Cannot update package list on dumb AP

I'm not able to get package updates
Errors are "Failed to establish connection"

I have tried doing opkg update through SSH, same deal.
I have an internet connection from the dumb AP as well.

My main router is able to get package updates though.

Does the dumb AP know what to use for a DNS server?

1 Like

Yes it knows

Can you ping 8.8.8.8 and downloads.openwrt.org? If both fails then there seems to be a problem with the default gateway.

2 Likes

They do both fail. But the odd thing is that I have perfect connection on my client devices connected to it.
The dumb AP is the only thing having issues :confused:

Gateway is set and correct.

Can you ping the gateway?

I am guessing that you either don't have an interface for the AP, or that it isn't being trunked back to the main router.

Yes, I am able to ping the gateway.
Looks like a firewall issue to be honest, just because it cannot communicate outside the network... Idk what it would be though.

Please post here the output of the following command, copy and paste the whole block:

uci show network; uci show wireless; \
uci show firewall; uci show dhcp; \
ip -4 addr ; ip -4 ro ; ip -4 ru; iptables-save; \
head -n -0 /etc/firewall.user; \
ls -l  /etc/resolv.* /tmp/resolv.*; head -n -0 /etc/resolv.* /tmp/resolv.* ; \
cat /etc/openwrt_release ; cat /etc/opkg/distfeeds.conf

Please use "Preformatted text </>" for logs, scripts, configs and general console output.
grafik

1 Like

Here you go:

