OpenWrt on RE200v2 cant get wlan1 to connect to lan. wlan0 works

I have an TP-LINK RE-200V2, flashed with openwrt 21.02
I am using the RE200 in access point mode, eth0 connected to my main router.

I followed these instructions https://openwrt.org/docs/guide-user/network/wifi/dumbap

The 2G wlan network works as expected. However, when connecting to the 5G network windows reports "Connected, but no internet access." alsom the 5G radio shows up in the luci interface with a fair connection quality.

Both wlan0 and wlan1 are linked to the to the lan: bridge network in the luci interface.

Heres what the connection on my widows desktop looks like for 5G (wlan1), it seems like DHCP isn't coming through at all.

Wireless LAN adapter Wi-Fi:

   Connection-specific DNS Suffix  . :
   Link-local IPv6 Address . . . . . : fe80::5822:9b92:778f:cbbe%20
   Autoconfiguration IPv4 Address. . : 169.254.203.190
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Default Gateway . . . . . . . . . :

Here's what the same adapter it looks like for when connected to the 2G (wlan0)

 Wireless LAN adapter Wi-Fi:
 
    Connection-specific DNS Suffix  . : hhbhasenack.local
    IPv6 Address. . . . . . . . . . . : fd56:b296:8c60:0:5822:9b92:778f:cbbe
    Temporary IPv6 Address. . . . . . : fd56:b296:8c60:0:493c:24c3:8185:dc18
    Link-local IPv6 Address . . . . . : fe80::5822:9b92:778f:cbbe%20
    IPv4 Address. . . . . . . . . . . : 192.168.178.131
    Subnet Mask . . . . . . . . . . . : 255.255.255.0
    Default Gateway . . . . . . . . . : 192.168.178.1

So... Any idea what I may have to change within luci to get DHCP to work on both adapters? (BTW DHCP is provided by my NAS, not by the OpenWRT or my main router)

Also setting a static IP address on the wifi adapter does not fix the 5G connection problem. My guess there is something off with the routing of the wlan1 device in openWrt.

Could an alternative solution be to have the 3 devices each with their own IP address and then setup a static routine table? - here's where my knowledge runs short :sa:

Here's part of the system log that may shed some light:

Fri Feb 18 20:52:27 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:52:32 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: deauthenticated due to local deauth request
Fri Feb 18 20:52:39 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:52:52 2022 daemon.info hostapd: wlan1: STA 9c:29:76:1a:ed:ca IEEE 802.11: authenticated
Fri Feb 18 20:52:52 2022 daemon.info hostapd: wlan1: STA 9c:29:76:1a:ed:ca IEEE 802.11: associated (aid 1)
Fri Feb 18 20:52:52 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:52:52 2022 daemon.info hostapd: wlan1: STA 9c:29:76:1a:ed:ca WPA: pairwise key handshake completed (RSN)
Fri Feb 18 20:52:55 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:53:10 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:53:11 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:53:15 2022 daemon.info hostapd: wlan1: STA 9c:29:76:1a:ed:ca IEEE 802.11: deauthenticated due to local deauth request
Fri Feb 18 20:53:27 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:53:34 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: authenticated
Fri Feb 18 20:53:34 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: associated (aid 1)
Fri Feb 18 20:53:34 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:53:34 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca WPA: pairwise key handshake completed (RSN)
Fri Feb 18 20:53:43 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:53:52 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:53:52 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: authenticated
Fri Feb 18 20:53:52 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: associated (aid 1)
Fri Feb 18 20:53:52 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:53:52 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca WPA: pairwise key handshake completed (RSN)
Fri Feb 18 20:53:59 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)
Fri Feb 18 20:54:08 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:54:12 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: authenticated
Fri Feb 18 20:54:12 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca IEEE 802.11: associated (aid 1)
Fri Feb 18 20:54:12 2022 daemon.notice hostapd: wlan0: STA-OPMODE-SMPS-MODE-CHANGED 9c:29:76:1a:ed:ca off
Fri Feb 18 20:54:12 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 9c:29:76:1a:ed:ca
Fri Feb 18 20:54:12 2022 daemon.info hostapd: wlan0: STA 9c:29:76:1a:ed:ca WPA: pairwise key handshake completed (RSN)
Fri Feb 18 20:54:15 2022 daemon.err odhcpd[1268]: Failed to send to ff02::1%lan@br-lan (Permission denied)

I learned from another message the following output might be very useful. (btw firewall is OFF)

/etc/ssl$ cat /etc/config/network

config interface 'loopback'
	option device 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option ula_prefix 'fd56:b296:8c60::/48'
	option packet_steering '1'

config interface 'lan'
	option device 'br-lan'
	option proto 'static'
	option netmask '255.255.255.0'
	option ip6assign '60'
	option ipaddr '192.168.178.2'
	option gateway '192.168.178.1'

config switch
	option name 'switch0'
	option reset '1'
	option enable_vlan '0'

config device
	option name 'br-lan'
	option type 'bridge'
	list ports 'eth0'
	option promisc '1'
	option acceptlocal '1'
	option ipv6 '0'

/etc/ssl$ cat /etc/config/wireless

config wifi-device 'radio0'
	option type 'mac80211'
	option channel '11'
	option hwmode '11g'
	option path 'platform/10300000.wmac'
	option htmode 'HT20'
	option cell_density '0'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option encryption 'psk-mixed'
	option key '<undisclosed>'
	option ssid 'SnackNet2GE.nl'

config wifi-device 'radio1'
	option type 'mac80211'
	option hwmode '11a'
	option path 'pci0000:00/0000:00:00.0/0000:01:00.0'
	option htmode 'VHT80'
	option channel 'auto'
	option cell_density '0'

config wifi-iface 'default_radio1'
	option device 'radio1'
	option network 'lan'
	option mode 'ap'
	option key '<undisclosed>'
	option encryption 'psk-mixed'
	option ssid 'SnackNet5GE.nl'
	option wds '1'

/etc/ssl$ cat /etc/config/dhcp

config dnsmasq
	option domainneeded '1'
	option boguspriv '1'
	option filterwin2k '0'
	option localise_queries '1'
	option rebind_protection '1'
	option rebind_localhost '1'
	option local '/lan/'
	option domain 'lan'
	option expandhosts '1'
	option nonegcache '0'
	option authoritative '1'
	option readethers '1'
	option leasefile '/tmp/dhcp.leases'
	option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
	option nonwildcard '1'
	option localservice '1'
	option ednspacket_max '1232'

config dhcp 'lan'
	option interface 'lan'
	option leasetime '12h'
	option dhcpv4 'server'
	option ignore '1'
	option dynamicdhcp '0'
	option start '200'
	option limit '220'
	option ra 'relay'
	list ra_flags 'none'
	option dhcpv6 'relay'
	option ndp 'relay'
	option ndproxy_routing '0'

config dhcp 'wan'
	option interface 'wan'
	option ignore '1'

config odhcpd 'odhcpd'
	option maindhcp '0'
	option leasefile '/tmp/hosts/odhcpd'
	option leasetrigger '/usr/sbin/odhcpd-update'
	option loglevel '4'

/etc/ssl$ cat /etc/config/firewall

config defaults
	option syn_flood '1'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'REJECT'

config zone
	option name 'lan'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'
	list network 'lan'

config zone
	option name 'wan'
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'
	option masq '1'
	option mtu_fix '1'
	list network 'wan'
	list network 'wan6'

config forwarding
	option src 'lan'
	option dest 'wan'

config rule
	option name 'Allow-DHCP-Renew'
	option src 'wan'
	option proto 'udp'
	option dest_port '68'
	option target 'ACCEPT'
	option family 'ipv4'

config rule
	option name 'Allow-Ping'
	option src 'wan'
	option proto 'icmp'
	option icmp_type 'echo-request'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-IGMP'
	option src 'wan'
	option proto 'igmp'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-DHCPv6'
	option src 'wan'
	option proto 'udp'
	option src_ip 'fc00::/6'
	option dest_ip 'fc00::/6'
	option dest_port '546'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-MLD'
	option src 'wan'
	option proto 'icmp'
	option src_ip 'fe80::/10'
	list icmp_type '130/0'
	list icmp_type '131/0'
	list icmp_type '132/0'
	list icmp_type '143/0'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Input'
	option src 'wan'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	list icmp_type 'router-solicitation'
	list icmp_type 'neighbour-solicitation'
	list icmp_type 'router-advertisement'
	list icmp_type 'neighbour-advertisement'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Forward'
	option src 'wan'
	option dest '*'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-IPSec-ESP'
	option src 'wan'
	option dest 'lan'
	option proto 'esp'
	option target 'ACCEPT'

config rule
	option name 'Allow-ISAKMP'
	option src 'wan'
	option dest 'lan'
	option dest_port '500'
	option proto 'udp'
	option target 'ACCEPT'

config rule
	option name 'Support-UDP-Traceroute'
	option src 'wan'
	option dest_port '33434:33689'
	option proto 'udp'
	option family 'ipv4'
	option target 'REJECT'
	option enabled 'false'

config include
	option path '/etc/firewall.user'

TIA

Hans

This device is known to have issues with 5Ghz radio when running OpenWRT. See more details below.

As far as I know this issue has not been solved yet, so therefore the 5Ghz radio is pretty much useless on this device with OpenWRT.

If you want to confirm you have this issue, just open an ssh session to the device, execute the command " iw phy phy1 channels" and post the results here.