Discussion Thread - 802.11s Mesh Networks [Series]

Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking
Goto page Previous  1, 2, 3  Next
Author Message
hatcreek68
DD-WRT User


Joined: 29 Nov 2016
Posts: 55
Location: New Mexico

PostPosted: Wed Jan 01, 2025 23:31    Post subject: Reply with quote
Thanks for the walk-through on mesh. I have mesh working EXCEPT one main issue I want to fix.
- I can't get WAN (internet) access on a "guest/unbridged" VAP on the secondary node. Main effort is to isolate IoT devices, which connect to the secondary node.

I followed the settings on the related wiki. Added the IP table command, rebooted, but still do not have WAN on unbridged VAP and not sure what else to try.
Code:
-iptables -I FORWARD -i wlan1.2 -d `nvram get lan_ipaddr`/`nvram get lan_netmask` -m state --state NEW -j REJECT
iptables -t nat -I POSTROUTING -o br0 -j SNAT --to `nvram get lan_ipaddr`


Background
I am testing mesh between MR7350 (primary) and R7500v2 (secondary); both on mid-Dec 2024 builds. Soon to be 2x MR7350s when the 2nd one arrives. The mesh is working with WAN access from secondary. I tinkered with 5G, 2G backhauls (individual and simultaneous), and with and without VAPs on backhaul band. Besides the expected performance hits, everything seems OK except unbridged VAP WAN. Minor bug I don't want to chase right now, 5G radio sometimes went MIA on the r7500v2 but since I'm ditching that router soon I don't want to chase down a root cause.

-Updates:
1. I mis-configured the unbridged VAP's DCHP; now it's fixed and assigns IP's to clients from the new subnet; unfortunatly, still no WAN access.


Last edited by hatcreek68 on Thu Jan 02, 2025 2:20; edited 1 time in total
Sponsor
lexridge
DD-WRT Guru


Joined: 07 Jun 2006
Posts: 2152
Location: WV, USA

PostPosted: Thu Jan 02, 2025 2:02    Post subject: Reply with quote
I am not sure why you would be using the WAN port on the secondary node. Perhaps more details about your setup and what you are trying to achieve is warranted. Usually the WAN would only be used on the primary node if it is also your main gateway to Internet.
_________________
- Linksys EA8500: I-Gateway, WAP/VAP 5ghz only. Features: VLANs, Samba, WG, Entware - r60xxx
- Linksys EA8500: 802.11s Secondary w/VLAN Trunk over 5ghz - r60xxx
- Linksys MX4300: 802.11s Primary w/VLAN Trunk over 5ghz. 2.4ghz WAP/VAP only - r60xxx
- Linksys MX4300: (WAP/VAP (7)) Multiple VLANs over single trunk port. Entware/Samba r60xxx
- Linksys MR7350: WDS Station for extended Ethernet r60xxx
- Linksys MR7500, MX8500: None in production. Just testing. r60xxx
- OSes: Fedora 40, 10 RPis (2,3,4,5), 23 ESP8266s: Straight from Amiga to Linux in '95, never having owned a Windows PC.
- Forum member #248
hatcreek68
DD-WRT User


Joined: 29 Nov 2016
Posts: 55
Location: New Mexico

PostPosted: Thu Jan 02, 2025 2:16    Post subject: Reply with quote
To clarify my issue - I made an unbridged VAP on the 2nd node, but clients have no internet (WAN) access. Bridged VAPs are working fine w/ internet (WAN) access. It's a "typical" setup w/ primary node as the gateway and 2nd node as the router/extender mesh node.

Maybe it's the wrong phrasing, but was just using WAN as in LAN vs. WAN. I'm not using the WAN ethernet port on the 2nd node.
lexridge
DD-WRT Guru


Joined: 07 Jun 2006
Posts: 2152
Location: WV, USA

PostPosted: Thu Jan 02, 2025 2:40    Post subject: Reply with quote
Okay, thanks. That is more clear now. I am no expert on 802.11s but I think unbridged VAPs would not be able to "see" the mesh as they are now disconnected from it (hence, unbridged). I think you probably may need to go with vlans instead, which is one nice advantage 802.11s has over WDS. It's covered in one of the first 3 posts above. It is more complicated to set up but sure simplifies things in the long run.

In this scenario you would not run any dhcp server on the secondary node for the VAPs. You would create additional dhcp servers on your main dhcp server (ie gateway).