network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.globals=globals
network.globals.ula_prefix='fdf9:7c80:a4fd::/48'
network.lan=interface
network.lan.type='bridge'
network.lan.ifname='eth0.1'
network.lan.proto='static'
network.lan.ipaddr='10.0.0.2'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='60'
network.lan.gateway='10.0.0.1'
network.lan.dns='10.0.0.1'
network.wan=interface
network.wan.ifname='eth0.2'
network.wan.proto='dhcp'
network.wan6=interface
network.wan6.ifname='eth0.2'
network.wan6.proto='dhcpv6'
network.@switch[0]=switch
network.@switch[0].name='switch0'
network.@switch[0].reset='1'
network.@switch[0].enable_vlan='1'
network.@switch_vlan[0]=switch_vlan
network.@switch_vlan[0].device='switch0'
network.@switch_vlan[0].vlan='1'
network.@switch_vlan[0].ports='0 1 2 3 5t'
network.@switch_vlan[1]=switch_vlan
network.@switch_vlan[1].device='switch0'
network.@switch_vlan[1].vlan='2'
network.@switch_vlan[1].ports='4 5t'
wireless.radio0=wifi-device
wireless.radio0.type='mac80211'
wireless.radio0.channel='11'
wireless.radio0.hwmode='11g'
wireless.radio0.path='bcma0:1'
wireless.radio0.country='00'
wireless.radio0.legacy_rates='1'
wireless.default_radio0=wifi-iface
wireless.default_radio0.device='radio0'
wireless.default_radio0.network='lan'
wireless.default_radio0.mode='ap'
wireless.default_radio0.ssid='Upstairs'
wireless.default_radio0.hidden='1'
wireless.default_radio0.encryption='psk2'
wireless.default_radio0.key='onlyrealniggas'
wireless.radio1=wifi-device
wireless.radio1.type='mac80211'
wireless.radio1.channel='36'
wireless.radio1.hwmode='11a'
wireless.radio1.path='pci0000:00/0000:00:01.0/bcma1:1'
wireless.radio1.country='00'
wireless.radio1.legacy_rates='1'
wireless.default_radio1=wifi-iface
wireless.default_radio1.device='radio1'
wireless.default_radio1.network='lan'
wireless.default_radio1.mode='ap'
wireless.default_radio1.hidden='1'
wireless.default_radio1.encryption='psk2'
wireless.default_radio1.key='onlyrealniggas'
wireless.default_radio1.ssid='Upstairs5'
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood='1'
firewall.@defaults[0].input='ACCEPT'
firewall.@defaults[0].output='ACCEPT'
firewall.@defaults[0].forward='REJECT'
firewall.@zone[0]=zone
firewall.@zone[0].name='lan'
firewall.@zone[0].network='lan'
firewall.@zone[0].input='ACCEPT'
firewall.@zone[0].output='ACCEPT'
firewall.@zone[0].forward='ACCEPT'
firewall.@zone[1]=zone
firewall.@zone[1].name='wan'
firewall.@zone[1].network='wan' 'wan6'
firewall.@zone[1].input='REJECT'
firewall.@zone[1].output='ACCEPT'
firewall.@zone[1].forward='REJECT'
firewall.@zone[1].masq='1'
firewall.@zone[1].mtu_fix='1'
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src='lan'
firewall.@forwarding[0].dest='wan'
firewall.@rule[0]=rule
firewall.@rule[0].name='Allow-DHCP-Renew'
firewall.@rule[0].src='wan'
firewall.@rule[0].proto='udp'
firewall.@rule[0].dest_port='68'
firewall.@rule[0].target='ACCEPT'
firewall.@rule[0].family='ipv4'
firewall.@rule[1]=rule
firewall.@rule[1].name='Allow-Ping'
firewall.@rule[1].src='wan'
firewall.@rule[1].proto='icmp'
firewall.@rule[1].icmp_type='echo-request'
firewall.@rule[1].family='ipv4'
firewall.@rule[1].target='ACCEPT'
firewall.@rule[2]=rule
firewall.@rule[2].name='Allow-IGMP'
firewall.@rule[2].src='wan'
firewall.@rule[2].proto='igmp'
firewall.@rule[2].family='ipv4'
firewall.@rule[2].target='ACCEPT'
firewall.@rule[3]=rule
firewall.@rule[3].name='Allow-DHCPv6'
firewall.@rule[3].src='wan'
firewall.@rule[3].proto='udp'
firewall.@rule[3].src_ip='fc00::/6'
firewall.@rule[3].dest_ip='fc00::/6'
firewall.@rule[3].dest_port='546'
firewall.@rule[3].family='ipv6'
firewall.@rule[3].target='ACCEPT'
firewall.@rule[4]=rule
firewall.@rule[4].name='Allow-MLD'
firewall.@rule[4].src='wan'
firewall.@rule[4].proto='icmp'
firewall.@rule[4].src_ip='fe80::/10'
firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
firewall.@rule[4].family='ipv6'
firewall.@rule[4].target='ACCEPT'
firewall.@rule[5]=rule
firewall.@rule[5].name='Allow-ICMPv6-Input'
firewall.@rule[5].src='wan'
firewall.@rule[5].proto='icmp'
firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' 'router-solicitation' 'neighbour-solicitation' 'router-advertisement' 'neighbour-advertisement'
firewall.@rule[5].limit='1000/sec'
firewall.@rule[5].family='ipv6'
firewall.@rule[5].target='ACCEPT'
firewall.@rule[6]=rule
firewall.@rule[6].name='Allow-ICMPv6-Forward'
firewall.@rule[6].src='wan'
firewall.@rule[6].dest='*'
firewall.@rule[6].proto='icmp'
firewall.@rule[6].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
firewall.@rule[6].limit='1000/sec'
firewall.@rule[6].family='ipv6'
firewall.@rule[6].target='ACCEPT'
firewall.@rule[7]=rule
firewall.@rule[7].name='Allow-IPSec-ESP'
firewall.@rule[7].src='wan'
firewall.@rule[7].dest='lan'
firewall.@rule[7].proto='esp'
firewall.@rule[7].target='ACCEPT'
firewall.@rule[8]=rule
firewall.@rule[8].name='Allow-ISAKMP'
firewall.@rule[8].src='wan'
firewall.@rule[8].dest='lan'
firewall.@rule[8].dest_port='500'
firewall.@rule[8].proto='udp'
firewall.@rule[8].target='ACCEPT'
firewall.@include[0]=include
firewall.@include[0].path='/etc/firewall.user'
dhcp.@dnsmasq[0]=dnsmasq
dhcp.@dnsmasq[0].domainneeded='1'
dhcp.@dnsmasq[0].localise_queries='1'
dhcp.@dnsmasq[0].rebind_protection='1'
dhcp.@dnsmasq[0].rebind_localhost='1'
dhcp.@dnsmasq[0].local='/lan/'
dhcp.@dnsmasq[0].domain='lan'
dhcp.@dnsmasq[0].expandhosts='1'
dhcp.@dnsmasq[0].authoritative='1'
dhcp.@dnsmasq[0].readethers='1'
dhcp.@dnsmasq[0].leasefile='/tmp/dhcp.leases'
dhcp.@dnsmasq[0].resolvfile='/tmp/resolv.conf.auto'
dhcp.@dnsmasq[0].nonwildcard='1'
dhcp.@dnsmasq[0].localservice='1'
dhcp.@dnsmasq[0].server='10.0.0.1'
dhcp.lan=dhcp
dhcp.lan.interface='lan'
dhcp.lan.ignore='1'
dhcp.wan=dhcp
dhcp.wan.interface='wan'
dhcp.wan.ignore='1'
dhcp.odhcpd=odhcpd
dhcp.odhcpd.maindhcp='0'
dhcp.odhcpd.leasefile='/tmp/hosts/odhcpd'
dhcp.odhcpd.leasetrigger='/usr/sbin/odhcpd-update'
dhcp.odhcpd.loglevel='4'
dhcp.@domain[0]=domain
dhcp.@domain[0].name='Office'
dhcp.@domain[0].ip='10.0.0.2'
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
11: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
    inet 10.0.0.2/24 brd 10.0.0.255 scope global br-lan
       valid_lft forever preferred_lft forever
10.0.0.0/24 dev br-lan scope link  src 10.0.0.2
0:      from all lookup local
32766:  from all lookup main
32767:  from all lookup default
# Generated by iptables-save v1.6.2 on Sat Sep 14 13:42:27 2019
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
# Completed on Sat Sep 14 13:42:27 2019
# Generated by iptables-save v1.6.2 on Sat Sep 14 13:42:27 2019
*mangle
:PREROUTING ACCEPT [303228:53856313]
:INPUT ACCEPT [129916:25681889]
:FORWARD ACCEPT [3:990]
:OUTPUT ACCEPT [49928:6470894]
:POSTROUTING ACCEPT [49931:6471884]
COMMIT
# Completed on Sat Sep 14 13:42:27 2019
# Generated by iptables-save v1.6.2 on Sat Sep 14 13:42:27 2019
*filter
:INPUT ACCEPT [129920:25682209]
:FORWARD ACCEPT [3:990]
:OUTPUT ACCEPT [49932:6471582]
COMMIT
# Completed on Sat Sep 14 13:42:27 2019
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.

