this post was submitted on 04 Mar 2024
69 points (94.8% liked)

Selfhosted

40441 readers
867 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I am worried that there is not really a benefit of doing that, just more noise and energy consumption.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 9 points 9 months ago (1 children)

A lot of access points, even consumer-grade ones, have this option. It's usually accomplished via predefined firewall rules on the access points themselves.

Consumer-grade access points usually let you have just one isolated guest network, whereas fancier ones (Omada, Unifi, Ruckus, Aruba, etc) usually let you enable isolation for any SSID (ie the "guest network" is no different from any other SSID)

[–] [email protected] 1 points 9 months ago* (last edited 9 months ago) (3 children)

Isolated guest networks I get, but isolating guests from other guests on the same subnet/isolated net is what I haven't seen.

[–] [email protected] 2 points 9 months ago

If there's an option on the AP to not permit link local routing within a vlan/ssid, that will force all traffic up to the firewall. Then you can block intrazone traffic at the firewall level for that vlan.
I've seen this in Meraki hardware where it's referred to as "client isolation". Ubiquiti might be able to do this too.

[–] [email protected] 2 points 9 months ago

The APs know who the Wi-Fi clients are and just drops traffic between them. This is called client/station isolation. It’s often used in corporate to 1) prevent wireless clients from attacking each other (students, guests) and 2) to prevent broadcast and multicast packets from wasting all your airtime. This has the downside of breaking AirPlay, AirPrint and any other services where devices are expected to talk to each other.

[–] [email protected] 1 points 9 months ago

I used to have a Netgear Nighthawk router/AP I bought from Costco, and if I remember correctly, its guest network automatically isolated guests from other guests. This router didn't support VLANs so I think it was just a bunch of firewall rules.