EDIT: Not completely sure, but you MAY be able to add a manual route for the unbridged VAPs to the secondary mesh gateway and vise-versa. You will have to experiment with this however as I have not tried it. Not sure if this would even be secure for that matter.

_________________
- Linksys EA8500: I-Gateway, WAP/VAP 5ghz only. Features: VLANs, Samba, WG, Entware - r60xxx
- Linksys EA8500: 802.11s Secondary w/VLAN Trunk over 5ghz - r60xxx
- Linksys MX4300: 802.11s Primary w/VLAN Trunk over 5ghz. 2.4ghz WAP/VAP only - r60xxx
- Linksys MX4300: (WAP/VAP (7)) Multiple VLANs over single trunk port. Entware/Samba r60xxx
- Linksys MR7350: WDS Station for extended Ethernet r60xxx
- Linksys MR7500, MX8500: None in production. Just testing. r60xxx
- OSes: Fedora 40, 10 RPis (2,3,4,5), 23 ESP8266s: Straight from Amiga to Linux in '95, never having owned a Windows PC.
- Forum member #248
hatcreek68
DD-WRT User


Joined: 29 Nov 2016
Posts: 55
Location: New Mexico

PostPosted: Sat Jan 04, 2025 19:47    Post subject: Reply with quote
Thanks! Indeed, vlan configuration works superbly, as you have already outlined. (Link to my working configuration)

Last edited by hatcreek68 on Thu Feb 13, 2025 17:55; edited 1 time in total
bitva
DD-WRT Novice


Joined: 02 Apr 2014
Posts: 5

PostPosted: Thu Feb 13, 2025 1:23    Post subject: Reply with quote
is a VAP necessary on the back haul / 802.11s network for this to work?

When I follow these instructions, network access is flaky and it almost seems like they get put into some sort of loop or self DoS

But it's not clear if a VAP is needed or not...I can't imagine it would be.

I got 3 MX4300s, followed the instructions to a T and the network hangs like it was caught by the sheriff.
lexridge
DD-WRT Guru


Joined: 07 Jun 2006
Posts: 2152
Location: WV, USA

PostPosted: Thu Feb 13, 2025 2:54    Post subject: Reply with quote
A VAP is not at all necessary. I am not using any VAPs over 802.11s, but I did test briefly with VAPs to make sure it worked, which it did.

Beyond testing, I am presently only using 802.11s to extend VLANs wirelessly which are then assigned to the switch ports.

_________________
- Linksys EA8500: I-Gateway, WAP/VAP 5ghz only. Features: VLANs, Samba, WG, Entware - r60xxx
- Linksys EA8500: 802.11s Secondary w/VLAN Trunk over 5ghz - r60xxx
- Linksys MX4300: 802.11s Primary w/VLAN Trunk over 5ghz. 2.4ghz WAP/VAP only - r60xxx
- Linksys MX4300: (WAP/VAP (7)) Multiple VLANs over single trunk port. Entware/Samba r60xxx
- Linksys MR7350: WDS Station for extended Ethernet r60xxx
- Linksys MR7500, MX8500: None in production. Just testing. r60xxx
- OSes: Fedora 40, 10 RPis (2,3,4,5), 23 ESP8266s: Straight from Amiga to Linux in '95, never having owned a Windows PC.
- Forum member #248
johnnyNobody999
DD-WRT Guru


Joined: 10 Jan 2014
Posts: 593

PostPosted: Sat Mar 01, 2025 1:35    Post subject: Reply with quote
I tried to enable the Avoid Multi-Hop Path Discovery on my primary node but it was not retained. Tried twice. I have no idea what to do with HWMP Rootmode - my guess is it should be enabled on the primary node only?
kernel-panic69
DD-WRT Guru


Joined: 08 May 2018
Posts: 16703
Location: Texas, USA

PostPosted: Sat Mar 01, 2025 1:58    Post subject: Reply with quote
SEE: High ping times with 4th node connected
_________________
"Life is but a fleeting moment, a vapor that vanishes quickly; All is vanity"
Contribute To DD-WRT
Pogo - A minimal level of ability is expected and needed...
RSS feed for DD-WRT releases (2025)
RSS feed for DD-WRT releases (2024)
RSS feed for DD-WRT releases (2023)

----------------------
Linux User #377467 counter.li.org / linuxcounter.net
lexridge
DD-WRT Guru


Joined: 07 Jun 2006
Posts: 2152
Location: WV, USA

PostPosted: Sat Mar 01, 2025 3:45    Post subject: Reply with quote
johnnyNobody999 wrote:
I tried to enable the Avoid Multi-Hop Path Discovery on my primary node but it was not retained. Tried twice. I have no idea what to do with HWMP Rootmode - my guess is it should be enabled on the primary node only?

