At office Wifi access
-
Ubiquiti has a guest networking option that does isolation without VLANs. It's not as secure as a VLAN and requires that you use a different subnet for the guest network for it to be effective, but they do offer a VLAN-less guest network isolation feature where the AP blocks traffic to everything but the designated gateway, DNS and DHCP servers.
-
From the Unifi AP FAQ:
I just want to provide free and simple guest access
Recommendation: In Wireless Configuration, enable "Apply Access Policies".
This turns on guest isolation and subnet restrictions (which can be customized in Settings->Guest Control), etc. - making sure guest cannot access your corporate network. If you choose Open for security, it's pretty much a connect-and-go, no guest portal, no "Terms of Use" or anything. UniFi controller doesn't even have to be running! You still have the option to choose WPA-Personal - just need to have a way to tell the guests the Passphrase.
-
-
Interesting.
Though that would still be technically 2 networks, two different SSIDs.
OK I will look into that.
-
I've not tried using the guest access system myself, but just basing the idea on their documentation.
-
This method requires communication with the controller. The controller is handing out DHCP and such.
You will still have to setup firewall rules and routing.
On the router side, it is no different than a VLAN (because a VLAN is just a different subnet at the IP layer anyway). -
@JaredBusch said:
This method requires communication with the controller. The controller is handing out DHCP and such.
You will still have to setup firewall rules and routing.
On the router side, it is no different than a VLAN (because a VLAN is just a different subnet at the IP layer anyway).VLANs can be the same subnet. It's a bit different because one is hard isolation and the other is soft.
So it's not as simple as they make it sound? That makes sense, although it seems like with logic in the bridge (AP) that they could have some serious isolation without the effort of VLANs.
-
@JaredBusch said:
This method requires communication with the controller. The controller is handing out DHCP and such.
You will still have to setup firewall rules and routing.
On the router side, it is no different than a VLAN (because a VLAN is just a different subnet at the IP layer anyway).Agreed - looks like UNBT is just setting up VLANing inside the APs, but otherwise just using the standard network fabric - of course you either have to have two interfaces on the router/firewall one for each IP range, unless the router/firewall supports multiple IPs non VLAN'ed on a single interface.
-
@Dashrender said:
Agreed - looks like UNBT is just setting up VLANing inside the APs, but otherwise just using the standard network fabric - of course you either have to have two interfaces on the router/firewall one for each IP range, unless the router/firewall supports multiple IPs non VLAN'ed on a single interface.
Often they do.
-
@scottalanmiller said:
@Dashrender said:
Agreed - looks like UNBT is just setting up VLANing inside the APs, but otherwise just using the standard network fabric - of course you either have to have two interfaces on the router/firewall one for each IP range, unless the router/firewall supports multiple IPs non VLAN'ed on a single interface.
Often they do.
because of routing on a stick?
I guess I've never seen someone try to route on a stick that wasn't using VLAN, but I suppose there is no reason you couldn't. The main bad thing about this, is if either side can change their IP to the other network, they would gain full access to that network.
-
Here's how we have it set up. I've removed other info, but just select the Guest Policy and it limits the devices on the Guest SSID to only interwebs traffic. They do have more advanced options under the Guest Control section.
-
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
Agreed - looks like UNBT is just setting up VLANing inside the APs, but otherwise just using the standard network fabric - of course you either have to have two interfaces on the router/firewall one for each IP range, unless the router/firewall supports multiple IPs non VLAN'ed on a single interface.
Often they do.
because of routing on a stick?
I guess I've never seen someone try to route on a stick that wasn't using VLAN, but I suppose there is no reason you couldn't. The main bad thing about this, is if either side can change their IP to the other network, they would gain full access to that network.
I am unfamiliar with this term.
But, in theory, they cannot change their IP address on the AP side because of the AP's security.
-
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
Agreed - looks like UNBT is just setting up VLANing inside the APs, but otherwise just using the standard network fabric - of course you either have to have two interfaces on the router/firewall one for each IP range, unless the router/firewall supports multiple IPs non VLAN'ed on a single interface.
Often they do.
because of routing on a stick?
I guess I've never seen someone try to route on a stick that wasn't using VLAN, but I suppose there is no reason you couldn't. The main bad thing about this, is if either side can change their IP to the other network, they would gain full access to that network.
I am unfamiliar with this term.
But, in theory, they cannot change their IP address on the AP side because of the AP's security.
In theory.
Routing on a stick - a router that routes all traffic on a single interface.
-
@Dashrender said:
Routing on a stick - a router that routes all traffic on a single interface.
Gotcha. Called those multi-homed interfaces in my day Oh, this would not be what you are thinking, still two interfaces, all routing would still go "through" the router, just separated on the other side.
So not routing on a stick then, in this case.
-
@Dashrender said:
In theory.
One could say the same thing about the routing or VLANs, though. They isolate the traffic "in theory." But in reality, the theory holds. I don't see any reason to be concerned here. It looks like a well thought out security mechanism. I would test it and not use it for military secrets or anything. But for a normal business on a scale where this would work, it seems like a simple, logical approach.
What about it causes concern?
-
@scottalanmiller said:
@Dashrender said:
Agreed - looks like UNBT is just setting up VLANing inside the APs, but otherwise just using the standard network fabric - of course you either have to have two interfaces on the router/firewall one for each IP range, unless the router/firewall supports multiple IPs non VLAN'ed on a single interface.
Often they do.
My routing on a stick comment was based on this, not the UNBT stuff. I took your meaning to be that many routers support single interface routing.
Although I see why you say it's not really routing on a stick because the traffic from network A (A and B being inside your network) and the internet, but not from A to B
-
@Dashrender said:
Although I see why you say it's not really routing on a stick because the traffic from network A (A and B being inside your network) and the internet, but not from A to B
Exactly. The one side of the router would be multi-homes but not routing between subnets on that side (if it did that, just skip the routing altogether) and instead only from multiple "inside" routes to a single external route.
-
@scottalanmiller said:
@Dashrender said:
In theory.
One could say the same thing about the routing or VLANs, though. They isolate the traffic "in theory." But in reality, the theory holds. I don't see any reason to be concerned here. It looks like a well thought out security mechanism. I would test it and not use it for military secrets or anything. But for a normal business on a scale where this would work, it seems like a simple, logical approach.
What about it causes concern?
Actually, now that I've looked at the configuration of the guest network, that network can be limited to only the specified IP range, so yeah, it's less of an issue. If that limitation wasn't there, a person could make an association, then after the association was live, manually change their IP to one on the production network and Bob's your uncle.
-
@Dashrender said:
Actually, now that I've looked at the configuration of the guest network, that network can be limited to only the specified IP range, so yeah, it's less of an issue. If that limitation wasn't there, a person could make an association, then after the association was live, manually change their IP to one on the production network and Bob's your uncle.
Right. I would agree that they could if the restrictions were not in place.
-
I have a UBNT Router and AP (UniFI). I have two SSIDs - one for the 'business' side of my home network, and another for the Kids. I have the Kids side limited to 1MBs to not saturate the main network. Work before Mindcraft.