2.4 GHz Band works but not 5GHz

Hello,

So I have my 2.4 Ghz and 5Ghz antennas on. The 2.4 Ghz works just fine. The 5Ghz broadcasts and can be connected to. While on the 5Ghz channel I can't get into my router or on to the internet.

I am new to all of this, I am thinking it is configured wrong or I am having firewall issues?

I am not sure what logs to run either...

Running a Netgear R6620

Please copy the output of the following commands and post it here using the "Preformatted text </> " button:
grafik
Remember to redact passwords, MAC addresses and any public IP addresses you may have

uci export network; uci export wireless; \
uci export dhcp; uci export firewall; \
head -n -0 /etc/firewall.user; \
iptables-save -c; \
ip -4 addr ; ip -4 ro li tab all ; ip -4 ru; \
ls -l  /etc/resolv.* /tmp/resolv.*; head -n -0 /etc/resolv.* /tmp/resolv.*

Use ssh to connect to the device.

Thanks for your quick response! Here is what I got.

package network

config interface 'loopback'
        option ifname 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fdef:d90c:2c71::/48'

config interface 'lan'
        option type 'bridge'
        option ifname 'eth0.1'
        option proto 'static'
        option netmask '255.255.255.0'
        option ip6assign '60'
        option ipaddr '192.168.2.1'
        list dns '8.8.8.8'
        list dns '8.8.4.4'

config device 'lan_eth0_1_dev'
        option name 'eth0.1'
        option macaddr ''

config interface 'wan'
        option ifname 'eth0.2'
        option proto 'dhcp'
        option type 'bridge'
        option broadcast '1'

config device 'wan_eth0_2_dev'
        option name 'eth0.2'
        option macaddr ''

config interface 'wan6'
        option ifname 'eth0.2'
        option proto 'dhcpv6'
        option type 'bridge'
        option reqaddress 'try'
        option reqprefix 'auto'

config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option ports '0 1 2 3 6t'

config switch_vlan
        option device 'switch0'
        option vlan '2'
        option ports '4 6t'

config interface 'VyperVpn'
        option ifname 'tun0'
        option proto 'none'

package wireless

config wifi-device 'radio0'
        option type 'mac80211'
        option channel '11'
        option hwmode '11g'
        option path 'pci0000:00/0000:00:01.0/0000:02:00.0'
        option htmode 'HT20'
        option country 'US'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option mode 'ap'
        option ssid 'OpenWrt'
        option key ''
        option encryption 'psk2'
        option network 'wan wan6 lan'

config wifi-device 'radio1'
        option type 'mac80211'
        option hwmode '11a'
        option path 'pci0000:00/0000:00:00.0/0000:01:00.0'
        option htmode 'VHT80'
        option channel 'auto'

config wifi-iface 'default_radio1'
        option device 'radio1'
        option mode 'ap'
        option network 'lan wan wan6'
        option key ''
        option encryption 'psk2'
        option ssid 'OpenWrt_5g'

config dnsmasq
        option domainneeded '1'
        option boguspriv '1'
        option filterwin2k '0'
        option localise_queries '1'
        option rebind_protection '1'
        option rebind_localhost '1'
        option local '/lan/'
        option domain 'lan'
        option expandhosts '1'
        option nonegcache '0'
        option authoritative '1'
        option readethers '1'
        option leasefile '/tmp/dhcp.leases'
        option resolvfile '/tmp/resolv.conf.auto'
        option nonwildcard '1'
        option localservice '1'

config dhcp 'lan'
        option interface 'lan'
        option start '100'
        option limit '150'
        option leasetime '12h'
        option dhcpv6 'server'
        option ra 'server'
        option ra_management '1'

config dhcp 'wan'
        option interface 'wan'
        option ignore '1'

config odhcpd 'odhcpd'
        option maindhcp '0'
        option leasefile '/tmp/hosts/odhcpd'
        option leasetrigger '/usr/sbin/odhcpd-update'
        option loglevel '4'

package firewall

config defaults
        option syn_flood '1'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'

config zone
        option name 'lan'
        list network 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'

config zone
        option name 'wan'
        list network 'wan'
        list network 'wan6'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'

config forwarding
        option src 'lan'
        option dest 'wan'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-IGMP'
        option src 'wan'
        option proto 'igmp'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option src_ip 'fc00::/6'
        option dest_ip 'fc00::/6'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-MLD'
        option src 'wan'
        option proto 'icmp'
        option src_ip 'fe80::/10'
        list icmp_type '130/0'
        list icmp_type '131/0'
        list icmp_type '132/0'
        list icmp_type '143/0'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-IPSec-ESP'
        option src 'wan'
        option dest 'lan'
        option proto 'esp'
        option target 'ACCEPT'

config rule
        option name 'Allow-ISAKMP'
        option src 'wan'
        option dest 'lan'
        option dest_port '500'
        option proto 'udp'
        option target 'ACCEPT'

config include
        option path '/etc/firewall.user'

config zone
        option network 'VyperVpn'
        option name 'VyperVPN'
        option mtu_fix '1'
        option input 'REJECT'
        option forward 'REJECT'
        option masq '1'
        option output 'ACCEPT'

config forwarding
        option dest 'VyperVPN'
        option src 'lan'

# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.

