Hello:
I configured my router (TP-Link 1043 ND) as routed client according to this section:
https://openwrt.org/docs/guide-user/network/routedclient
My configuration is:
(Subnet 192.168.2.1)Router TP-Link (main net 192.168.1.90) ---------WiFi----- main router (net 192.168.1.x)
But I can't reach the main network from my subnet.
If I try to do:
PC(subnet:192.168.2.x) -----------------------SSH----------------->(main net:192.168.1.x)Device
It doesn't work.
However, if I do:
PC(subnet:192.168.2.x) -------SSH----> Router TP-Link --------SSH---------->(main net:192.168.1.x)Device
I can reach the device using TP-Link CPU as a middle platform.
It seems, something is blocking the access from the subnet to the main net.
I have deactivate masquerading for 192.168.1.x net and firewall Accepts blocks from Subnet to net, and from net to subnet.
It's becoming me crazy.
Thank you.
Add route to subnet 192.168.2.0/24 via host 192.168.1.90 on your main router.
Sorry, it didn't work:
I still doing ping from TP-Link router to main router, but from my PC.
What am I doing wrong?
Thank you, vgaetera.
@openwrt-router :
uci show network
uci show firewall
ip a; ip r; ip ru
root@OpenWrt:~# uci show network
network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.globals=globals
network.globals.ula_prefix='fddd:5f45:c928::/48'
network.lan=interface
network.lan.type='bridge'
network.lan.ifname='eth1.1'
network.lan.proto='static'
network.lan.ipaddr='192.168.2.1'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='60'
network.@switch [0]=switch
network.@switch [0].name='switch0'
network.@switch [0].reset='1'
network.@switch [0].enable_vlan='1'
network.@switch [0].enable_mirror_rx='1'
network.@switch [0].enable_mirror_tx='1'
network.@switch [0].mirror_source_port='6'
network.@switch [0].mirror_monitor_port='1'
network.@switch_vlan [0]=switch_vlan
network.@switch_vlan [0].device='switch0'
network.@switch_vlan [0].vlan='1'
network.@switch_vlan [0].vid='1'
network.@switch_vlan [0].ports='0t 1 2 3 4'
network.@switch_vlan [1]=switch_vlan
network.@switch_vlan [1].device='switch0'
network.@switch_vlan [1].vlan='2'
network.@switch_vlan [1].vid='2'
network.@switch_vlan [1].ports='5 6t'
network.wan=interface
network.wan.proto='static'
network.wan.ipaddr='192.168.1.90'
network.wan.netmask='255.255.255.0'
network.wan.gateway='192.168.1.1'
firewall
firewall.defaults[0]=defaults
firewall.defaults[0].input='ACCEPT'
firewall.defaults[0].output='ACCEPT'
firewall.defaults[0].syn_flood='1'
firewall.defaults[0].forward='ACCEPT'
firewall.zone[0]=zone
firewall.zone[0].name='lan'
firewall.zone[0].input='ACCEPT'
firewall.zone[0].output='ACCEPT'
firewall.zone[0].forward='ACCEPT'
firewall.zone[0].network='lan'
firewall.zone[1]=zone
firewall.zone[1].name='wan'
firewall.zone[1].output='ACCEPT'
firewall.zone[1].input='ACCEPT'
firewall.zone[1].network='wan'
firewall.zone[1].masq_dest='!192.168.1.0/24'
firewall.zone[1].masq='1'
firewall.zone[1].mtu_fix='1'
firewall.zone[1].forward='ACCEPT'
firewall.rule[0]=rule
firewall.rule[0].name='Allow-DHCP-Renew'
firewall.rule[0].src='wan'
firewall.rule[0].proto='udp'
firewall.rule[0].dest_port='68'
firewall.rule[0].target='ACCEPT'
firewall.rule[0].family='ipv4'
firewall.rule[1]=rule
firewall.rule[1].name='Allow-Ping'
firewall.rule[1].src='wan'
firewall.rule[1].proto='icmp'
firewall.rule[1].icmp_type='echo-request'
firewall.rule[1].family='ipv4'
firewall.rule[1].target='ACCEPT'
firewall.rule[2]=rule
firewall.rule[2].name='Allow-IGMP'
firewall.rule[2].src='wan'
firewall.rule[2].proto='igmp'
firewall.rule[2].family='ipv4'
firewall.rule[2].target='ACCEPT'
firewall.rule[3]=rule
firewall.rule[3].name='Allow-DHCPv6'
firewall.rule[3].src='wan'
firewall.rule[3].proto='udp'
firewall.rule[3].src_ip='fc00::/6'
firewall.rule[3].dest_ip='fc00::/6'
firewall.rule[3].dest_port='546'
firewall.rule[3].family='ipv6'
firewall.rule[3].target='ACCEPT'
firewall.rule[4]=rule
firewall.rule[4].name='Allow-MLD'
