I have an TP-LINK RE-200V2, flashed with openwrt 21.02
I am using the RE200 in access point mode, eth0 connected to my main router.
I followed these instructions https://openwrt.org/docs/guide-user/network/wifi/dumbap
The 2G wlan network works as expected. However, when connecting to the 5G network windows reports "Connected, but no internet access." alsom the 5G radio shows up in the luci interface with a fair connection quality.
Both wlan0 and wlan1 are linked to the to the lan: bridge network in the luci interface.
Heres what the connection on my widows desktop looks like for 5G (wlan1), it seems like DHCP isn't coming through at all.
Wireless LAN adapter Wi-Fi:
Connection-specific DNS Suffix . :
Link-local IPv6 Address . . . . . : fe80::5822:9b92:778f:cbbe%20
Autoconfiguration IPv4 Address. . : 169.254.203.190
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . . . :
Here's what the same adapter it looks like for when connected to the 2G (wlan0)
Wireless LAN adapter Wi-Fi:
Connection-specific DNS Suffix . : hhbhasenack.local
IPv6 Address. . . . . . . . . . . : fd56:b296:8c60:0:5822:9b92:778f:cbbe
Temporary IPv6 Address. . . . . . : fd56:b296:8c60:0:493c:24c3:8185:dc18
Link-local IPv6 Address . . . . . : fe80::5822:9b92:778f:cbbe%20
IPv4 Address. . . . . . . . . . . : 192.168.178.131
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.178.1
So... Any idea what I may have to change within luci to get DHCP to work on both adapters? (BTW DHCP is provided by my NAS, not by the OpenWRT or my main router)
Also setting a static IP address on the wifi adapter does not fix the 5G connection problem. My guess there is something off with the routing of the wlan1 device in openWrt.
Could an alternative solution be to have the 3 devices each with their own IP address and then setup a static routine table? - here's where my knowledge runs short
Here's part of the system log that may shed some light:
Fri Feb 18 20:52:27 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:52:32 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: deauthenticated due to local deauth request
Fri Feb 18 20:52:39 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:52:52 2022 daemon.info hostapd: wlan1: STA 9c:29:76:1a:ed:ca IEEE 802.11: authenticated
Fri Feb 18 20:52:52 2022 daemon.info hostapd: wlan1: STA 9c:29:76:1a:ed:ca IEEE 802.11: associated (aid 1)
Fri Feb 18 20:52:52 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:52:52 2022 daemon.info hostapd: wlan1: STA 9c:29:76:1a:ed:ca WPA: pairwise key handshake completed (RSN)
Fri Feb 18 20:52:55 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:53:10 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:53:11 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:53:15 2022 daemon.info hostapd: wlan1: STA 9c:29:76:1a:ed:ca IEEE 802.11: deauthenticated due to local deauth request
Fri Feb 18 20:53:27 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:53:34 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: authenticated
Fri Feb 18 20:53:34 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: associated (aid 1)
Fri Feb 18 20:53:34 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:53:34 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca WPA: pairwise key handshake completed (RSN)
Fri Feb 18 20:53:43 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:53:52 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:53:52 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: authenticated
Fri Feb 18 20:53:52 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: associated (aid 1)
Fri Feb 18 20:53:52 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:53:52 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca WPA: pairwise key handshake completed (RSN)
Fri Feb 18 20:53:59 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:54:08 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:54:12 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: authenticated
Fri Feb 18 20:54:12 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: associated (aid 1)
Fri Feb 18 20:54:12 2022 daemon.notice hostapd: wlan0: STA-OPMODE-SMPS-MODE-CHANGED 9c:29:76:1a:ed:ca off
Fri Feb 18 20:54:12 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:54:12 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca WPA: pairwise key handshake completed (RSN)
Fri Feb 18 20:54:15 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
I learned from another message the following output might be very useful. (btw firewall is OFF)
/etc/ssl$ cat /etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd56:b296:8c60::/48'
option packet_steering '1'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option netmask '255.255.255.0'
option ip6assign '60'
option ipaddr '192.168.178.2'
option gateway '192.168.178.1'
config switch
option name 'switch0'
option reset '1'
option enable_vlan '0'
config device
option name 'br-lan'
option type 'bridge'
list ports 'eth0'
option promisc '1'
option acceptlocal '1'
option ipv6 '0'
/etc/ssl$ cat /etc/config/wireless
config wifi-device 'radio0'
option type 'mac80211'
option channel '11'
option hwmode '11g'
option path 'platform/10300000.wmac'
option htmode 'HT20'
option cell_density '0'
config wifi-iface 'default_radio0'
option device 'radio0'
option network 'lan'
option mode 'ap'
option encryption 'psk-mixed'
option key '<undisclosed>'
option ssid 'SnackNet2GE.nl'
config wifi-device 'radio1'
option type 'mac80211'
option hwmode '11a'
option path 'pci0000:00/0000:00:00.0/0000:01:00.0'
option htmode 'VHT80'
option channel 'auto'
option cell_density '0'
config wifi-iface 'default_radio1'
option device 'radio1'
option network 'lan'
option mode 'ap'
option key '<undisclosed>'
option encryption 'psk-mixed'
option ssid 'SnackNet5GE.nl'
option wds '1'
/etc/ssl$ cat /etc/config/dhcp
config dnsmasq
option domainneeded '1'
option boguspriv '1'
option filterwin2k '0'
option localise_queries '1'
option rebind_protection '1'
option rebind_localhost '1'
option local '/lan/'
option domain 'lan'
option expandhosts '1'
option nonegcache '0'
option authoritative '1'
option readethers '1'
option leasefile '/tmp/dhcp.leases'
option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
option nonwildcard '1'
option localservice '1'
option ednspacket_max '1232'
config dhcp 'lan'
option interface 'lan'
option leasetime '12h'
option dhcpv4 'server'
option ignore '1'
option dynamicdhcp '0'
option start '200'
option limit '220'
option ra 'relay'
list ra_flags 'none'
option dhcpv6 'relay'
option ndp 'relay'
option ndproxy_routing '0'
config dhcp 'wan'
option interface 'wan'
option ignore '1'
config odhcpd 'odhcpd'
option maindhcp '0'
option leasefile '/tmp/hosts/odhcpd'
option leasetrigger '/usr/sbin/odhcpd-update'
option loglevel '4'
/etc/ssl$ cat /etc/config/firewall
config defaults
option syn_flood '1'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
config zone
option name 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
list network 'lan'
config zone
option name 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
list network 'wan'
list network 'wan6'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option src_ip 'fc00::/6'
option dest_ip 'fc00::/6'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config rule
option name 'Support-UDP-Traceroute'
option src 'wan'
option dest_port '33434:33689'
option proto 'udp'
option family 'ipv4'
option target 'REJECT'
option enabled 'false'
config include
option path '/etc/firewall.user'
TIA
Hans