# Internal uci firewall chains are flushed and recreated on reload, so
# put custom rules into the root chains e.g. INPUT or FORWARD or into the
# special user chains, e.g. input_wan_rule or postrouting_lan_rule.
# Generated by iptables-save v1.8.3 on Mon Jun  1 01:01:14 2020
*nat
:PREROUTING ACCEPT [56020:8726392]
:INPUT ACCEPT [5120:371411]
:OUTPUT ACCEPT [9335:690374]
:POSTROUTING ACCEPT [210:24441]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_VyperVPN_postrouting - [0:0]
:zone_VyperVPN_prerouting - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
[56020:8726392] -A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
[26549:4818723] -A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
[16030:2937066] -A PREROUTING -i br-wan -m comment --comment "!fw3" -j zone_wan_prerouting
[3021:455635] -A PREROUTING -i br-wan6 -m comment --comment "!fw3" -j zone_wan_prerouting
[10420:514968] -A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_VyperVPN_prerouting
[27914:3006570] -A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
[41:12273] -A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
[6758:492563] -A POSTROUTING -o br-wan -m comment --comment "!fw3" -j zone_wan_postrouting
[0:0] -A POSTROUTING -o br-wan6 -m comment --comment "!fw3" -j zone_wan_postrouting
[20946:2489566] -A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_VyperVPN_postrouting
[20946:2489566] -A zone_VyperVPN_postrouting -m comment --comment "!fw3" -j MASQUERADE
[41:12273] -A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
[26549:4818723] -A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
[6758:492563] -A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
[6758:492563] -A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE
[19051:3392701] -A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
COMMIT
# Completed on Mon Jun  1 01:01:14 2020
# Generated by iptables-save v1.8.3 on Mon Jun  1 01:01:14 2020
*mangle
:PREROUTING ACCEPT [11837284:11634685227]
:INPUT ACCEPT [4932729:5652216416]
:FORWARD ACCEPT [6877835:5977178331]
:OUTPUT ACCEPT [1994218:858007758]
:POSTROUTING ACCEPT [8870147:6835090110]
[3:156] -A FORWARD -o br-wan -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
[0:0] -A FORWARD -o br-wan6 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
[7807:441264] -A FORWARD -o tun0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone VyperVPN MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Mon Jun  1 01:01:14 2020
# Generated by iptables-save v1.8.3 on Mon Jun  1 01:01:14 2020
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_VyperVPN_dest_ACCEPT - [0:0]
:zone_VyperVPN_dest_REJECT - [0:0]
:zone_VyperVPN_forward - [0:0]
:zone_VyperVPN_input - [0:0]
:zone_VyperVPN_output - [0:0]
:zone_VyperVPN_src_REJECT - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
[5579:583270] -A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
[4927152:5651633226] -A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
[4902995:5649835426] -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
[9516:397446] -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
[7961:610654] -A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
[4985:426519] -A INPUT -i br-wan -m comment --comment "!fw3" -j zone_wan_input
[746:243488] -A INPUT -i br-wan6 -m comment --comment "!fw3" -j zone_wan_input
[10465:517139] -A INPUT -i tun0 -m comment --comment "!fw3" -j zone_VyperVPN_input
[6877835:5977178331] -A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
[6864480:5974320163] -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
[13355:2858168] -A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
[0:0] -A FORWARD -i br-wan -m comment --comment "!fw3" -j zone_wan_forward
[0:0] -A FORWARD -i br-wan6 -m comment --comment "!fw3" -j zone_wan_forward
[0:0] -A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_VyperVPN_forward
[0:0] -A FORWARD -m comment --comment "!fw3" -j reject
[5579:583270] -A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
[1988641:857425672] -A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
[1979279:856730180] -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
[71:22178] -A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
[6657:484832] -A OUTPUT -o br-wan -m comment --comment "!fw3" -j zone_wan_output
[0:0] -A OUTPUT -o br-wan6 -m comment --comment "!fw3" -j zone_wan_output
[2634:188482] -A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_VyperVPN_output
[9749:437070] -A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
[5647:721100] -A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
[9516:397446] -A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
[0:0] -A syn_flood -m comment --comment "!fw3" -j DROP
[1911:97619] -A zone_VyperVPN_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
[13853:2932137] -A zone_VyperVPN_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT
[0:0] -A zone_VyperVPN_dest_REJECT -o tun0 -m comment --comment "!fw3" -j reject
[0:0] -A zone_VyperVPN_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
[0:0] -A zone_VyperVPN_forward -m comment --comment "!fw3" -j zone_VyperVPN_dest_REJECT
[0:0] -A zone_VyperVPN_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
[10465:517139] -A zone_VyperVPN_input -m comment --comment "!fw3" -j zone_VyperVPN_src_REJECT
[2634:188482] -A zone_VyperVPN_output -m comment --comment "!fw3" -j zone_VyperVPN_dest_ACCEPT
[10465:517139] -A zone_VyperVPN_src_REJECT -i tun0 -m comment --comment "!fw3" -j reject
[71:22178] -A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
[13355:2858168] -A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
[13355:2858168] -A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
[13130:2841274] -A zone_lan_forward -m comment --comment "!fw3: Zone lan to VyperVPN forwarding policy" -j zone_VyperVPN_dest_ACCEPT
[0:0] -A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
[0:0] -A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
[7961:610654] -A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
[0:0] -A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
[7961:610654] -A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
[71:22178] -A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
[71:22178] -A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
[7961:610654] -A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
[0:0] -A zone_wan_dest_ACCEPT -o br-wan -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
[6882:501726] -A zone_wan_dest_ACCEPT -o br-wan -m comment --comment "!fw3" -j ACCEPT
[0:0] -A zone_wan_dest_ACCEPT -o br-wan6 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
[0:0] -A zone_wan_dest_ACCEPT -o br-wan6 -m comment --comment "!fw3" -j ACCEPT
[0:0] -A zone_wan_dest_REJECT -o br-wan -m comment --comment "!fw3" -j reject
[0:0] -A zone_wan_dest_REJECT -o br-wan6 -m comment --comment "!fw3" -j reject
[0:0] -A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
[0:0] -A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
[0:0] -A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
[0:0] -A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
[0:0] -A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
[5731:670007] -A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
[11:3728] -A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
[0:0] -A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
[789:25248] -A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
[0:0] -A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
[4931:641031] -A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
[6657:484832] -A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
[6657:484832] -A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
[4185:397543] -A zone_wan_src_REJECT -i br-wan -m comment --comment "!fw3" -j reject
[746:243488] -A zone_wan_src_REJECT -i br-wan6 -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Mon Jun  1 01:01:14 2020
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
5: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
    inet 192.168.2.1/24 brd 192.168.2.255 scope global br-lan
       valid_lft forever preferred_lft forever
7: br-wan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
    inet 192.168.1.94/24 brd 192.168.1.255 scope global br-wan
       valid_lft forever preferred_lft forever
14: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN qlen 100
    inet 10.2.3.219/24 brd 10.2.3.255 scope global tun0
       valid_lft forever preferred_lft forever
0.0.0.0/1 via 10.2.3.1 dev tun0
default via 192.168.1.1 dev br-wan  src 192.168.1.94
10.2.3.0/24 dev tun0 scope link  src 10.2.3.219
128.0.0.0/1 via 10.2.3.1 dev tun0
192.168.1.0/24 dev br-wan scope link  src 192.168.1.94
192.168.2.0/24 dev br-lan scope link  src 192.168.2.1
209.99.94.18 via 192.168.1.1 dev br-wan
broadcast 10.2.3.0 dev tun0 table local scope link  src 10.2.3.219
local 10.2.3.219 dev tun0 table local scope host  src 10.2.3.219
broadcast 10.2.3.255 dev tun0 table local scope link  src 10.2.3.219
broadcast 127.0.0.0 dev lo table local scope link  src 127.0.0.1
local 127.0.0.0/8 dev lo table local scope host  src 127.0.0.1
local 127.0.0.1 dev lo table local scope host  src 127.0.0.1
broadcast 127.255.255.255 dev lo table local scope link  src 127.0.0.1
broadcast 192.168.1.0 dev br-wan table local scope link  src 192.168.1.94
local 192.168.1.94 dev br-wan table local scope host  src 192.168.1.94
broadcast 192.168.1.255 dev br-wan table local scope link  src 192.168.1.94
broadcast 192.168.2.0 dev br-lan table local scope link  src 192.168.2.1
local 192.168.2.1 dev br-lan table local scope host  src 192.168.2.1
broadcast 192.168.2.255 dev br-lan table local scope link  src 192.168.2.1
0:      from all lookup local
32766:  from all lookup main
32767:  from all lookup default
lrwxrwxrwx    1 root     root            16 May 16 18:32 /etc/resolv.conf -> /tmp/resolv.conf
-rw-r--r--    1 root     root            32 May 30 20:40 /tmp/resolv.conf
-rw-r--r--    1 root     root           116 May 30 20:40 /tmp/resolv.conf.auto
==> /etc/resolv.conf <==
search lan
nameserver 127.0.0.1

==> /tmp/resolv.conf <==
search lan
nameserver 127.0.0.1

==> /tmp/resolv.conf.auto <==
# Interface lan
nameserver 8.8.8.8
nameserver 8.8.4.4
# Interface wan
nameserver 192.168.1.1
search routerlogin.net

In both SSIDs you must have only lan in option network.

config interface 'wan'
...
        option type 'bridge'

Remove the bridge from wan and wan6.

1 Like

Excellent,

Thank you. That did fix that problem! I had it set up that way because it had the wan working on one of the SSIDs. That being said how do I know get the wan to both of those SSIDs? I can't find it online anywhere.

Do you trust the wan side? If yes, you can make the wan interface bridge again, then go to the SSID and in option network remove lan and add wan.

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.