Hello,
Installation of OPENWRT on TP-LINK 902AC micro router is ok .
I give static address 192.168.1.253 for LAN (eth0) interface, gateway 192.168.1.1 who is my internet acces box.
2 wifi modules AC (wlan0)& N (wlan1) with 2 interfaces WLAN_AC and WLAN_N
Each one as DHCP client. Firewall zone WLAN
I made a bridge (br_lan) between eth0,wlan0,wlan1
I create a interface/firewall zone WAN with eth0 interface ( dhcp )
Everything is ok at this point .
I can connect from any device on internet from.
As i would like to make time restriction for wifi i 'm trying basic firewall rule first.
FROM LAN TO WAN REJECT (see capture )
I still have connection from my wifi to internet
Restarting firewall , but no help !
I precise, i am a very newbie in router configuration and understanding of router configuration.
Could you provide some details about what you are trying to achieve?
Start by explaining your network. You have internet box, what model?
I imagine form your question that you will want to have the TP-Link working as a router. When you do that, the Ethernet port will be a WAN port. So you would need to allow access to SSH from WAN side. We will help you with that.
Anyway, start by reverting the configuration to the default.
System > Backup / Flash Firmware > Perform Reset
When you have done that, login to the router from SSH and send the output of the following commands
His config is wrong and needs to be changed, yes,, but he also wants a firewall. Therefore, presuming that he has a reason to want a firewall, the dumpap will not help.
I believe it can work either way.
If eth and wifi are bridged all together it would make more sense to use ebtables.
If they are not bridged the normal firewall could have them in the same zone, e.g LAN and change the setting for intra zone forwarding to DROP, allowing individual IPs or MACs to be forwarded. But this also needs static route in the main router, otherwise NAT should be enabled for IPs of the Wifi interfaces.
When you create a kernel bridge, the bridge owns the IP address and any DHCP server or client. The interfaces attached to the bridge are "slaves" to it. It is like plugging Ethernet cables into an unmanaged switch. There is nothing to configure or control about the individual end interfaces, they just are connected.
The wifi-schedule package will take the AP off the air when the off time hour arrives. It isn't concerned with bridging or routing.
Should you create new interfaces, use short names in all lower case. There is a difference, and the convention is to use lower case. LuCI uppercases the names, that is confusing.
I don't know exactly you want, just want control wifi on off by time based ?
If not, you need assign wired eth0 interface to wan zone, assign wifi interface to lan zone, enable dhcp server, change ip address subnet of AP to difference with main router & create firewall rule to control.
If i made a subnet for wifi devices, for exemple,
192.168.2.100 to 2.150 , i imagine i have to create a route to subnet 192.168.1.1/254 as i would like that wifi devices can connect to the others network client ?
For the wifi devices to have unrestricted access to the whole network you would want a simple bridge or "dumb AP". The dumb AP operates as a wifi to wired converter at layer 2, much like an unmanaged Ethernet switch except that some of the connections are wireless. It doesn't route or firewall any potential traffic between the wifi users and the rest of the network. The wifi users will get their IP address from the DHCP server in the main router. They will then be in the 192.168.1.0/24 network with the main router 192.168.1.1 as their gateway to the Internet.
The only reason the dumb AP needs an IP address is to log in and administer it. Usually I set it up as a DHCP client.
A dumb AP has only one internal network, the LAN bridge (which exists by default, and can be used for this purpose). The wifi and wired ports are all attached to it. The DHCP server in the AP which exists by default needs to be turned off.
Separate "guest/restricted" interface / subnet / BSSID
Same subnet + higher level restrictions ( firewall etc. )
There are many guides available on these configurations...... The only difference as you already mention is;
adding routes possibly
disabling NAT probably
With the firewall... Just disable it..... It's internal for now..... The slowly build it it up bit by bit..... This way you will be able to learn without being overwhelmed.
What you need to do is just follow a simple one or two.... even if it's not perfect for your situation. This will give you better foundation skills.....