How to configure OpenWrt as Firewall for your home network and Guest Wifi and IPTables explained

  Рет қаралды 164,556

OneMarcFifty

OneMarcFifty

Күн бұрын

MANY THANKS TO ALL MY PATRONS on / onemarcfifty !!!
Guest Wifi in your home network can easily be done with OpenWrt. How to configure OpenWrt as Firewall, how to build a firewall for your home network, How to make a Guest Wifi and a separate IOT Wifi and Firewall zone ? IPTables explained in the middle part.
0:00 Intro
0:48 Creating the IOT and Guest Firewall zones
1:32 Explaining the desired setup (IOT/LAN/GUEST)
2:20 Firewall zones in OpenWrt / Luci
2:35 IPTables explained
5:10 Setting the policies in the OpenWrt Interface
7:59 DNS and DHCP for the guest network
9:15 Masquerading and NAT, private IP addresses
10:17 adding and assigning the interfaces
11:48 adding the wireless interfaces
12:42 summary
Please support me on patreon: / onemarcfifty
My youtube channel: / onemarcfifty
Marc on Twitter: / onemarcfifty
Marc on Facebook: / onemarcfifty
Marc on Reddit: / onemarcfifty
Chat with me on Discord: / discord
Licence-free music on / Lizenzfreie Musik von www.terrasound.de/lizenzfreie...

Пікірлер: 397
@JB-tz9pi
@JB-tz9pi 3 жыл бұрын
You definitely have some of the best videos I have come across on OpenWRT.
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Wow, thanks!
@TorgeirThoresen
@TorgeirThoresen 2 жыл бұрын
Still true! Great stuff.
@eugrus
@eugrus Жыл бұрын
Yeah! Far less KZfaq content on OpenWRT than on pfSense. Marc is a blessing!
@ClintonWBlackmore
@ClintonWBlackmore 10 ай бұрын
I've been needing this video for months. I've found OpenWRT to be so confusing. This is explaining exactly what I wanted to know. Thank you so much.
@jaromanda
@jaromanda 2 жыл бұрын
OMG! Your explanation of the firewall in OpenWRT was the final piece in the puzzle for me - it all clicked with this video, thank you
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Awesome - I am glad it helped ;-)
@crazylio
@crazylio 3 жыл бұрын
This is such an awsome video! I am just getting started with OpenWRT and LUCI and I have been looking for this kind of video for weeks. Love the level of detail and the screen captures.
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Hi Lionel, many thanks - I am glad that you like it !
@colinnich
@colinnich 3 жыл бұрын
Just the video I needed - can't wait for the VLAN to 2nd access point episode! I've just set up a two OpenWRT router system because of your fast roaming video.
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Many thanks Colin! Perfect timing ;-) I hope that I get this ready until next monday. But it will come _very_ soon.
@PankajSharma-ir7fb
@PankajSharma-ir7fb 7 ай бұрын
Best set up video for beginner to achieve a perfect network settings with full understanding of how the os does this.
@goppinaththurairajah760
@goppinaththurairajah760 2 жыл бұрын
Simple and effective explanation by covering the audience from beginners to advanced.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Thank you very much for your feedback ;-)
@ColinReddig
@ColinReddig 2 жыл бұрын
This is such an incredibly helpful video for newcomers to OpenWRT. Very high quality an informative. The way you explain things is so clear. Thank you!
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Many thanks Colin !
@francescopocci2201
@francescopocci2201 3 жыл бұрын
Hey man, are you a teacher?! This video is the one that I was looking for and Your explanations are GREAT! OpenWrt is not that simple (and the wiki is confusing IMO) but you make things easier. Keep it up, please !
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Hi Francesco, no I am not a teacher 😉, I just love to explain things - all I’m doing on this channel is that I share my own learnings really.
@l4te4oot91
@l4te4oot91 2 жыл бұрын
Wow.. just incredible the clear, simple, and well detailed explainations you give to whip a segmented home network that probably will apply to the 99% of us out here... big fan and love what your doing!
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Many thanks for the friendly feedback!
@l4te4oot91
@l4te4oot91 2 жыл бұрын
@@OneMarcFifty will be sure to check out your discord and patreon options!
@soljafarra8055
@soljafarra8055 9 ай бұрын
@@OneMarcFifty man, you're great, thank you sooooo much for this straightforward explanation!
@bradkaral1188
@bradkaral1188 9 ай бұрын
Darn, your videos are so clear and well-presented.
@Christian_Ky
@Christian_Ky 2 жыл бұрын
To be honest, brilliant! It's not only that you explain it simple and brilliant, in addition you really lern!
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Christian, many thanks - glad you like it ;-)
@Danacus
@Danacus 2 жыл бұрын
You are doing exactly what I am trying to do. Thank you for the clear explanation!
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Awesome- thanks a lot!
@LeoGitarzysta
@LeoGitarzysta 2 жыл бұрын
Kudos. Very informative video and without substantive errors on the topic, and showing the proper understanding of underlying mechanisms This is the proper way in which OpenWrt configuration should be explained.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Many thanks for your friendly feedback!!!
@tonybell1597
@tonybell1597 2 жыл бұрын
After many hours of struggling with OpenWRT in the past months, finally came back to it and re-watched your series on OpenWRT, I think I have a handle on it now (which probably means I don't understand it 🙂 ), and now have Guest Access points and its all working well..... its a steep learning curve with Openwrt, didn't get the fundamental building blocks of "interfaces" and how they relate to the router, to physicall ports and other network dark arts, but its now making much more sense. Many thanks Marc....
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Tony, glad to hear that the videos helped bringing pieces together. It's true that every software has their own look and feel and also - I'd say "philosophy" of looking at things. the main thing I personally struggle with products that are new to me seems to be exactly what you describe - getting my head around the "way of thinking" - or building blocks like you called it. Don't give up ;-)
@AntonPopov_
@AntonPopov_ 3 жыл бұрын
Thank you for that great explanation of firewall rules! I really needed this. Great work!
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
You're very welcome! Glad you liked it !
@sanyr80
@sanyr80 2 жыл бұрын
Thanks, this was really helpful. Your explanations gave me enough info to be able to tailor everything to my own needs without being completely lost. The screens shown are a little out of date for the latest version of OpenWrt but are still quite usable.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi, many thanks for the feedback - there's newer videos on OpenWrt 21 on my channel https:/kzfaq.info
@cau8777
@cau8777 3 жыл бұрын
This is the best channel on Openwrt and some more, please continue !
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Many thanks for your kind feedback. There will be more to come. I have taken some days off in August and will definitely produce more ;-)
@gasparem16
@gasparem16 3 жыл бұрын
Definetly one of the best videos on OpenWrt Firewall settings. Thanks a lot! brillant.
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Thank you very much !
@ictstelucjam3604
@ictstelucjam3604 Жыл бұрын
Thanks so much for all those great video Marc.. It's really helping me to go everyday a step further on my home network. It takes time, but I will get there...
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Awesome, many thanks for your feedback!
@MrBrownpotato
@MrBrownpotato 2 жыл бұрын
That was excellent - thank you for demystifying openwrt firewall settings
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Thank you very much!
@CEPTha_78BANG
@CEPTha_78BANG 3 ай бұрын
Thanks so much for being so clarified, Mr.!☺
@ghkpr
@ghkpr 9 ай бұрын
This channel is a treasure! Thanks you!
@ColdScarecrow
@ColdScarecrow 3 жыл бұрын
Thank you for this superb video. I finally could understand the firewall in OpenWRT easily!. Subscribed and waiting for more OpenWRT master classes 😉
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Awesome, thank you!
@tolisl5013
@tolisl5013 2 жыл бұрын
Hi Marc. I would like to see another video in this series and I believe it is a must. Setup of IGMP snooping and mDNS so devices and services can be discovered across the network. This would provide a seamless experience for the users.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi, definitely. mdns and IGMP are on my list - but unfortunately not at the very top ;-( The use case would be airprint / airplay etc.
@tolisl5013
@tolisl5013 2 жыл бұрын
@@OneMarcFifty also this would be beneficial when using smart home apps like home-assistant, where devices discovery is very convenient
@k0nstant1n0s
@k0nstant1n0s 2 жыл бұрын
Thank you so much for the effort you put to create this video.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Many thanks ;-)
@syt3d
@syt3d Жыл бұрын
great video, clear and amazingly helpful. in openwrt 22.03.5, the "bridge interfaces" checkbox in the "add new interface" menu is no longer there, is there something i need to do in this version to acheive the same thing?
@tidico
@tidico 4 ай бұрын
They moved the functionality to the "devices" tab in Network > Interfaces. Create a new device. Select "bridge interface" in interface type and select the port/vlan you want.
@anatolistrechen6619
@anatolistrechen6619 3 жыл бұрын
So good. Thank you for clear explanation!
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Many thanks Anatoli.
@payamysf
@payamysf 8 ай бұрын
Very helpful, Thank you!
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Please visit my channel page: kzfaq.info Want to talk to me? Join my Discord Server: discord.com/invite/DXnfBUG
@ivoabreu5760
@ivoabreu5760 5 ай бұрын
So good! Congratulations.
@linuxstudent5158
@linuxstudent5158 2 жыл бұрын
Great video, clear. Thank you.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Thank you very much !
@catsupchutney
@catsupchutney 2 жыл бұрын
I am *completely* in agreement with you about the need to block IOT devices from phoning home.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Many thanks for the feedback ;-)
@thelightings
@thelightings 2 жыл бұрын
The best video for openwrt. Thanks you so so much for this.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Many thanks for your kind feedback ;-) kzfaq.info/love/G5Ph9Mm6UEQLJJ-kGIC2AQ
@joshenders
@joshenders 2 жыл бұрын
This is so good. Thank you very much for sharing.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Josh, thank you very much !
@joshenders
@joshenders 2 жыл бұрын
@@OneMarcFifty it’s silly but after a 15 year career at big tech companies in Silicon Valley, this is the video which made iptables finally click in my head! Would love to see a deeper dive, I feel like you have a lot to share.
@elpeperumanof236
@elpeperumanof236 18 күн бұрын
I think I should follow all the instructions in the video, even liking and subscribing hahaha
@tolisl5013
@tolisl5013 2 жыл бұрын
Thank you very much 😊 Great explanation
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Thank you
@skynetdyson3970
@skynetdyson3970 3 жыл бұрын
Great openwrt videos,same case in my home,i want to trunk two openwrt routers with diferent vlans,thanks!!
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Many thanks for your feedback!
@tonebaxter
@tonebaxter 2 жыл бұрын
Awesome content! Thank you… I see many new projects in my future. New sub!!! 👍🏾❤️
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Awesome - many thanks for watching and subscribing !
@brianpayne5773
@brianpayne5773 3 жыл бұрын
This is am outstanding video. I hope your channel is successful. You deserve it. I am subscribing.
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Hey Brian, many thanks for your kind feedback and for subscribing!
@henning7801
@henning7801 3 жыл бұрын
Another great video. I've been reading documentation for days to find out what and how I have to configure a OpenWrt router. Just like Franceso Pocci, I find the OpenWrt documentary very confusing. Only when you understand how it works can you understand it :( And like Colin Nicholson, I'm excited about the expansion to include VLANs. You have a talent for explaining complicated things simply. Great. And that with the proverbial "German thoroughness" Last night I managed to flash my Archer C7 on OpenWrt. Had the latest TP-Link firmware and unfortunately only worked with TFTP. It took me a long time to find out that media sensing was the problem to get TFTP to work. :( I'm going to do the configuration right now. I will try myself to get VLAN working too... Many greetings from Braunschweig to Berlin
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Many thanks for your kind feedback!
@henning7801
@henning7801 3 жыл бұрын
@@OneMarcFifty Got VLAN's for IOT / Guest work on my Archer C7 :) LAN Ports and Wireless works as expected. Thanks to your video "Building a managed switch with OpenWrt on old Wifi Router" Next step is to add an additional dump AP with VLAN support, fast roaming, ...
@henning7801
@henning7801 3 жыл бұрын
I would like to see another episode on the topic. Extended firewall configuration according to the blacklist principle when using VLANs. E.g. allow HTTP / HTTPS from LAN / Guest zones, but stop sending SMB packets over the WAN interface.
@AndyShrestha
@AndyShrestha Жыл бұрын
thank you for such amazing videos.😍
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Many thanks Andy
@stbhg680p9
@stbhg680p9 Жыл бұрын
i'm from indonesia, i didnt speak english well, need more focus to understand what the meaning of so i've watch this video again and again great job, thank for your explaining video
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Hi, many thanks for your feedback. Please check out the subtitles. You should be able to use automatic translation to Indonesian.
@OpenProjktsClub
@OpenProjktsClub 3 жыл бұрын
Great tutorial
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Thank you !
@Satoshi_Nakamoto123
@Satoshi_Nakamoto123 2 жыл бұрын
Thank you so much 👍👍👍
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
You’re welcome;-)
@johnpapa8554
@johnpapa8554 2 жыл бұрын
great video once again
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Many thanks!
@vahshi9876
@vahshi9876 5 ай бұрын
Thank you Sir
@DanielAJSokolov
@DanielAJSokolov Жыл бұрын
Wonderful.
@juptech
@juptech 3 жыл бұрын
very nice, thank you sir...
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Hi thank you - glad you liked it ;-)
@HeinserTorres
@HeinserTorres 3 жыл бұрын
Awesome Thank you!
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
You're welcome!
@LeonidMutti
@LeonidMutti 5 ай бұрын
First of all, I would like to thank you. And I would like to ad just one small thing. I forgot the rule for the IOT-DHCP part in the firewall configuration section. Without it the IOT devices will never get the IP addresses 😀
@SB-qm5wg
@SB-qm5wg 2 жыл бұрын
Thank you.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
And thank you for watching ;-)
@geolan
@geolan 3 жыл бұрын
I took inspiration from my video... 😀
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Hi, I assume you meant "for" your video ? That's totally OK ;-) All the best and good luck for your channel !!!
@IndiaRan
@IndiaRan 3 жыл бұрын
Well explained and sumarized the firewall concept of openwrt, not available in utube though it is in openwrt forum scattered in bits and pieces. Looking for videos on : 1. parent contro traffic rules, esp this pandemic season it all the more imperative. Kids are smart with their whack a mole device outwits the tagged IP or MAC in traffic rules. 2. Access openwrt router from internet (we have one of the wifi tagged to OpenVPN). No videos on this in you tube. Hope there would be enough requests for these and would be helpful to mmany openwrt users. Thanks in advance.
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Many thanks for your feedback @Ranish and thank you for the suggestions - port forwarding is on my list but parental control was not - I‘ll have a look into options (hint: give your kids a separate Wifi in a separate FW zone, this is resistant against ip/mac changes)
@rlajos
@rlajos 3 жыл бұрын
Thank you for the great content! I would like to know a bit more, how do you configure the provider's router LAN output and the first OpenWRT WAN input area? Do you allow the provider's router to make the NAT? Or will it be done also in the OperWRT?
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
In my case, I just set the WAN interface of OpenWrt to DHCP, i.e. I let the ISP do NAT. From a performance standpoint not the best solution but the easiest to implement as from the ISP router's standpoint it looks like there is just one client.
@jebthereb2
@jebthereb2 3 жыл бұрын
Excellent
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Thank you!
@lamb237
@lamb237 10 ай бұрын
Great video, i'm often refering to it whenever my memory fail me :) I do have a question: On my iot zone, how would you enable smtp only to go through wan so my wireless cameras can send me emails on events. Your instructions on iot zone restrict access globally under zone forwarding proving no wan access. Would you go the by the trafics rules instead to permit only smtp protocol. Thank again for your great tutorial.
@robyp
@robyp Жыл бұрын
Thanks for the explanation, it was very clear. I have been fooled by that double "forward" setting! If I can ask, what hardware did you use to install OpenWRT on?
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Yeah, that one is hard to explain because the terms are so similar. Honestly I can’t remember which hardware I used for the video - one of Archer C7, D-Link dir2660 or potentially a VM.
@joefrank133
@joefrank133 3 жыл бұрын
Really well organized and informative! Thanks so much! Just wanted to clarify around the 8:52 mark: If I want to separate these rules, wouldn’t DNS be using UDP and DHCP using TCP? I think you might have flipped them.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
I am actually simplifying the rule in order to just use one. I open both protocols tcp and udp on both ports. But because there is nothing else on the opposite protocol there should be no risk to that.
