[Solved] Network client can't ping/connect to dumb router/switch

I'm getting this weird issue on just 1 workstation and I can't figure out why!?

My Windows 10 workstation (192.168.1.6) is connected to my main router (Archer C7 v2 - 19.07.1 - 192.168.1.1) on PORT 1
I have my Asus RT-N56U (192.168.1.2) connected to PORT 2 on my main router (Archer).

Whenever I reboot the Asus router I can ping it from my Windows workstation for a few seconds.. then all of a sudden it gets blocked somehow on the ASUS dumb router/switch. I'm unable to communicate with it and ANY other devices connected to it. (I have my printer (192.168.1.20) connected to 1 of the ports on the Asus dump switch)

I've disabled wifi, firewall, odhcp and dnsmasq.

Every other client/device on my network can ping/connect to both the Asus dumb router/switch and the printer that's connected to one of its ports.

/etc/config# cat network

config interface 'loopback'
        option ifname 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fdd4:86e0:8b59::/48'

config interface 'lan'
        option type 'bridge'
        option ifname 'eth0.1'
        option proto 'static'
        option netmask '255.255.255.0'
        option ipaddr '192.168.1.2'
        option gateway '192.168.1.1'
        option delegate '0'
        list dns '192.168.1.1'


config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option ports '0 1 2 3 4 8t'

This is my syslog after a reboot of the Asus dump router/switch:

