I am very fresh to the forum and just joined because I'm looking to develop a comprehensive and updated guide for configuring a secure (WPA2 or comparable) wireless Mesh network with OpenWRT. I was hoping the community may be able to give this novice some help filling in the gaps.
I've been hammering away at building some sort of setup for the past month utilizing GL-AR150 devices with little luck. I have referenced several guides I've found in both this forum and others but it seems like they are not as useful anymore due to the depreciation of authsae (maybe I'm missing something however I keep getting the error [even after updating]; ' opkg_install_cmd: Cannot install package authsae.')
Has anyone had any luck implementing this on the most recent clean openWRT build for firmware: openwrt-ar150.3.017? Which packages did you install and what's the best way to set up the interfaces/networks to allow it to run smoothly?
Overall the goals for this project are below:
The Master Node (MN):
-Access to the internet
-Access to certain devices in my home network (10.0.x.x/24 range. I would utilize my home network firewall rules to restrict access to things I don't want the mesh to touch)
Remote Master Node (RMN):
-VPN access to the home network when out of range of Master Node
--IE: RMN has VPN client running/connected with assigned IP from my home network of: 10.0.50.55. Mesh Node 30 with a reserved attached device IP of 192.168.1.33 is able to access a device on the home network via VPN with IP of 10.0.50.20.
Remote Nodes (RN):
-Network Layout
--IE: Node 10 would have a static IP of 192.168.1.10, DHCP range of 11-19
Node 20 would have a static IP of 192.168.1.20, DHCP range or 21-29
-Access to and from any attached device's static reservations from any node in mesh with or without master/remote master node being available in the network.
--IE: Device at Node 10 with static reservation of 192.168.1.11 can communicate with Device at Node 40 with static reservation of 192.168.1.45 (assuming the mesh architecture figures out the best route to get to there)
and finally the best available encryption between each node
IF there is a better way to layout the network to accomplish the goals above i'm all ears. I realize what I'm suggesting may not exactly work in this environment and could require some sort of different subnetting at each device.
The functionality of authsae has been incorporated directly into wpad. However this is only found in the complete versions of wpad not the mini or basic that is installed by default. For example wpad-mesh-openssl.
Raw (mesh_fwding = 0) 802.11s as the radio interface for BATMAN is the typical modern mesh. VLANs can be applied to a bat interface with conventional notation i.e. bat0.2. VLANs cannot operate directly on the radio layer.
Awesome I knew I was missing something. I’ll give that a shot and post the results. Any thought on the network layout i proposed? Do you think that could work like that? (Assuming I just kept it flat no VLANS)
Was also thinking of trying to use OLSR unless anyone suggests I avoid that and go straight to BATMAN. After talking with some friends I think I’m going to be hard set on getting the “master node” and “remote master node” concept running smoothly. Not sure how exactly I would do that. My initial thought was some sort of WAN failover.