon /usr/lib/libavahi-common.so.3 /usr/lib/libavahi-common.so.3.5.3 /usr/lib/libavahi-core.so.7 /usr/lib/libavahi-core.so.7.0.2 /usr/sbin/avahi-daemon
And if I dump the process table, I do see the avahi daemon running.
Code:admin@RT-AC68U-0960:/tmp/home/root# ps | grep -i avahi 282 nobody 1540 S avahi-daemon: running [RT-AC68U-0960.local]
For what purpose, I don't know. Maybe this replicator feature is exposed in the GUI and I just don't know it (I'm not a Merlin expert). Or perhaps you can leverage it for your own purposes.
I'm a little surprised to see it, since most times this software is NOT included in third-party firmware, and so you need to install it from optware (e.g., Entware).
Even if you manage to work around the WiFi guest network problems the Ethernet devices will still be unresolved. All the Ethernet devices are connected to the same switch. There are some community hacks that attempt to reconfigure the switch ports into separate VLANs but that's going to lead to quite a complicated setup.Also, some of my Chromecast devices are ethernet (Android TV boxes).
+1 I agree a tp-link switch or a second chromecast is the answer.If you really need to segregate the Chromecasts but have them available from your guest and primary network have you considered just plugging a second Chromecast or similar generic device into another HDMI port on your TV? For as little as US$22 the problem would be solved. One Chromecast connects to your trusted network and the second to your guest network.
While no one likes buying additional hardware IMHO you either have to buy additional Chromecasts, a smart switch or a router with Pfsense or similar OS.
I use a script to block/allow non-guest WiFi access from/to nominated LAN devices RT-AC68U - Block IP Range from Accessing Another IP Range, so it is possible to achieve using firewall rules.I have another idea, if I remove the Guest network, and allow my guests into the main Wifi, they will have access to Chromecasts.
Would it be possible to limit their access to only the Chromecasts with the Firewall.
I am thinking something like this:
- All my own devices has a static local IP-adress, they should be allowed access to everything.
- Guest devices, which are provided a dynamic local IP-adress, should not be allowed any access except two Chromecast devices.
Can you do this with the firewall in Merlin?
The wrinkle with the OPs request is that their Chromecast connect using Ethernet so any rules need to apply to both the WiFi guest networks and hardwired devices.
I feel like this is the best solution for me. As this would not need guest wifi either.I use a script to block/allow non-guest WiFi access from/to nominated LAN devices RT-AC68U - Block IP Range from Accessing Another IP Range, so it is possible to achieve using firewall rules.
Yes, found that option!set DHCP IP-range to what you need 192.168.1.51-192.168.1.254
but if you set a fix IP out of this range on such clients it wont work.
Bear in mind that this still doesn't block traffic between two wired devices.I feel like this is the best solution for me. As this would not need guest wifi either.
Say I have devices with static local IP-adress in the range of 192.168.1.2-192.168.1.50 (note that not all these IP-adresses are used).
Can I do something to make sure that new devices that are given an IP-adress won't get an IP in this range? And then use your script to block access to everything except two IP-adresses for devices in the range 192.168.1.51-192.168.1.255
How would this be done?
That's no issue. None of my guests will be doing wired connection.Bear in mind that this still doesn't block traffic between two wired devices.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!