OpenWRT Guest Network (and beyond)

As my kids get to the age where both they and their friends have devices, this means granting access to our internet to a growing circle of people. OpenWRT has the ability to support guest networks and I’ve been meaning to set this up for some time.

Beyond simply having a guest network, I also want to setup an IoT network where I can isolate some of the network enabled things but not give them wide access to the rest of my internal infrastructure.

Let’s start with a simple guest network setup. This is well documented on the OpenWRT site. I’ll be using the CLI instructions to make these changes. FWIW this is based on the 21.02.0 version of OpenWRT.

The first part of this will be pretty much copy and paste from the OpenWRT instructions:

I of course modified the ipaddr for my setup, but pretty much used the command as is.

On the Web UI (LuCI) you should now see under Network->Interfaces a new Guest network. All of the changes landed in the /etc/config/network file.

Now we setup a wireless network configuration with the first radio

Again, I’ve pretty much followed the directions but have customized the SSID and not shared the password. I’ve rolled in the extras to isolate guest users and use encryption.

The LuCI web UI now looks a little more concerning (Network->Wireless)

But.. the previous Network->Interfaces now seems to have come to life.

Still the expected changes are reflected in /etc/config/wireless.

It took a bit of head-scratching, but I figured out what was wrong. I had not specified a wireless.guest.key that met the minimum length (8 to 63 characters) – this apparently caused everything to go sideways. Once I fixed this my new wireless interface came to life.

Let’s continue on with the DHCP configuration

And the Firewall

Now not only should you be able to see the new WiFi SSID available to connect to, but when you do you will be isolated from all other devices on the network and only able to see the internet. A network scan will turn up the existence of the router, but attempts to connect the web UI fail – that’s pretty cool isolation.

Devices connected to the guest network still show up in the OpenWRT status page. They are assigned a DHCP address from the network.guest.ipaddr subnet, which is distinct from my normal network.

Apparently I do give up a little performance having two (or more) networks hung off of the same radio, but the utility of having a restrictive guest network is pretty cool.

The Archer C7 has two radios, and we’ve not configured the guest network on the second radio. Let’s do that now.

Cool – now I have a guest network that is on both radio bands. You’ll note that I run both access points with the same SSID, this mostly just works and devices figure it out. I even run my dumb AP with the same SSID. This is one approach that works and let’s people move around the house with seamless connections.

I do know that some people try to force a device to a particular radio type, and will run their legacy network on a different SSID. This is of course also valid, it really depends what you’re looking to achieve. I’m taking the simple to configure devices approach, and giving the devices the responsibility to work out which radio band and which access point to connect to.

Now let’s create a second ‘guest’ like network for IoT devices. This time I’ll just combine all of the steps together

Nice – now I have a third subnet which will hand out DHCP addresses valid for 24hrs. The devices are all isolated from each other.

For devices on the IoT network, while I don’t want the device to be able to see anything other than the internet – for my own monitoring and use, I’d like to be able to see the devices on the IoT network from my normal lan network. This turns out to be very easy.

Connecting to the IoT network and doing as scan, shows me that I can only see myself and the router (because the device has to send traffic somewhere). Again, with the isolation I can’t connect to the web interface of the router. However, with this new “zone->forwardings” I can from my lan network see devices on the IoT network. Super cool, and actually very easy.

There plenty more tweaking we can do here, but to avoid going too far down the rabbit hole we’ll stop here.

3 thoughts on “OpenWRT Guest Network (and beyond)”

  1. I realized that reverse DNS wasn’t working for IoT devices. This is because I route all of my DNS through a pi-hole, and that has a “conditional forwarding” setup that specifies a CIDR range to pass to my router.

    The CIDR range was 192.168.2.1/24 – which specifies all IPs from 192.168.2.1 – 192.168.2.254. Now with the guest and IoT networks, I need a wider range to cover the additional networks.

    192.168.2.1/21 is sufficiently large – covering 192.168.0.1 – 192.168.7.254 a range which spans all of my networks. This fixes reverse DNS requests that hit my pi-hole, and are selectively forwarded to my router.

    If I had selected to allow the pi-hole to manage DHCP requests, things would have been different. However, I’m not sure how well the pi-hole manages guest networks.

  2. This looked interesting. However I tried adding your second guest approach and although stuff appears, it does not actually function. Seems some stuff is missing, at least when I check through L(uci). Ideas?

  3. Jason, I’m not sure I can help much. The folks on the OpenWRT forums are super helpful, try reaching out there for some help. I have set up a second dumb AP using basically this post exactly (cut & paste).. so these instructions work for me.

    If you were successful in setting up a single guest network – the IoT network is basically a simple clone of those steps with a few details changed to make it a unique network. If you got one working, there must be something simple you missed.

    The thing I like about OpenWRT is that the config files are a great way to look at the setup in a different light than just trying to navigate through the web ui (Luci) — and having two perspectives often helps me understand where I’ve missed something.

Leave a Reply

Your email address will not be published. Required fields are marked *