/tmp/log# cat syslog.log
Wed Mar 11 11:36:01 2020 authpriv.info dropbear[928]: Not backgrounding
Wed Mar 11 11:36:01 2020 authpriv.info dropbear[929]: Not backgrounding
Wed Mar 11 11:36:03 2020 user.notice : Added device handler type: 8021ad
Wed Mar 11 11:36:03 2020 user.notice : Added device handler type: 8021q
Wed Mar 11 11:36:03 2020 user.notice : Added device handler type: macvlan
Wed Mar 11 11:36:03 2020 user.notice : Added device handler type: veth
Wed Mar 11 11:36:03 2020 user.notice : Added device handler type: bridge
Wed Mar 11 11:36:03 2020 user.notice : Added device handler type: Network device
Wed Mar 11 11:36:03 2020 user.notice : Added device handler type: tunnel
Wed Mar 11 11:36:04 2020 kern.notice kernel: [   34.468750] jffs2: notice: (968) jffs2_build_xattr_subsystem: complete building xattr subsystem, 9 of xdatum (3 unchecked, 6 orphan) and 69 of xref (8 dead, 22 orphan) found.
Wed Mar 11 11:36:04 2020 daemon.notice procd: /etc/init.d/network: 'radio0' is disabled
Wed Mar 11 11:36:04 2020 daemon.notice procd: /etc/init.d/network: 'radio1' is disabled
Wed Mar 11 11:36:04 2020 daemon.err block: hotplug-call call failed
Wed Mar 11 11:36:04 2020 daemon.notice procd: /etc/init.d/network: 'radio0' is disabled
Wed Mar 11 11:36:04 2020 daemon.notice procd: /etc/init.d/network: 'radio1' is disabled
Wed Mar 11 11:36:06 2020 cron.info crond[1031]: crond (busybox 1.30.1) started, log level 5
Wed Mar 11 11:36:08 2020 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
Wed Mar 11 11:36:08 2020 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd
Wed Mar 11 11:36:08 2020 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
Wed Mar 11 11:36:09 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
Wed Mar 11 11:36:09 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
Wed Mar 11 11:36:09 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
Wed Mar 11 11:36:09 2020 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
Wed Mar 11 11:36:10 2020 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Wed Mar 11 11:36:10 2020 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Wed Mar 11 11:36:11 2020 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
Wed Mar 11 11:36:11 2020 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
Wed Mar 11 11:36:11 2020 daemon.warn netifd: You have delegated IPv6-prefixes but haven't assigned them to any interface. Did you forget to set option ip6assign on your lan-interfaces?
Wed Mar 11 11:36:11 2020 kern.info kernel: [   41.554407] mtk_soc_eth 10100000.ethernet eth0: link up (1000Mbps/Full duplex)
Wed Mar 11 11:36:11 2020 kern.info kernel: [   41.569192] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Wed Mar 11 11:36:11 2020 kern.info kernel: [   41.580864] 8021q: adding VLAN 0 to HW filter on device eth0
Wed Mar 11 11:36:11 2020 kern.info kernel: [   41.699296] br-lan: port 1(eth0.1) entered blocking state
Wed Mar 11 11:36:11 2020 kern.info kernel: [   41.710159] br-lan: port 1(eth0.1) entered disabled state
Wed Mar 11 11:36:11 2020 kern.info kernel: [   41.721338] device eth0.1 entered promiscuous mode
Wed Mar 11 11:36:11 2020 kern.info kernel: [   41.730942] device eth0 entered promiscuous mode
Wed Mar 11 11:36:11 2020 kern.info kernel: [   41.899470] br-lan: port 1(eth0.1) entered blocking state
Wed Mar 11 11:36:11 2020 kern.info kernel: [   41.910306] br-lan: port 1(eth0.1) entered forwarding state
Wed Mar 11 11:36:11 2020 kern.info kernel: [   41.921640] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Wed Mar 11 11:36:12 2020 daemon.notice netifd: Interface 'lan' is enabled
Wed Mar 11 11:36:12 2020 daemon.notice netifd: Interface 'lan' is setting up now
Wed Mar 11 11:36:12 2020 daemon.notice netifd: Interface 'lan' is now up
Wed Mar 11 11:36:12 2020 daemon.notice netifd: Interface 'loopback' is enabled
Wed Mar 11 11:36:12 2020 daemon.notice netifd: Interface 'loopback' is setting up now
Wed Mar 11 11:36:12 2020 daemon.notice netifd: Interface 'loopback' is now up
Wed Mar 11 11:36:12 2020 daemon.notice netifd: bridge 'br-lan' link is up
Wed Mar 11 11:36:12 2020 daemon.notice netifd: Interface 'lan' has link connectivity
Wed Mar 11 11:36:12 2020 daemon.notice netifd: Network device 'eth0' link is up
Wed Mar 11 11:36:12 2020 daemon.notice netifd: VLAN 'eth0.1' link is up
Wed Mar 11 11:36:12 2020 daemon.notice netifd: Network device 'lo' link is up
Wed Mar 11 11:36:12 2020 daemon.notice netifd: Interface 'loopback' has link connectivity
Wed Mar 11 11:36:12 2020 kern.info kernel: [   42.607852] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Wed Mar 11 11:36:12 2020 kern.info kernel: [   42.621549] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Wed Mar 11 11:36:15 2020 daemon.info procd: - init complete -

What could be causing this?

Run a tcpdump on the Asus and verify that you receive the packets
tcpdump -i eth0.1 -vn host 192.168.1.6
Is there even the slightest chance that the workstation is connecting to the Asus by wireless?
Does dmesg show anything on Asus?

Hi trendy! Thanks for the quick reply!

It seems like it's NOW able to receive communication from my workstation.. however I still can't access the printer (192.168.1.20) that's connected to the Asus dumb switch/router. Other clients on my network can still access it.

tcpdump -i eth0.1 -vn host 192.168.1.6
tcpdump: listening on eth0.1, link-type EN10MB (Ethernet), capture size 262144 bytes
12:19:18.662007 IP (tos 0x0, ttl 128, id 19546, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 47, seq 1, length 64
12:19:18.662182 IP (tos 0x0, ttl 64, id 14125, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 47, seq 1, length 64
12:19:19.662148 IP (tos 0x0, ttl 128, id 19547, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 47, seq 2, length 64
12:19:19.662318 IP (tos 0x0, ttl 64, id 14224, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 47, seq 2, length 64
12:19:20.663053 IP (tos 0x0, ttl 128, id 19548, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 47, seq 3, length 64
12:19:20.663221 IP (tos 0x0, ttl 64, id 14279, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 47, seq 3, length 64
12:19:23.235953 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.2 (ac:22:0b:8d:f9:07) tell 192.168.1.6, length 46
12:19:23.236054 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.2 is-at ac:22:0b:8d:f9:07, length 28
12:19:23.736714 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.6 tell 192.168.1.2, length 28
12:19:23.738851 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.6 is-at e0:d5:5e:7e:ac:63, length 46
12:19:28.299646 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:19:35.366610 IP (tos 0x0, ttl 128, id 37704, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:19:35.366722 IP (tos 0x0, ttl 128, id 37705, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:19:56.642552 IP (tos 0x0, ttl 1, id 12202, offset 0, flags [none], proto UDP (17), length 154)
    192.168.1.6.54945 > 239.255.255.250.1900: UDP, length 126
12:19:56.644257 IP (tos 0x0, ttl 1, id 12203, offset 0, flags [none], proto UDP (17), length 154)
    192.168.1.6.54946 > 239.255.255.250.1900: UDP, length 126
12:19:59.343561 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:20:05.380435 IP (tos 0x0, ttl 128, id 37706, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:20:05.380516 IP (tos 0x0, ttl 128, id 37707, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:20:10.837158 IP (tos 0x0, ttl 128, id 19549, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 48, seq 1, length 64
root@DoorKeeper:/tmp/log# tcpdump -i eth0.1 -vn host 192.168.1.6
tcpdump: listening on eth0.1, link-type EN10MB (Ethernet), capture size 262144 bytes
12:20:56.093097 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:21:05.392131 IP (tos 0x0, ttl 128, id 19553, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 50, seq 1, length 64
12:21:05.392297 IP (tos 0x0, ttl 64, id 16115, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 50, seq 1, length 64
12:21:05.450142 IP (tos 0x0, ttl 128, id 37710, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:21:05.450220 IP (tos 0x0, ttl 128, id 37711, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:21:06.230482 IP (tos 0x0, ttl 1, id 46320, offset 0, flags [none], proto IGMP (2), length 32, options (RA))
    192.168.1.6 > 224.0.0.252: igmp v2 report 224.0.0.252
12:21:06.393178 IP (tos 0x0, ttl 128, id 19554, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 50, seq 2, length 64
12:21:06.393336 IP (tos 0x0, ttl 64, id 16207, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 50, seq 2, length 64
12:21:06.730350 IP (tos 0x0, ttl 1, id 62137, offset 0, flags [none], proto IGMP (2), length 32, options (RA))
    192.168.1.6 > 224.0.0.251: igmp v2 report 224.0.0.251
12:21:07.401292 IP (tos 0x0, ttl 128, id 19555, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 50, seq 3, length 64
12:21:07.401462 IP (tos 0x0, ttl 64, id 16247, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 50, seq 3, length 64
12:21:08.402298 IP (tos 0x0, ttl 128, id 19556, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 50, seq 4, length 64
12:21:08.402465 IP (tos 0x0, ttl 64, id 16288, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 50, seq 4, length 64
12:21:10.229298 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.2 (ac:22:0b:8d:f9:07) tell 192.168.1.6, length 46
12:21:10.229397 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.2 is-at ac:22:0b:8d:f9:07, length 28
12:21:10.456708 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.6 tell 192.168.1.2, length 28
12:21:10.458881 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.6 is-at e0:d5:5e:7e:ac:63, length 46

My workstation doesn't have a wireless card/interface. The printer does.. but I believe it's disabled as I've never used it.

I left the tcpdump running while I was writing my previous reply and noticed it's showing my printers IP in there now. (192.168.1.20)

tcpdump -i eth0.1 -vn host 192.168.1.6
tcpdump: listening on eth0.1, link-type EN10MB (Ethernet), capture size 262144 bytes
12:20:56.093097 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:21:05.392131 IP (tos 0x0, ttl 128, id 19553, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 50, seq 1, length 64
12:21:05.392297 IP (tos 0x0, ttl 64, id 16115, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 50, seq 1, length 64
12:21:05.450142 IP (tos 0x0, ttl 128, id 37710, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:21:05.450220 IP (tos 0x0, ttl 128, id 37711, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:21:06.230482 IP (tos 0x0, ttl 1, id 46320, offset 0, flags [none], proto IGMP (2), length 32, options (RA))
    192.168.1.6 > 224.0.0.252: igmp v2 report 224.0.0.252
12:21:06.393178 IP (tos 0x0, ttl 128, id 19554, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 50, seq 2, length 64
12:21:06.393336 IP (tos 0x0, ttl 64, id 16207, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 50, seq 2, length 64
12:21:06.730350 IP (tos 0x0, ttl 1, id 62137, offset 0, flags [none], proto IGMP (2), length 32, options (RA))
    192.168.1.6 > 224.0.0.251: igmp v2 report 224.0.0.251
12:21:07.401292 IP (tos 0x0, ttl 128, id 19555, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 50, seq 3, length 64
12:21:07.401462 IP (tos 0x0, ttl 64, id 16247, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 50, seq 3, length 64
12:21:08.402298 IP (tos 0x0, ttl 128, id 19556, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 50, seq 4, length 64
12:21:08.402465 IP (tos 0x0, ttl 64, id 16288, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 50, seq 4, length 64
12:21:10.229298 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.2 (ac:22:0b:8d:f9:07) tell 192.168.1.6, length 46
12:21:10.229397 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.2 is-at ac:22:0b:8d:f9:07, length 28
12:21:10.456708 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.6 tell 192.168.1.2, length 28
12:21:10.458881 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.6 is-at e0:d5:5e:7e:ac:63, length 46
12:21:32.541151 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:21:35.466841 IP (tos 0x0, ttl 128, id 37712, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:21:35.466910 IP (tos 0x0, ttl 128, id 37713, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:21:56.649125 IP (tos 0x0, ttl 1, id 12204, offset 0, flags [none], proto UDP (17), length 154)
    192.168.1.6.54945 > 239.255.255.250.1900: UDP, length 126
12:21:56.650828 IP (tos 0x0, ttl 1, id 12205, offset 0, flags [none], proto UDP (17), length 154)
    192.168.1.6.54946 > 239.255.255.250.1900: UDP, length 126
12:22:01.209669 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:22:05.481150 IP (tos 0x0, ttl 128, id 37714, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:22:05.481218 IP (tos 0x0, ttl 128, id 37715, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:22:10.008561 IP (tos 0x0, ttl 128, id 37716, offset 0, flags [none], proto UDP (17), length 252)
    192.168.1.6.138 > 192.168.1.255.138: UDP, length 224
12:22:15.242491 IP (tos 0x0, ttl 1, id 12206, offset 0, flags [none], proto UDP (17), length 684)
    192.168.1.6.56148 > 239.255.255.250.3702: UDP, length 656
12:22:15.366494 IP (tos 0x0, ttl 1, id 12207, offset 0, flags [none], proto UDP (17), length 684)
    192.168.1.6.56148 > 239.255.255.250.3702: UDP, length 656
12:22:15.616545 IP (tos 0x0, ttl 1, id 12208, offset 0, flags [none], proto UDP (17), length 684)
    192.168.1.6.56148 > 239.255.255.250.3702: UDP, length 656
12:22:16.117505 IP (tos 0x0, ttl 1, id 12209, offset 0, flags [none], proto UDP (17), length 684)
    192.168.1.6.56148 > 239.255.255.250.3702: UDP, length 656
12:22:17.117511 IP (tos 0x0, ttl 1, id 12210, offset 0, flags [none], proto UDP (17), length 684)
    192.168.1.6.56148 > 239.255.255.250.3702: UDP, length 656
12:22:19.101418 IP (tos 0x0, ttl 1, id 12211, offset 0, flags [none], proto UDP (17), length 684)
    192.168.1.6.56148 > 239.255.255.250.3702: UDP, length 656
12:22:21.116497 IP (tos 0x0, ttl 1, id 12212, offset 0, flags [none], proto UDP (17), length 684)
    192.168.1.6.56148 > 239.255.255.250.3702: UDP, length 656
12:22:26.645289 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:22:35.540904 IP (tos 0x0, ttl 128, id 37717, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:22:35.540982 IP (tos 0x0, ttl 128, id 37718, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:22:50.685300 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:23:05.553523 IP (tos 0x0, ttl 128, id 37719, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:23:05.553596 IP (tos 0x0, ttl 128, id 37720, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:23:05.720177 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:23:07.720939 IP (tos 0x0, ttl 1, id 62140, offset 0, flags [none], proto IGMP (2), length 32, options (RA))
    192.168.1.6 > 224.0.0.251: igmp v2 report 224.0.0.251
12:23:08.221068 IP (tos 0x0, ttl 1, id 46321, offset 0, flags [none], proto IGMP (2), length 32, options (RA))
    192.168.1.6 > 224.0.0.252: igmp v2 report 224.0.0.252
12:23:35.566941 IP (tos 0x0, ttl 128, id 37721, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:23:35.567013 IP (tos 0x0, ttl 128, id 37722, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:23:36.749355 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:23:56.654902 IP (tos 0x0, ttl 1, id 12213, offset 0, flags [none], proto UDP (17), length 154)
    192.168.1.6.54945 > 239.255.255.250.1900: UDP, length 126
12:23:56.656590 IP (tos 0x0, ttl 1, id 12214, offset 0, flags [none], proto UDP (17), length 154)
    192.168.1.6.54946 > 239.255.255.250.1900: UDP, length 126
12:24:05.624031 IP (tos 0x0, ttl 128, id 37723, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:24:05.624107 IP (tos 0x0, ttl 128, id 37724, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:24:07.793336 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:24:35.639887 IP (tos 0x0, ttl 128, id 37725, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:24:35.639959 IP (tos 0x0, ttl 128, id 37726, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:24:38.869439 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:25:05.652762 IP (tos 0x0, ttl 128, id 37727, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:25:05.652835 IP (tos 0x0, ttl 128, id 37728, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:25:09.913034 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:25:14.210555 IP (tos 0x0, ttl 1, id 46322, offset 0, flags [none], proto IGMP (2), length 32, options (RA))
    192.168.1.6 > 224.0.0.252: igmp v2 report 224.0.0.252
12:25:14.212232 IP (tos 0x0, ttl 1, id 62143, offset 0, flags [none], proto IGMP (2), length 32, options (RA))
    192.168.1.6 > 224.0.0.251: igmp v2 report 224.0.0.251
12:25:35.663077 IP (tos 0x0, ttl 128, id 37729, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:25:35.663149 IP (tos 0x0, ttl 128, id 37730, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:25:40.973086 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
12:25:56.645506 IP (tos 0x0, ttl 1, id 12215, offset 0, flags [none], proto UDP (17), length 154)
    192.168.1.6.54945 > 239.255.255.250.1900: UDP, length 126
12:25:56.647208 IP (tos 0x0, ttl 1, id 12216, offset 0, flags [none], proto UDP (17), length 154)
    192.168.1.6.54946 > 239.255.255.250.1900: UDP, length 126
12:26:05.727400 IP (tos 0x0, ttl 128, id 37731, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
12:26:05.727479 IP (tos 0x0, ttl 128, id 37732, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44

EDIT: I think it's showing the printer IP now as I tried to ping it from the main Archer router (192.168.1.1).

The workstation is asking the mac of the printer but doesn't get an answer.
I don't see any other communication with the printer.
Try to see if the printer gets the arp:
tcpdump -i eth0.1 -vn ether host 00:11:22:33:44:55 or ether host 66:77:88:99:aa:bb
use the MACs of workstation and printer.

sorry I just realized that I had to specify my own MAC addresses lol

Here are the proper results:

PRINTER 192.168.1.20

/tmp/log# tcpdump -i eth0.1 -vn ether host 30:05:5c:32:cb:38
tcpdump: listening on eth0.1, link-type EN10MB (Ethernet), capture size 262144 bytes
^C
0 packets captured
1 packet received by filter
0 packets dropped by kernel
1 packet dropped by interface

Windows 10 workstation 192.168.1.6
I tried to ping 192.168.1.20 (printer) first then I ping 192.168.1.2 (Asus)

root@DoorKeeper:/tmp/log# tcpdump -i eth0.1 -vn ether host e0:d5:5e:7e:ac:63
tcpdump: listening on eth0.1, link-type EN10MB (Ethernet), capture size 262144 bytes
13:15:07.914620 IP (tos 0x0, ttl 128, id 37937, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
13:15:07.916342 IP (tos 0x0, ttl 128, id 37938, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
13:15:19.449204 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
13:15:21.443929 IP (tos 0x0, ttl 1, id 62225, offset 0, flags [none], proto IGMP (2), length 32, options (RA))
    192.168.1.6 > 224.0.0.251: igmp v2 report 224.0.0.251
13:15:23.444920 IP (tos 0x0, ttl 1, id 46354, offset 0, flags [none], proto IGMP (2), length 32, options (RA))
    192.168.1.6 > 224.0.0.252: igmp v2 report 224.0.0.252
13:15:37.964331 IP (tos 0x0, ttl 128, id 37939, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
13:15:37.964399 IP (tos 0x0, ttl 128, id 37940, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
13:15:45.527467 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.20 tell 192.168.1.6, length 46
13:15:54.842988 IP (tos 0x0, ttl 128, id 26988, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 63, seq 1, length 64
13:15:54.843172 IP (tos 0x0, ttl 64, id 21076, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 63, seq 1, length 64
13:15:55.844152 IP (tos 0x0, ttl 128, id 26989, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 63, seq 2, length 64
13:15:55.844320 IP (tos 0x0, ttl 64, id 21094, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 63, seq 2, length 64
13:15:56.583890 IP (tos 0x0, ttl 1, id 12338, offset 0, flags [none], proto UDP (17), length 154)
    192.168.1.6.54945 > 239.255.255.250.1900: UDP, length 126
13:15:56.585584 IP (tos 0x0, ttl 1, id 12339, offset 0, flags [none], proto UDP (17), length 154)
    192.168.1.6.54946 > 239.255.255.250.1900: UDP, length 126
13:15:56.845059 IP (tos 0x0, ttl 128, id 26990, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.6 > 192.168.1.2: ICMP echo request, id 63, seq 3, length 64
13:15:56.845241 IP (tos 0x0, ttl 64, id 21150, offset 0, flags [none], proto ICMP (1), length 84)
    192.168.1.2 > 192.168.1.6: ICMP echo reply, id 63, seq 3, length 64
13:15:56.942901 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.117 tell 192.168.1.6, length 46
13:15:59.440097 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.2 (ac:22:0b:8d:f9:07) tell 192.168.1.6, length 46
13:15:59.440184 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.2 is-at ac:22:0b:8d:f9:07, length 28
13:15:59.748410 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.117 tell 192.168.1.6, length 46
13:15:59.896707 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.6 tell 192.168.1.2, length 28
13:15:59.901616 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.6 is-at e0:d5:5e:7e:ac:63, length 46
13:16:00.441580 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.117 tell 192.168.1.6, length 46
13:16:01.441556 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.117 tell 192.168.1.6, length 46
13:16:07.994486 IP (tos 0x0, ttl 128, id 37941, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
13:16:07.994592 IP (tos 0x0, ttl 128, id 37942, offset 0, flags [none], proto UDP (17), length 72)
    192.168.1.6.57621 > 192.168.1.255.57621: UDP, length 44
^C
26 packets captured
26 packets received by filter
0 packets dropped by kernel
1 packet dropped by interface

