RT-AX56U on Merlin 388.2_2
Is it possible to define one or more LAN ports to the guest network, and leave the others alone?
Thanks, I assume this your tutorial?Yes but depending on which chipset it uses, it can either be easy or very difficult. Script required either way.
Far easier to buy a $25 smart switch and do it there, the router sends the guest VLANs tagged out all LAN ports. I posted a tutorial on it a while back.
Thanks, I assume this your tutorial?
Tutorial - How to use VLANs on your non-pro Asus router with 386 or 388 code (no scripting required)
With 386 and 388 code base, you can make use of two built in VLANs (plus the main LAN VLAN 1) to further segment your wired and wireless network, even on non-pro models. This definitely works in router mode on all models that support AIMESH and these code versions. From what I have seen (but...www.snbforums.com
How would I determine which chipset I have on my router, and if I have one that setup is easy on is there a post or tutorial for that?
Yes, that's the one. You can use that no matter which chipset you have.
If you want to do the script and do it directly on the router, someone here may know off the top of their head what chipset it has, but you can also SSH into it and do "robocfg show". If you get an output, that is the easier chipset, if not, it is the much harder one. I don't think many routers are using the older/easier chipset anymore so I'm guessing probably the latter, in which case just use an external switch, far easier.
"Your wired devices will now be in the respective VLAN/subnet and isolated from your main LAN (and also isolated from wireless devices in that same guest network)"
I'm using Firesticks for my TV's on the 5ghz Guest Network, and am adding a hardwired SiliconDust HDHomeRun tuner and Mini PC with Plex Server on it.
Will the Firestick apps be able to control the Tuner and Plex Server being Isolated from each other on the Guest Network?
Don't want to put either on my LAN with my main PC.
If they need to talk directly to each other then no, but you can use a pretty simple script to disable the AP/client isolation on that guest network. Actually the setting seems pretty "sticky" so you may even be able to just do it in the CLI and have it be permanent, as long as you never touch the "access intranet" setting in the GUI. A script is probably safer though.
You may want to consider one of the Pro routers with VLANs and advanced guest. Or use Yazfi and have all the guests wireless (won't be able to have a wired port in guest with that). But the above will work if you don't mind toying with the CLI settings or creating a script (along with the external smart switch).
I have two RT-AX56U routers so, would this work?
Router 1, Connect WAN to internet and use a LAN port for my main PC.
Router 2 in AP Mode, Connect WAN to LAN port on Router #1 (port 1 or 4 or does it matter?), Firesticks use Wireless (Not Guest) and the HDHomeRun and Plex Server use LAN.
Or should my main PC be on Router 2 in AP mode and the media devices be on Router 1?
Just trying to keep my main PC safe from Firesticks, Kodi, Plex, Security Cams etc.
As I have two RT-AX56U routers would this work, or is it just extending my LAN on router 1 to router 2?
Router 1, Connect WAN to internet and use a LAN port for my main PC.
Router 2 in AP Mode, Connect WAN to LAN port on Router #1, Firesticks use Wireless (Not Guest) and the HDHomeRun and Plex Server use LAN ports.
Just trying to keep my main PC safe from Firesticks, Kodi, Plex, Security Cams etc.
Thanks very much for all the info.One other option too is if you have an ISP router in the path, you can just have your untrusted stuff connect to that, then hang one asus off that for your trusted stuff. Basically same as the "easier" option I just posted but you utilize an otherwise underutilized ISP router. Still have double NAT for your trusted devices in that case though.
Thanks very much for all the info.
The ISP router is a Starlink V2 in Passthrough Mode and then ethernet to my Asus network, no wireless possible on the Starlink in Passthrough.
The Asus has better range to my cameras, so I want it for wireless to untrusted clients.
Will implement your second solution without the double nat.
Seems to be working great,Ok let us know if it works as expected, some of that is from memory, but I believe it is all correct. Then we can just refer people to this post as it gets asked from time to time and I'm not writing it again
Seems to be working great,
Trusted clients on Router 1 are isolated from Non Trusted on Router 2, and those can see each other from LAN Ports / WiFi.
Can't ping Google.com from Router 2 Clients, but performance seems fine otherwise.
Ipconfig /all from Router 1 Client shows DNS is the LAN IP of Router 1 (192.168.50.1) which seems odd as it's set to obtain from ISP (Currently Verizon) in the GUI.
Tried setting Router 2 DNS to 192.158.50.1 and also to 8.8.8.8 with no change.
Could be my test setup: Android phone with Visible Sim, PdaNet USB Tether to Windows 11 Mini PC, Connectify Sharing Internet out Ethernet to Router 1.
Will be on Starlink as soon as the Ethernet adapter I have on order arrives, so DNS might react differently then.
Ok, set Router 2 to static IP 192.168.50.2 and Gateway 192.168.50.1Router 1
WAN DNS should be set to automatic, it will get your ISP's DNS servers. Copy those down for use on router 2. You can specify different DNS servers here too if you want but usually the ISP ones are the best, unless you want to use one of the filtering DNS servers (adguard, cleanbrowsing, quad9, etc).
LAN DHCP - DNS servers should be blank. While you're in there, make sure 192.168.50.2 is not part of the DHCP range. I forget what the default is but have it start at like 50. The checkbox for "advertise router IP" can be checked or unchecked, doesn't matter in this configuration, it won't have any impact.