@chenkarenina4299
@chenkarenina4299 2 жыл бұрын
@@OneMarcFifty According Wikipedia, looks only need open port 67 for DHCP cause port 68 only use to reply to client, so it not necessary. zh.wikipedia.org/wiki/%E5%8A%A8%E6%80%81%E4%B8%BB%E6%9C%BA%E8%AE%BE%E7%BD%AE%E5%8D%8F%E8%AE%AE
@MrEqtube
@MrEqtube Жыл бұрын
@@OneMarcFifty You said that DNS uses only TCP. False! DNS uses UDP unless answer is too big to be delivered over UDP, in which case server tells client to connect again using TCP.
@torstenwohemer6543
@torstenwohemer6543 2 жыл бұрын
Hey Marc, first of all thanks for this very good tutorial, which helped me very much! Also I got a question: I would like to specify a firewall zone for a specific port on my router. Is that possible? How? Thanks a lot in advance!
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Yes that’s possible. You would just have to assign a port untagged to a VLAN and then define an interface that is using the specific VLAN. With DSA on version 21 you could also just define an interface that has the port device (e.g. lan2) as the physical device and assign it to the desired zone. Just make sure the port is not on any other bridge or the like.
@ricardos3756
@ricardos3756 Жыл бұрын
This is a great video, and I used it to setup my home network with just a few customizations, but I just tried this again using OpenWRT 22.x and the changes are just too important, especially the missing "Bridge Interfaces" option which also breaks the wireless network setup. Can you please consider updating this video with a 22.x version? Thank you.
@OneMarcFifty
@OneMarcFifty Жыл бұрын
It’s true - things have changed a bit. I’ll probably do some follow up as soon as the remaining dependencies to iptables will have been removed
@TheKan3nas
@TheKan3nas Жыл бұрын
@@OneMarcFifty Please confirm can we overcome this by using a specified bridge e.g. br-lan? or I am missing something
@TimoteoTomas
@TimoteoTomas Жыл бұрын
Very enlightening! What if i have an NVR and connected it the IOT wifi, will it be able to notify me incase I turned on the Detect Motion and Notify me. Thanks and More Power!
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Hi, thanks for your comment - I personally like to do notifications over network boundaries with MQTT - for this I have Mosquitto running on my router which is accessible from all network segments
@miguelangelpatlan294
@miguelangelpatlan294 Жыл бұрын
Hi, thank you for sharing this info, question, is there a way for Block access using MAC Filtering , I just want to allow wireless connection for those devices with MAC address in my list. Regards !
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Hi, you can do that on the "Security"tab of the Wireless. Another possibility would be to just not give them IP addresses over DHCP.
@jbgrenouille2527
@jbgrenouille2527 2 жыл бұрын
Hello, excellent your lessons! :) any lesson to configure "Nat 1:1 in openwrt " or netmap - Dnetmap "??
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi JB, many thanks ;-) I'll need to have a look at NAT networks and possible videos on that - comes up quite often. But none for the time being I'm afraid ;-( kzfaq.info/love/G5Ph9Mm6UEQLJJ-kGIC2AQ
@Neo198431
@Neo198431 Жыл бұрын
Great video helped out a lot as openwrt does things differently than other custom firmwares. One thing though my tv won’t connect to the IOT wifi I created is it due to way the forwarding because the tv needs an wan connection? Or am I understanding this wrong.
@OneMarcFifty
@OneMarcFifty Жыл бұрын
It might need a default gateway- or maybe it’s checking internet access? Dificult to say from a distance
@Eurobunker
@Eurobunker 2 жыл бұрын
@10:30 what does the enabling "Bridge interfaces" here actually do? How did it help in the "next episode" and what would have happened if we didn't enable it? BTW: GREAT OpenWRT explanation. Firewall Zones on OpenWRT is a hard topic for me, but now I more or less get it.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Mainly "enabling bridge" in OpenWrt 19 links the interface to a bridge rather than one single interface. The advantage is that you can add multiple devices (Ethernet, VLANs, Wireless) to one single interface rather than have one single interface. Things have changed in OpenWrt 21 as well w/r to the separation of "interface" and "device"
@cheapthrills280
@cheapthrills280 Жыл бұрын
Thank you for this tutorial good Sir! This is verify helpful to me. Just want to add 1 question Sir. Is there a way to separate browsing (wanA) and gaming (wanB) on different wan interfaces with a failover option?
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Yes you can do that. Just define two lan interfaces, attach a wifi to each one and define the same or different firewall rules for each (basically allow forward to wan)
@katywu1
@katywu1 2 жыл бұрын
Marc - great content really enjoyed it. Just one observation in relation to the OpenWrt firewall gui screen and your comments around 6:30. Earlier in the video you explained nicely about the different tables and chains involved but your comment about ignoring the forward chain setting on the right hand side of the screen threw me at first. You are basically saying ignore it (in fact I could just set the forward action to reject) as it has no effect at all as you should actually control forwarding through the edit menu function and by how you configure the two drop down menus at the bottom of the screen i.e. "allow forward to destination zones" and "allow forward from source zones". Just thought I would check my understanding is correct? thanks again
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi - many thanks for asking ! I had to look it up before I made the video ;-) the third setting on the right is actually forwarding WITHIN the zone, i.e. if you had multiple networks inside the LAN zone and would want to allow or deny forwarding between them. So it's INSIDE one given zone. The setting that we change in the vieo is the forwarding BETWEEN zones, i.e. from one zone to another ;-) Great question - many thanks for your feedback !!!!
