All AP clients get their IP from DHCP servers running on router (10.11.13.1/24 for VLAN1 Private and 10.11.17.0/24 for VLAN20 Guest).
All works fine, in terms of connectivity. (On router, I block any communication from VLAN20 interface to VLAN1 interface and allow only WAN interface.)
My question is whether the setup in OpenWRT AP is sufficiently secure to block Guest WLAN clients from any access to the AP and/or Private LAN/WLAN.
That's probably a left-over when I still had the guest interface as a managed one (with IP address assigned). I deleted that after reading the forum posts here and probably forgot about the earlier firewall setup - I'll delete it now.
The guest interface probably still has a link-local IPv6 address unless you have disabled ipv6. Set network.guest.ipv6 to 0. And maybe set firewall defaults to input reject and forward reject. With ipv6 enabled and firewall allowing input it's probably possible to connect to the link-local address of the router.
uci set network.guest.ipv6=0 did remove the link-local IPv6 address from the br-guest bridge and eth0.20 iface. However, wlan0-1 still keeps the link-local IPv6 address.
root@wifi:~# ip addr | grep -A3 br-guest
12: wlan0-1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master br-guest state UP qlen 1000
link/ether 08:60:6e:e9:3c:89 brd ff:ff:ff:ff:ff:ff
inet6 fe80::a60:6eff:fee9:3c89/64 scope link
valid_lft forever preferred_lft forever
15: br-guest: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
link/ether 08:60:6e:e9:3c:89 brd ff:ff:ff:ff:ff:ff
16: eth0.20@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-guest state UP qlen 1000
link/ether 08:60:6e:e9:3c:89 brd ff:ff:ff:ff:ff:ff
I can see that wlan0-1 is automatically created for wireless wifi-iface (with ssid Guest) and the option network guest assigns it to guest network (and bridge).
Is there a way to disable IPv6 also on wlan0-1 via /etc/config files?
I recently ran into a similar situation on my OpenWrt system acting as an AP, and I'm not sure if it's a true security issue or just an annoyance.
bridge br-iot is configured with ipv6 disabled
Network IOT is configured as unmanaged
Wireless master network is attached to IOT network
In this configuration, I expected to have no IPv6 active on any parts of the IOT network or its bridged pieces. Yet, the wireless network has a link-local IPv6 address assigned. I can ping it while logged into the AP, but not from any other member of the IOT network. tcpdump shows that attempts to ping it are sending neighbor solicitation messages, but it's not responding. So, the link-local address really isn't useful to anybody else, and seemingly does not pose a security threat since nobody else can get network packets delivered to it.
So then, why is there a link-local IPv6 address assigned to the wifi interface, when its bridged network has IPv6 disabled?