Ask Setting Firewall on GL .inet MT300N

Hey Guys,

Please help me how to configuration firewall on GL.inet Mt300N-v2,
I have setting snmp with mini_snmp on MT300-v2 and success snmpwalk but i want to monitoring it via cacti from another server. I just snmpwalk on MT300N but no response. Please help. My firmware is OpenWrt 18.06.1 r7258-5eb055306f

My mini_snmpd config

Firewall

My firewall config

Is the cacti server located in LAN or WAN?

thanx for reply,
this openwrt is a cacti client, for cacti server is in another server. i used connection via openvpn (tunnel interface)


heres ss for interfaces
Screenshot%20from%202019-05-06%2009-16-45

Please post here the output of the following command, all in one line
cat /etc/config/network; cat /etc/config/firewall; ip -4 addr ; ip -4 ro ; ip -4 ru

cat /etc/config/network

config interface 'loopback'
	option ifname 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option ula_prefix 'fd34:7161:a76c::/48'

config interface 'lan'
	option type 'bridge'
	option ifname 'eth0.1'
	option proto 'static'
	option netmask '255.255.255.0'
	option ip6assign '60'
	option hostname 'GL-MT300N-V2-b67'
	option ipaddr '172.16.32.1'

config interface 'wan'
	option ifname 'eth0.2'
	option proto 'dhcp'
	option hostname 'GL-MT300N-V2-b67'
	option metric '10'

config device 'wan_dev'
	option name 'eth0.2'
	option macaddr 'e4:95:6e:46:6b:67'

config interface 'wan6'
	option ifname 'eth0.2'
	option proto 'dhcpv6'

config switch
	option name 'switch0'
	option reset '1'
	option enable_vlan '1'

config switch_vlan
	option device 'switch0'
	option vlan '1'
	option ports '1 6t'

config switch_vlan
	option device 'switch0'
	option vlan '2'
	option ports '0 6t'

config interface 'tap0'
	option proto 'none'
	option ifname 'tap0'
	option auto '1'

config interface 'tap1'
	option ifname 'tap1'
	option proto 'none'
	option auto '1'

My ip route is :slightly_smiling_face:

172.16.0.0/20 via 172.16.254.1 dev tap0 proto zebra metric 20 
172.16.16.0/20 via 172.16.254.4 dev tap0 proto zebra metric 20 
172.16.32.0/24 dev br-lan proto kernel scope link src 172.16.32.1 
172.16.48.0/24 via 172.16.254.7 dev tap0 proto zebra metric 20 
172.16.60.0/24 via 172.16.254.2 dev tap0 proto zebra metric 20 
172.16.64.0/24 via 172.16.254.5 dev tap0 proto zebra metric 20 
172.16.72.0/24 via 172.16.254.6 dev tap0 proto zebra metric 20 
172.16.252.0/25 dev tap1 proto kernel scope link src 172.16.252.7 
172.16.252.128/25 via 172.16.252.1 dev tap1 
172.16.253.0/24 via 172.16.252.1 dev tap1 
172.16.254.0/25 dev tap0 proto kernel scope link src 172.16.254.3 
192.168.32.0/24 dev eth0.2 proto static scope link metric 10 
192.168.87.0/24 via 172.16.254.1 dev tap0 proto zebra metric 20

The cacti server is 172.16.0.2 and can communicate both of them.

You forgot to post the rest of the configurations I asked you.

2 Likes

This package is actually larger now; and doesn't do 64-bit counters.

root@GL-MT300N-V2:~# cat /etc/config/network; cat /etc/config/firewall; ip -4 addr ; ip -4 ro ; ip -4 ru

config interface 'loopback'
	option ifname 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option ula_prefix 'fd34:7161:a76c::/48'

config interface 'lan'
	option type 'bridge'
	option ifname 'eth0.1'
	option proto 'static'
	option netmask '255.255.255.0'
	option ip6assign '60'
	option hostname 'GL-MT300N-V2-b67'
	option ipaddr '172.16.32.1'

config interface 'wan'
	option ifname 'eth0.2'
	option proto 'dhcp'
	option hostname 'GL-MT300N-V2-b67'
	option metric '10'

config device 'wan_dev'
	option name 'eth0.2'
	option macaddr 'e4:95:6e:46:6b:67'

config interface 'wan6'
	option ifname 'eth0.2'
	option proto 'dhcpv6'

config switch
	option name 'switch0'
	option reset '1'
	option enable_vlan '1'

config switch_vlan
	option device 'switch0'
	option vlan '1'
	option ports '1 6t'

config switch_vlan
	option device 'switch0'
	option vlan '2'
	option ports '0 6t'

config interface 'tap0'
	option proto 'none'
	option ifname 'tap0'
	option auto '1'

config interface 'tap1'
	option ifname 'tap1'
	option proto 'none'
	option auto '1'


config defaults
	option syn_flood '1'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'