Sorry, when I edited this is the OP today, I forgot to mention the fix for this has not been published yet, but if you follow the link provided by @kp69, it tells you how to enable it with current firmware. Sorry for the oversight.

_________________
- Linksys EA8500: I-Gateway, WAP/VAP 5ghz only. Features: VLANs, Samba, WG, Entware - r60xxx
- Linksys EA8500: 802.11s Secondary w/VLAN Trunk over 5ghz - r60xxx
- Linksys MX4300: 802.11s Primary w/VLAN Trunk over 5ghz. 2.4ghz WAP/VAP only - r60xxx
- Linksys MX4300: (WAP/VAP (7)) Multiple VLANs over single trunk port. Entware/Samba r60xxx
- Linksys MR7350: WDS Station for extended Ethernet r60xxx
- Linksys MR7500, MX8500: None in production. Just testing. r60xxx
- OSes: Fedora 40, 10 RPis (2,3,4,5), 23 ESP8266s: Straight from Amiga to Linux in '95, never having owned a Windows PC.
- Forum member #248
AshyBoi
DD-WRT Novice


Joined: 08 Dec 2024
Posts: 12

PostPosted: Wed Mar 26, 2025 4:25    Post subject: Reply with quote
Thank you lexridge for the guide! I was able to get a 2 node mesh setup working between 2 MX4300s utilizing VLANs.

I do have one issue I need some help with. I'm running build 59171 and my setup is:

Code:

Node 1
bridge name     bridge id               STP enabled     interfaces
br0             8000.80691a1ded9d       no              eth2
                                                        eth3
                                                        wlan0
                                                        wlan1
                                                        wlan2
br1             8000.80691a1ded9d       no              wlan0.10
                                                        wlan1.1
br2             8000.80691a1ded9d       no              wlan0.20
                                                        wlan2.1
br3             8000.80691a1ded9d       no              eth1
                                                        wlan0.30

Node 2
bridge name     bridge id               STP enabled     interfaces
br0             8000.80691a228e1a       no              eth0
                                                        eth2
                                                        eth3
                                                        wlan0
                                                        wlan1
                                                        wlan2
br1             8000.80691a228e1a       no              wlan0.10
                                                        wlan1.1
br2             8000.80691a228e1a       no              wlan0.20
                                                        wlan2.1
br3             8000.80691a228e1a       no              eth1
                                                        wlan0.30


wlan0: 5GHz Mesh Backhaul
wlan1: 2.4GHz Primary network
wlan1.1: 2.4GHz VAP for Guest Network (VLAN tag 10)
wlan2: 5GHz Primary Network
wlan2.1: 5GHz VAP for Guest Network (VLAN tag 20)
eth1: port configured to behave similar to Guest network. (VLAN tag 30)


2.4GHz and 5GHz radios share the same SSID on respective Primary and Guest networks, along with same WPA2/CCMP128 security settings. The Guest network has AP Isolation/Net Isolation enabled, so that clients cannot see each other (or if they can due to mDNS enabled, they can't establish communication with each other). Node 1 handles DHCP and Firewall rules for both nodes.

For my Guest network, I had to separate wlan1.1 and wlan2.1 onto their own bridges, since having them both on the same bridge did not isolate the traffic between the two radios, i.e. client on 2.4GHz Guest could see/ping client on 5GHz guest, and vice versa.

The issue I am having is that once I extended this setup to the 2nd node, a similar thing is occurring. A client on node 1, br2, is able to see/ping a client on node 2, br2, and vice versa. Guest traffic is isolated WITHIN a node, but not ACROSS nodes. The same happens on br1 as well.

