New OpenWRT user and i'm very frustrated...clients do not take an IP from routers (opnsense) DHCP when I disable openwrt DHCP.
I'm using OpenWRT on Asus TUF AX6000 router version 23.x
I'm trying to set it up as an AP, so in br-lan I set a static IP (192.168.4.70) (Outside the routers dhcp range) which belongs to my opnsense router (192.168.4.1)
The opnsense router is connected to a managed switch and from the managed switch a cable to WAN, and i can access the internet fine and it takes an IP from the routers DHCP.
What port is used on your AP to connect to the upstream network?
Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button:
Remember to redact passwords, MAC addresses and any public IP addresses you may have:
Your firewall is rather messed up, but that shouldn't really affect the functionality.
What port is connected on the AP (going to the upstream network)?
If you unplug the AP and connect that cable directly to a computer, does it get an IP address via DHCP?
Now all is good, I'm sure it was because of the firewall rules, how to completely disable the firewall?
Ok now I need to configure a guest wifi to be in a specific VLAN 192.168.9.x
I already configured the opnsense router with VID 9 and the managed switch as well, any available guides or can you help me out how to do this on openwrt?
I can only find videos on yourtube but i think with a totally different versions of Openwrt...
Thank you, ok to do this once and for all i'd appreciate helping in the following setting:
The main LAN to my router (Port 2) needs to be in VLAN 20 (subnet 192.168.2.x) so any wifi device connected needs to go to 192.168.2.x
Guest WIFI needs to be in VLAN 9 (192.168.9.x)
Question, Must i connect another LAN cable (Say port 3) to my switch for VLAN 9? or its done via Wifi bridging? because If 2 cables are connected from the asus router (openwrt) to the switch I lose all connections..how to fix that?
All is good here, I did several modifications as follows (I had to use different LAN ports for each subnet), I've got a question, Can't I use all the 3 subnets on just 1 LAN port?
cat /etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd41:d1b3:d404::/48'
config device
option name 'br-lan'
option type 'bridge'
list ports 'lan1'
list ports 'lan2'
list ports 'lan5'
config device
option name 'lan1'
option macaddr '10:7c:61:a0:82:66'
config device
option name 'lan2'
option macaddr '10:7c:61:a0:82:66'
config device
option name 'lan3'
option macaddr '10:7c:61:a0:82:66'
config device
option name 'lan4'
option macaddr '10:7c:61:a0:82:66'
config device
option name 'lan5'
option macaddr '10:7c:61:a0:82:66'
config interface 'lan'
option device 'br-lan.1'
option proto 'static'
option ipaddr '192.168.4.70'
option netmask '255.255.255.0'
option ip6assign '60'
option gateway '192.168.4.1'
option broadcast '192.168.4.255'
option defaultroute '0'
config device
option name 'eth1'
option macaddr '10:7c:61:a0:82:66'
config interface 'wan'
option device 'eth1'
option proto 'dhcp'
config interface 'wan6'
option device 'eth1'
option proto 'dhcpv6'
config bridge-vlan
option device 'br-lan'
option vlan '1'
list ports 'lan1:u*'
list ports 'lan2:u*'
list ports 'lan5:u*'
config bridge-vlan
option device 'br-lan'
option vlan '9'
list ports 'lan3:u'
config interface 'guest'
option device 'br-lan.9'
option proto 'none'
config bridge-vlan
option device 'br-lan'
option vlan '20'
list ports 'lan4'
config interface 'vlan20'
option device 'br-lan.20'
option proto 'none'
I see quite a few potential issues with your configuration. I can help you resolve them, but I need to know what the intent is for each port -- port-vlan membership, tagging status for each vlan per port, and which port is the uplink to the main router.
For example (making this up):
port lan 1 - uplink to the main router, VLAN 1 untagged + VLANs 9 and 20 tagged
port lan 2 - access port for VLAN 1 (untagged)
port lan 3 - access port for vlan 9
port lan 4 - trunk to a downstream managed switch, all VLANs tagged.
Ok, 1 cable from switch to WAN (DHCP subnet 192.168.4.x)
port lan 2 to switch port 22 (untagged on switch enter VLAN 192.168.4.x (default))
port lan 3 to switch port 23 (untagged on switch VLAN 9 but using port using its PVID)
port lan 4 to switch port 21 (tagged on switch VLAN 20 but port using its PVID)
So if I understand your description, you have 4 cables connecting between the switch and the ap. Is that correct?
If so, you should reconsider the design here. All of those networks can run over a single cable by setting up a trunk port on the switch and a corresponding one on the ap.
Start by creating a trunk port on the main switch. Then, put all ports on the ap back into br-lan. Create bridge VLANs to build the trunk on the ap, and optionally define the port-vlan membership of the other ports on the ap.