{"id":251,"date":"2015-02-25T20:06:22","date_gmt":"2015-02-25T20:06:22","guid":{"rendered":"https:\/\/notiz.comanet.xyz\/?p=251"},"modified":"2019-03-03T19:42:29","modified_gmt":"2019-03-03T18:42:29","slug":"dd-wrt-guest-wireless","status":"publish","type":"post","link":"https:\/\/notiz.comanet.xyz\/?p=251","title":{"rendered":"DD-WRT Guest Wireless"},"content":{"rendered":"<p> \t&nbsp;<\/p>\n<h1> \tIntroduction<\/h1>\n<p> \tIf you&rsquo;ve done any amount of work with routers, you know that it doesn&rsquo;t take long to start craving consistency. And more advanced functionality that the cheap home interfaces simply don&rsquo;t grant you. This is the point where you usually break down and start research things like Tomato, OpenWrt, and DD-WRT, just to name a few of the more popular alternatives.<\/p>\n<p> \tThese alternate firmwares don&rsquo;t just provide a consistent administrative experience across all compatible models and brands, they also turn a cheap home router into a flexible and competitive enterprise router.<\/p>\n<h1> \t&nbsp;<\/h1>\n<h1> \tMy Setup<\/h1>\n<p> \tDD-WRT is my personal firmware of choice. Powerful, flexible, and stable. One thing that I demand in a router is the ability to broadcast a secondary SSID for my guest&rsquo;s to be able to access wireless internet in my home without also having access to my entire network of computers and devices.<\/p>\n<p> \tGladly, because my router&rsquo;s firmware was extremely slow and buggy, I flashed my <a href=\"http:\/\/www.linksys.com\/en-apac\/products\/routers\/E2500\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco E2500 router<\/a> with<a href=\"http:\/\/www.dd-wrt.com\/phpBB2\/download.php?id=21930\" target=\"_blank\" rel=\"noopener noreferrer\"> &ldquo;mini&rdquo; DD-WRT firmware<\/a> (the E2500 <a href=\"http:\/\/www.dd-wrt.com\/wiki\/index.php\/Linksys_E2500\" target=\"_blank\" rel=\"noopener noreferrer\">also supports the &ldquo;big&rdquo; firmware<\/a>). But after reviewing getting the two wireless networks setup on my router, it was brought to my attention that there are no good tutorials for how exactly you are to do this using DD-WRT. The tutorial provided on their own website, in fact, does not work. So, I find that it falls upon me to put out my particular configuration for two mutually exclusive wireless networks from a single router, both networks having access to the WAN port (that is, internet access). There are, of course, multiple ways to do this. Feel free to leave alternative suggestions in the comments.<\/p>\n<h1> \t&nbsp;<\/h1>\n<h1> \tCreate Two Wireless Networks<\/h1>\n<p> \tFirst, create your wireless networks by clicking clicking on &ldquo;Wireless&rdquo; and then &ldquo;Basic Settings&rdquo;. We&rsquo;ll setup security in a moment. After you&rsquo;ve configured your private wireless network setup, click &ldquo;Add&rdquo; under &ldquo;Virtual Interfaces&rdquo; to add the &ldquo;wl0.1 SSID&rdquo;. Give your guest network a separate SSID, and select &ldquo;Enable&rdquo; for &ldquo;AP Isolation&rdquo;.<\/p>\n<p> \tNow click &ldquo;Save&rdquo; and &ldquo;Apply Settings&rdquo;.<\/p>\n<p> \t<a href=\"http:\/\/alexlaird.com\/content\/uploads\/2013\/03\/ssid.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-243\" alt=\"ssid\" class=\"aligncenter size-medium wp-image-2973\" src=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtssid.png\" style=\"width: 807px; height: 662px;\" width=\"807\" height=\"662\" srcset=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtssid.png 807w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtssid-300x246.png 300w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtssid-768x630.png 768w\" sizes=\"auto, (max-width: 807px) 100vw, 807px\" \/><\/a><\/p>\n<h1> \t&nbsp;<\/h1>\n<h1> \tSetup Wireless Security<\/h1>\n<p> \tNavigate over to the &ldquo;Wireless Security&rdquo; tab. After you&rsquo;ve setup the wireless security for your private network, setup similar security for your guest SSID. I would advise against leaving your guest wireless completely open, but since you&rsquo;re going to be giving out this password to your guests, it should probably be a little simpler than your private network&rsquo;s key.<\/p>\n<p> \tNow click &ldquo;Save&rdquo; and &ldquo;Apply Settings&rdquo;.