firewall.rule[4].src='wan'
firewall.rule[4].proto='icmp'
firewall.rule[4].src_ip='fe80::/10'
firewall.rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
firewall.rule[4].family='ipv6'
firewall.rule[4].target='ACCEPT'
firewall.rule[5]=rule
firewall.rule[5].name='Allow-ICMPv6-Input'
firewall.rule[5].src='wan'
firewall.rule[5].proto='icmp'
firewall.rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' 'router-solicitation' 'neighbour-solicitation' 'router-advertisement' 'neighbour-advertisement'
firewall.rule[5].limit='1000/sec'
firewall.rule[5].family='ipv6'
firewall.rule[5].target='ACCEPT'
firewall.rule[6]=rule
firewall.rule[6].name='Allow-ICMPv6-Forward'
firewall.rule[6].src='wan'
firewall.rule[6].dest='*'
firewall.rule[6].proto='icmp'
firewall.rule[6].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
firewall.rule[6].limit='1000/sec'
firewall.rule[6].family='ipv6'
firewall.rule[6].target='ACCEPT'
firewall.rule[7]=rule
firewall.rule[7].name='Allow-IPSec-ESP'
firewall.rule[7].src='wan'
firewall.rule[7].dest='lan'
firewall.rule[7].proto='esp'
firewall.rule[7].target='ACCEPT'
firewall.rule[8]=rule
firewall.rule[8].name='Allow-ISAKMP'
firewall.rule[8].src='wan'
firewall.rule[8].dest='lan'
firewall.rule[8].dest_port='500'
firewall.rule[8].proto='udp'
firewall.rule[8].target='ACCEPT'
firewall.include[0]=include
firewall.include[0].path='/etc/firewall.user'
firewall.forwarding[0]=forwarding
firewall.forwarding[0].dest='lan'
firewall.forwarding[0].src='wan'
firewall.forwarding[1]=forwarding
firewall.forwarding[1].dest='wan'
firewall.forwarding[1].src='lan'
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN qlen 1000
link/ether c4:6e:1f:d6:69:e7 brd ff:ff:ff:ff:ff:ff
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP qlen 1000
link/ether c4:6e:1f:d6:69:e6 brd ff:ff:ff:ff:ff:ff
inet6 fe80::c66e:1fff:fed6:69e6/64 scope link
valid_lft forever preferred_lft forever
17: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
link/ether c4:6e:1f:d6:69:e6 brd ff:ff:ff:ff:ff:ff
inet 192.168.2.1/24 brd 192.168.2.255 scope global br-lan
valid_lft forever preferred_lft forever
inet6 fddd:5f45:c928::1/60 scope global
valid_lft forever preferred_lft forever
inet6 fe80::c66e:1fff:fed6:69e6/64 scope link
valid_lft forever preferred_lft forever
18: eth1.1@eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP qlen 1000
link/ether c4:6e:1f:d6:69:e6 brd ff:ff:ff:ff:ff:ff
19: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
link/ether c4:6e:1f:d6:69:e6 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.90/24 brd 192.168.1.255 scope global wlan0
valid_lft forever preferred_lft forever
inet6 fe80::c66e:1fff:fed6:69e6/64 scope link
valid_lft forever preferred_lft forever
20: wlan0-1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP qlen 1000
link/ether c6:6e:1f:d6:69:e6 brd ff:ff:ff:ff:ff:ff
inet6 fe80::c46e:1fff:fed6:69e6/64 scope link
valid_lft forever preferred_lft forever
default via 192.168.1.1 dev wlan0
192.168.1.0/24 dev wlan0 scope link src 192.168.1.90
192.168.2.0/24 dev br-lan scope link src 192.168.2.1
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
uci delete firewall.zone[1].masq_dest
uci commit firewall
service firewall restart
After that you should be able to access 192.168.1.0/24 from 192.168.2.0/24.
uci delete firewall.zone[1].masq
uci commit firewall
service firewall restart
This should help to access 192.168.2.0/24 from 192.168.1.0/24.
But the condition is upper level router allows LAN-LAN forwarding and has correct route to 192.168.2.0/24.
Also make sure destination host firewall allows traffic outside of LocalSubnet scope.
Usually that's a Windows specific issue.
1 Like
Thank you, thank you a lot!!
It worked!!
I have to say, that trying it, at first it didn't work and I changed the netmask of my computer from 16 to 24.
I really thank you.
Best regards.
system
Closed
November 6, 2018, 4:13pm
8
This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.