how do I, configure settings?:
so WAN cable is directly forwarded to LAN1
(excluded from OpenWrt Firewall,
and so LAN1 gets IP from from WAN cable)
how do I, configure settings?:
so WAN cable is directly forwarded to LAN1
(excluded from OpenWrt Firewall,
and so LAN1 gets IP from from WAN cable)
move the WAN port cable to whatever is connected to LAN1 ?
If you're running default OpenWRT, chances are:
This means:
I guess what you want to do is: Assign LAN port 1 not to vlan 1 untagged, but to vlan 2 untagged.
This means:
This would behave just like if you took an external 3-port switch and added it to your WAN port, leaving you with an additional physical rj45 jack, which sees the unfiltered WAN traffic.
Is your goal to allow both OpenWrt and another device to both be connected to the wan?
If that's the case, it is usually fairly easy to make the necessary modifications -- we just need to see the following:
Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </>
" button:
Remember to redact passwords, MAC addresses and any public IP addresses you may have:
ubus call system board
cat /etc/config/network
Be aware of these two things:
Yes, I want both WAN and LAN1, to have same connection
I got cable from MODEM, and it has TRUNK traffic (both VIDEO and INTERNET)
sent to OpenWRT Router:
I use Openwrt as Wifi for Internet Connection
(it works, without any special settings)
Now, I want TRUNK traffic, to be Forwarded directly to LAN1
(so I can use both Internet and VIDEO on PC)
I had set hyperv on PC and 2 virtual network cards
(1 for INTERNET, and 1 for VIDEO)
{
"kernel": "5.15.137",
"hostname": "OpenWrt",
"system": "MediaTek MT7621 ver:1 eco:3",
"model": "Xiaomi Mi Router 4A Gigabit Edition",
"board_name": "xiaomi,mi-router-4a-gigabit",
"rootfs_type": "squashfs",
"release": {
"distribution": "OpenWrt",
"version": "23.05.2",
"revision": "r23630-842932a63d",
"target": "ramips/mt7621",
"description": "OpenWrt 23.05.2 r23630-842932a63d"
}
}
root@OpenWrt:~# cat /etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd08:4991:5d56::/48'
option packet_steering '1'
config device
option name 'br-lan'
option type 'bridge'
list ports 'lan1'
list ports 'lan2'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option ipaddr '192.168.2.1'
option netmask '255.255.255.0'
option ip6assign '60'
config interface 'wan'
option device 'wan'
option proto 'dhcp'
config interface 'wan6'
option device 'wan'
option proto 'dhcpv6'
This will remove "lan1" from your LAN and put it to "wan".
Thank You Very Much,
that is what I needed
This most likely won't work because DSA can only handle a single bridge on a switch chip.
The solution, therefore, is to add the wan to br-lan
and then use bridge-vlans to separate them.
Start by adding the wan to br-lan
so that it looks like this:
config device
option name 'br-lan'
option type 'bridge'
list ports 'lan1'
list ports 'lan2'
list ports 'wan'
Then, create bridge-VLANs like this:
config bridge-vlan
option device 'br-lan'
option vlan '1'
list ports 'lan2:u*'
config bridge-vlan
option device 'br-lan'
option vlan '2'
list ports 'lan1:u*'
list ports 'wan:u*'
Now, edit the wan and lan interfaces to use br-lan.1
and br-lan.2
respectively:
config interface 'lan'
option device 'br-lan.1'
option proto 'static'
option ipaddr '192.168.2.1'
option netmask '255.255.255.0'
option ip6assign '60'
config interface 'wan'
option device 'br-lan.2'
option proto 'dhcp'
config interface 'wan6'
option device 'br-lan.2'
option proto 'dhcpv6'
Then restart the router. At this point, lan1 and wan will be bridged together, so if you plug a device into lan1, it will connect to the upstream network.
Port lan2 will be your normal lan.
The above solution may not actually solve your issue, though -- at least if other VLANs are in use. A trunk is defined as a port/cable that carries more than one network... if there are other VLANs, they need to be defined, too, otherwise they will simply be ignored.
i made it, like you wrote in previous post
now i added vlan3999, for udpxy (udpxy works)
but now Internet on WiFi isn't working
what could be wrong now ?
i tried adding new wan interface for br-lan.1,
but still no success
Before you change anything, please read carefully, especially the question at the end.
Does it work if you set your 3999 vlan on all 3 columns to "- / none".
Could you provide any information on how you configured wifi? Especially: Where do you attach your wifi to? That's the "network" field, where you should have only selected "lan".
If you want to separate your TV wifi, add an additional wifi config with a different SSID that has only the "TV" network configured as "network".
As to what I can see/assume on your screenshots:
Could you please describe in detail and in full what you're trying to do? Switching the raw WAN port to a LAN port allows you to "sniff" your WAN traffic with a second device. It requires your ISP to provide you with at least one additional external IP address, which most ISPs don't do. What's with the TV vlan you introduced? If you want to put your potentially unsecure/hackable TV on another vlan to prevent your other devices from being accessed in case your TV gets hacked: That might be a good idea and will work the way we're about to configure. If the "3999" number is something your ISP sends "TV over IP" on, that's something completely different.
As psherman suggested in his last paragraph and as I included in my list of things in this post: If you pass multiple VLANs "tagged" to an external device (your TV, I suppose) that's something that very external device needs to understand. An arbitrary consumer grade TV you buy on amazon will not.
Thank you, it works now
I had to assign firewall to TV,
and create DHCP for WIFI
Now WIFI works, and can have Firewall Enabled
This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.