<\/p>\n<p> \t<a href=\"http:\/\/alexlaird.com\/content\/uploads\/2013\/03\/security.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-244\" alt=\"security\" class=\"aligncenter size-medium wp-image-2972\" src=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtsecurity.png\" style=\"width: 807px; height: 492px;\" width=\"807\" height=\"492\" srcset=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtsecurity.png 807w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtsecurity-300x183.png 300w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtsecurity-768x468.png 768w\" sizes=\"auto, (max-width: 807px) 100vw, 807px\" \/><\/a><\/p>\n<h1> \t&nbsp;<\/h1>\n<h1> \tCreate Bridge<\/h1>\n<p> \tAt this point, you have two wireless networks broadcasting on two separate SSIDs. Both networks should have internet access, but you&rsquo;ll also notice both networks dish out IPs in the same subnet, and both networks are clearly able to see each other. While you may like and trust your guests, that doesn&rsquo;t mean you necessarily want them to have access to all your network devices. To separate the network routing, we need to create a bridge and place the guest network into a different subnet.<\/p>\n<p> \tClick on &ldquo;Setup&rdquo; and then on the &ldquo;Networking&rdquo; tab. Under &ldquo;Create Bridge&rdquo; click &ldquo;Add&rdquo; to add a new bridge. Give the bridge a name, and modify the IP address of the bridge to be in a different subnet than your private network. For example, my private network grants IPs in the subnet 192.168.1.0\/24, so my guest network in the image below is setup to grant IPs in the subnet 192.168.2.0\/24.<\/p>\n<p> \tNow click &ldquo;Save&rdquo; and &ldquo;Apply Settings&rdquo;. Though the page may refresh right away, you may need to wait about a minute before the bridge is available to use in the next few steps.<\/p>\n<p> \t<a href=\"http:\/\/alexlaird.com\/content\/uploads\/2013\/03\/create-bridge.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-245\" alt=\"create-bridge\" class=\"aligncenter size-medium wp-image-2970\" src=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtcreate-bridge.png\" style=\"width: 809px; height: 405px;\" width=\"809\" height=\"405\" srcset=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtcreate-bridge.png 809w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtcreate-bridge-300x150.png 300w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtcreate-bridge-768x384.png 768w\" sizes=\"auto, (max-width: 809px) 100vw, 809px\" \/><\/a><\/p>\n<h1> \t&nbsp;<\/h1>\n<h1> \tAssign Guest Network to Bridge<\/h1>\n<p> \tUnder &ldquo;Assign to Bridge&rdquo; click &ldquo;Add&rdquo;. Select the new bridge you&rsquo;ve created from the first drop-down, and pair it with the &ldquo;wl0.1&Prime; interface.<\/p>\n<p> \tNow click &ldquo;Save&rdquo; and &ldquo;Apply Settings&rdquo;.<\/p>\n<p> \t<a href=\"http:\/\/alexlaird.com\/content\/uploads\/2013\/03\/assign-bridge.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-246\" alt=\"assign-bridge\" class=\"aligncenter size-medium wp-image-2968\" src=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtassign-bridge.png\" style=\"width: 592px; height: 215px;\" width=\"592\" height=\"215\" srcset=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtassign-bridge.png 592w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtassign-bridge-300x109.png 300w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/a><\/p>\n<h1> \t&nbsp;<\/h1>\n<h1> \tCreate DHCP Server for Guest Network<\/h1>\n<p> \tWe&rsquo;re almost there! We&rsquo;ve created a bridge in an alternate subnet, but the alternate subnet doesn&rsquo;t have a DHCP server, so our guests currently cannot access the guest SSID (unless they assign themselves a static IP). Scroll to the bottom of the &ldquo;Networking&rdquo; page and under &ldquo;Multiple DHCP Server&rdquo; click &ldquo;Add&rdquo;. Ensure your newly created bridge name is selected from the first drop-down menu.<\/p>\n<p> \tNow click &ldquo;Save&rdquo; and &ldquo;Apply Settings&rdquo;. Congratulations, we now have a working, separate guest network! Unfortunately, while users can connect to the network and DHCP is running, guest users aren&rsquo;t able to access the internet quite yet.