Anyone keep two separate wifi networks for guest/HA?

I'm running pfSense with a Netgear POE managed switch and stand-alone Ruckus APs.

For simplicity and security, I use a router-on-a-stick configuration with multiple VLANs trunked down to the switch. Individual devices are then placed on different networks by modifying the vlan(s) associated with that port.


My networks include (but are not limited to..);

GUEST-WIFI -- Isolated network with no internal access, limited ports open outbound, and a unique SSID.

LAN-WIFI -- General network with limited access to MGMT network, unrestricted outbound to internet, and a unique SSID. This is where our personal devices sit, to include things like Chromecasts and Plex.

MGMT -- Restricted network with extremely limited egress rules that prevent most devices from communicating to anything outside of the mgmt network, no wireless SSID. This is where mgmt interfaces for the firewall, switch, and APs, sit. An ESX host with a number of virtual machines, and the M1. When I install cameras, they will go here.


All of my trusted devices (my laptop/phone, wife's laptop/phone) have DHCP reservations on the general network, firewall rules permit our IPs to specific things back in the mgmt network (i.e. the kids devices and the Chromecast cannot access the mgmt interfaces on firewall, switch, APs, or the M1). This also takes care of the occasional scenario where we might put a guest device on the internal wifi, such as if they wanted to cast, or if someone hacks into the wireless network.

Remote access is locked down fairly tight, First WAN rule blocks anything not originating from a US based IP address. Then there are only a few ports open, and I only permit access to those ports from a few known IPs. OpenVPN would be technically more secure, but I frequently use VPNs for work and that creates headaches.



...v

Sent from my HTC One_M8 using Tapatalk
 
ON my ASUS router, I am allowed six guest SSIDs as well as my two main SSIDs.

I always include a guest 2.4 and 5GHz SSID, a Home Automation SSID for ISY994 controlled devices, and a neighbourhood amusement SSID with something like:

"FBI Survelance Vehicle"

or

"Free Pizza Hotline"
 
JonW said:
Not using any VLANs.  It's under Settings - Guest Control - Access Control.  Add host exceptions in the "Pre-Authorization Access" area.  Single IP exceptions can be put in as a /32 subnet - e.g. 192.168.1.200/32 will allow guests to access the host 192.168.1.200.
 
JonW, 
 
Thanks for your previous help on this.  I note that I had to allow Multicast address of 224.0.0.251/32 and the [IPaddress]/32 of the devices.  I was able to see the device on my PC but not on iOS until I added the multicast address.
 
Changed to be a 192.168.0.0/23 (255.255.254.0) network based on another post I had seen.  Seems to work, but I previously used /24 and changed based on a post at Ubiquiti Forum.
 
I'm happy with the Ubiquiti AP's and also that I don’t need to run controller software 24/7 to do this.
 
Back
Top