I have router Netgear WAX202 and OpenWrt 22.03.3 r20028-43d71ad93e
the router has three lan ports and tcpdump shows me interfaces lan1, lan2, lan3 and br_lan
config device
option name 'br-lan'
option type 'bridge'
list ports 'lan1'
list ports 'lan2'
list ports 'lan3'
config device
option name 'lan1'
option macaddr '34:98:b5:0f:d2:0f'
config device
option name 'lan2'
option macaddr '34:98:b5:0f:d2:0f'
config device
option name 'lan3'
option macaddr '34:98:b5:0f:d2:0f'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option netmask '255.255.255.192'
option ipaddr '172.21.163.126'
I have one machine on one LAN2 port and another machine on another LAN port and I can't ping between them
when I ping the machine on the Internet, tcpdump captures the packets:
root@www:~# tcpdump -n -i lan2 icmp
listening on lan2, link-type EN10MB (Ethernet), capture size 262144 bytes
21:13:14.554204 IP 172.21.163.80 > 178.238.38.116: ICMP echo request, id 1, seq 325, length 40
21:13:14.556885 IP 178.238.38.116 > 172.21.163.80: ICMP echo reply, id 1, seq 325, length 40
21:13:15.566727 IP 172.21.163.80 > 178.238.38.116: ICMP echo request, id 1, seq 326, length 40
however, when I ping the other machine in the other LAN port, tcpdump does not capture any packet not even mine request.
I mentioned that ping the Internet via the WAN interface is captured (on lan2 port) by tcpdump, but the ping from 172.21.163.80 (port lan2) to 172.21.163.94 (port lan1) is not captured by tcpdump
root@www:~# ping mirek-pc
PING mirek-pc (172.21.163.80): 56 data bytes
ping: sendto: Operation not permitted
root@www:~# ping jitka-pc
PING jitka-pc (172.21.163.94): 56 data bytes
ping: sendto: Operation not permitted
ping from Windows to internet it works, the machines are on the same network, see the LAN configuration above and the IP addresses of the machines above
Please copy the output of the following commands and post it here using the "Preformatted text </> " button:
Remember to redact passwords, MAC addresses and any public IP addresses you may have:
config defaults
option input 'REJECT'
option output 'REJECT'
option forward 'REJECT'
option synflood_protect '1'
config zone 'lan'
option name 'lan'
list network 'lan'
option input 'REJECT'
option output 'REJECT'
option forward 'REJECT'
list device 'tun+'
config zone 'wan'
option name 'wan'
list network 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
config forwarding
option src 'lan'
option dest 'wan'
config zone
option name 'Z_WIFI2'
list network 'I_WIFI2'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option family 'ipv4'
config forwarding
option src 'Z_WIFI2'
option dest 'wan'
config zone
option name 'Z_WIFI5'
list network 'I_WIFI5'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option family 'ipv4'
config forwarding
option src 'Z_WIFI5'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
option proto 'udp'
config rule
option name 'Allow-Ping'
option src 'wan'
option icmp_type 'echo-request'
option target 'ACCEPT'
option family 'ipv4'
option proto 'icmp'
config rule
option name 'Allow-IGMP'
option src 'wan'
option target 'ACCEPT'
option family 'ipv4'
option proto 'igmp'
config rule
option enabled '0'
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option enabled '0'
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option enabled '0'
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option enabled '0'
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option enabled '0'
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option target 'ACCEPT'
option family 'ipv4'
option proto 'esp'
config rule
option enabled '0'
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option target 'ACCEPT'
option family 'ipv4'
option proto 'udp'
config rule
option name 'blokovat z wifi2'
option src 'Z_WIFI2'
list src_ip '172.21.164.240/28'
option dest 'wan'
option target 'DROP'
option family 'ipv4'
config rule
option name 'blokovat z wifi5'
option src 'Z_WIFI5'
list src_ip '172.21.165.240/28'
option dest 'wan'
option target 'DROP'
option family 'ipv4'
config rule
option name 'DHCP DNS NTP'
option src '*'
option dest_port '67 53 123'
option target 'ACCEPT'
option family 'ipv4'
list proto 'udp'
config rule
option name 'management'
option src 'lan'
list src_ip '172.21.163.80'
option dest_port '22 80 443'
option target 'ACCEPT'
option family 'ipv4'
option proto 'tcp'
config rule
option name 'NTP'
option dest 'wan'
option dest_port '123'
option target 'ACCEPT'
option family 'ipv4'
list proto 'udp'
config rule
option name 'NTP'
option src '*'
option dest 'wan'
option dest_port '123'
option target 'ACCEPT'
option family 'ipv4'
list proto 'udp'
config rule
option name 'DHCP DNS NTP'
option src '*'
option dest_port '67 53 123'
option target 'ACCEPT'
option family 'ipv4'
list proto 'udp'
config rule
option name 'Ping do wan'
option src 'lan'
option dest 'wan'
option target 'ACCEPT'
list proto 'icmp'
config rule
option name 'blokovano lan DHCP'
option src 'lan'
list src_ip '172.21.163.64/28'
option dest 'wan'
option target 'DROP'
option family 'ipv4'
config rule
option name 'vse lan'
option src 'lan'
option dest 'wan'
option target 'ACCEPT'
list src_ip '172.21.163.96/28'
option family 'ipv4'
config rule
option name 'http https'
option src 'lan'
list src_ip '172.21.163.80/28'
option dest 'wan'
option dest_port '80 443'
option target 'ACCEPT'
option family 'ipv4'
list proto 'tcp'
config rule
option name 'smtps imaps pop3s'
option src 'lan'
list src_ip '172.21.163.80/30'
option dest 'wan'
option dest_port '465 993 995'
option target 'ACCEPT'
option family 'ipv4'
list proto 'tcp'
config rule
option name 'ftp'
option src 'lan'
list src_ip '172.21.163.80/29'
option dest 'wan'
option dest_port '21'
option helper 'ftp'
option target 'ACCEPT'
option family 'ipv4'
list proto 'tcp'
option enabled '0'
config rule
option name 'licence.winduo64.cz'
option src 'lan'
list src_ip '172.21.163.94'
option dest 'wan'
option dest_port '9000'
list dest_ip '90.182.56.154'
option target 'ACCEPT'
option family 'ipv4'
list proto 'tcp'
config rule
option name 'sims vyssi porty 1'
option src 'lan'
option dest 'wan'
option dest_port '8995 12020'
list dest_ip '159.153.74.8'
option target 'ACCEPT'
option family 'ipv4'
list proto 'tcp'
config rule
option name 'sims vyssi porty 2'
option src 'lan'
option dest 'wan'
option dest_port '12000-12028'
list dest_ip '159.153.79.0/26'
option target 'ACCEPT'
option family 'ipv4'
list proto 'tcp'
config rule
option name 'Sims port 44325'
option src 'lan'
option dest 'wan'
option dest_port '44325'
list dest_ip '159.153.64.176'
option target 'ACCEPT'
option family 'ipv4'
list proto 'tcp'
config rule 'ovpn'
option name 'Allow-OpenVPN'
option src 'wan'
option dest_port '1194'
option target 'ACCEPT'
option proto 'udp'
config rule
option src 'lan'
option name 'svrcek.cz'
option target 'ACCEPT'
option family 'ipv4'
list dest_ip '93.185.104.14'
option dest 'wan'
list proto 'tcp'
config rule
option src 'lan'
option dest 'wan'
list dest_ip '93.185.104.24'
option target 'ACCEPT'
list proto 'tcp'
option family 'ipv4'
option name 'kreteni.eu'
config rule
option src 'lan'
option name 'toniczech.cz'
option dest 'wan'
list dest_ip '93.185.104.30'
option target 'ACCEPT'
list proto 'tcp'
option family 'ipv4'
config rule
option dest_port '25565'
option src 'lan'
option name 'Minecraft'
option dest 'wan'
list dest_ip '65.21.94.23'
option target 'ACCEPT'
list proto 'tcp'
config rule
option family 'ipv4'
option src 'lan'
option target 'ACCEPT'
option name 'Ping z LAN'
list proto 'icmp'
config rule
option name 'blokovat vse z lan'
option src 'lan'
option dest 'wan'
option target 'DROP'
option family 'ipv4'
list proto 'all'
Normally the lan has ACCEPT for all three of these. OUTPUT = ACCEPT is required for the LAN to function properly in general. If INPUT is not ACCEPT, the router will not respond to pings from the connected hosts on the respective network.
ping from machine to router is OK, ping from router to my machine is bad:
root@www:~# ping mirek-pc
PING mirek-pc (172.21.163.80): 56 data bytes
ping: sendto: Operation not permitted
root@www:~# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: seq=0 ttl=116 time=3.039 ms
64 bytes from 8.8.8.8: seq=1 ttl=116 time=2.577 ms
64 bytes from 8.8.8.8: seq=2 ttl=116 time=2.675 ms
64 bytes from 8.8.8.8: seq=3 ttl=116 time=2.597 ms
H:\>ping ip2.cvrcci.klfree.net
Pinging ip2.cvrcci.klfree.net [81.201.53.57] with 32 bytes of data:
Reply from 81.201.53.57: bytes=32 time=7ms TTL=50
Reply from 81.201.53.57: bytes=32 time=7ms TTL=50
Reply from 81.201.53.57: bytes=32 time=7ms TTL=50
Reply from 81.201.53.57: bytes=32 time=7ms TTL=50
Ping statistics for 81.201.53.57:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 7ms, Maximum = 7ms, Average = 7ms
ok... so that confirms that the router can ping properly, and that the router is operating as expected.
At this point, it is almost certainly an issue with the Windows firewall.
But it might be worth proving that that lhe lan bridge is working properly (I'm fairly certain it is, but verification is good), Do you have another device such as a Raspberry Pi or anything running Linux, Mac OS, or even another OpenWrt device you can put on your LAN?