<\/p>\n<p> \t<a href=\"http:\/\/alexlaird.com\/content\/uploads\/2013\/03\/bridge-dhcp.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-247\" alt=\"bridge-dhcp\" class=\"aligncenter size-medium wp-image-2976\" src=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtbridge-dhcp.png\" style=\"width: 587px; height: 174px;\" width=\"587\" height=\"174\" srcset=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtbridge-dhcp.png 587w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtbridge-dhcp-300x89.png 300w\" sizes=\"auto, (max-width: 587px) 100vw, 587px\" \/><\/a><\/p>\n<h1> \t&nbsp;<\/h1>\n<h1> \tCreate Firewall Rules for Guest Network<\/h1>\n<p> \tNavigate to the &ldquo;Administration&rdquo; tab and click on &ldquo;Commands&rdquo;. We need to add three rules to our firewall settings before our private network is completely secure and our guest network has internet access. Add these three rules (one per line) to the &ldquo;Commands&rdquo; text field, then click &ldquo;Save Firewall&rdquo; to ensure the rules execute even after the router is rebooted.<\/p>\n<div>\n<div class=\"syntaxhighlighter  bash\" id=\"highlighter_352821\">\n<table border=\"0\" cellpadding=\"0\" cellspacing=\"0\" height=\"86\" width=\"732\">\n<tbody>\n<tr>\n<td class=\"gutter\">\n<div class=\"line number1 index0 alt2\"> \t\t\t\t\t\t\t1<\/div>\n<div class=\"line number2 index1 alt1\"> \t\t\t\t\t\t\t2<\/div>\n<div class=\"line number3 index2 alt2\"> \t\t\t\t\t\t\t3<\/div>\n<\/td>\n<td class=\"code\">\n<div class=\"container\">\n<div class=\"line number1 index0 alt2\"> \t\t\t\t\t\t\t\t<code class=\"bash plain\">iptables -t nat -I POSTROUTING -o `get_wanface` -j SNAT --to `nvram get wan_ipaddr`<\/code><\/div>\n<div class=\"line number2 index1 alt1\"> \t\t\t\t\t\t\t\t<code class=\"bash plain\">iptables -I FORWARD -i br1 -m state --state NEW -j ACCEPT<\/code><\/div>\n<div class=\"line number3 index2 alt2\"> \t\t\t\t\t\t\t\t<code class=\"bash plain\">iptables -I FORWARD -i br1 -o br0 -m state --state NEW -j DROP<\/code><\/div>\n<\/p><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p> \t\t&nbsp;<\/p>\n<\/p><\/div>\n<p> \t<a href=\"http:\/\/alexlaird.com\/content\/uploads\/2013\/03\/firewall.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-248\" alt=\"firewall\" class=\"aligncenter size-medium wp-image-2971\" src=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtfirewall.png\" style=\"width: 806px; height: 533px;\" width=\"806\" height=\"533\" srcset=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtfirewall.png 806w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtfirewall-300x198.png 300w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/ddwrtfirewall-768x508.png 768w\" sizes=\"auto, (max-width: 806px) 100vw, 806px\" \/><\/a><\/p>\n<h1> \t&nbsp;<\/h1>\n<h1> \tImprove Guest Security<\/h1>\n<p> \tPete Runyan commented with a few more ways to nail down the security of the guest network. For one, your guests likely assume that their device on the guest network is not accessible from other devices on the same network, so you&rsquo;ll want to add the firewall rules below to make that true. It&rsquo;s also probably unnecessary (depending on your needs) to allow users on the guest network SSH, Telnet, or GUI access to the router. Append these firewall rules to harden the security of all of your networks!<\/p>\n<div>\n<div class=\"syntaxhighlighter  bash\" id=\"highlighter_777980\">\n<table border=\"0\" cellpadding=\"0\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td class=\"gutter\">\n<div class=\"line number1 index0 alt2\"> \t\t\t\t\t\t\t1<\/div>\n<div class=\"line number2 index1 alt1\"> \t\t\t\t\t\t\t2<\/div>\n<div class=\"line number3 index2 alt2\"> \t\t\t\t\t\t\t3<\/div>\n<div class=\"line number4 index3 alt1\"> \t\t\t\t\t\t\t4<\/div>\n<div class=\"line number5 index4 alt2\"> \t\t\t\t\t\t\t5<\/div>\n<\/td>\n<td class=\"code\">\n<div class=\"container\">\n<div class=\"line number1 index0 alt2\"> \t\t\t\t\t\t\t\t<code class=\"bash plain\">iptables -I FORWARD -i br0 -o br1 -m state --state NEW -j DROP<\/code><\/div>\n<div class=\"line number2 index1 alt1\"> \t\t\t\t\t\t\t\t<code class=\"bash plain\">iptables -I INPUT -i br1 -p tcp --dport