PunchCardBoss
Senior Member
YES, in general. Setting up a VLAN on your 86U-PRO lets you assign a LAN port (wired) to a specific subnet. You define (assign) the subnet number rather than the router. So if you want a subnet that is 192.168.3.1, or 192.168.99.1 you can do that.So if I move my cameras and the raspberry pi with the CCTV onto the subnet, it is more secure.
In theory, you should be able to do the same thing with WiFi. Guest Network Pro allows you to choose the type of connection: wired or WiFi by radio frequency.
Now, there is one more step to the security issue: ISOLATION. Asus’ Guest Network Pro allows you to choose whether you want to allow “Access Intranet” (not internet). This switch permits or denies access of devices on a subnet to access devices on another subnet that is controlled by your router. If you want to keep all your devices on your subnet from communicating with any LAN device on another subnet, then leave this switch off. (Note, isolation also appears on the LAN>VLAN>Profile screen. It is called “Port Isolation”)
Special note. Right now, the Asus firmware for your router may not allow you to deny internet access for a specific device on your VLAN subnet. This appears to be a bug and current limitation.
There are 2 ways you can access a VLAN subnet from your primary subnet.How do I then access these devices from my main PC, on the other subnet ? Does that access method reintroduce the security risk ?
The first and often easiest is to temporarily change the Guest Network Pro “Access Intranet” option to Allow. Then you can dis-allow after your finished to re-establish your VLAN subnet isolation. Note that security (isolation) is temporarily suspended during this process.
The second way is to temporarily connect your PC to the VLAN subnet. I simply connect my PC to the switch that is connected to the VLAN port on my router and reboot my PC (assuming your PC NIC is set up with automatic DHCP). When I am finished doing want I need to do, I disconnect my ethernet cable and reconnect to my WiFi (after a reboot). Security of your PC is temporarily compromised when it is connected to VLAN subnet.
The best scenario would be to have a separate PC on your VLAN subnet all the time. But that option is not practical for home systems.
ADDED...
Here is how I have my network wired (with VLAN IDs hidden). Note that I can either have my router control the VLAN for my cameras or connect the switch to a 2nd LAN port on my NAS/NRV which has a static VLAN IP. Everything works as it should.
Last edited: