Can't access NAS on different network

uci show network; uci show firewall

On which router? I think I can only do it on the "VPN" router, as the ISP one does not accept SSH/telnet connections.

So here are the results on the GL-MT300N-V2:

network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.globals=globals
network.globals.ula_prefix='fd05:d03e:7d35::/48'
network.lan=interface
network.lan.type='bridge'
network.lan.ifname='eth0.1'
network.lan.proto='static'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='60'
network.lan.hostname='GL-MT300N-V2-376'
network.lan.ipaddr='192.168.8.1'
network.wan=interface
network.wan.ifname='eth0.2'
network.wan.proto='dhcp'
network.wan.hostname='GL-MT300N-V2-376'
network.wan.metric='10'
network.wan_dev=device
network.wan_dev.name='eth0.2'
network.wan_dev.macaddr='e4:95:6e:43:23:76'
network.wan6=interface
network.wan6.ifname='eth0.2'
network.wan6.proto='dhcpv6'
network.@switch[0]=switch
network.@switch[0].name='switch0'
network.@switch[0].reset='1'
network.@switch[0].enable_vlan='1'
network.@switch_vlan[0]=switch_vlan
network.@switch_vlan[0].device='switch0'
network.@switch_vlan[0].vlan='1'
network.@switch_vlan[0].ports='1 6t'
network.@switch_vlan[1]=switch_vlan
network.@switch_vlan[1].device='switch0'
network.@switch_vlan[1].vlan='2'
network.@switch_vlan[1].ports='0 6t'
network.ovpn=interface
network.ovpn.ifname='tun0'
network.ovpn.proto='none'
network.@route[0]=route
network.@route[0].interface='wan'
network.@route[0].target='192.168.1.103'
network.@route[0].gateway='192.168.1.254'
network.@route[0].netmask='255.255.255.0'

And:

root@GL-MT300N-V2:~# uci show firewall
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood='1'
firewall.@defaults[0].input='ACCEPT'
firewall.@defaults[0].output='ACCEPT'
firewall.@defaults[0].forward='REJECT'
firewall.@zone[0]=zone
firewall.@zone[0].name='lan'
firewall.@zone[0].network='lan'
firewall.@zone[0].input='ACCEPT'
firewall.@zone[0].output='ACCEPT'
firewall.@zone[0].forward='ACCEPT'
firewall.@zone[1]=zone
firewall.@zone[1].name='wan'
firewall.@zone[1].network='wan' 'wan6'
firewall.@zone[1].input='REJECT'
firewall.@zone[1].output='ACCEPT'
firewall.@zone[1].forward='REJECT'
firewall.@zone[1].masq='1'
firewall.@zone[1].mtu_fix='1'
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src='lan'
firewall.@forwarding[0].dest='wan'
firewall.@forwarding[0].enabled='0'
firewall.@rule[0]=rule
firewall.@rule[0].name='Allow-DHCP-Renew'
firewall.@rule[0].src='wan'
firewall.@rule[0].proto='udp'
firewall.@rule[0].dest_port='68'
firewall.@rule[0].target='ACCEPT'
firewall.@rule[0].family='ipv4'
firewall.@rule[1]=rule
firewall.@rule[1].name='Allow-Ping'
firewall.@rule[1].src='wan'
firewall.@rule[1].proto='icmp'
firewall.@rule[1].icmp_type='echo-request'
firewall.@rule[1].family='ipv4'
firewall.@rule[1].target='ACCEPT'
firewall.@rule[2]=rule
firewall.@rule[2].name='Allow-IGMP'
firewall.@rule[2].src='wan'
firewall.@rule[2].proto='igmp'
firewall.@rule[2].family='ipv4'
firewall.@rule[2].target='ACCEPT'
firewall.@rule[3]=rule
firewall.@rule[3].name='Allow-DHCPv6'
firewall.@rule[3].src='wan'
firewall.@rule[3].proto='udp'
firewall.@rule[3].src_ip='fc00::/6'
firewall.@rule[3].dest_ip='fc00::/6'
firewall.@rule[3].dest_port='546'
firewall.@rule[3].family='ipv6'
firewall.@rule[3].target='ACCEPT'
firewall.@rule[4]=rule
firewall.@rule[4].name='Allow-MLD'
firewall.@rule[4].src='wan'
firewall.@rule[4].proto='icmp'
firewall.@rule[4].src_ip='fe80::/10'
firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
firewall.@rule[4].family='ipv6'
firewall.@rule[4].target='ACCEPT'
firewall.@rule[5]=rule
firewall.@rule[5].name='Allow-ICMPv6-Input'
firewall.@rule[5].src='wan'
firewall.@rule[5].proto='icmp'
firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'des
tination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-
header' 'unknown-header-type' 'router-solicitation' 'neighbo
ur-solicitation' 'router-advertisement' 'neighbour-advertise
ment'
firewall.@rule[5].limit='1000/sec'
firewall.@rule[5].family='ipv6'
firewall.@rule[5].target='ACCEPT'
firewall.@rule[6]=rule
firewall.@rule[6].name='Allow-ICMPv6-Forward'
firewall.@rule[6].src='wan'
firewall.@rule[6].dest='*'
firewall.@rule[6].proto='icmp'
firewall.@rule[6].icmp_type='echo-request' 'echo-reply' 'des
tination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-
header' 'unknown-header-type'
firewall.@rule[6].limit='1000/sec'
firewall.@rule[6].family='ipv6'
firewall.@rule[6].target='ACCEPT'
firewall.@rule[7]=rule
firewall.@rule[7].name='Allow-IPSec-ESP'
firewall.@rule[7].src='wan'
firewall.@rule[7].dest='lan'
firewall.@rule[7].proto='esp'
firewall.@rule[7].target='ACCEPT'
firewall.@rule[8]=rule
firewall.@rule[8].name='Allow-ISAKMP'
firewall.@rule[8].src='wan'
firewall.@rule[8].dest='lan'
firewall.@rule[8].dest_port='500'
firewall.@rule[8].proto='udp'
firewall.@rule[8].target='ACCEPT'
firewall.@include[0]=include
firewall.@include[0].path='/etc/firewall.user'
firewall.@include[0].reload='1'
firewall.glfw=include
firewall.glfw.type='script'
firewall.glfw.path='/usr/bin/glfw.sh'
firewall.glfw.reload='1'
firewall.glqos=include
firewall.glqos.type='script'
firewall.glqos.path='/usr/sbin/glqos.sh'
firewall.glqos.reload='1'
firewall.mwan3=include
firewall.mwan3.type='script'
firewall.mwan3.path='/var/etc/mwan3.include'
firewall.mwan3.reload='1'
firewall.glservice_rule=rule
firewall.glservice_rule.name='glservice'
firewall.glservice_rule.dest_port='83'
firewall.glservice_rule.proto='tcp udp'
firewall.glservice_rule.src='wan'
firewall.glservice_rule.target='ACCEPT'
firewall.glservice_rule.enabled='0'
firewall.vpn_zone=zone
firewall.vpn_zone.name='ovpn'
firewall.vpn_zone.input='ACCEPT'
firewall.vpn_zone.forward='REJECT'
firewall.vpn_zone.output='ACCEPT'
firewall.vpn_zone.network='ovpn'
firewall.vpn_zone.masq='1'
firewall.forwarding_vpn1=forwarding
firewall.forwarding_vpn1.dest='ovpn'
firewall.forwarding_vpn1.src='lan'
``

Why is this?

No need.

Really?

I'm starting to worry...

Care to explain your worries a little more?
Apart from the static route that I added (the one you said it's not needed) the rest is the default configuration of this router. I touched nothing else...

It doesn't look like OpenWrt official vanilla configuration.

uci delete firewall.@forwarding[0].enabled
uci commit firewall
service firewall restart

Well, I don't know what to say about that: a few days ago I updated the firmware of the router and reset it to the default settings...

