mbern
March 15, 2020, 6:49pm
1
Hope someone can help me solve this one. I have an TP-Link C5 v2 with OpenWrt 19.07.2 r1 on it.
I have setup wireless AP and it works. I can SSH and ping the unit from both the LAN and Wireless side. But when I SSH to the unit and try an ping my main router 192.168.1.1 it does not work. Also it cannot resolve any domain name.
Below is some additional information about the network setup. Hope someone can help me understand what is causing the challenges.
root@OpenWrtStue:~# uci show network
network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.globals=globals
network.globals.ula_prefix='fd61:034f:5b9f::/48'
network.lan=interface
network.lan.type='bridge'
network.lan.proto='static'
network.lan.netmask='255.255.255.0'
network.lan.ipaddr='192.168.1.2'
network.lan.gateway='192.168.1.1'
network.lan.delegate='0'
network.lan.dns='8.8.8.8'
network.lan.ifname='eth0.1'
network.@switch [0]=switch
network.@switch [0].name='switch0'
network.@switch [0].reset='1'
network.@switch [0].enable_vlan='1'
network.@switch_vlan [0]=switch_vlan
network.@switch_vlan [0].device='switch0'
network.@switch_vlan [0].vlan='1'
network.@switch_vlan [0].ports='1 2 3 4 5t'
trendy
March 15, 2020, 8:42pm
2
What is the output of the following:
uci export network; uci export dhcp; uci export firewall; head -n -0 /etc/firewall.user; \
ip -4 addr ; ip -4 ro ls tab all ; ip -4 ru; arp
Please use "Preformatted text </>" for logs, scripts, configs and general console output.
mbern
March 15, 2020, 9:30pm
3
Hi trendy,
Thanks for the quick reply. Please find the requested data below.
package network
config interface 'loopback'
option ifname 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd61:034f:5b9f::/48'
config interface 'lan'
option type 'bridge'
option proto 'static'
option netmask '255.255.255.0'
option ipaddr '192.168.1.2'
option gateway '192.168.1.1'
option delegate '0'
list dns '8.8.8.8'
option ifname 'eth0.1'
config switch
option name 'switch0'
option reset '1'
option enable_vlan '1'
config switch_vlan
option device 'switch0'
option vlan '1'
option ports '1 2 3 4 5t'
package dhcp
config dnsmasq
option domainneeded '1'
option localise_queries '1'
option rebind_protection '1'
option rebind_localhost '1'
option local '/lan/'
option domain 'lan'
option expandhosts '1'
option readethers '1'
option leasefile '/tmp/dhcp.leases'
option resolvfile '/tmp/resolv.conf.auto'
option localservice '1'
config dhcp 'lan'
option interface 'lan'
option ignore '1'
config dhcp 'wan'
option interface 'wan'
option ignore '1'
config odhcpd 'odhcpd'
option maindhcp '0'
option leasefile '/tmp/hosts/odhcpd'
option leasetrigger '/usr/sbin/odhcpd-update'
option loglevel '4'
package firewall
config defaults
option syn_flood '1'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
config zone
option name 'lan'
list network 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
config zone
option name 'wan'
list network 'wan'
list network 'wan6'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option src_ip 'fc00::/6'
option dest_ip 'fc00::/6'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config include
option path '/etc/firewall.user'
# This file is interpreted as shell script.
# Put your custom iptables rules here, they will
# be executed with each firewall (re-)start.
# Internal uci firewall chains are flushed and recreated on reload, so
# put custom rules into the root chains e.g. INPUT or FORWARD or into the
# special user chains, e.g. input_wan_rule or postrouting_lan_rule.
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
7: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
inet 192.168.1.2/24 brd 192.168.1.255 scope global br-lan
valid_lft forever preferred_lft forever
ip: invalid argument 'ls' to 'ip'
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
IP address HW type Flags HW address Mask Device
192.168.1.5 0x1 0x0 c8:bc:c8:d6:df:25 * br-lan
192.168.1.108 0x1 0x2 c8:bc:c8:d6:df:25 * br-lan
192.168.1.1 0x1 0x2 a4:2b:b0:de:7e:f4 * br-lan
192.168.1.101 0x1 0x2 88:40:3b:1f:70:99 * br-lan
trendy
March 15, 2020, 10:16pm
4
I don't see anything wrong here.
Verify that there is no IP conflict with the address 192.168.1.2 which you are using on the dumbAP.
Does the router 1.1 reply to pings from other hosts? Even from those connected on the dumbAP?
1 Like
mbern
March 16, 2020, 6:33am
5
You figured it out. It is an IP conflict. Before upgrading the route it had IP 192.168.1.2, so not sure why there is a conflict. But regardless it worked when I change IP to 192.168.1.3.
Thank you for the support. Really appreciate it
Morten
trendy
March 17, 2020, 9:05am
6
Maybe the DHCP server allocated the 1.2 to some other host while you were upgrading it.
system
Closed
March 27, 2020, 9:05am
7
This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.