I have no clue - multiple router connectivity

Hi guys,

I am absoluteley stuck and would really apreaciate your helping hand.

Situation:
one ISP Router (FritzBox)
one OpenWRT Router (AP01)
For the configuration, please find the attached pictures.

Problem:
If my PC is connected to the OpenWRT WLAN, I cannot reach the ISP Router
PC:192.168.0.100
ping to 192.168.0.1 OK
ping to 192.168.1.1 OK
ping to 192.168.1.254 NOT OK

If my PC is connected to the ISP Router, I cannot reach the OpenWRT
PC:192.168.1.100
ping to 192.168.1.254 OK
ping to 192.168.1.1 NOT OK
ping to 192.168.0.1 NOT OK

Even if I connect to the OpenWRT AP by SSH and do a ping -I eth0 192.168.1.254, the router cannot reach the ISP Router.
And I do not know why the default gateway is not correct.

Please help me

uci show network; uci show wireless; uci show firewall; uci show dhcp
ip a; ip r; ip ru; iptables-save







Thanks for your reply, please find the requested output below

root@deludap01:~# uci show network
network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.globals=globals
network.globals.ula_prefix='fd6b:f07e:c3e5::/48'
network.lan=interface
network.lan.proto='static'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='60'
network.lan.delegate='0'
network.lan.ifname='eth0'
network.lan.ipaddr='192.168.1.1'
network.lan.gateway='192.168.1.254'
network.@switch[0]=switch
network.@switch[0].name='switch0'
network.@switch[0].reset='1'
network.@switch[0].enable_vlan='1'
network.@switch_vlan[0]=switch_vlan
network.@switch_vlan[0].device='switch0'
network.@switch_vlan[0].vlan='1'
network.@switch_vlan[0].ports='2 3 4 5 0t'
network.@switch_vlan[1]=switch_vlan
network.@switch_vlan[1].device='switch0'
network.@switch_vlan[1].vlan='2'
network.@switch_vlan[1].ports='1 0t'
network.br0=interface
network.br0.proto='static'
network.br0.delegate='0'
network.br0.ipaddr='192.168.0.1'
network.br0.netmask='255.255.255.0'
network.br0.type='bridge'
network.br0.gateway='192.168.0.1'

root@deludap01:~# uci show wireless
wireless.radio0=wifi-device
wireless.radio0.type='mac80211'
wireless.radio0.hwmode='11g'
wireless.radio0.path='platform/ar934x_wmac'
wireless.radio0.country='US'
wireless.radio0.legacy_rates='1'
wireless.radio0.htmode='HT40'
wireless.radio0.txpower='22'
wireless.radio0.channel='1'
wireless.default_radio0=wifi-iface
wireless.default_radio0.device='radio0'
wireless.default_radio0.mode='ap'
wireless.default_radio0.encryption='psk-mixed+tkip+ccmp'
wireless.default_radio0.key='----------'
wireless.default_radio0.ssid='OpenWrt_AP01'
wireless.default_radio0.network='br0'
wireless.radio1=wifi-device
wireless.radio1.type='mac80211'
wireless.radio1.channel='36'
wireless.radio1.hwmode='11a'
wireless.radio1.path='pci0000:00/0000:00:00.0'
wireless.radio1.htmode='HT20'
wireless.radio1.country='US'
wireless.radio1.legacy_rates='1'
wireless.radio1.txpower='21'
wireless.@wifi-iface[1]=wifi-iface
wireless.@wifi-iface[1].device='radio1'
wireless.@wifi-iface[1].key='----------'
wireless.@wifi-iface[1].wds='1'
wireless.@wifi-iface[1].mode='ap'
wireless.@wifi-iface[1].ssid='OpenWrt-WDS'
wireless.@wifi-iface[1].encryption='psk-mixed+tkip+ccmp'
wireless.@wifi-iface[1].wpa_disable_eapol_key_retries='1'
wireless.@wifi-iface[1].network='br0'

root@deludap01:~# uci show firewall
firewall.@defaults[0]=defaults
firewall.@defaults[0].input='ACCEPT'
firewall.@defaults[0].output='ACCEPT'
firewall.@defaults[0].forward='REJECT'
firewall.@include[0]=include
firewall.@include[0].path='/etc/firewall.user'

