I am worried that there is not really a benefit of doing that, just more noise and energy consumption.

47 points
*

Energy consumption is essentially the same, as it’s using the same radios.

For what it’s worth, I have several SSIDs, each on a separate VLAN:

  • my main one
  • Guest. Has internet access but is otherwise isolated - Guest devices can’t communicate with other guest devices or with any other VLANs.
  • IoT Internet: IoT and home automation devices that need internet access. Things like Ecobee thermostat, Google speakers, etc
  • IoT No Internet: Home automation stuff that does not need internet access. Security cameras, Zigbee PoE dongle (SLZB-06), garage door opener, ESPHome devices, etc

(to remotely access home automation stuff, I use Home Assistant via a Tailscale VPN)

Most of these have both 2.4Ghz and 5Ghz enabled, with band steering enabled to (hopefully) convince devices to use 5Ghz when possible.

This is on a TP-Link Omada setup with 2 x EAP670 ceiling-mounted access points. You can create up to 16 SSIDs I think.

permalink
report
reply
5 points

Guest devices can’t communicate with other guest devices

How do you accomplish this isolation since they’re on the same subnet/broadcast domain? Is it a feature of the hardware you’re using?

permalink
report
parent
reply
9 points

A lot of access points, even consumer-grade ones, have this option. It’s usually accomplished via predefined firewall rules on the access points themselves.

Consumer-grade access points usually let you have just one isolated guest network, whereas fancier ones (Omada, Unifi, Ruckus, Aruba, etc) usually let you enable isolation for any SSID (ie the “guest network” is no different from any other SSID)

permalink
report
parent
reply
1 point
*

Isolated guest networks I get, but isolating guests from other guests on the same subnet/isolated net is what I haven’t seen.

permalink
report
parent
reply
1 point

Unifi out of the box settings.

permalink
report
parent
reply
1 point

For Unifi devices you setup a Virtual Network then assign the guests to that. https://help.ui.com/hc/en-us/articles/115000166827-UniFi-Hotspot-Portal-and-Guest-WiFi

permalink
report
parent
reply
0 points

I’m not seeing anything there that says guests can’t see other guests - quite the opposite.

guests connected to your Hotspot Portal will be isolated from all other networks except the one they are assigned to.

Guests on this network are able to access the internet, and communicate with the UniFi gateway to obtain a DHCP lease and resolve names using DNS

I suppose a switch could be configured to prevent traffic going to other ports, which is how I would assume this would have to be done. This functionality would have to exist in the access point, I guess?

Does UniFi have a feature to isolate devices from each other on the same subnet? Seems like it would require some kind of Layer 2 routing?

permalink
report
parent
reply
2 points

That was an amazing read. Thank you.

What do you say is the use case for separating guest Wi-Fi with the more “private” stuff on your network?

As far as I understand… Basically all communications, even inside a network, are encrypted… So I guess you do that to avoid someone trying to exploit some vulnerability?

permalink
report
parent
reply
12 points
*

Basically all communications, even inside a network, are encrypted

LOL, oh no.

Even internet traffic isn’t encrypted by default.

Sadly TCP/IP isn’t encrypted.

permalink
report
parent
reply
6 points

I think the main benefit is that Guests devices on your network can’t find and exploit your own devices.

permalink
report
parent
reply
1 point

If you don’t trust the person, why give them access to your WiFi in the first place?

permalink
report
parent
reply
3 points

Remember that once you give the password out, they likely have the password from now on. They will always have access until you change the password.

No, a lot of local traffic is not encrypted, especially residential. No, residential probably doesn’t use much authentication or separation of privileges.

permalink
report
parent
reply
2 points
*

I don’t want my guests to be able to access my home server or Omada controller for example, or spread malware (their phone may have malware without them even knowing). Also, I give the guest wifi to people other than friends, like contractors. Phone reception is horrible at my house so I give them the wifi so they can use wifi calling.

permalink
report
parent
reply
2 points

Ooh I like the idea of “no Internet.” I do trust all of those devices (open source), but they could still be pwned.

permalink
report
parent
reply
20 points

I’m not sure that I understand the “more noise and energy consumption” part, since we’re still talking about the same router with the same connected devices.

But I do have multiple SSIDs on my router. One is explicitly for IoT devices, and they don’t have network access, so they are isolated from my computers, NAS, etc.

permalink
report
reply
1 point

The more SSIDs being broadcast the more airtime is wastes on broadcasting them. SSIDs are also broadcast at a much lower speed so even though it’s a trivial amount of data, it takes longer to send. You ideally want as few SSIDs a possible but sometimes it’s unavoidable, like if you have an open guest network, or multiple authentication types used for different SSIDs.

permalink
report
parent
reply
1 point

Is there a measurable, real-world effect? Because if so, I don’t see it, and I can max out my router’s bandwidth pretty easily without noticing any slowdowns (this is with 30+ devices across three different SSIDs).

permalink
report
parent
reply
15 points

Are we talking main + guest network, or 2,4GHz + 5GHz, or something else?

permalink
report
reply
10 points

Why would you want to do this, anyway? Or, as I as a developer regularly have to ask our sales people: what do you actually want to achieve that led you to this question?

permalink
report
reply
13 points
*

Here’s my use-case, I’m pretty sure the first 2 are pretty common (common enough to be supported by most OEM firmware):

  • main LAN
  • guest LAN (isolated from “main” but can access internet)
  • IoT LAN (isolated from internet, can be accessed from “main”; prevents devices from phoning home)
permalink
report
parent
reply
0 points

But you don’t need several LANs for this. This can easily done with proper routing. A can access internet and internal network addresses. B can only access internet, and C can only reach internal addresses.

permalink
report
parent
reply
8 points

I’m curious. How would you identify who’s guest and who’s not in this case?

With multiple networks it’s pretty easy as they are on a different network.

permalink
report
parent
reply
7 points

I’m an idiot and I put emojis in my SSID and sometimes devices don’t like that but I don’t want to change everything. So there’s a guest network with no emojis

permalink
report
parent
reply
5 points

It’s more like: I know people do this, but I don’t, so I wanted to see what was the reasoning behind these things.

permalink
report
parent
reply
-1 points

Then why don’t you ask the people who do this?

permalink
report
parent
reply
4 points

Emm… I did, it’s this post 😅

permalink
report
parent
reply
8 points

Whether it has benefits is up to you, but from a technical perspective they’re as expensive as VLANs, so basically free. It’s the same receive and transmit radio, the only difference is that it broadcasts and responds to two network names at the same time. The maximum power consumption is the same: the max the radio will pull when at full load. The minimum power consumption has to be ever so slightly more since it needs to broadcast two network IDs, but those are measured in bytes and sent a couple times a second, it’s negligible compared to the cost of just running the radio.

permalink
report
reply

Selfhosted

!selfhosted@lemmy.world

Create post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

Community stats

  • 4.8K

    Monthly active users

  • 3.5K

    Posts

  • 79K

    Comments