telnet -j REJECT --reject-with tcp-reset<\/code><\/div>\n<div class=\"line number3 index2 alt2\"> \t\t\t\t\t\t\t\t<code class=\"bash plain\">iptables -I INPUT -i br1 -p tcp --dport <\/code><code class=\"bash functions\">ssh<\/code> <code class=\"bash plain\">-j REJECT --reject-with tcp-reset<\/code><\/div>\n<div class=\"line number4 index3 alt1\"> \t\t\t\t\t\t\t\t<code class=\"bash plain\">iptables -I INPUT -i br1 -p tcp --dport www -j REJECT --reject-with tcp-reset<\/code><\/div>\n<div class=\"line number5 index4 alt2\"> \t\t\t\t\t\t\t\t<code class=\"bash plain\">iptables -I INPUT -i br1 -p tcp --dport https -j REJECT --reject-with tcp-reset<\/code><\/div>\n<\/p><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/p><\/div>\n<h1> \t&nbsp;<\/h1>\n<h1> \tConclusion<\/h1>\n<p> \tYou should now have two working SSIDs: a private one for your home network, and a guest network for your visitors. Both networks should have internet access. The private network will function the same as a LAN and single wireless network did before, with the wireless network having full access to the LAN connections. The guest network, on the other hand, is separated from the private network. Additionally, each individual device on the guest network is separate from another, so guests cannot see each other.<\/p>\n<p> \tIf you&rsquo;ve gotten to this point and something is not working, or your guest network does not have internet access, don&rsquo;t be alarmed. DD-WRT is a always evolving, and it&rsquo;s entirely possible bridge settings or firewall rules for the latest build have changed. If this tutorial does not produce the desired result, please leave a comment below. I&rsquo;ll try to always keep the tutorial updated with instructions for the latest DD-WRT build.<\/p>\n<h1 class=\"entry-title font-headlines\" itemprop=\"headline\"> \t&nbsp;<\/h1>\n<h1 class=\"entry-title font-headlines\" itemprop=\"headline\"> \t&nbsp;<\/h1>\n<h1 class=\"entry-title font-headlines\" itemprop=\"headline\"> \tUse DD-WRT to Create a Guest WiFi Network and Block Skype<\/h1>\n<p> \t<img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-249\" alt=\"Skype\" class=\"aligncenter size-full wp-image-2471\" src=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/skype.jpg\" style=\"width: 960px; height: 300px;\" width=\"960\" height=\"300\" srcset=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/skype.jpg 960w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/skype-300x94.jpg 300w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/skype-768x240.jpg 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/p>\n<p> \t&nbsp;<\/p>\n<p> \tEven for the extremely ungeeky, having WiFi available throughout your house is pretty much standard these days. And while the next logical step of securing that network via encryption (WEP is for n00bs &mdash; those in the know use WPA2-AES) may not be standard, it really&nbsp;<em>should<\/em> be. Assuming you do have a WiFi password at your house, the notion of freely sharing your WiFi password anyone who shows up at your house is <em>so<\/em> 2009. If you truly want to bring your geeky hospitality to a whole new level, it&rsquo;s time to consider setting up a &ldquo;guest-only&rdquo; network for your wireless router.<\/p>\n<p> \tA number of modern wireless routers come with out-of-the-box support for guest networks, but still limit the amount of control you have in configuring them. As a long-time user of &ldquo;hacked&rdquo; third-party open source router firmware (such as <a href=\"http:\/\/www.polarbutt.com\/tomato\" target=\"_blank\" rel=\"noopener noreferrer\">Tomato<\/a> and <a href=\"http:\/\/dd-wrt.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">DD-WRT<\/a>), the ability to run those firmwares is an essential requirement when I purchase a router, and the installation of an open source firmware is the first thing I do when I take it out of the box.