# Internal uci firewall chains are flushed and recreated on reload, so
# put custom rules into the root chains e.g. INPUT or FORWARD or into the
# special user chains, e.g. input_wan_rule or postrouting_lan_rule.
lrwxrwxrwx    1 root     root            16 Jun 27 12:18 /etc/resolv.conf -> /tmp/resolv.conf
lrwxrwxrwx    1 root     root            21 Sep 13 17:27 /tmp/resolv.conf -> /tmp/resolv.conf.auto
-rw-r--r--    1 root     root            82 Sep 14 07:56 /tmp/resolv.conf.auto
==> /etc/resolv.conf <==
# Interface lan
nameserver 10.0.0.1
# Interface wan6
nameserver fd1c:ca95:5c82::1

==> /tmp/resolv.conf <==
# Interface lan
nameserver 10.0.0.1
# Interface wan6
nameserver fd1c:ca95:5c82::1

==> /tmp/resolv.conf.auto <==
# Interface lan
nameserver 10.0.0.1
# Interface wan6
nameserver fd1c:ca95:5c82::1
DISTRIB_ID='OpenWrt'
DISTRIB_RELEASE='18.06.4'
DISTRIB_REVISION='r7808-ef686b7292'
DISTRIB_TARGET='brcm47xx/mips74k'
DISTRIB_ARCH='mipsel_74kc'
DISTRIB_DESCRIPTION='OpenWrt 18.06.4 r7808-ef686b7292'
DISTRIB_TAINTS=''
src/gz openwrt_core http://downloads.openwrt.org/releases/18.06.4/targets/brcm47xx/mips74k/packages
src/gz openwrt_kmods http://downloads.openwrt.org/releases/18.06.4/targets/brcm47xx/mips74k/kmods/4.14.131-1-02db999b9a35c6f18e42af9dcedf4480
src/gz openwrt_base http://downloads.openwrt.org/releases/18.06.4/packages/mipsel_74kc/base
src/gz openwrt_luci http://downloads.openwrt.org/releases/18.06.4/packages/mipsel_74kc/luci
src/gz openwrt_packages http://downloads.openwrt.org/releases/18.06.4/packages/mipsel_74kc/packages
src/gz openwrt_routing http://downloads.openwrt.org/releases/18.06.4/packages/mipsel_74kc/routing
src/gz openwrt_telephony http://downloads.openwrt.org/releases/18.06.4/packages/mipsel_74kc/telephony

The runtime configuration has no default gateway.
Perhaps the UCI configuration has not been applied properly.

uci commit; /etc/init.d/network restart; sleep 5; ip r g 1
3 Likes

This worked, thanks for the help!

1 Like

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.