Anyway here is the result of the commands:

root@GL-MT300N-V2:~# service firewall restart
 * Flushing IPv4 filter table
 * Flushing IPv4 nat table
 * Flushing IPv4 mangle table
 * Flushing IPv6 filter table
 * Flushing IPv6 mangle table
 * Flushing conntrack table ...
 * Populating IPv4 filter table
   * Rule 'Allow-DHCP-Renew'
   * Rule 'Allow-Ping'
   * Rule 'Allow-IGMP'
   * Rule 'Allow-IPSec-ESP'
   * Rule 'Allow-ISAKMP'
   * Forward 'lan' -> 'wan'
   * Forward 'lan' -> 'ovpn'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'ovpn'
 * Populating IPv4 nat table
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'ovpn'
 * Populating IPv4 mangle table
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'ovpn'
 * Populating IPv6 filter table
   * Rule 'Allow-DHCPv6'
   * Rule 'Allow-MLD'
   * Rule 'Allow-ICMPv6-Input'
   * Rule 'Allow-ICMPv6-Forward'
   * Rule 'Allow-IPSec-ESP'
   * Rule 'Allow-ISAKMP'
   * Forward 'lan' -> 'wan'
   * Forward 'lan' -> 'ovpn'
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'ovpn'
 * Populating IPv6 mangle table
   * Zone 'lan'
   * Zone 'wan'
   * Zone 'ovpn'
 * Set tcp_ecn to off
 * Set tcp_syncookies to on
 * Set tcp_window_scaling to on
 * Running script '/etc/firewall.user'
iptables: No chain/target/match by that name.
iptables: No chain/target/match by that name.
 * Running script '/usr/bin/glfw.sh'
uci: Entry not found
uci: Entry not found
 * Running script '/usr/sbin/glqos.sh'
   ! Skipping due to path error: No such file or directory
 * Running script '/var/etc/mwan3.include'
root@GL-MT300N-V2:~#

It worked!! THANK YOU SO MUCH!!

Just a last question: when I ping the NAS now there are tons of duplicates (first time in my life that I see this:

PING 192.168.1.103 (192.168.1.103): 56 data bytes
64 bytes from 192.168.1.103: seq=0 ttl=63 time=0.712 ms
64 bytes from 192.168.1.103: seq=0 ttl=63 time=0.851 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=0.906 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=0.955 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.004 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.055 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.111 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.163 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.216 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.265 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.314 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.368 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.485 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.547 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.598 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.648 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.697 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.746 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.796 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.844 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.897 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.947 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=1.997 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=2.045 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=2.095 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=2.151 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=2.205 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=2.259 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=2.305 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=2.354 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=2.402 ms (DUP
!)
64 bytes from 192.168.1.103: seq=0 ttl=63 time=2.528 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=0.546 ms
64 bytes from 192.168.1.103: seq=1 ttl=63 time=0.677 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=0.882 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=0.950 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.047 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.105 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.184 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.244 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.397 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.486 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.568 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.654 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.736 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.818 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.900 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=1.995 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=2.071 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=2.142 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=2.213 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=2.331 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=2.383 ms (DUP
!)
64 bytes from 192.168.1.103: seq=1 ttl=63 time=20.867 ms (DU
P!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=0.510 ms
64 bytes from 192.168.1.103: seq=2 ttl=63 time=0.642 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=0.856 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=0.923 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.018 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.075 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.220 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.286 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.339 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.393 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.445 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.497 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.548 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.598 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.651 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.700 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.753 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.803 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.852 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.903 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=1.957 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=2.003 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=2.047 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=2.088 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=2.176 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=2.249 ms (DUP
!)
64 bytes from 192.168.1.103: seq=2 ttl=63 time=9.792 ms (DUP
!)
^C
--- 192.168.1.103 ping statistics ---
3 packets transmitted, 3 packets received, 78 duplicates, 0%
 packet loss
round-trip min/avg/max = 0.510/1.913/20.867 ms

Is this a problem?

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.