I have tried multiple variations of iptables and even ebtables rules to block this cross-node guest traffic, but have had no success:

Code:

iptables -I FORWARD -i br2 -o br2 -m state --state NEW -j REJECT

ebtables -I FORWARD -i br2 -o br2 -j DROP
ebtables -I FORWARD --logical-in br2 --logical-out br2 -j DROP
ebtables -I FORWARD -i wlan2.1 -o wlan1.1 -j DROP
ebtables -I FORWARD -i wlan1.1 -o wlan2.1 -j DROP
ebtables -I FORWARD -s 82:69:1A:1D:ED:9F -d 82:69:1A:1D:ED:A0 -j DROP
ebtables -I FORWARD -d 82:69:1A:1D:ED:9F -s 82:69:1A:1D:ED:A0 -j DROP


Has anyone else experienced this, or have any clue how to resolve it? Apart from this, the setup seems stable and I have everything else working that I need. Appreciate any input!
lexridge
DD-WRT Guru


Joined: 07 Jun 2006
Posts: 2152
Location: WV, USA

PostPosted: Wed Mar 26, 2025 4:36    Post subject: Reply with quote
I'm not sure you need any ebtables rules. iptables should do the job. My main gateway handles all these rules and the main vlan trunk, but here are mine:
Code:
# VLAN/Bridge Rules
iptables -I INPUT -i br+ -j REJECT
iptables -I INPUT -i br3 -j ACCEPT
iptables -I INPUT -i br0 -j ACCEPT

# Allow DNS and DHCP
iptables -I INPUT -i br+ -p udp -m multiport --dports 53,67 -j ACCEPT
iptables -I INPUT -i br+ -p tcp -m multiport --dports 53,67 -j ACCEPT

# Block all communications between bridges except br0->* and br3->br0
iptables -I FORWARD -i br+ -o br+ -j REJECT
iptables -I FORWARD -i br3 -o br0 -j ACCEPT
iptables -I FORWARD -i br0 -j ACCEPT


My bridges are: br0 Main LAN, br1 is IoT (untrusted), br2 is Guest (untrusted) and br3 is trusted Media. Adjust accordingly.

ea8500 secondary node one:
Code:
bridge name     bridge id               STP enabled     interfaces
br0             8000.1491827c3ac1       no              eth0
                                                        eth1
                                                        vlan1
                                                        wlan1
br1             8000.1491827c3ac1       yes             vlan10
                                                        wlan1.10
br2             8000.1491827c3ac1       yes             vlan11
                                                        wlan1.11
br3             8000.1491827c3ac1       yes             vlan12
                                                        wlan1.12


MX4300 Primary Node:
Code:
bridge name     bridge id               STP enabled     interfaces
br0             8000.80691a22a454       no              lan1
                                                        lan3
                                                        wan
                                                        wlan0
                                                        wlan1
br1             8000.80691a22a454       yes             lan1.10
                                                        wlan0.10
                                                        wlan1.1
br2             8000.80691a22a454       yes             lan1.11
                                                        wlan0.11
                                                        wlan1.2
br3             8000.80691a22a454       yes             lan1.12
                                                        lan2
                                                        wlan0.12
                                                        wlan1.3

Gateway EA8500 Main Gateway and Main Trunk w/DHCP servers:
Code:
bridge name     bridge id               STP enabled     interfaces
br0             8000.c05627101cc4       yes             eth1
                                                        vlan1
                                                        wlan1
br1             8000.c05627101cc4       yes             vlan10
br2             8000.c05627101cc4       yes             vlan11
                                                        wlan1.1
br3             8000.c05627101cc4       yes             vlan12
                                                        wlan1.2


Do NOT assign IP addresses to any bridges with the sole exception of the Main Trunk device (ie Gateway). This will create an insecure vlan environment.

Also, you need to update to a newer version. The interface names have changed from eth0-eth3 to lan1- lan4. You will need to adjust your Networking tab settings once you update because they have changed.

_________________
- Linksys EA8500: I-Gateway, WAP/VAP 5ghz only. Features: VLANs, Samba, WG, Entware - r60xxx
- Linksys EA8500: 802.11s Secondary w/VLAN Trunk over 5ghz - r60xxx
- Linksys MX4300: 802.11s Primary w/VLAN Trunk over 5ghz. 2.4ghz WAP/VAP only - r60xxx
- Linksys MX4300: (WAP/VAP (7)) Multiple VLANs over single trunk port. Entware/Samba r60xxx
- Linksys MR7350: WDS Station for extended Ethernet r60xxx
- Linksys MR7500, MX8500: None in production. Just testing. r60xxx
- OSes: Fedora 40, 10 RPis (2,3,4,5), 23 ESP8266s: Straight from Amiga to Linux in '95, never having owned a Windows PC.
- Forum member #248
AshyBoi
DD-WRT Novice


Joined: 08 Dec 2024
Posts: 12

PostPosted: Thu Mar 27, 2025 4:17    Post subject: Reply with quote
Thank you for the quick and detailed reply!