@VadimRotaru
@VadimRotaru Жыл бұрын
Marc, great video, convinced me to move to OpenWRT with all my thought to restrict the local devices I have as much as possible. One question though - why not restricting IoT devices to access my router? I'm not an expert, but doesn't those smart plugs represent a trojan horse for someone who knows what to do with them once they can ssh to my router? What if we "reject their input" and create the same rules as for Guest Network with DHCP rule only?
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Hi Vadim, valid approach. There is no 100% Security ;-) If someone takes over your router then you might have a whole bunch of other problems as well ;-)
@Andrew-by5yo
@Andrew-by5yo 2 жыл бұрын
Would you mind sharing what router models you use/suggest for the Router/Firewall and Access Point Devices? Thanks for these videos, I've been struggling in vain to do a similar setup using dd-wrt.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Andrew, in the video I had been using Archer C7's but I have replaced them with D-Link DIR-2660's these days. You might want to check my video on Router models here: kzfaq.info/get/bejne/rbZhjcaCp7KwYZ8.html
@cattivello
@cattivello 2 жыл бұрын
Hi, you are a great trainer. Your explanations are clear and calm. I do have a problem.. I followed your steps but I run into some issues: 1) any cable I plug in the router LAN ports seem to be routed to guest lan. 2) also the normal wifi is routed to Guest lan. I checked and rechecked your video and I dont seem to do anything different. I use Luci 21.02. Do you think that has different settings? I must say that the GUI is just a bit different an so some of the options. Any chance you can review this tutorial with the latest Luci? or give me some suggestions? Thank you
@karpwgalarecie2406
@karpwgalarecie2406 2 жыл бұрын
That's true there is new framework called DSA instead swconfig from video. it's quite embarrassing for newcomers like me too.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi, first off - many thanks for your feed-back! Actually yes, things have changed in OpenWrt 21 and more importantly with Linux Kerne 5 and the way VLANs are handled - the new DSA architecture is customized on the interface itself, there is no "switch" menu item any more. I'l see if I can update the series.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Ah - saw your reply - yes correct - DSA requires configuration on the interface itself. I'll take a note of this and update as soon as I can.
@ShadowingforEnglish
@ShadowingforEnglish 2 жыл бұрын
Thanks for the great content. I followed the procedure and put iot devices as well as my printer into a different subnet. Now my computer can't find the printer. Could you please tell me how to make my printer accessible by my computer and mobile phones?
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
You'd need an mdns repeater/IGMP proxy style of software in order to use Airprint and the like so that your phone sees the printer. Omcproxy might do the trick or else mdns-repeater in a linux container or Avahi with echo function. Plus you need to allow ports 9100, 631, 443 TCP and 5353 UDP to the printer
@oKP77o
@oKP77o Ай бұрын
Just to double check two things at 5:32 when you say that the output is set by default so the router may access all other zones, can you think of a scenario where you wouldn't wat that to happen? Also at 5:40 you mention that everything is kept its in own zone, do you mean that everything its kept in its own network within the zone that the forward policy is applied to? Want to make sure my understanding is correct, thanks again for the wonderful vids!
@michaelb.7610
@michaelb.7610 3 ай бұрын
i want to open the iot network for mqtt at port 1883 for the lan network, so that my iot devices can send packages to a mqtt broker which is in lan. I dont know how to handle it.
@samstringo4724
@samstringo4724 2 жыл бұрын
Thank you for the video! I have set up a guest wifi on my Openwrt 19.07 router. Everything works as it should, and the guest clients connected to the guest SSID cannot ping LuCi or any other IPs in the LAN zone. BUT I want the guests to be able to communicate with one IP in the LAN zone, a brother network printer. I checked what common ports are used for network printers and I have set up a traffic rule allowing use use of those ports only to the IP of the printer in the LAN zone. But I cannot access it from the guest clients. Only if I allow "Forward to destination zone LAN" in the firewall zone settings in the guest zone, the devices in the guest zone is allowed to reach the printer, but then they can access the rest of the IPs in the LAN zone as well. How can I make the traffic rule somehow override the Firewall zone settings?
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Create a traffic rule (Network - Firewall - Traffic rules). Set the protocol to TCP. Source Zone to GUEST, do NOT add a source IP. Set the destination Zone to LAN, specify the IP of your printer in the "Destination address" drop down. Specify the destination ports (e.g. "9100 631 515 443") and set the Action to "accept". Make sure that the rule is ABOVE any other deny rule (i.e. move it to the top of the list).
@Smitch1971
@Smitch1971 3 жыл бұрын
Great video again Marc :-) I have a question, is it possible to put one or more of the ethernet ports in a zone that way putting it on a seperate real network like you did with the firewall zones as opposed to a vlan?
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Thanks mate! What you are looking for _is_ effectively VLAN, you can‘t assign a switch port to a firewall zone without eth.x interface.
@chatrughanprasad7778
@chatrughanprasad7778 3 жыл бұрын
You are genous
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Thank you ;-)
@deNuNietNooitNiet
@deNuNietNooitNiet 2 жыл бұрын
This video only made me realize I do not have the basic skills. This is gonna take a while. But hey, that's the fun of it!
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi, many thanks for your comment! Oh yes - I know the feeling ;-) You know, many of my videos are born out of ideas where I had absolutely no clue before I started producing the video! I take a lot of inspiration from the discussions on Discord - basically I am only sharing my learnings ;-) If you do however have an idea on how to support with a video on basics or the like then please let me know!
@user-vh8fu8xn5x
@user-vh8fu8xn5x 3 жыл бұрын
Hi! Actions ACCEPT, REJECT ... etc. are used when we talk about rules in the chain (with appropriate criteria for a packet in these rules) but not to the chain itself. How it can be understood? Does it mean that chosen action is applied for all rules in the chain? Thank you!
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Hi Aleksandr, those rules are default settings, i.e. they apply for everything. If you want then you can have exceptions in the traffic rules and be more specific on Source IP, Destination IP and many more.
@WillClarke91
@WillClarke91 2 жыл бұрын
Hi, great videos. One question though, why does your IoT network have access to the router interface/login page? I had a rogue IoT device previously attempting user/Pw combinations, I really want to avoid this. How would I block them from seeing my router? You also said you don't want devices on your IoT network to phone home. How would they continue to work if blocked from WAN? E.g blink cameras, nest doorbells etc as they need Internet?
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Will, mainly this was just for the sake of simplification. You could as well set the default Input to "drop" and then enable only needed services (such as DNS, DHCP, maybe NTP). W/r to internet access - the IOT devices that I use are no cloud devices. They are mainly DIY devices built with ESP8266 or ESP32 micro controllers and don't need internet access. My vacuum cleaner is an exception. It does need internet access and is in a separate DMZ.
@Hydrokracker1
@Hydrokracker1 Жыл бұрын
@OneMarcFifty at the 10:39 mark you ticked the bridge interface box, in 22.03 that box no longer appears and we have to manually create a device to configure. What physical devices are you bridging by ticking that box?
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Hi Randy - as such you're just creating an empty bridge where you can add devices later. In Versions 21 and later you would create a bridge under devices and then add the devices you want to the bridge.
@zeal514
@zeal514 Жыл бұрын
Running 22.03, and setting up a zone to reject input, let's say from a guest network, is yielding all devices on the interface, in that zone, with the inability to get a IP from the DHCP server. In order for the devices to connect to the internet, they need to be configured on the device end to have a static IP within the range... I think openWRT in a update changed the way these firewall zone rules work?
@adityajoshi321
@adityajoshi321 2 жыл бұрын
Nice explanation. I just flashed openwrt to my router. I have a raspberry Pi running multiple applications on docker connected via ethernet. They all have unique IP's on my LAN ( by creating a macvlan network). Is it possible to isolate one application (using one unique lan ip) so that it cannot access other LAN devices?
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Aditya, that scenario would require the implementation of VLANs on the host and then binding the docker containers to the separate VLANs (e.g. eth0.3 / eth0.4)
@GLHerzberg
@GLHerzberg Жыл бұрын
Great channel, Great instruction too but for the life of me just could not get this tutorial to work on a Linksys EA3500 running OpenWRT 21.02.3. That said, OpenWRT's Guest WiFi Basics CLI command list also would not work which may mean the issue is with the router (or the seat to kybd interface).
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Hi Greg, some things have changed in OpenWrt 21 (what you have) as opposed to 19 (the video). Mainly bridging is done on the device tab under network-interfaces and you would then select the bridge as a device under your interface. Your Wi-fi is then added to that network.
@MrOlegrom
@MrOlegrom 6 ай бұрын
Thank you very much for the video. It's a pitty, it is outdated. I cannot follow with the video, because in the new openwrt version things are different, starting with creating interfaces. Is it possible to update the instructions?
@philtype-r810
@philtype-r810 Жыл бұрын
Thank you very much for your videos, they were really helpful for setting up OpenWRT :) Quick question: How can we isolate devices from each other in the guest network? I have created a bridge device br-guest bridging br-lan.3 and bat0.3 (I use batman-adv) and added it to the guest network. Communication between lan and guest is blocked, however the devices in guest can see and access each other. Checking AP isolation on the radios and bat0 seems to change nothing. On DD-WRT i had to manually setup ebtables. Is there any way to set this up with luci? Thanks a lot!
@OneMarcFifty
@OneMarcFifty Жыл бұрын
I have not yet found a good way to do this. If you set up Wi-fi isolation, it will work on one AP but not over many APs. Firewall-wise you can't really define such a rule in LuCI. You would need to come up with some rule based on the MAC addresses (deny all traffic from GUEST except to the router itself).
@philtype-r810
@philtype-r810 Жыл бұрын
@@OneMarcFifty Thanks for your response! I have researched a bit and found some ways to achieve this. One easy and efficient way would be to enable VLAN filtering in the br-guest settings and simply setting 1 PVID Egress untagged on each Port there. This would effectively deny all local communication on that bridge. However there are two problems: Using batman-adv on nodes, this would also deny communication to the gateway router via bat0.3. Also, there is currently a problem with the bcm4366 driver (?), where wifi does not work on bridges with VLAN filtering enabled. I did the following to achieve this goal: - Enable AP isolation on guest Wifis on each node - Install ebtables-nft and add the following to the startup of the gateway router: ebtables -A FORWARD -logical-in br-guest -logical-out br-guest -j DROP - Add this to the startup of all other nodes that are connected via batman-adv: ebtables -A FORWARD -logical-in br-guest -logical-out br-guest -in-if ! bat0.3 -out-if ! bat0.3 -j DROP I read a lot online that ebtables is quite inefficient, however this is the only way that worked for me. I didn’t notice any performance degradation doing this.
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Great one! I’ll add that to my router for testing as soon as I can - thanks for sharing!
@kuzuryu186
@kuzuryu186 Жыл бұрын
Hi Marc, quick question for you. @10:30 you mention to Bridge Interfaces, but now on latest 22.03 version that isn't there anymore. Do we need to do something different now? The only thing I could see in regards to bridging was to select the device to "Bridge: "br-lan" (lan)" but that seems to do something different...Thank you.
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Yes, you can use br-lan or any other bridge that you create under the devices tab. That does the same.
@andspenrob
@andspenrob Жыл бұрын
@@OneMarcFifty Thanks for looping back around to this! Is there any benefit to setting up a separate bridge for the guest and iot interfaces, or can they all safely use the same bridge? (i.e. why would you have set up separate ones in earlier versions?)
@blanked_out_chin
@blanked_out_chin 2 жыл бұрын
Marc, do I need to add a new interface for each Vlan ID I want my router to recognize or is adding it on the "Switch" page enough? And also do i add firewall zone settings for each? I may be thinking too complicated for this and it's much simpler than I thought
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
It depends on the OpenWrt version. I briefly touch on this in the "VLANs in OpenWrt 21" video.
@cattivello
@cattivello 2 жыл бұрын
Hi thanks for the tutorial. Very well done. I have a question: since I follow the tutoria and created the 2interfaces for IOT and guest, all my physical ports seems to fall under the IOT DHCP server. What am I doing wrong?
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Cattivello, difficult to say from a distance - are you using OpenWrt 19 or 21 ? in 21, the configuration of the VLANs is different.
@cattivello
@cattivello 2 жыл бұрын
@@OneMarcFifty 21 (yes, i noticed some differences) for the rest it all works. But at the moment i have to create static leases to make sure my devices stay in the correct subnet
@francocastilloAR
@francocastilloAR 2 жыл бұрын
@@cattivello You may be allowed to forward between firewall zones.
@donpetties1817
@donpetties1817 Жыл бұрын
Is there to still block devices on the iot firewall from the internet, but also certain ones. For example a smart TV, Google home, or HA server
@OneMarcFifty
@OneMarcFifty Жыл бұрын
You could add another zone and call it "Multimedia" or the like
@pascalmartin1891
@pascalmartin1891 Жыл бұрын
I had an IOT WiFI access point, with its own SSID and password but associated with LAN (so not network separation). I followed most of the setup here to use a separate zone: ping works but my Kasa switches are no longer acessible. This is because broadcast is used to retrieve the switches, but local broadcast does not reach the IOT (different address space). I found the udp-broadcast-relay-redux package, which does exactly what I need. If I launch it by hand to forward LAN broadcat requests to the IOT zone, then everything works. I checked and found that this was installed as a service, with a UCI-style configuration in /etc/config. However, no matter how I configure it, it does not start any instance of udp-broadcast-relay-redux. No error shown in the log either. After looking at the init script, I found that I needed to fill the "Service" attribute of the IOT interface: now "uci get network.IOT.device" returns the proper value, but the service instance still does not start. My contribution to call to action: a tutorial on how to make udp-broadcast-relay-redux work would be really nice. PS: I followed the demonstrated setup, and it worked fine (beside the broadcast issue, which I should have anticipated), even while the "Bridge Interface" option was not visible in Lucy. I understand this option was only enabled for future setups, and I guess that this is no longer needed.
@OneMarcFifty
@OneMarcFifty Жыл бұрын
Many thanks for the thorough feedback and sharing your solution
@pascalmartin1891
@pascalmartin1891 Жыл бұрын
@@OneMarcFifty I am sorry to report that I did undo the separate firewall zone, and hooked my IOT access point back to the LAN interface. The main issue has been how to setup new devices without access to the Internet. A secondary issue are the difficulties with configuring or using udp-broadcast-relay-redux. I could have setup temporary firewall rules to allow Internet access while installing new devices, but that represents an additional headache. Call to action: a video to explain the best approaches for installing new home automation devices on an IOT network without Internet access. 🙂
@AkshayCS1
@AkshayCS1 2 жыл бұрын
Thank you so much for this wonderful video! At 10:25, I'm not seeing a "Bridge Interfaces" option in the current version of Luci. Proceeding to create an interface without that option shows "Device: Not Present" under status. Any idea what could be wrong?
@sidbyron210
@sidbyron210 2 жыл бұрын
I have the same problem. Did you resolved?
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Things have changed in OpenWrt 21 - video is in the making and will come out in December !
@AkshayCS1
@AkshayCS1 2 жыл бұрын
@@sidbyron210 Yes, I managed to resolve it. I created separate VLANs and used them.
@avsomeren
@avsomeren 2 жыл бұрын
@@OneMarcFifty Am I correct that I can just create a custom device named br-GUEST and br-IOT?
@dronerequest
@dronerequest 2 жыл бұрын
@@OneMarcFifty Hello, did you ever make this video? I am stuck at this part. Thank you!
@ThePunkyDrewster
@ThePunkyDrewster 2 жыл бұрын
Hi Marc. First of all your videos are very helpful and I'm great full for you putting in the time in teaching. However, I'm having an issue that didn't work on my end (7:08 mark). I followed everything on the guest zone, then I tried on that zone with my laptop to see if it works but, it let me ssh. I must've missed a step. I watched the video over a bunch of times. And I can't seem to get out of this loop.
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Hi Drew, are you saying that you _can_ ssh into the router's guest IP even though your expectation is that you can't ? Presumably then you are connecting to the router over the LAN and not the GUEST network ? Even connecting to another IP _on_ the router would NOT go through the forward chain but through the INPUT chain of the network that you are connecting from. So if you connect from LAN, then yes - you can ssh to the guest's IP address. ut you can't do that if you come FROM guest.
@blanked_out_chin
@blanked_out_chin 2 жыл бұрын
Yes, as Marc has said, simply put: your laptop needs to be connected ONLY on your Guest Network for this to work (well, not work for the SSH part heh) if you're plugged in with ethernet, you need to make sure that port is a Guest only port and not a LAN port (via Switch>VLAN ID).
@Ilshatms
@Ilshatms 2 жыл бұрын
Hi Mark! In openwrt version 22.0.3, when creating a network interface, you need to select a device. Apparently for the guest and IOT you need to create a new device?
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Either you create a device for each VLAN (eth0.44 or the like), add it to a new bridge or you can use Distributed Switch architecture DSA. There is a video about VLANs on version 21 on my channel page
@GuilhermegRoberti
@GuilhermegRoberti Жыл бұрын
how do we do this in the new 22.x.x version of open wrt, the "physical settings" disappeared and now we have the "devices" tab
@atravels1055
@atravels1055 8 ай бұрын
Hi - I'd like to add a comment that took me hours of frustration. The 'interface' names need to be created in lowercase - otherwise there will be no IP assigned even if it's setup properly. I didn't try all capital - but a mix of lower/upper case resulted in a connection to the guest network, but no internet/obtained IP. One thing I can't get working, is connecting over wifi to the "IOT" wifi network. Was that not the intention based on these instructions? Basically, I wanted a separate "guest" network for IOT devices that can't see my LAN. I can connect to the "GUEST" network fine, but not the "IOT" one.
@evadtgov9845
@evadtgov9845 2 жыл бұрын
I only have 2 radios, so I created my primary and Guest network as described in the video. I'd like an IOT network, so how can I create a second network on one of the radios?
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
You can create multiple networks on one radio just by clicking on "Add" next to the radio under Network-Wireless. I have 6 SSIDs running here per radio.
@Raukze
@Raukze 2 жыл бұрын
Hi Marc, thanks for the video, it really helped me a lot! I have one question about my specific setup. I have one device which needs to be able to talk to all iot devices, the iot devices need to be able to talk to that one device and this but only this one device needs to be able to access the wan zone. Right now I located that one device in the iot zone but don't know how to setup a rule so that this one device can access the wan. Can you help me with this one? Thank you!
@OneMarcFifty
@OneMarcFifty 2 жыл бұрын
Go to Network-Firewall-Traffic rules, add a new rule. Name "IOT exception", protocol : TCP/UDP or whatever you need, Source Zone: IOT, Source Address: Select the device that should be able to talk to the internet. Destination Zone: WAN, Action: accept. Mae sure that rule is at the top of the list or at least before any deny rule, save and apply ;-)
@Raukze
@Raukze 2 жыл бұрын
@@OneMarcFifty Thanks for the quick reply. What I was missing was that I just allowed TCP/UDP and I was testing my connection via a ping 🤦‍♂️
@francocastilloAR
@francocastilloAR 2 жыл бұрын
@@Raukze Perhaps you had to indicate the protocol as "Any".
@anno.nym.faceless
@anno.nym.faceless 3 жыл бұрын
Nice video, already learned a lot. "IT" is complex but so interesting. The only thing that does not works for me, is my IOT wifi channel. My Smart lamps are on a cloud depended service. Perhaps somebody has a solution for this?
@OneMarcFifty
@OneMarcFifty 3 жыл бұрын
Just add a traffic rule under network-firewall and allow access for those devices
@anno.nym.faceless
@anno.nym.faceless 3 жыл бұрын
@@OneMarcFifty Thank You!, i will try to figure that out. I also better get rid of my Smart maps since they are on the tuya cloud :)
@Bobhavlin
@Bobhavlin Жыл бұрын
Thanks for the videos! I am trying to follow you to achieve the dumb AP vlan over one cable, but when I try to create the new interface I do not see the "Bridge Interfaces" checkbox (video @ 10:44) and then when adding Interface my status shows "Device: Not Present" while you show "br-GUEST" (video @ 10:54). I am on the Belkin RT3200 snapshot r21517-d7876daf65. Anyhow, it seems maybe I missed where the device br-GUEST was created. Any ideas?
@OneMarcFifty
@OneMarcFifty Жыл бұрын
This has changed in OpenWrt 21. You now create a bridge device under Network-Interfaces-devices tab, add the Ethernet ports to it. Define an interface and attach it to the bridge. When you create a Wifi you can then attach it to the network.
migrate a physical server to a virtual machine on proxmox
10:48
OneMarcFifty
Рет қаралды 46 М.
extend a guest wifi on second access point with OpenWrt using VLANs
13:56
Finger Heart - Fancy Refill (Inside Out Animation)
00:30
FASH
Рет қаралды 29 МЛН
Получилось у Миланы?😂
00:13
ХАБИБ
Рет қаралды 5 МЛН
Wi-fi basics and how to get better Wi-fi in the home network
20:36
OneMarcFifty
Рет қаралды 12 М.
Must-Have OpenWrt Router Setup For Your Proxmox
17:21
Novaspirit Tech
Рет қаралды 45 М.
VLANs in OpenWrt 21
28:27
OneMarcFifty
Рет қаралды 167 М.
Port Forwarding Explained + The Risks You Need to Know
14:03
CertBros
Рет қаралды 10 М.
OpenWrt - FOSS Firmware For Your Router
15:32
Mental Outlaw
Рет қаралды 90 М.
DO NOT design your network like this!! // FREE CCNA // EP 6
19:36
NetworkChuck
Рет қаралды 3,2 МЛН
iPhone socket cleaning #Fixit
0:30
Tamar DB (mt)
Рет қаралды 18 МЛН
Как противодействовать FPV дронам
44:34
Стратег Диванного Легиона
Рет қаралды 98 М.
Это iPhone 16
0:52
Wylsacom
Рет қаралды 786 М.
تجربة أغرب توصيلة شحن ضد القطع تماما
0:56
صدام العزي
Рет қаралды 64 МЛН
iPhone 15 Pro в реальной жизни
24:07
HUDAKOV
Рет қаралды 498 М.