<\/p>\n<p> \tDoing the things I&rsquo;m describing in this post requires that a semi-recent build of&nbsp;DD-WRT&nbsp;be running on your wireless router. If you don&rsquo;t know what DD-WRT is, find your resident geek and ask them if installing it on your router is even an option (it will only work on certain hardware). <strong>Keep in mind<\/strong> that installing third-party firmware improperly and\/or on unsupported hardware can &ldquo;brick&rdquo; your router (i.e. make it as useful as a brick), so rookies should study up big time by reading the appropriate wiki entries and threads on the DD-WRT website before trying it for the very first time. Seriously. Please don&rsquo;t comment on this article that &ldquo;I&rdquo; ruined your router because you didn&rsquo;t RTFM. So now that my conscience is clear, let&rsquo;s proceed. <img decoding=\"async\" alt=\":)\" class=\"wp-smiley\" src=\"data:image\/gif;base64,R0lGODlhDwAPAPMAAP\/qAEVFRQAAAP\/OAP\/JAP+0AP6dAP\/+k\/\/9E\/\/\/\/\/\/\/xzMzM\/\/\/6\/\/lAAAAAAAAACH5BAEAAA4ALAAAAAAPAA8AQARa0EkZap0UgQW630QROMGhfd4wUsNAvO9grBSjICcgr+UpeD9AaBQYAASJZFJAUGEoFtqzYjscVNKA4iAIHgU70q3jDRJmJRRqWPx2390zsdWAM8OTSmFfQE8iADs=\" \/><\/p>\n<p> \tRather than re-post the instructions for getting a 2nd WiFi network running at your house, I&rsquo;ll simply refer you to the instructions on the <a href=\"http:\/\/www.dd-wrt.com\/wiki\/index.php\/Multiple_WLANs\" target=\"_blank\" rel=\"noopener noreferrer\">DD-WRT website<\/a>. The process is called setting up a 2nd WLAN (<strong>W<\/strong>ireless <strong>L<\/strong>ocal <strong>A<\/strong>rea <strong>N<\/strong>etwork).<\/p>\n<figure class=\"wp-caption aligncenter\" id=\"attachment_2473\" style=\"max-width: 600px\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-250\" alt=\"Setting up multiple WLANs in DD-WRT\" class=\"size-full wp-image-2473\" src=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/MultiWLAN.png\" style=\"width: 600px; height: 569px;\" width=\"600\" height=\"569\" srcset=\"https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/MultiWLAN.png 600w, https:\/\/notiz.comanet.xyz\/wp-content\/uploads\/2015\/02\/MultiWLAN-300x285.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption class=\"wp-caption-text font-secondary\">Setting up multiple WLANs in DD-WRT<\/figcaption><\/figure>\n<p> \tAt our house, I set up a &ldquo;private&rdquo; WiFi network for immediate family members only, which requires a password that we don&rsquo;t share with anyone else. This allows family members to access shared network resources (both wired and wireless) in the house, such as printers, NAS media storage devices, security cameras, DVRs, home automation tools, AirPlay-capable audio devices, AppleTV, etc.<\/p>\n<p> \tAdditionally, I&rsquo;ve set up a &ldquo;public&rdquo; WiFi network for guests to use, and which doesn&rsquo;t require any password. With two separate networks, I can configure separate sets of rules to make things more&nbsp;usable&nbsp;and secure across both networks. For example, I&rsquo;ve configured QoS (Quality of Service) settings that give bandwidth priority to the private network &mdash; meaning that if I&rsquo;m trying to watch something on Netflix at the same time one of my guests is trying to download a huge file, my Netflix experience is unaffected while they&rsquo;ll have to wait a bit longer for their file. I&rsquo;ve also applied a number of firewall rules to my guest network so that guests can&rsquo;t access the network resources on my private network, nor than they run network scans to try and discover the IP addresses or MAC addresses of network devices. Want to try that the next time you&rsquo;re connected to a public network? Download the free&nbsp;<strong>Fing<\/strong>&nbsp;app onto your <a href=\"https:\/\/itunes.apple.com\/us\/app\/fing-network-scanner\/id430921107\" target=\"_blank\" rel=\"noopener noreferrer\">iPhone<\/a>&nbsp;or <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.overlook.android.fing\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> device and see what kind of data you can collect at the click of a button. It&rsquo;s downright scary.<\/p>\n<p> \tBut perhaps the ability I appreciate the most is the option to to block access to certain remote resources for those on the guest network, such as Skype. As an example, let&rsquo;s take a <em>completely<\/em> hypothetical situation. Let&rsquo;s assume that your wife&rsquo;s sister&rsquo;s family, who recently moved from Seattle to Casper, Wyoming, is driving to meet you at your vacation home in Utah, where four adults and eight kids will all spend their Christmas and New Year&rsquo;s vacation together. Let&rsquo;s also assume that your 17-year old nephew has his very first girlfriend, but that she still lives back in Seattle, and that those crazy kids spend hour&hellip; after hour&hellip; after hour&hellip; on their smart phones logged in to Skype &mdash; and sometimes they just stare at each other and don&rsquo;t even talk. It&rsquo;s hypothetically creepy. Then again, let&rsquo;s assume that sometimes they do talk&hellip; for hours&hellip; and hours&hellip; even past midnight when the nephew should be sleeping, and let&rsquo;s further assume that he&rsquo;s sharing your son&rsquo;s bedroom, which is directly below yours, and that his late night Skype marathons are keeping you, your wife, and your son awake late into the night, which makes you grumpy in the morning. Like I said &mdash; <em>completely<\/em> hypothetical.<\/p>\n<p> \tWith most applications, the solution would be easy. Just go into your router&rsquo;s firewall and shut down the ports used by the application that you want to block. But because Skype uses ports 80 and 443, which are the standard ports used by nearly every website on the Internet, shutting those ports down would essentially mean shutting down access to the entire web for all users on the guest network&hellip; which kind of defeats the purpose of having a guest network in the first place. To make matters worse, Skype is a &ldquo;peer to peer&rdquo; (P2P) service, meaning that Skype users connect directly to one another, usually on remote dynamic addresses (which change often), meaning there&rsquo;s no way to predict and block the IP address of the remote user.<\/p>\n<p> \tWeb searching for a solution uncovered a number of extremely complex potential anwers, most of which involved the use of proxy servers, deep packet inspection, and a bunch of other stuff that I really didn&rsquo;t want to get into. Er&hellip; I mean, things I wouldn&rsquo;t <em>want<\/em> to get into were this something other than a completely&nbsp;hypothetical scenario.<\/p>\n<p> \tHowever, there is a small chink in Skype&rsquo;s armor&hellip; its Achilles Heel, if you will. Prior to establishing a peer-to-peer connection with another Skype user, you first need to sign in to one of Skype&rsquo;s authentication servers with your username and password. The authentication servers store your contact list, your chat history, and serve as the launching pad for all Skype chats. Best of all, finding a list of Skype&rsquo;s authentication server IP addresses only took a few seconds with search engine.<\/p>\n<p> \tWith Skype&rsquo;s authentication server IP addresses in hand, blocking access to them becomes as simple as writing a Linux firewall script to restrict access to them from the guest network. Again, this technically doesn&rsquo;t shut down the ability for the chat to take place, it shuts down the ability to <em>start<\/em> the chat, but it accomplishes the same goal. Here&rsquo;s what such a firewall command would look like, hypothetically, of course:<\/p>\n<pre>iptables -I FORWARD -i br1 -d 111.221.74.0\/24 -j DROP<\/pre>\n<p> \tIn English, that means that you want to insert (-I) a FORWARD chain rule that says any traffic coming in to the router (-i) from the guest network bridge (br1) that tries to go to any destination (-d) IP address that starts with the numbers <strong>111.221.74<\/strong>&nbsp;should be ignored (-j DROP).<\/p>\n<p> \tTherefore, adding one of these lines to your firewall script for each of Skype&rsquo;s subnets would hypothetically do the trick. Of course, if a marathon Skype chat was <em>already<\/em> underway, this wouldn&rsquo;t end it &mdash; this approach only stops new chats from starting. So to stop a chat that&rsquo;s already progress, you&rsquo;d hypothetically have to briefly shut off the guest WiFi network for a couple of seconds and then turn it back on, temporarily dropping all network access, would would hypothetically frustrate your nephew when he tries to re-initiate a Skype chat with his girlfriend. But you&rsquo;d hypothetically be able to <strong>finally<\/strong> get some decent sleep during your Christmas vacation, which would hypothetically be worth the trouble.<\/p>\n<p> \tSo, if you wanted a list of firewall rules for your router that could hypothetically secure your guest network and shut down access to all the Skype authentication servers, here&rsquo;s what that script would look like, with comments embedded to help you understand what each line is doing:<\/p>\n<p> \t&nbsp;<\/p>\n<pre>#Enable NAT on the WAN port to correct a bug in builds over 17000 iptables -t nat -I POSTROUTING -o `get_wanface` -j SNAT --to `nvram get wan_ipaddr`  #Allow br1 access to br0, the WAN, and any other subnets (required if SPI firewall is on) iptables -I FORWARD -i br1 -m state --state NEW -j ACCEPT iptables -I FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu  #Restrict br1 from accessing br0 iptables -I FORWARD -i br1 -o br0 -m state --state NEW -j DROP  #Restrict br1 from accessing the WAN subnet iptables -I FORWARD -i br1 -d `nvram get wan_ipaddr`\/`nvram get wan_netmask` -m state --state NEW -j DROP  #Restrict br1 from accessing the router&#39;s local sockets iptables -I INPUT -i br1 -m state --state NEW -j DROP  #Allow br1 to access DHCP on the router iptables -I INPUT -i br1 -p udp --dport 67 -j ACCEPT  #Allow br1 to access DNS on the router iptables -I INPUT -i br1 -p udp --dport 53 -j ACCEPT iptables -I INPUT -i br1 -p tcp --dport 53 -j ACCEPT  #Block br1 from accessing Skype authentication servers iptables -I FORWARD -i br1 -d 111.221.74.0\/24 -j DROP iptables -I FORWARD -i br1 -d 111.221.77.0\/24 -j DROP iptables -I FORWARD -i br1 -d 157.55.130.0\/24 -j DROP iptables -I FORWARD -i br1 -d 157.55.235.0\/24 -j DROP iptables -I FORWARD -i br1 -d 157.55.56.0\/24 -j DROP iptables -I FORWARD -i br1 -d 157.56.52.0\/24 -j DROP iptables -I FORWARD -i br1 -d 194.165.188.0\/24 -j DROP iptables -I FORWARD -i br1 -d 195.46.253.0\/24 -j DROP iptables -I FORWARD -i br1 -d 213.199.179.0\/24 -j DROP iptables -I FORWARD -i br1 -d 63.245.217.0\/24 -j DROP iptables -I FORWARD -i br1 -d 64.4.23.0\/24 -j DROP iptables -I FORWARD -i br1 -d 65.55.223.0\/24 -j DROP<\/pre>\n<p> \t&nbsp;<\/p>\n<p> \t&nbsp;<\/p>\n<p> \tFeel free to borrow and edit that file to your liking, just in case you ever need it. Hypothetically, of course<\/p>\n<p> \t&nbsp;<\/p>\n<h1> \tLINKS:<\/h1>\n<p class=\"post-title entry-title\"> \t<a href=\"http:\/\/www.alexlaird.com\/2013\/03\/dd-wrt-guest-wireless\/\">DD-WRT Guest Wireless<\/a><\/p>\n<p class=\"entry-title font-headlines\" itemprop=\"headline\"> \t<a href=\"http:\/\/www.stevejenkins.com\/blog\/2013\/01\/use-dd-wrt-to-create-a-guest-wifi-network-and-block-skype\/\">Use DD-WRT to Create a Guest WiFi Network and Block Skype<\/a><\/p>\n<p> \t<a href=\"http:\/\/www.wi-fiplanet.com\/tutorials\/article.php\/3931491\/ShareYourWirelessNetworkWithGuests.htm\">Share Your Wireless Network With Guests<\/a><\/p>\n<p class=\"page_title\"> \t<a href=\"http:\/\/dev.gengar.org\/2011\/02\/nocatsplash\/\" rel=\"bookmark\" title=\"Permanent Link to DD-WRT NoCatSplash Setup\">DD-WRT NoCatSplash Setup<\/a><\/p>\n<p class=\"page_title\"> \t&nbsp;<\/p>\n<p class=\"page_title\"> \t&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Introduction If you&rsquo;ve done any amount of work with routers, you know that it doesn&rsquo;t take long to start craving consistency. And more advanced functionality that the cheap home interfaces simply don&rsquo;t grant you. This is the point where you usually break down and start research things like Tomato, OpenWrt, and DD-WRT, just to&#8230;<\/p>\n","protected":false},"author":1,"featured_media":243,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-251","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-network"],"_links":{"self":[{"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=\/wp\/v2\/posts\/251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=251"}],"version-history":[{"count":1,"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=\/wp\/v2\/posts\/251\/revisions"}],"predecessor-version":[{"id":386,"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=\/wp\/v2\/posts\/251\/revisions\/386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=\/wp\/v2\/media\/243"}],"wp:attachment":[{"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/notiz.comanet.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}