I did try to reset my firewall rules to just have something similar to yours, but my issue still persisted. I have read on other forum threads that sometimes the "AP Isolation" or "Net Isolation" features are baked-in to the driver, so I tried disabling those to allow the firewall to control everything. That didn't help either.

As you suggested, I will update to a newer firmware and try again. This time I will build out a limited setup to see if the problem reappears, or can be further isolated to specific configurations.

Have you by chance ever tested my scenario on your setup, i.e. wireless clients on same untrusted VLAN but different nodes being able to ping each other?
lexridge
DD-WRT Guru


Joined: 07 Jun 2006
Posts: 2152
Location: WV, USA

PostPosted: Thu Mar 27, 2025 4:28    Post subject: Reply with quote
I have not tested your scenario simply because I see a few issues with it. It looks like you are making it way more complicated than needed.
Quote:
wlan0: 5GHz Mesh Backhaul
wlan1: 2.4GHz Primary network
wlan1.1: 2.4GHz VAP for Guest Network (VLAN tag 10)
wlan2: 5GHz Primary Network
wlan2.1: 5GHz VAP for Guest Network (VLAN tag 20)
eth1: port configured to behave similar to Guest network. (VLAN tag 30)

So Primary wlan1 and wlan2 look fine. I am not at all sure why you have separate vlans for 2.4 and 5ghz Guests. Those can and SHOULD share the same vlan10. No need for vlan20. Also, no need for your tagged vlan30 on eth1. That should be an untagged vlan10 since it's not part (or so it seems) of a trunk port (not more than one vlan assigned to it, so why tag it?).

_________________
- Linksys EA8500: I-Gateway, WAP/VAP 5ghz only. Features: VLANs, Samba, WG, Entware - r60xxx
- Linksys EA8500: 802.11s Secondary w/VLAN Trunk over 5ghz - r60xxx
- Linksys MX4300: 802.11s Primary w/VLAN Trunk over 5ghz. 2.4ghz WAP/VAP only - r60xxx
- Linksys MX4300: (WAP/VAP (7)) Multiple VLANs over single trunk port. Entware/Samba r60xxx
- Linksys MR7350: WDS Station for extended Ethernet r60xxx
- Linksys MR7500, MX8500: None in production. Just testing. r60xxx
- OSes: Fedora 40, 10 RPis (2,3,4,5), 23 ESP8266s: Straight from Amiga to Linux in '95, never having owned a Windows PC.
- Forum member #248
AshyBoi
DD-WRT Novice


Joined: 08 Dec 2024
Posts: 12

PostPosted: Thu Mar 27, 2025 5:10    Post subject: Reply with quote
Quote:
I am not at all sure why you have separate vlans for 2.4 and 5ghz Guests. Those can and SHOULD share the same vlan10. No need for vlan20.


I initially wanted them on the same bridge to keep a simple setup, as you noted. With my pre-mesh setup using only 1 node, I noticed that if 2 guest clients are connected, one on 2.4GHz and one on 5GHz, with both wlans assigned to the same bridge, any attempt at isolating the clients from each other did not work. AP Isolation, Net Isolation, IPTABLES rules to block the bridge from itself, or to block interfaces within the bridge from each other, none of those worked.

This forum post here seems to confirm this behavior:
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320891

Another post suggested the use of ebtables to block traffic within a bridge interface:
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320004

I wasn't able to get ebtables rules to make any difference either.


Quote:
Also, no need for your tagged vlan30 on eth1. That should be an untagged vlan10 since it's not part (or so it seems) of a trunk port (not more than one vlan assigned to it, so why tag it?).


My thinking here is to reserve that ethernet port on each node to behave like a Guest network, where if the need arises I can plug in a device to it (Printer, TV, etc.) and have it isolated from my trusted network. Ideally it would be nice to just add it to the same VLAN I am already using for the guest wlans, but due to the isolation issues I am having I decided to keep it separate.
Goto page Previous  1, 2, 3  Next Display posts from previous:    Page 2 of 3
Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum