Hi, I am struggling to get a single static LAN ONLY route between two routers. I only want effectively a single route to and from a single device, see details below.
I've reviewed the other topics but still can't make heads of this.
Here's my topology below.
The reason they are split connections to each have their own WAN is because the cable internet is not as stable as the DSL yet, they are fixing the wiring outside. I don't want interruptions, so the DSL is rock solid.
I DO NOT WANT the devices to share WAN Internet connections. They each have their own.
-
Router 1 - TL1043ND running OpenWRT 19.07
-
Network: 192.168.6.0/24
-
Gateway: 192.168.6.1
-
DHCP: YES
-
Client 1: Pi4 - 192.168.6.42 (DNS and Wireguard)
-
Client 2: Desktop - 192.168.6.18 (Main)
-
WAN: DSL PPPoE - Bridged mode to DSL modem TPLink 99-something
-
/etc/Firewall config:
config defaults
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
option synflood_protect '1'
config zone
option name 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
option network 'lan'
config zone
option name 'wan'
option output 'ACCEPT'
option mtu_fix '1'
option network 'wan'
option input 'REJECT'
option forward 'REJECT'
option masq '1'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option src_ip 'fc00::/6'
option dest_ip 'fc00::/6'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config include
option path '/etc/firewall.user'
config redirect
option dest_port '12345'
option src 'wan'
option name 'Wireguard'
option src_dport '12345'
option target 'DNAT'
option dest_ip '192.168.6.42'
option dest 'lan'
config rule
option src '*'
option name 'Allow-PING-locally'
option family 'ipv4'
option target 'ACCEPT'
option dest '*'
list proto 'icmp'
config nat
option target 'MASQUERADE'
option name 'external-server'
option dest_ip '192.168.2.43'
list proto 'all'
option src '*'
- /etc/Network config:
config interface 'loopback'
option ifname 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix ''
config interface 'lan'
option type 'bridge'
option ifname 'eth0.1'
option proto 'static'
option netmask '255.255.255.0'
option ipaddr '192.168.6.1'
option delegate '0'
option broadcast '192.168.6.255'
list dns '192.168.6.42'
config interface 'wan'
option ifname 'eth0.2'
option proto 'pppoe'
option password ''
option ipv6 '0'
list dns '192.168.6.42'
option delegate '0'
option peerdns '0'
option username ''
config switch
option name 'switch0'
option reset '1'
option enable_vlan '1'
config switch_vlan
option device 'switch0'
option vlan '1'
option ports '1 2 3 4 5t'
config switch_vlan
option device 'switch0'
option vlan '2'
option ports '0 5t'
config route
option gateway '192.168.2.1'
option netmask '255.255.255.0'
option target '192.168.2.43'
option interface 'lan'
////
-
Router 2 - Archer C7 running Stock Firmware (for hardware NAT)
-
Network: 192.168.2.0/24
-
Gateway: 192.168.2.1
-
DHCP: NO
-
Client 1: NAS - 192.168.2.43
-
WAN: 1gbit/30mbit Cable internet, DHCP to cable modem
-
static route:
ID Destination Network Subnet Mask Default Gateway
1 192.168.6.0 255.255.255.0 192.168.6.1
I have set a static route on both routers, but packets never come through. I've read a sizeable amount of the documentation and can't make proper heads about it, even the examples.
Maybe this is due to something Firewall is doing to masquerading traffic, but I don't necessarily want WAN traffic to have free reign.
Maybe I misunderstand "WAN" to just mean Internet but it means my other router?
Any help appreciated.
thanks abound.