Solved

Asus RT-AC68U Guest Network configuration

Posted on 2014-10-09
5
1,802 Views
Last Modified: 2014-10-20
Hey Experts,

I just had this Asus RT-AC68U and told to make it work at a customer site.  They're current setup:

Sonicwall Firewall: 10.0.0.1
Server:  10.0.0.2
 -DHCP
 -DNS
ASUS RT-AC68U: 10.0.0.5
 -plugs into a LAN port on the firewall

They want a guest network configured with only Internet access and no access to the server.  I upgraded the firmware on the latest from the Asus site.  I'm not that familiar with these devices and I'm struggling to make it work.  I can get the wireless up and running, but it seems like every configuration I try (Router mode, Access Point mode) ends with the guests able to ping the server.

Any suggestions would be great appreciated.
Thanks!
0
Comment
Question by:xlingshot
  • 3
  • 2
5 Comments
 
LVL 3

Expert Comment

by:Davy Paridaens
ID: 40372419
Hi,

The solution to your problem should be 2 VLAN's one for your network environment with the server and the other for your guest. When i go trough the specifications of the ASUS RT-AC68U http://www.asus.com/Networking/RTAC68U/specifications/
There is no VLAN capability mentioned on the site. Can you double check it in your configuration. Let me know if you need more info or help.
0
 

Author Comment

by:xlingshot
ID: 40378246
Hi Davy,

I've checked the online manual and I can't find an option for VLANs.  I'll keep looking, but do you have any other suggestions?

Thanks!
0
 
LVL 3

Accepted Solution

by:
Davy Paridaens earned 500 total points
ID: 40379320
Look for an Access point that can manage and configure VLAN's Linksys is not expensive for example.
0
 

Author Closing Comment

by:xlingshot
ID: 40387215
Hi Davy,

I ended up using a second wireless access point and creating a DMZ port on our firewall.  This way all of the guest traffic is on the outside of the firewall.

Thanks for your input.
0
 
LVL 3

Expert Comment

by:Davy Paridaens
ID: 40391421
Hi

Good job, this is a nice solution for your problem.

Sincerely,

Davy
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

In this article we have discussed about the OS X EI Capitan and how to fix Wi-Fi issue in OS X El Capitan. We have explained how to delete system level preferences and create a new Wi-Fi location to resolve Wi-Fi issue.
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now