config zone
	option name 'lan'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'
	option network 'lan'

config zone
	option name 'wan'
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'
	option masq '1'
	option mtu_fix '1'
	option network 'wan wan6'

config forwarding
	option src 'lan'
	option dest 'wan'

config rule
	option name 'Allow-DHCP-Renew'
	option src 'wan'
	option proto 'udp'
	option dest_port '68'
	option target 'ACCEPT'
	option family 'ipv4'

config rule
	option name 'Allow-Ping'
	option src 'wan'
	option proto 'icmp'
	option icmp_type 'echo-request'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-IGMP'
	option src 'wan'
	option proto 'igmp'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-DHCPv6'
	option src 'wan'
	option proto 'udp'
	option src_ip 'fc00::/6'
	option dest_ip 'fc00::/6'
	option dest_port '546'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-MLD'
	option src 'wan'
	option proto 'icmp'
	option src_ip 'fe80::/10'
	list icmp_type '130/0'
	list icmp_type '131/0'
	list icmp_type '132/0'
	list icmp_type '143/0'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Input'
	option src 'wan'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	list icmp_type 'router-solicitation'
	list icmp_type 'neighbour-solicitation'
	list icmp_type 'router-advertisement'
	list icmp_type 'neighbour-advertisement'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Forward'
	option src 'wan'
	option dest '*'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-IPSec-ESP'
	option src 'wan'
	option dest 'lan'
	option proto 'esp'
	option target 'ACCEPT'

config rule
	option name 'Allow-ISAKMP'
	option src 'wan'
	option dest 'lan'
	option dest_port '500'
	option proto 'udp'
	option target 'ACCEPT'

config include
	option path '/etc/firewall.user'
	option reload '1'

config include 'glfw'
	option type 'script'
	option path '/usr/bin/glfw.sh'
	option reload '1'

config include 'glqos'
	option type 'script'
	option path '/usr/sbin/glqos.sh'
	option reload '1'

config include 'mwan3'
	option type 'script'
	option path '/var/etc/mwan3.include'
	option reload '1'

config rule 'glservice_rule'
	option name 'glservice'
	option dest_port '83'
	option proto 'tcp udp'
	option src 'wan'
	option target 'ACCEPT'
	option enabled '0'

config zone
	option input 'ACCEPT'
	option forward 'ACCEPT'
	option output 'ACCEPT'
	option name 'VPN'
	option network 'tap0 tap1'

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
5: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    inet 172.16.32.1/24 brd 172.16.32.255 scope global br-lan
       valid_lft forever preferred_lft forever
7: eth0.2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    inet 192.168.32.196/24 brd 192.168.32.255 scope global eth0.2
       valid_lft forever preferred_lft forever
13: tap1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100
    inet 172.16.252.7/25 brd 172.16.252.127 scope global tap1
       valid_lft forever preferred_lft forever
14: tap0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1420 qdisc fq_codel state UNKNOWN group default qlen 100
    inet 172.16.254.3/25 brd 172.16.254.127 scope global tap0
       valid_lft forever preferred_lft forever
default via 192.168.32.1 dev eth0.2 proto static src 192.168.32.196 metric 10 
172.16.0.0/20 via 172.16.254.1 dev tap0 proto zebra metric 20 
172.16.16.0/20 via 172.16.254.4 dev tap0 proto zebra metric 20 
172.16.32.0/24 dev br-lan proto kernel scope link src 172.16.32.1 
172.16.48.0/24 via 172.16.254.7 dev tap0 proto zebra metric 20 
172.16.60.0/24 via 172.16.254.2 dev tap0 proto zebra metric 20 
172.16.64.0/24 via 172.16.254.5 dev tap0 proto zebra metric 20 
172.16.72.0/24 via 172.16.254.6 dev tap0 proto zebra metric 20 
172.16.252.0/25 dev tap1 proto kernel scope link src 172.16.252.7 
172.16.252.128/25 via 172.16.252.1 dev tap1 
172.16.253.0/24 via 172.16.252.1 dev tap1 
172.16.254.0/25 dev tap0 proto kernel scope link src 172.16.254.3 
192.168.32.0/24 dev eth0.2 proto static scope link metric 10 
192.168.87.0/24 via 172.16.254.1 dev tap0 proto zebra metric 20 
0:	from all lookup local 
1001:	from all iif eth0.2 lookup main 
2001:	from all fwmark 0x100/0x3f00 lookup 1 
2061:	from all fwmark 0x3d00/0x3f00 blackhole
2062:	from all fwmark 0x3e00/0x3f00 unreachable
32766:	from all lookup main 
32767:	from all lookup default

According to your configuration snmpd listens to lan interface.

In firewall there is no rule to allow the snmp from VPN zone (better use small letters) to LAN IP of the router.
Either allow snmpd on the tap interfaces or create a firewall rule to allow the vpn->lan for snmp.

1 Like