For Flint3 (GL-BE9300) only.
Describes how to configure a dedicated IoT network on SSH by creating a VLAN (VID 25), a bridge, DHCP, firewall rules, and a separate 2.4 GHz Wi-Fi SSID.
1. Define VLAN 25 on eth1
We create a VLAN subinterface eth1.25 using IEEE 802.1Q tagging.
uci set network.eth1_25=device
uci set network.eth1_25.type='8021q'
uci set network.eth1_25.ifname='eth1'
uci set network.eth1_25.vid='25'
uci set network.eth1_25.name='eth1.25'
2. Create the IoT Bridge
We define a new bridge interface br-iot and attach VLAN 25 to it.
uci add network device
uci set network.@device[-1].type='bridge'
uci set network.@device[-1].name='br-iot'
uci add_list network.@device[-1].ports='eth1.25'
3. Configure the IoT Interface
The IoT interface will use a static IP for the gateway.
uci set network.iot=interface
uci set network.iot.proto='static'
uci set network.iot.device='br-iot'
uci set network.iot.ipaddr='192.168.25.1'
uci set network.iot.netmask='255.255.255.0'
4. Enable DHCP for IoT Network
We configure a DHCP server to assign IP addresses to IoT devices.
uci set dhcp.iot=dhcp
uci set dhcp.iot.interface='iot'
uci set dhcp.iot.start='100'
uci set dhcp.iot.limit='150'
uci set dhcp.iot.leasetime='12h'
5. Create IoT Firewall Zone
We define a dedicated firewall zone for IoT, allowing IoT devices to reach the Internet but restricting local traffic.
uci add firewall zone
uci set firewall.@zone[-1].name='iot'
uci set firewall.@zone[-1].input='ACCEPT'
uci set firewall.@zone[-1].output='ACCEPT'
uci set firewall.@zone[-1].forward='REJECT'
uci add_list firewall.@zone[-1].network='iot'
6. Set Firewall Forwarding Rules
- Allow IoT devices to access WAN
- Allow LAN to reach IoT (for smart home management)
uci add firewall forwarding
uci set firewall.@forwarding[-1].src='iot'
uci set firewall.@forwarding[-1].dest='wan'
uci add firewall forwarding
uci set firewall.@forwarding[-1].src='lan'
uci set firewall.@forwarding[-1].dest='iot'
7. Allow DHCP and DNS for IoT
Firewall rules are added to allow IoT clients to obtain DHCP leases and resolve DNS.
uci add firewall rule
uci set firewall.@rule[-1].name='Allow-DHCP-IoT'
uci add_list firewall.@rule[-1].proto='udp'
uci set firewall.@rule[-1].src='iot'
uci set firewall.@rule[-1].dest_port='67-68'
uci set firewall.@rule[-1].target='ACCEPT'
uci add firewall rule
uci set firewall.@rule[-1].name='Allow-DNS-IoT'
uci set firewall.@rule[-1].src='iot'
uci set firewall.@rule[-1].dest_port='53'
uci set firewall.@rule[-1].target='ACCEPT'
8. Create IoT Wi-Fi SSID (2.4 GHz)
A new wireless access point GL-Router-IoT is created on the 2.4 GHz radio, bound to the IoT network.
uci set wireless.iot24=wifi-iface
uci set wireless.iot24.device='wifi0'
uci set wireless.iot24.network='iot'
uci set wireless.iot24.mode='ap'
uci set wireless.iot24.ifname='wlan05'
uci set wireless.iot24.ssid='GL-Router-IoT'
uci set wireless.iot24.encryption='psk2+ccmp'
uci set wireless.iot24.key='goodlife'
uci set wireless.iot24.hidden='0'
uci set wireless.iot24.isolate='1'
9. Apply and Reboot
Finally, commit all changes and restart the router.
uci commit
reboot
Result
After reboot, the router will provide:
- VLAN 25 on
eth1 - IoT bridge
br-iotwith subnet192.168.25.0/24 - DHCP server for IoT clients
- Firewall rules allowing IoT → WAN and LAN → IoT
- A dedicated 2.4 GHz IoT Wi-Fi SSID
GL-Router-IoT
This setup isolates IoT devices while still allowing management access from the LAN.


