ddaenen1
Very Senior Member
So i have been thinking for quite some time to set up isolated guest wifi to avoid any access to all devices on my home network.
What i wanted to achieve was simple:
1. Dedicated guest SSID with own PW
2. No access from the guest wifi to any of the devices/systems on the LAN
3. Bandwidth limitation for guests (nice to have and not a priority)
For that, i made sure my purchases in the past that all my switches were VLAN capable (check) and i would have a router supporting that (check)
After some trials on AP-level that gave me only point one, i actually gave up for some time. After more and more reading, i actually started wondering if this is not too complicated for a home LAN.
Today, i changed my mind again and decided to go for it, understanding the concept of a VLAN but no clue how to configure it in the various devices.
Here is what i did:
Step 1: set up a dedicated VLAN (10) in the AP's and set up a dedicated guest SSID configured with this VLAN 10.
Step 2: configured the port of the AP in my switch as "trunk" and the port of the router to "trunk"
Step 3: created VLAN 10 in the switch, added VLAN10 to the respective trunk ports together with the default VLAN
Tried to connect to the guest SSID, it connects, no IP assigned, no internet access - time for pfSense config:
Step 4: Create VLAN10 in the router and assigned it to my LAN port.
Step 5: enabled the Guest interface with gateway 192.168.10.1
Step 6: created a IPv4 DHCP server with range 192.168.10.x to 192.168.10.xxx
Tried to connect to the guest SSID, it connects, 192.168.10.xxx IP assigned, no internet access
Step 7: create firewall rule to allow guest to access WAN.
Connected to the guest SSID, it connects, 192.168.10.xxx IP assigned, and internet access (Yay!)
Checked if i had access to my LAN devices (bummer - i have access to my servers, pfsense and all)
Some more reading up, adding 2 firewall rules, one to block access to pfsense, and one to block access to all RFC1918 networks on the GUEST interface
TADA! all works as i wanted to. Still need to look into bandwidth limiting but that is not a priority right now.
Am i happy? Yes and no. For some reason, i am unsure if i got it completely right by the book and have the impression i made it more complicated than it needs to be.
Here are my questions or the experts:
1. Is what i did above really all necessary in order to created an isolated and secure wifi connection for guests?
2. Do i really need a separate DHCP server on a different subnet?
3. I configured 2 trunked ports (one on the AP side, one on the router side) but did not tag the ports for either default or VLAN10 - is that correct?
Thanks in advance for any comments and insights.
What i wanted to achieve was simple:
1. Dedicated guest SSID with own PW
2. No access from the guest wifi to any of the devices/systems on the LAN
3. Bandwidth limitation for guests (nice to have and not a priority)
For that, i made sure my purchases in the past that all my switches were VLAN capable (check) and i would have a router supporting that (check)
After some trials on AP-level that gave me only point one, i actually gave up for some time. After more and more reading, i actually started wondering if this is not too complicated for a home LAN.
Today, i changed my mind again and decided to go for it, understanding the concept of a VLAN but no clue how to configure it in the various devices.
Here is what i did:
Step 1: set up a dedicated VLAN (10) in the AP's and set up a dedicated guest SSID configured with this VLAN 10.
Step 2: configured the port of the AP in my switch as "trunk" and the port of the router to "trunk"
Step 3: created VLAN 10 in the switch, added VLAN10 to the respective trunk ports together with the default VLAN
Tried to connect to the guest SSID, it connects, no IP assigned, no internet access - time for pfSense config:
Step 4: Create VLAN10 in the router and assigned it to my LAN port.
Step 5: enabled the Guest interface with gateway 192.168.10.1
Step 6: created a IPv4 DHCP server with range 192.168.10.x to 192.168.10.xxx
Tried to connect to the guest SSID, it connects, 192.168.10.xxx IP assigned, no internet access
Step 7: create firewall rule to allow guest to access WAN.
Connected to the guest SSID, it connects, 192.168.10.xxx IP assigned, and internet access (Yay!)
Checked if i had access to my LAN devices (bummer - i have access to my servers, pfsense and all)
Some more reading up, adding 2 firewall rules, one to block access to pfsense, and one to block access to all RFC1918 networks on the GUEST interface
TADA! all works as i wanted to. Still need to look into bandwidth limiting but that is not a priority right now.
Am i happy? Yes and no. For some reason, i am unsure if i got it completely right by the book and have the impression i made it more complicated than it needs to be.
Here are my questions or the experts:
1. Is what i did above really all necessary in order to created an isolated and secure wifi connection for guests?
2. Do i really need a separate DHCP server on a different subnet?
3. I configured 2 trunked ports (one on the AP side, one on the router side) but did not tag the ports for either default or VLAN10 - is that correct?
Thanks in advance for any comments and insights.
Last edited: