I have a Fritz!Box 4040 with OpenWRT behind the ISP's router. The ISP router's network can be used by guests and the like (DMZ). In the network behind OpenWRT there is a layer-3 switch, an AP and various clients. The two networks are therefore physically separated.
In future, however, I would like to enable access to both networks in the network behind OpenWRT without duplicating cabling. I am thinking of VLANs. In contrast to OPNsense, I am not yet very familiar with OpenWRT. Can this scenario be achieved with OpenWRT and VLANs? Or is there another way?
Many people confuse L3 switches and smart/managed switches. You don't need a layer 3 switch for this functionality (although it's fine, it's usually overkill for the application). A configurable VLAN aware (i.e. a "smart" or "managed") switch is all that is necessary... many of these are just L2, some are L2+, and others are full L3.
If your ISP router has the ability to define static routes, you can actually avoid the double-NAT situation. However, as @eduperez points out, it will most likely be double-NAT since many ISP supplied routers are limited and/or provide 'simplified' user configuration pages.
What is the brand+model of the AP? What firmware is on there?
I confuse L3 switches and smart/managed switches too. Thanks for the hint.
The ISP router is a Fritz!Box 5590 with full administration access. The switch will be a Zyxel GS1200. Unless someone has a more suitable device for my situation,
Would you like to recommend a how-to or tutorial with instructions to configure OpenWRT for my needs?
Since you want to have the ISP router's network available downstream, I'd recommend that you start with a dumb AP configuration. Then, once there, we can add the new subnet -- basically mirroring the guest wifi on a dumb AP process. With the guest wifi running, we'll then make few small modifications to setup ethernet access for that guest wifi and the VLAN trunk to the switch.
A key question is if your 5590 has support for static routes. If it does, we can avoid double NAT (if not, though, no big deal).
We also need to know what your goals are in terms of the communication/isolation between the two networks so we can help you setup the firewall accordingly.
Yes, it does. At this point, I would like to mention that we are assigned a dynamic IP address by the ISP. Not sure if this is a problem.
My goal is to deny devices that I distrust access to the private network and its devices. They should only be allowed to communicate with the internet. Devices from the private network are allowed to reach all other devices. A complete separation, i.e. in both directions, would also be okay.
I have tried that. Unfortunately, I hadn't considered that I had installed stubby and adblock on OpenWRT to use my own resolver. Anyway, at some point my router was no longer accessible via LAN, I had to go into failsafe mode and reset everything.
Apart from that, I have 2 questions/comments about the second tutorial " Guest Wi-Fi on a dumb wireless AP":
In "Firewall Part 1" it says: "After you have enabled masquerading for lan, your screen should look like the screenshot above." But this statement contradicts the screenshot. Which one is correct?
In "Firewall Part 2 - Firewall traffic rules" a screenshot of the rules is missing.
I have started all over again. I have flashed the current OpenWRT. Then I ran the two tutorials . I noticed that I made two mistakes during my first attempt a week ago. Now the Dumb AP works as it should. However, two questions have arisen again:
How do I have to configure the recommended static routes?
The WAN port on the Fritzbox 4040 is now free. Can it be used as LAN port number 5? That would be important to me for the physical cabling.
Let's see your network config file, then I can explain the static route that you'll enter into the ISP router.
Probably, we'll see based on your network config file.
Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button:
Remember to redact passwords, MAC addresses and any public IP addresses you may have:
I assume you mean you want to create additional networks, rather than 'subdividing' one network. Can you be more specific about what you want to happen?