Router 2
WAN I would set to static IP
IP address 192.168.50.2
Gateway 192.168.50.1
DNS - enter your ISP DNS servers you copied down here. Alternatively, if you want to be more strict on this one, you can use something like cleanbrowsing or quad9 to block these more "risky" devices from being able to reach malicious sites.
Note the above can also be accomplished using a DHCP reservation on router 1 and leaving router 2 at automatic, but that only lets you assign one DNS server that way, personally I'd rather have network devices using static IPs and not relying on DHCP anyway, and it is more flexible.
LAN DHCP - DNS servers should be blank. The default range is fine unless you want to reserve some for static IPs or something, but that's better done through DHCP reservations anyway.
Router 1 clients should get 192.168.50.1 as their DNS server, this is normal, the router acts as a DHCP proxy so that it can respond to queries for local hosts (which your ISP DNS can't). It knows to forward internet stuff to the ISP DNS.
Router 2 clients should get 192.168.51.1 (or whatever you set the router LAN IP to) as their DNS for the same reason.
It is possible to override this behavior but typically there is no reason to and it can cause problems.
On router 2, if you left Network Services Filter "filtered ICMP packet types" blank, clients should be able to ping 192.168.50.1 and probably 192.168.50.2 but nothing else in that range. They should also be able to ping and traceroute to anything on the internet. If you put something like "0 8" in this field that will block all pings to anything except 192.168.51.x (local stuff) and traceroutes as well.
If you're using the static route option and want clients to be able to ping, it is safe to leave the filtered ICMP types blank since they won't be able to ping anything on your main LAN other than the router IP which is fine (and often necessary for troubleshooting).
Ok, set Router 2 to static IP 192.168.50.2 and Gateway 192.168.50.1
WAN DNS on Router 1 is set to automatic, but I can't see where to get the DNS IP's that my ISP is assigning.
Network Map, Internet Status shows WAN IP of 192.168.70.77, clicking on that box then shows a panel to the right and a DNS of 192.168.70.1 and gateway is the same.
Where do I go to see both DNS servers from my ISP?
The DNS weirdness was due to my test setup using a Verizon tethered phone for an internet source.So your ISP device is a router. 192.168 is a private IP, so technically your first router is in double nat and your second router is in triple NAT. Not something to be too worried about, just be aware that likely is not in "passthrough" mode (though not exactly sure what that means on Starlink, maybe they are handing out private IPs and then NAT'ing at an aggregation point).
192.168.70.1 is your ISP DNS (again, probably their device acting as a DNS proxy, just like the Asus does).
If their router can't be placed into true bridge mode to where you're getting a public IP on Router 1, see if their device lets you configure router 1 as a DMZ host. That's the next best thing. While in there you can also see what their router has for "real" DNS servers and put those into both Asus if you want, to eliminate an unnecessary DNS hop.
In reality it doesn't make a huge difference, less DNS hops is better to a certain extent but most would not notice the difference, you can put 192.168.70.1 into router 2 or like I said, use cleanbrowsing or quad9 to give a bit of protection (they're generally about the same, when I used one briefly I went with cleanbrowsing as it had better latency and response time for me, but for you may be the other way around). Technically you could even put 192.168.50.1 in Router 2 but now you're hopping through 3 DNS proxies before even hitting the internet, so that's a bit excessive.
Two router setup works great for non trusted clients, but I'm having some issues with my Plex Server on router 2 working remotely.
Enabled port forwarding on Router 2 for the Public and Private IP's / Ports shown in plex remote access settings.
If I disable/enable Plex Remote, it says "fully accessable outsite your network" but then goes red after a short time.
canyouseeme.org says it can't see port 32400 with my pubic IP.
Enabled port forwarding on Router 1 for the WAN IP of Router 2 and now Plex remote access stays green for a bit longer, but still eventually says it's not accessable outside my network.
Interestingly the Plex app on my phone connects using cell data as does the Firestick in my RV using the phone's internet, but both are really slow to connect.
Is Port Forwarding on Router 1 a security risk, since it's only for Router 2's WAN IP?
Router 2 is using the same DNS server as router 1 so I should have avoided a double nat.
Any suggestions to make remote access of Plex on Router 2 work better, while preserving security are appreciated.
Plex server is behind router 2 and uPNP can be used for auto remote server configuration, I had it on for testing but it's off now.If your plex server is behind router 2 and you need inbound traffic to it, you need port forwarding configured on both routers. Router 1 to router 2 WAN, and router 2 to plex. Whether the plex server will "like" that double NAT I don't know, but usually not a problem.
You also have the option of putting router 2's WAN as the DMZ of router 1 (a bit less secure but should be ok) so you only have to configure the port forwarding on router 2. You could even take that a step further and enable uPNP on router 2 (assuming the plex server uses uPNP). uPNP I wouldn't want though, static port mappings are more secure (and uPNP isn't the most reliable, in fact it could actually be interfering, that may be what is timing out your connections).
If you know exactly what port you need and you don't need uPNP for game consoles or anything, I'd disable uPNP on both routers, and just configure a static mapping on both. Make sure you don't have any port trigger rules etc either as that could interfere and should not be needed.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!