FritzBox 4040 - no WAN port function while using MWAN3

Hello,
I've tried to configure a WAN failover system by using MWAN3, but when MWAN3 is installed on the system, (from this point) there is no (more) communication over the WAN port. The eth1 device (WAN port) not even get a dynamic address by DHCP. And when I've set a static ip on the eth1 device, other clients are not reachable by ping.

Removing MWAN3 from the system solves the problem. From this point the WAN port works normal.

When I'am using VLAN on 2 of the 4 switch ports, all works fine. Then WMAN3 is able to communicate over these ports (via VLAN).

I'am using 22.03.1.

Has anybody tried to use MWAN3 on a FritzBox 4040?

Interface status:
 interface WAN1 is offline and tracking is paused
 interface WAN2 is online 00h:00m:55s, uptime 00h:00m:57s and tracking is active

Current ipv4 policies:
failover:
 WAN2 (100%)

Current ipv6 policies:
failover:
 unreachable

Directly connected ipv4 networks:
192.168.1.255
192.168.1.1
192.168.1.0/24
192.168.221.0
127.0.0.0/8
192.168.1.0
192.168.221.207
127.0.0.1
224.0.0.0/3
192.168.221.255
127.255.255.255
192.168.221.0/24
127.0.0.0

Directly connected ipv6 networks:

Active ipv4 user rules:
   44  3854 - failover  all  --  *      *       0.0.0.0/0            0.0.0.0/0            

Active ipv6 user rules:
Software-Version
-------------------------------------------------
OpenWrt - 22.03.1

Output of "ip -4 a show"
-------------------------------------------------
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
6: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    inet 192.168.1.1/24 brd 192.168.1.255 scope global br-lan
       valid_lft forever preferred_lft forever
7: eth0.221@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    inet 192.168.221.207/24 brd 192.168.221.255 scope global eth0.221
       valid_lft forever preferred_lft forever

Output of "ip -4 route show"
-------------------------------------------------
default via 192.168.221.254 dev eth0.221 proto static src 192.168.221.207 metric 20 
192.168.1.0/24 dev br-lan proto kernel scope link src 192.168.1.1 
192.168.221.0/24 dev eth0.221 proto static scope link metric 20 

Output of "ip -4 rule show"
-------------------------------------------------
0:	from all lookup local
1002:	from all iif eth0.221 lookup 2
2002:	from all fwmark 0x200/0x3f00 lookup 2
2061:	from all fwmark 0x3d00/0x3f00 blackhole
2062:	from all fwmark 0x3e00/0x3f00 unreachable
3002:	from all fwmark 0x200/0x3f00 unreachable
32766:	from all lookup main
32767:	from all lookup default

Output of "ip -4 route list table 1-250"
-------------------------------------------------
Routing table 2:
default via 192.168.221.254 dev eth0.221 proto static src 192.168.221.207 metric 20 
192.168.1.0/24 dev br-lan proto kernel scope link src 192.168.1.1 
192.168.221.0/24 dev eth0.221 proto static scope link metric 20 

Output of "iptables -t mangle -w -L -v -n"
-------------------------------------------------
Chain PREROUTING (policy ACCEPT 2317 packets, 679K bytes)
 pkts bytes target     prot opt in     out     source               destination         
 2351  685K mwan3_hook  all  --  *      *       0.0.0.0/0            0.0.0.0/0           

Chain INPUT (policy ACCEPT 645 packets, 88244 bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain FORWARD (policy ACCEPT 895 packets, 414K bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain OUTPUT (policy ACCEPT 640 packets, 222K bytes)
 pkts bytes target     prot opt in     out     source               destination         
  648  223K mwan3_hook  all  --  *      *       0.0.0.0/0            0.0.0.0/0           

Chain POSTROUTING (policy ACCEPT 1536 packets, 636K bytes)
 pkts bytes target     prot opt in     out     source               destination         

Chain mwan3_connected_ipv4 (2 references)
 pkts bytes target     prot opt in     out     source               destination         
  769  370K MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0            match-set mwan3_connected_ipv4 dst MARK or 0x3f00

Chain mwan3_custom_ipv4 (2 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0            match-set mwan3_custom_ipv4 dst MARK or 0x3f00

Chain mwan3_dynamic_ipv4 (2 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0            match-set mwan3_dynamic_ipv4 dst MARK or 0x3f00

Chain mwan3_hook (2 references)
 pkts bytes target     prot opt in     out     source               destination         
 2868  897K CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x3f00 CONNMARK restore mask 0x3f00
  971  197K mwan3_ifaces_in  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x3f00
  337 72103 mwan3_custom_ipv4  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x3f00
  337 72103 mwan3_connected_ipv4  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x3f00
   62  5006 mwan3_dynamic_ipv4  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x3f00
   62  5006 mwan3_rules  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x3f00
 2999  908K CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0            CONNMARK save mask 0x3f00
  995  422K mwan3_custom_ipv4  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match ! 0x3f00/0x3f00
  995  422K mwan3_connected_ipv4  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match ! 0x3f00/0x3f00
  501  119K mwan3_dynamic_ipv4  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match ! 0x3f00/0x3f00

Chain mwan3_iface_in_WAN2 (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 MARK       all  --  eth0.221 *       0.0.0.0/0            0.0.0.0/0            match-set mwan3_custom_ipv4 src mark match 0x0/0x3f00 /* default */ MARK or 0x3f00
  631  125K MARK       all  --  eth0.221 *       0.0.0.0/0            0.0.0.0/0            match-set mwan3_connected_ipv4 src mark match 0x0/0x3f00 /* default */ MARK or 0x3f00
    0     0 MARK       all  --  eth0.221 *       0.0.0.0/0            0.0.0.0/0            match-set mwan3_dynamic_ipv4 src mark match 0x0/0x3f00 /* default */ MARK or 0x3f00
    3   197 MARK       all  --  eth0.221 *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x3f00 /* WAN2 */ MARK xset 0x200/0x3f00

Chain mwan3_ifaces_in (1 references)
 pkts bytes target     prot opt in     out     source               destination         
  945  191K mwan3_iface_in_WAN2  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x3f00

Chain mwan3_policy_failover (1 references)
 pkts bytes target     prot opt in     out     source               destination         
   55  3624 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x3f00 /* WAN2 1 1 */ MARK xset 0x200/0x3f00

Chain mwan3_rules (1 references)
 pkts bytes target     prot opt in     out     source               destination         
   62  5006 mwan3_policy_failover  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x3f00
network.loopback=interface
network.loopback.device='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.globals=globals
network.globals.ula_prefix='fd30:eeb0:f333::/48'
network.@device[0]=device
network.@device[0].name='br-lan'
network.@device[0].type='bridge'
network.@device[0].ports='eth0'
network.lan=interface
network.lan.device='br-lan'
network.lan.proto='static'
network.lan.ipaddr='192.168.1.1'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='60'
network.@switch[0]=switch
network.@switch[0].name='switch0'
network.@switch[0].reset='1'
network.@switch[0].enable_vlan='1'
network.@switch_vlan[0]=switch_vlan
network.@switch_vlan[0].device='switch0'
network.@switch_vlan[0].vlan='1'
network.@switch_vlan[0].vid='1'
network.@switch_vlan[0].ports='0 2 3 4'
network.@device[1]=device
network.@device[1].type='8021q'
network.@device[1].ifname='eth0'
network.@device[1].vid='221'
network.@device[1].name='eth0.221'
network.@device[1].ipv6='0'
network.WAN2=interface
network.WAN2.proto='dhcp'
network.WAN2.device='eth0.221'
network.WAN2.hostname='*'
network.WAN2.metric='20'
network.@switch_vlan[1]=switch_vlan
network.@switch_vlan[1].device='switch0'
network.@switch_vlan[1].vlan='2'
network.@switch_vlan[1].ports='0t 1'
network.@switch_vlan[1].vid='221'
network.WAN1=interface
network.WAN1.proto='dhcp'
network.WAN1.device='eth1'
network.WAN1.hostname='*'
network.WAN1.metric='10'
mwan3.globals=globals
mwan3.globals.mmx_mask='0x3F00'
mwan3.isp1=member
mwan3.isp1.metric='1'
mwan3.isp1.weight='1'
mwan3.isp1.interface='WAN1'
mwan3.isp2=member
mwan3.isp2.metric='1'
mwan3.isp2.weight='1'
mwan3.isp2.interface='WAN2'
mwan3.failover=policy
mwan3.failover.use_member='isp1' 'isp2'
mwan3.failover.last_resort='unreachable'
mwan3.rule=rule
mwan3.rule.proto='all'
mwan3.rule.dest_ip='0.0.0.0/0'
mwan3.rule.sticky='0'
mwan3.rule.use_policy='failover'
mwan3.WAN1=interface
mwan3.WAN1.enabled='1'
mwan3.WAN1.initial_state='online'
mwan3.WAN1.family='ipv4'
mwan3.WAN1.track_ip='8.8.8.8'
mwan3.WAN1.track_method='ping'
mwan3.WAN1.reliability='2'
mwan3.WAN1.count='1'
mwan3.WAN1.size='56'
mwan3.WAN1.max_ttl='60'
mwan3.WAN1.timeout='4'
mwan3.WAN1.interval='10'
mwan3.WAN1.failure_interval='5'
mwan3.WAN1.recovery_interval='5'
mwan3.WAN1.down='5'
mwan3.WAN1.up='5'
mwan3.WAN2=interface
mwan3.WAN2.enabled='1'
mwan3.WAN2.initial_state='online'
mwan3.WAN2.family='ipv4'
mwan3.WAN2.track_ip='8.8.8.8'
mwan3.WAN2.track_method='ping'
mwan3.WAN2.reliability='1'
mwan3.WAN2.count='1'
mwan3.WAN2.size='56'
mwan3.WAN2.max_ttl='60'
mwan3.WAN2.timeout='4'
mwan3.WAN2.interval='10'
mwan3.WAN2.failure_interval='5'
mwan3.WAN2.recovery_interval='5'
mwan3.WAN2.down='5'
mwan3.WAN2.up='5'

un Oct 16 07:48:10 2022 kern.debug kernel: [   23.209611] ath: EEPROM regdomain: 0x0
Sun Oct 16 07:48:10 2022 kern.debug kernel: [   23.209647] ath: EEPROM indicates default country code should be used
Sun Oct 16 07:48:10 2022 kern.debug kernel: [   23.209666] ath: doing EEPROM country->regdmn map search
Sun Oct 16 07:48:10 2022 kern.debug kernel: [   23.209698] ath: country maps to regdmn code: 0x3a
Sun Oct 16 07:48:10 2022 kern.debug kernel: [   23.209723] ath: Country alpha2 being used: US
Sun Oct 16 07:48:10 2022 kern.debug kernel: [   23.209742] ath: Regpair used: 0x3a
Sun Oct 16 07:48:10 2022 user.info kernel: [   23.225776] kmodloader: done loading kernel modules from /etc/modules.d/*
Sun Oct 16 07:48:11 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Sun Oct 16 07:48:11 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: started, version 2.86 cachesize 150
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: DNS service limited to local subnets
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Sun Oct 16 07:48:12 2022 daemon.warn dnsmasq[1]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Sun Oct 16 07:48:12 2022 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Sun Oct 16 07:48:12 2022 authpriv.info dropbear[822]: Not backgrounding
Sun Oct 16 07:48:15 2022 user.warn mwan3-init[878]: invalid ipv6 address 0.0.0.0/0 specified for rule rule
Sun Oct 16 07:48:16 2022 user.notice : Added device handler type: bonding
Sun Oct 16 07:48:16 2022 user.notice : Added device handler type: 8021ad
Sun Oct 16 07:48:16 2022 user.notice : Added device handler type: 8021q
Sun Oct 16 07:48:16 2022 user.notice : Added device handler type: macvlan
Sun Oct 16 07:48:16 2022 user.notice : Added device handler type: veth
Sun Oct 16 07:48:16 2022 user.notice : Added device handler type: bridge
Sun Oct 16 07:48:16 2022 user.notice : Added device handler type: Network device
Sun Oct 16 07:48:16 2022 user.notice : Added device handler type: tunnel
Sun Oct 16 07:48:17 2022 daemon.notice wpa_supplicant[1259]: Successfully initialized wpa_supplicant
Sun Oct 16 07:48:17 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
Sun Oct 16 07:48:17 2022 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
Sun Oct 16 07:48:17 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
Sun Oct 16 07:48:17 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
Sun Oct 16 07:48:18 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
Sun Oct 16 07:48:18 2022 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
Sun Oct 16 07:48:18 2022 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Sun Oct 16 07:48:18 2022 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Sun Oct 16 07:48:18 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
Sun Oct 16 07:48:18 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
Sun Oct 16 07:48:19 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led WLAN
Sun Oct 16 07:48:19 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led WAN
Sun Oct 16 07:48:19 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN
Sun Oct 16 07:48:19 2022 kern.info kernel: [   34.199975] br-lan: port 1(eth0) entered blocking state
Sun Oct 16 07:48:19 2022 kern.info kernel: [   34.200024] br-lan: port 1(eth0) entered disabled state
Sun Oct 16 07:48:19 2022 kern.info kernel: [   34.204635] device eth0 entered promiscuous mode
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'lan' is enabled
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'lan' is setting up now
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'lan' is now up
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'WAN2' is enabled
Sun Oct 16 07:48:19 2022 daemon.notice netifd: 8021q 'eth0.221' link is up
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'WAN2' has link connectivity
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'WAN2' is setting up now
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'WAN1' is enabled
Sun Oct 16 07:48:19 2022 kern.info kernel: [   34.309445] ess_edma c080000.edma eth1: Link is Down
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'loopback' is enabled
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'loopback' is setting up now
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'loopback' is now up
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Network device 'eth0' link is up
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Network device 'lo' link is up
Sun Oct 16 07:48:19 2022 daemon.notice netifd: Interface 'loopback' has link connectivity
Sun Oct 16 07:48:19 2022 daemon.notice netifd: WAN2 (1842): udhcpc: started, v1.35.0
Sun Oct 16 07:48:19 2022 daemon.notice netifd: WAN2 (1842): udhcpc: broadcasting discover
Sun Oct 16 07:48:19 2022 user.notice mwan3-hotplug[1781]: mwan3 hotplug on lan not called because interface disabled
Sun Oct 16 07:48:20 2022 daemon.info procd: - init complete -
Sun Oct 16 07:48:20 2022 kern.info kernel: [   35.273943] br-lan: port 1(eth0) entered blocking state
Sun Oct 16 07:48:20 2022 kern.info kernel: [   35.273993] br-lan: port 1(eth0) entered forwarding state
Sun Oct 16 07:48:20 2022 kern.info kernel: [   35.278501] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Sun Oct 16 07:48:20 2022 daemon.notice netifd: bridge 'br-lan' link is up
Sun Oct 16 07:48:20 2022 daemon.notice netifd: Interface 'lan' has link connectivity
Sun Oct 16 07:48:20 2022 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Sun Oct 16 07:48:20 2022 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1) --> new PHY
Sun Oct 16 07:48:20 2022 daemon.notice netifd: WAN2 (1842): udhcpc: broadcasting select for 192.168.221.207, server 192.168.221.6
Sun Oct 16 07:48:20 2022 daemon.notice netifd: WAN2 (1842): udhcpc: lease of 192.168.221.207 obtained from 192.168.221.6, lease time 7200
Sun Oct 16 07:48:21 2022 daemon.err odhcpd[1334]: Failed to send to ff02::1%lan@br-lan (Address not available)
Sun Oct 16 07:48:22 2022 kern.warn kernel: [   37.134109] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
Sun Oct 16 07:48:22 2022 kern.warn kernel: [   37.134172] ath10k_ahb a800000.wifi: msdu-desc: 2500  skid: 32
Sun Oct 16 07:48:22 2022 kern.info kernel: [   37.169844] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
Sun Oct 16 07:48:22 2022 kern.info kernel: [   37.170808] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
Sun Oct 16 07:48:22 2022 kern.info kernel: [   37.458381] ath10k_ahb a800000.wifi: rts threshold -1
Sun Oct 16 07:48:22 2022 kern.warn kernel: [   37.458890] ath10k_ahb a800000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
Sun Oct 16 07:48:22 2022 daemon.notice netifd: Interface 'WAN2' is now up
Sun Oct 16 07:48:22 2022 kern.info kernel: [   37.469984] br-lan: port 2(wlan1) entered blocking state
Sun Oct 16 07:48:22 2022 kern.info kernel: [   37.473482] br-lan: port 2(wlan1) entered disabled state
Sun Oct 16 07:48:22 2022 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sun Oct 16 07:48:22 2022 kern.info kernel: [   37.480652] device wlan1 entered promiscuous mode
Sun Oct 16 07:48:22 2022 kern.info kernel: [   37.485086] br-lan: port 2(wlan1) entered blocking state
Sun Oct 16 07:48:22 2022 kern.info kernel: [   37.488855] br-lan: port 2(wlan1) entered forwarding state
Sun Oct 16 07:48:22 2022 daemon.info dnsmasq[1]: using nameserver 192.168.221.6#53
Sun Oct 16 07:48:22 2022 daemon.info dnsmasq[1]: using nameserver 192.168.221.8#53
Sun Oct 16 07:48:22 2022 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sun Oct 16 07:48:22 2022 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sun Oct 16 07:48:22 2022 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sun Oct 16 07:48:22 2022 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sun Oct 16 07:48:22 2022 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sun Oct 16 07:48:22 2022 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Sun Oct 16 07:48:22 2022 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Sun Oct 16 07:48:22 2022 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->HT_SCAN
Sun Oct 16 07:48:22 2022 kern.info kernel: [   37.495294] br-lan: port 2(wlan1) entered disabled state
Sun Oct 16 07:48:22 2022 kern.info kernel: [   37.660596] ath10k_ahb a800000.wifi: NOTE:  Firmware DBGLOG output disabled in debug_mask: 0x10000000
Sun Oct 16 07:48:23 2022 user.notice mwan3-hotplug[2307]: mwan3 hotplug on loopback not called because interface disabled
Sun Oct 16 07:48:23 2022 kern.info kernel: [   38.097682] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
Sun Oct 16 07:48:23 2022 kern.info kernel: [   38.098208] br-lan: port 2(wlan1) entered blocking state
Sun Oct 16 07:48:23 2022 kern.info kernel: [   38.103141] br-lan: port 2(wlan1) entered forwarding state
Sun Oct 16 07:48:23 2022 daemon.notice hostapd: wlan1: interface state HT_SCAN->ENABLED
Sun Oct 16 07:48:23 2022 daemon.notice hostapd: wlan1: AP-ENABLED
Sun Oct 16 07:48:23 2022 daemon.notice netifd: Network device 'eth1' link is up
Sun Oct 16 07:48:23 2022 daemon.notice netifd: Interface 'WAN1' has link connectivity
Sun Oct 16 07:48:23 2022 daemon.notice netifd: Interface 'WAN1' is setting up now
Sun Oct 16 07:48:23 2022 kern.info kernel: [   38.475392] ess_edma c080000.edma eth1: Link is Up - 1Gbps/Full - flow control off
Sun Oct 16 07:48:23 2022 kern.info kernel: [   38.475515] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Sun Oct 16 07:48:23 2022 daemon.err odhcpd[1334]: Failed to send to ff02::1%lan@br-lan (Address not available)
Sun Oct 16 07:48:23 2022 daemon.notice netifd: WAN1 (2526): udhcpc: started, v1.35.0
Sun Oct 16 07:48:23 2022 daemon.notice netifd: Wireless device 'radio1' is now up
Sun Oct 16 07:48:23 2022 daemon.notice netifd: Network device 'wlan1' link is up
Sun Oct 16 07:48:23 2022 daemon.notice netifd: WAN1 (2526): udhcpc: broadcasting discover
Sun Oct 16 07:48:24 2022 user.notice mwan3-hotplug[2534]: Execute ifup event on interface WAN2 (eth0.221)
Sun Oct 16 07:48:24 2022 user.warn mwan3-hotplug[2534]: failed to add 192.168.221.0/24 dev eth0.221 proto static scope link metric 20 to table 2
Sun Oct 16 07:48:24 2022 user.warn mwan3-hotplug[2534]: failed to add default via 192.168.221.254 dev eth0.221 proto static src 192.168.221.207 metric 20 to table 2
Sun Oct 16 07:48:24 2022 user.info mwan3track[1062]: Detect ifup event on interface WAN2 ()
Sun Oct 16 07:48:25 2022 user.notice mwan3track[1062]: Interface WAN2 (eth0.221) is online
Sun Oct 16 07:48:25 2022 user.notice firewall: Reloading firewall due to ifup of WAN2 (eth0.221)
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Sun Oct 16 07:51:05 2022 daemon.err procd: Got unexpected signal 1
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: started, version 2.86 cachesize 150
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: DNS service limited to local subnets
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using nameserver 192.168.221.6#53
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using nameserver 192.168.221.8#53
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sun Oct 16 07:51:05 2022 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Sun Oct 16 07:51:06 2022 daemon.notice netifd: WAN1 (2526): udhcpc: broadcasting discover
Sun Oct 16 07:51:07 2022 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Sun Oct 16 07:51:07 2022 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sun Oct 16 07:51:07 2022 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Sun Oct 16 07:51:09 2022 daemon.notice netifd: WAN1 (2526): udhcpc: broadcasting discover
Sun Oct 16 07:51:19 2022 daemon.info hostapd: wlan1: STA e4:a7:a0:37:f6:b8 IEEE 802.11: authenticated
Sun Oct 16 07:51:19 2022 daemon.info hostapd: wlan1: STA e4:a7:a0:37:f6:b8 IEEE 802.11: associated (aid 1)
Sun Oct 16 07:51:19 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED e4:a7:a0:37:f6:b8
Sun Oct 16 07:51:19 2022 daemon.info hostapd: wlan1: STA e4:a7:a0:37:f6:b8 WPA: pairwise key handshake completed (RSN)
Sun Oct 16 07:51:19 2022 daemon.notice hostapd: wlan1: EAPOL-4WAY-HS-COMPLETED e4:a7:a0:37:f6:b8
Sun Oct 16 07:51:20 2022 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.206 e4:a7:a0:37:f6:b8
Sun Oct 16 07:51:20 2022 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.206 e4:a7:a0:37:f6:b8 DESKTOP-7S7J4SE
Sun Oct 16 07:51:29 2022 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Sun Oct 16 07:51:29 2022 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sun Oct 16 07:51:29 2022 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 0 addresses
Sun Oct 16 07:51:29 2022 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Sun Oct 16 07:51:29 2022 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Sun Oct 16 07:51:29 2022 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sun Oct 16 07:51:29 2022 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 1 addresses
Sun Oct 16 07:51:29 2022 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses

I would suggest to side-step this issue by testing a (very recent) master snapshot build (don't keep configs!), which moved to DSA and sorted this mess for good.

I've tested it again with the Snapshot:
avm_fritzbox-4040-squashfs-sysupgrade.bin a39ea805c59617ff5fdd0d292287f21bebba57720dd93a223545c1b66e1c2517 6912.6 KB Sun Oct 16 00:06:02 2022
OpenWrt SNAPSHOT r20954-cb24be47ff

In this new "release" the control of the internal network switch and devices is very different.

I'd to remove the lan1 (device) from the eth bridge und had to set manually DIFFERENT MAC addresses to the wan and lan1 device (before they had the same as the bridge dev).

Another test was to use the WAN adapter with two different VLANs (221 and 222).
VLAN 221 für the logical device WAN1 und 222 for WAN2, this work too.

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.