Recently, I added a VLAN and attached the VLAN to the bridge.
I set up the IP pool, DHCP server, and added a new SSID to CAPsMAN.
My clients are able to connect to the SSID, and get an IP address.
They cannot however:
* Access the router (using the local router IP address)
* Access the other network assigned to the bridge
* Access the internet (by IP address)
I've been goofing around for the firewall for sometime, and even with logging enabled I'm not getting any hints as to what the issue is.
Since the VLAN was added to the bridge, both interface are on the address list "LAN"
Current filter rules: (192.168.90.0/24 is the VLAN 192.168.80.0/24 is the original bridge)
Code: Select all
Flags: X - disabled, I - invalid, D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 ;;; defconf: accept established,related,untracked
chain=input action=accept connection-state=established,related,untracked log=no log-prefix=""
2 chain=forward action=accept src-address=192.168.90.0/24 dst-address=192.168.80.0/24 log=no log-prefix=""
3 ;;; defconf: drop invalid
chain=input action=drop connection-state=invalid log=no log-prefix=""
4 ;;; defconf: accept ICMP
chain=input action=accept protocol=icmp
5 ;;; defconf: accept to local loopback (for CAPsMAN)
chain=input action=accept dst-address=127.0.0.1
6 ;;; defconf: drop all not coming from LAN
chain=input action=drop in-interface-list=!LAN log=no log-prefix=""
7 ;;; defconf: accept in ipsec policy
chain=forward action=accept ipsec-policy=in,ipsec
8 ;;; defconf: accept out ipsec policy
chain=forward action=accept ipsec-policy=out,ipsec
9 ;;; defconf: fasttrack
chain=forward action=fasttrack-connection connection-state=established,related
10 ;;; defconf: accept established,related, untracked
chain=forward action=accept connection-state=established,related,untracked
11 ;;; default configuration
chain=input action=accept connection-state=established,related log=no log-prefix=""
12 chain=input action=accept in-interface-list=LAN log=no log-prefix=""
13 chain=input action=accept protocol=icmp log=no log-prefix=""
14 chain=input action=accept protocol=udp src-address=0.0.0.0 dst-port=5246,5247 log=no log-prefix=""
15 ;;; CAPSMANAGER Discovery
chain=input action=accept protocol=udp src-port=5246,5247
16 ;;; CAPSMANAGER Discovery
chain=input action=accept protocol=udp dst-port=5246,5247
17 chain=input action=accept protocol=tcp src-address=66.152.179.48 dst-port=8989 log=no log-prefix=""
18 chain=input action=drop log=yes log-prefix=""
19 ;;; defconf: drop invalid
chain=forward action=drop connection-state=invalid log=no log-prefix=""
20 ;;; defconf: drop all from WAN not DSTNATed
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN log=no log-prefix=""
Code: Select all
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; defconf: masquerade
chain=srcnat action=masquerade src-address=0.0.0.0/0 out-interface-list=WAN log=no log-prefix="" ipsec-policy=out,none