root@deludap01:~# uci show dhcp
dhcp.@dnsmasq[0]=dnsmasq
dhcp.@dnsmasq[0].domainneeded='1'
dhcp.@dnsmasq[0].localise_queries='1'
dhcp.@dnsmasq[0].rebind_protection='1'
dhcp.@dnsmasq[0].rebind_localhost='1'
dhcp.@dnsmasq[0].local='/lan/'
dhcp.@dnsmasq[0].domain='lan'
dhcp.@dnsmasq[0].expandhosts='1'
dhcp.@dnsmasq[0].authoritative='1'
dhcp.@dnsmasq[0].readethers='1'
dhcp.@dnsmasq[0].leasefile='/tmp/dhcp.leases'
dhcp.@dnsmasq[0].resolvfile='/tmp/resolv.conf.auto'
dhcp.@dnsmasq[0].nonwildcard='1'
dhcp.@dnsmasq[0].localservice='1'
dhcp.@dnsmasq[0].rebind_domain='fritz.box'
dhcp.@dnsmasq[0].logqueries='1'
dhcp.@dnsmasq[0].server='192.168.1.254'
dhcp.lan=dhcp
dhcp.lan.interface='lan'
dhcp.lan.dhcpv6='server'
dhcp.lan.ra='server'
dhcp.lan.ignore='1'
dhcp.lan.ra_management='1'
dhcp.wan=dhcp
dhcp.wan.interface='wan'
dhcp.wan.ignore='1'
dhcp.odhcpd=odhcpd
dhcp.odhcpd.maindhcp='0'
dhcp.odhcpd.leasefile='/tmp/hosts/odhcpd'
dhcp.odhcpd.leasetrigger='/usr/sbin/odhcpd-update'
dhcp.odhcpd.loglevel='4'
dhcp.br0=dhcp
dhcp.br0.start='100'
dhcp.br0.leasetime='12h'
dhcp.br0.limit='150'
dhcp.br0.interface='br0'
dhcp.br0.dhcp_option='6,192.168.1.254,8.8.8.8'

root@deludap01:~# ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP qlen 1000
    link/ether 64:66:b3:6f:8d:c8 brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.1/24 brd 192.168.1.255 scope global eth0
       valid_lft forever preferred_lft forever
    inet6 fd6b:f07e:c3e5::1/60 scope global
       valid_lft forever preferred_lft forever
    inet6 fe80::6666:b3ff:fe6f:8dc8/64 scope link
       valid_lft forever preferred_lft forever
5: br-br0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
    link/ether 64:66:b3:6f:8d:c9 brd ff:ff:ff:ff:ff:ff
    inet 192.168.0.1/24 brd 192.168.0.255 scope global br-br0
       valid_lft forever preferred_lft forever
    inet6 fe80::6666:b3ff:fe6f:8dc9/64 scope link
       valid_lft forever preferred_lft forever
6: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-br0 state UP qlen 1000
    link/ether 64:66:b3:6f:8d:ca brd ff:ff:ff:ff:ff:ff
    inet6 fe80::6666:b3ff:fe6f:8dca/64 scope link
       valid_lft forever preferred_lft forever
7: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-br0 state UP qlen 1000
    link/ether 64:66:b3:6f:8d:c9 brd ff:ff:ff:ff:ff:ff
    inet6 fe80::6666:b3ff:fe6f:8dc9/64 scope link
       valid_lft forever preferred_lft forever

root@deludap01:~# ip r
default via 192.168.0.1 dev br-br0
192.168.0.0/24 dev br-br0 scope link  src 192.168.0.1
192.168.1.0/24 dev eth0 scope link  src 192.168.1.1

root@deludap01:~# ip ru
0:      from all lookup local
32766:  from all lookup main
32767:  from all lookup default

root@deludap01:~# iptables-save
# Generated by iptables-save v1.6.2 on Fri Feb 15 10:54:03 2019
*nat
:PREROUTING ACCEPT [848:57054]
:INPUT ACCEPT [10:1487]
:OUTPUT ACCEPT [64:4842]
:POSTROUTING ACCEPT [379:17442]
:postrouting_rule - [0:0]
:prerouting_rule - [0:0]
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
COMMIT
# Completed on Fri Feb 15 10:54:03 2019
# Generated by iptables-save v1.6.2 on Fri Feb 15 10:54:03 2019
*mangle
:PREROUTING ACCEPT [1954:180660]
:INPUT ACCEPT [1116:125093]
:FORWARD ACCEPT [788:51135]
:OUTPUT ACCEPT [1239:94677]
:POSTROUTING ACCEPT [1233:95035]
COMMIT
# Completed on Fri Feb 15 10:54:03 2019
# Generated by iptables-save v1.6.2 on Fri Feb 15 10:54:03 2019
*filter
:INPUT ACCEPT [317:70029]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [88:7494]
:forwarding_rule - [0:0]
:input_rule - [0:0]
:output_rule - [0:0]
:reject - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
COMMIT
# Completed on Fri Feb 15 10:54:03 2019

You need firewall rules to forward between the two networks.

This is all done for you in a default configuration. I suggest starting there rather than trying to rebuild the whole thing from scratch. The wifi side would be lan and the Fritzbox side would be wan. This is called a routed AP.

If you don't need (or want) to isolate wireless users from the wired network, the most common setup is a bridged or "dumb" AP. This has only one network so there is no need for a firewall configuration.

2 Likes

Remove that.

Change to ACCEPT and either add a forwarding rule, or create zones and traffic forwardings.

Also check:

sysctl net.ipv4 | grep forward

The changes for the gateway and the firewall are done, but it still looks the same

root@deludap01:~# sysctl net.ipv4 | grep forward
net.ipv4.conf.all.forwarding = 1
net.ipv4.conf.all.mc_forwarding = 0
net.ipv4.conf.br-br0.forwarding = 1
net.ipv4.conf.br-br0.mc_forwarding = 0
net.ipv4.conf.default.forwarding = 1
net.ipv4.conf.default.mc_forwarding = 0
net.ipv4.conf.eth0.forwarding = 1
net.ipv4.conf.eth0.mc_forwarding = 0
net.ipv4.conf.lo.forwarding = 1
net.ipv4.conf.lo.mc_forwarding = 0
net.ipv4.conf.wlan0.forwarding = 1
net.ipv4.conf.wlan0.mc_forwarding = 0
net.ipv4.conf.wlan1.forwarding = 1
net.ipv4.conf.wlan1.mc_forwarding = 0
net.ipv4.ip_forward = 1
net.ipv4.ip_forward_use_pmtu = 0

To me it seems as if the switch is not connected to eth0 because even if I am connected by cable in the same network I cannot reach the IP of eth0

Let's see:

uci show firewall
iptables-save
root@deludap01:~# uci show firewall
firewall.@defaults[0]=defaults
firewall.@defaults[0].input='ACCEPT'
firewall.@defaults[0].output='ACCEPT'
firewall.@defaults[0].forward='ACCEPT'
firewall.@include[0]=include
firewall.@include[0].path='/etc/firewall.user'
root@deludap01:~# iptables-save
# Generated by iptables-save v1.6.2 on Sat Feb 16 05:24:01 2019
*nat
:PREROUTING ACCEPT [152:12727]
:INPUT ACCEPT [6:1056]
:OUTPUT ACCEPT [113:8194]
:POSTROUTING ACCEPT [189:13550]
:postrouting_rule - [0:0]
:prerouting_rule - [0:0]
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
COMMIT
# Completed on Sat Feb 16 05:24:01 2019
# Generated by iptables-save v1.6.2 on Sat Feb 16 05:24:01 2019
*mangle
:PREROUTING ACCEPT [791:80041]
:INPUT ACCEPT [466:55552]
:FORWARD ACCEPT [255:18174]
:OUTPUT ACCEPT [541:46729]
:POSTROUTING ACCEPT [799:66171]
COMMIT
# Completed on Sat Feb 16 05:24:01 2019
# Generated by iptables-save v1.6.2 on Sat Feb 16 05:24:01 2019
*filter
:INPUT ACCEPT [146:28484]
:FORWARD ACCEPT [255:18174]
:OUTPUT ACCEPT [150:11469]
:forwarding_rule - [0:0]
:input_rule - [0:0]
:output_rule - [0:0]
:reject - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
COMMIT
# Completed on Sat Feb 16 05:24:01 2019

Now it is configured correctly, assuming that you have a route to 192.168.0.0/24 via 192.168.1.1 either on 192.168.1.254, or on every host in the 192.168.1.0/24 network.

If you can't add that route, plain routing is impossible, and you should revert to default firewall setup with masquerading.

This route is already in place, but I do not think that this is the problem.
The below output shows my PCs configuration while I am not connected to the AP but to the ISP Router

C:\Users\some.user>ipconfig

Windows IP Configuration


Wireless LAN adapter Local Area Connection* 2:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Wireless LAN adapter Wi-Fi:

   Connection-specific DNS Suffix  . : fritz.box
   IPv4 Address. . . . . . . . . . . : 192.168.1.123
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.1.254

Ethernet adapter Bluetooth Network Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter Local Area Connection* 13:

   Connection-specific DNS Suffix  . :
   IPv6 Address. . . . . . . . . . . : 2001:0:9d38:6ab8:9:15d4:3f57:fe84
   Link-local IPv6 Address . . . . . : fe80::9:15d4:3f57:fe84%8
   Default Gateway . . . . . . . . . : ::

C:\Users\some.user>ping 192.168.1.1 -n 2

Pinging 192.168.1.1 with 32 bytes of data:
Reply from 192.168.1.123: Destination host unreachable.
Reply from 192.168.1.123: Destination host unreachable.

Ping statistics for 192.168.1.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

C:\Users\some.user>ping 192.168.1.254 -n 2

Pinging 192.168.1.254 with 32 bytes of data:
Reply from 192.168.1.254: bytes=32 time=1ms TTL=64
Reply from 192.168.1.254: bytes=32 time=1ms TTL=64

Ping statistics for 192.168.1.254:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 1ms, Maximum = 1ms, Average = 1ms

C:\Users\some.user>

Windows firewall allows only LocalSubnet access by default.

Do a traceroute to the Openwrt when you are connected to the ISP router:
tracert 192.168.0.1
Is there some setting in the ISP router to isolate LAN from Wifi or to isolate all clients?

There is no setting to isolate, I think it is very strange that the LAN port (eht0) does not respond to ICPM echo requests if I am connected to the same Network.

If I am on the WLAN of the OpenWRT device I am able to ping the 192.168.1.1. but my src net is 192.168.0.0/24 in that case.

C:\Users\some.user>tracert 192.168.0.1

Tracing route to 192.168.0.1 over a maximum of 30 hops

  1     1 ms     1 ms     *     fritz.box [192.168.1.254]
  2  fritz.box [192.168.1.254]  reports: Destination host unreachable.

Trace complete.

The fritz doesn't have a static route to the 192.168.0.0/24

Most likely the routing table on 192.168.1.254 is incorrect, or it doesn't permit LAN-LAN forwarding.
Either fix it, or create a static route on your Windows host.

The routing table on 192.168.1.254 is correct, to demonstrate it I have set the default gateway of my pc to the local interface of the OpenWRT router ... see output below

Sorry to mention this over and over but to me it seems that the eth0 is the issue somehow, e.g. not connected to the switch ports.

C:\Users\some.user>ipconfig

Windows IP Configuration


Wireless LAN adapter Local Area Connection* 2:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Wireless LAN adapter Wi-Fi:

   Connection-specific DNS Suffix  . :
   IPv4 Address. . . . . . . . . . . : 192.168.1.123
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.1.1

Ethernet adapter Bluetooth Network Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

Tunnel adapter Local Area Connection* 13:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :

C:\Users\some.user>tracert 192.168.0.1

Tracing route to 192.168.0.1 over a maximum of 30 hops

  1  PC [192.168.1.123]  reports: Destination host unreachable.

Trace complete.

C:\Users\some.user>ping 192.168.1.1

Pinging 192.168.1.1 with 32 bytes of data:
Reply from 192.168.1.123: Destination host unreachable.
Reply from 192.168.1.123: Destination host unreachable.

Ping statistics for 192.168.1.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Control-C
^C
C:\Users\some.user>

Check from OpenWrt:

tcpdump -vni any icmp

Try to backup and reset the settings to factory defaults and/or reflash the firmware.
Check your system information and switch settings:

ubus call system board
swconfig list
swconfig dev switch0 show

tcpdump is not installed

Output without reset

root@deludap01:~# ubus call system board
{
        "kernel": "4.9.120",
        "hostname": "deludap01",
        "system": "Atheros AR9344 rev 2",
        "model": "TP-Link TL-WDR4300 v1",
        "board_name": "tl-wdr4300",
        "release": {
                "distribution": "OpenWrt",
                "version": "18.06.1",
                "revision": "r7258-5eb055306f",
                "target": "ar71xx\/generic",
                "description": "OpenWrt 18.06.1 r7258-5eb055306f"
        }
}
root@deludap01:~# swconfig list
Found: switch0 - ag71xx-mdio.0
root@deludap01:~# swconfig dev switch0 show
Global attributes:
        enable_vlan: 1
        enable_mirror_rx: 0
        enable_mirror_tx: 0
        mirror_monitor_port: 0
        mirror_source_port: 0
        arl_age_time: 300
        arl_table: address resolution table
Port 2: MAC 78:d7:5f:e3:eb:25
Port 2: MAC 5c:96:56:f9:cc:11
Port 2: MAC 0c:2c:54:07:18:9b
Port 2: MAC 10:08:c1:1a:f7:5a
Port 2: MAC d8:c7:71:8a:eb:ca
Port 2: MAC b2:35:fc:3c:a6:81
Port 2: MAC 10:fe:ed:af:6c:64
Port 2: MAC 00:11:32:22:a6:5d
Port 2: MAC 44:4e:6d:b4:ce:49

        igmp_snooping: 0
        igmp_v3: 0
Port 0:
        mib: MIB counters
RxBroad     : 1260
RxPause     : 0
RxMulti     : 61
RxFcsErr    : 0
RxAlignErr  : 0
RxRunt      : 0
RxFragment  : 0
Rx64Byte    : 1264
Rx128Byte   : 17
Rx256Byte   : 44
Rx512Byte   : 2
Rx1024Byte  : 1
Rx1518Byte  : 0
RxMaxByte   : 0
RxTooLong   : 0
RxGoodByte  : 91764 (89.6 KiB)
RxBadByte   : 0
RxOverFlow  : 0
Filtered    : 1315
TxBroad     : 27633
TxPause     : 0
TxMulti     : 8798
TxUnderRun  : 0
Tx64Byte    : 7
Tx128Byte   : 21791
Tx256Byte   : 2744
Tx512Byte   : 12679
Tx1024Byte  : 166
Tx1518Byte  : 94
TxMaxByte   : 8
TxOverSize  : 0
TxByte      : 6351947 (6.0 MiB)
TxCollision : 0
TxAbortCol  : 0
TxMultiCol  : 0
TxSingleCol : 0
TxExcDefer  : 0
TxDefer     : 0
TxLateCol   : 0

        enable_eee: ???
        igmp_snooping: 0
        vlan_prio: 0
        pvid: 0
        link: port:0 link:up speed:1000baseT full-duplex txflow rxflow
Port 1:
        mib: No MIB data
        enable_eee: 0
        igmp_snooping: 0
        vlan_prio: 0
        pvid: 2
        link: port:1 link:down
Port 2:
        mib: MIB counters
RxBroad     : 27633
RxPause     : 0
RxMulti     : 8798
RxFcsErr    : 0
RxAlignErr  : 0
RxRunt      : 0
RxFragment  : 0
Rx64Byte    : 18918
Rx128Byte   : 3549
Rx256Byte   : 2093
Rx512Byte   : 12678
Rx1024Byte  : 172
Rx1518Byte  : 102
RxMaxByte   : 0
RxTooLong   : 0
RxGoodByte  : 6208561 (5.9 MiB)
RxBadByte   : 0
RxOverFlow  : 0
Filtered    : 23
TxBroad     : 0
TxPause     : 0
TxMulti     : 6
TxUnderRun  : 0
Tx64Byte    : 2
Tx128Byte   : 11
Tx256Byte   : 0
Tx512Byte   : 0
Tx1024Byte  : 0
Tx1518Byte  : 0
TxMaxByte   : 0
TxOverSize  : 0
TxByte      : 1158 (1.1 KiB)
TxCollision : 0
TxAbortCol  : 0
TxMultiCol  : 0
TxSingleCol : 0
TxExcDefer  : 0
TxDefer     : 0
TxLateCol   : 0

        enable_eee: 0
        igmp_snooping: 0
        vlan_prio: 0
        pvid: 1
        link: port:2 link:up speed:1000baseT full-duplex txflow rxflow eee100 ee                                                                             e1000 auto
Port 3:
        mib: No MIB data
        enable_eee: 0
        igmp_snooping: 0
        vlan_prio: 0
        pvid: 1
        link: port:3 link:down
Port 4:
        mib: No MIB data
        enable_eee: 0
        igmp_snooping: 0
        vlan_prio: 0
        pvid: 1
        link: port:4 link:down
Port 5:
        mib: No MIB data
        enable_eee: 0
        igmp_snooping: 0
        vlan_prio: 0
        pvid: 1
        link: port:5 link:down
Port 6:
        mib: No MIB data
        enable_eee: ???
        igmp_snooping: 0
        vlan_prio: 0
        pvid: 0
        link: port:6 link:down
VLAN 1:
        vid: 1
        ports: 0t 2 3 4 5
VLAN 2:
        vid: 2
        ports: 0t 1
root@deludap01:~#