this archer c5 v4.1 was working fine - 19.07.3 - as a dumb ap with 2 vlans and wan as trunk port for almost a year. Since trunk port failed to communicate tried to fix updating it to update version 24.10 No success. Flashed the 19.07.3 back and set it as a switch instead with uplink via wan port.
I think this issue has relation to the cpu (eth0) wich status is NO LINK since then.
BTW, the gateway router upstream to the internet is a edge router X - 22.03.5 - via untagged port as well.
Would u guys help with some tips before i replace it considering a hw issue?
Sorry my delay. Im in a hurry and updated it to 24.10 And btw, this pop up msg came up: Switch switch0 has an unknown topology - the VLAN settings might not be accurate.:
root@OpenWrt3:~# ip link
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN qlen 1000
link/ether b0:xxxxxxxxx brd ff:ff:ff:ff:ff:ff
4: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qle n 1000
link/ether b0:xxxxxxxxx brd ff:ff:ff:ff:ff:ff
5: eth0.1@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP qlen 1000
link/ether b0:xxxxxxxxxxxxxx brd ff:ff:ff:ff:ff:ff
6: eth0.2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state U P qlen 1000
link/ether b0:xxxxxxxxx brd ff:ff:ff:ff:ff:ff
root@OpenWrt3:~#```
That is swconfig, you will have to check after upgrade. Make backups from working old version. If something breaks unzip tho¡e and type back missing configs.
Here u are the old swconfig network v. 19.07 and the current one in v 24.10
Would someone please indicate a new one wich would fix this issue (dsa, vlan and 1-4 ethernet ports)?
i lack of knowledge. Appreciate
No, I have a feeling that the OP didn't reset to defaults when they upgraded to 24.10 (or they restored their config). As such, it makes the most sense to review the config as it is in the completely default sate/
Ok... so your device is swconfig based on this default config. This means that you cannot use the DSA syntax to setup your VLANs.
It should be fairly straightforward to do what you want. The logical-to-physical port mapping is shown here.
I assume that this means both vlan1 and vlan2 are tagged on this port. If this is not the case, simply remove the t from one of the VLANs on logical port 4.
This corresponds to logical port 3. We'll remove this from the VLAN 1 stanza and add it to VLAN 2. We'll also be tagging logical port 4 (wan) in both VLAN stanzas. This is what it should look like:
Now, we'll remove the wan interfaces -- delete this:
Next, create a new bridge with eth0.2:
config device
option name 'br-lan2'
option type 'bridge'
list ports 'eth0.2'
Now we'll edit the lan:
config interface 'lan'
option device 'br-lan'
option proto 'static'
option ipaddr '192.168.1.3'
option netmask '255.255.255.0'
list dns '192.168.1.1'
option gateway '192.168.1.1'
And we can create the lan2 interface -- but I wouldn't necessarily recommend this particular config (see below):
config interface 'lan2'
option device 'br-lan2'
option proto 'static'
option ipaddr '192.168.20.3'
option netmask '255.255.255.0'
list dns '192.168.20.1'
option gateway '192.168.20.1'
Normally, a bridged AP only uses a single address -- that is, the address needed for managing the device itself. In most cases, the additional interfaces will be 'unmanaged' insofar as the device does not need an address on any other network(s). Specifically, in the case of an iot or guest situation or any untrusted network, the general idea is that those devices should not have any means of connecting to the AP's management interfaces. Instead, they just need a transparent bridge such that the wifi SSID is connected to the upstream router. Assuming that this is your general need, I'd recommend the following instead:
config interface 'lan2'
option device 'br-lan2'
option proto 'none'
The only things left will be to disable DHCP on the lan interface. I strongly recommend leaving both dnsmasq and the firewall enabled and running normally. In order to disable the DHCP server, do it explicitly in the config file by setting the lan DHCP server to ignore (option ignore '1') and also remove the IPv6 related entries.
Thank u man, for a prompt answer.
It headed me back to my first post cos trunk port cant comunicate to trunk port in the main router. clients cant get ip and none communication at all. Besides i can realize some lag using lucy and ssh as well.
Right now set it back to switch mode (all ports untagged, fixed br lan IP 192.168.1.3 /gateway 192.168.1.1 ) and also switched to a lan untagged port at main router side.
Once i read in this forum abroad the only way to get back v 19.07.03 fully working again is flashing back the original manufacturer fw, reset if and then flash openwrt snapshot and 19.07.3 later. Will try this ASAP before i consider this situation a hw failure maybe.
i first verified it when the comunnication failed. Then switched connection to a free RJ45 untagged port at upstream side (edge router x) in order discard rj45 port hw problem. There are 2 trunk ports in the main router (eth3T, eth4T )
Humm. Thank you for yr approach.
Will read it carefully before take any action (noob here). As i first said it was working properly for almost a year ( ER-x as main router with upstream to internet and 2 trunk links to archer C5 and archer C6 - 4 vlans) Till the C5 trunk began to fail... Also will consider try it next weekend and avoid network downtime. C6 covers iot and media stuff. C5 was covering a small office and still does as a regular switch.
Will share ASAP.
Do you have firewall rules to allow DHCP and DNS (you currently reject or drop input in the firewall).
Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button:
Remember to redact passwords, MAC addresses and any public IP addresses you may have:
ubus call system board
cat /etc/config/dhcp
cat /etc/config/firewall