No packet from the printer? That doesn't look right. Does it respong to ping from any of the routers?

doesn't appear to be any.. I can ping it from my main router (192.168.1.1) and my NAS (192.168.1.10)

/etc/config# ping 192.168.1.20
PING 192.168.1.20 (192.168.1.20): 56 data bytes
64 bytes from 192.168.1.20: seq=0 ttl=255 time=3.817 ms
64 bytes from 192.168.1.20: seq=1 ttl=255 time=5.227 ms
64 bytes from 192.168.1.20: seq=2 ttl=255 time=2.717 ms
64 bytes from 192.168.1.20: seq=3 ttl=255 time=4.474 ms
^C
--- 192.168.1.20 ping statistics ---
4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max = 2.717/4.058/5.227 ms



ping 192.168.1.20
Password:
PING 192.168.1.20 (192.168.1.20) 56(84) bytes of data.
64 bytes from 192.168.1.20: icmp_seq=1 ttl=255 time=4.49 ms
64 bytes from 192.168.1.20: icmp_seq=2 ttl=255 time=1.93 ms
64 bytes from 192.168.1.20: icmp_seq=3 ttl=255 time=1.97 ms
64 bytes from 192.168.1.20: icmp_seq=4 ttl=255 time=1.99 ms
64 bytes from 192.168.1.20: icmp_seq=5 ttl=255 time=2.83 ms
^C
--- 192.168.1.20 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 4012ms
rtt min/avg/max/mdev = 1.935/2.646/4.496/0.984 ms

This is why I'm completely stomped.. can't for the life of me figure out what's going on!

Something is very wrong here.
Can you try to connect the workstation on the Asus and try again?
Other than that, is the workstation working properly with other clients, the Archer and the internet?

Yes the workstation has no issues with every other device that’s on my network and the internet is fine. It’s just that Asus router/switch and whatever device that’s hooked up to it.

I’ll try connecting the workstation directly to the Asus router/switch and see what happens. I’ll report back!

1 Like

If possible also try to connect the printer directly on the Archer and test again.

Could it be that the network on the Windows machine is set to public (in which case the firewall will block access to other devices)?

1 Like

If I plug my workstation in the Asus dumb router/switch I can reach the printer and the Asus as well.

My only conclusion is that there's something wonky with the Ethernet cable that connected to my Archer router. I'm using a ether-coax adapter for this connection as it was the only way I could run a cable to my office.

Still doesn't make sense to me since my workstation only couldn't reach the Asus router and whatever was connected to it (ie printer).. Everything thing else on my local network was working fine.

I think I'll try and run an ethernet cable directly from the Archer somehow and get rid of that adapter.

Thanks anyways for the help! :wink:

1 Like

You should have mentioned that earlier, it would immediately raise flags and test the workstation directly on the Asus. But anyway, lesson learned.
Feel free to mark the topic accordingly .

And I would like to comment on using the term dump router, as there is no such thing. If you meant a router that's being used as a switch then that makes it a de facto smart or managed switch (if its firmware supports such features).

I was using the term "dumb" as this "router" (The Asus one) was only being used as a smart switch. It's a term I've seen used in the past. Like "dumb AP".

didn't factor this in at first as every other device on my network was accessible. It must have to do with the fact it's another router and it's somehow blocking my workstation. Anyways, I guess it's sorted out! Can't trust that adapter :wink:

thanks again for the help in troubleshooting. It's given me more insight on how to troubleshoot!

1 Like

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.