New Build - 07/22/2021 - r47086

Post new topic   Reply to topic    DD-WRT Forum Forum Index -> Atheros WiSOC based Hardware
Goto page 1, 2  Next
Author Message
kernel-panic69
DD-WRT Guru


Joined: 08 May 2018
Posts: 10001
Location: Texas, USA

PostPosted: Thu Jul 22, 2021 15:55    Post subject: New Build - 07/22/2021 - r47086 Reply with quote
[WARNING]: This thread is only for feedback on this beta release for developers and the community's benefit.
DO NOT flash this beta release unless you understand the risks involved and device specific recovery methods.
Avoid discussions! Create threads for questions, general problems or use search; this thread is not for support.
Please list router model & revision, operating & wireless mode(s) and exact filename/firmware image flashed.


Downloads: (DD-WRT website) HTTPS & FTP (try another if a link does not work)

CLI Flash: 'cd /tmp' then 'wget {file URL}' (or 'curl -k {file URL} -o {file}') with http (not https) or ftp. Then 'write {file} linux'.

Repository: Trac SVN changelog since last build r47074 (GitHub mirror)

Notes:
OpenVPN 2.5.3: Guides, Server, PBR, Reverse PBR, Client (see second post), Kill Switch, update tips, scripts and more.
WireGuard 1.0.20210606/Tools: Guides, Client, Server, Advanced, PBR, KS, update tips, scripts & more. Thanks BS & egc!
• CVE-2019-14899 VPN fix (applicability depends on VPN setup) and GUI toggle since r41813.
Select ath10k radios now feature on-the-fly firmware type switching between customized DD-WRT and vanilla QCA binaries!
SmartDNSMiniDLNAUnboundCoovaChilliOpenSSLdnsmasqPrivoxyTorSquidFreeRADIUSiperf3 cake
In-kernel Samba (ksmbd 3.3.9+): default min/max versions changed. • WSD updateANTFS/NTFS3 kernel mode driver++
CVE-2020-26147, CVE-2020-24586, CVE-2020-24587 & CVE-2020-24588 (Fragattack) fixed.
• "Assign WAN port to Switch" feature removed to be reworked in a future release.
• TL-WA901Nv2 Ethernet port not working is fixed (other TL-WA* devices may apply). r47032, #3002, TL-WA901NDv2 thread

Issues:
• Show us your findings with steps to reproduce, configuration, output, logs and important information below!

Important:
• For issues provide applicable info: 'dmesg', 'cat /tmp/var/log/messages', syslog, klog, serial, strace, tcpdump, wireshark etc.
• Any firewall NAT or WAN issues, show output: 'iptables -vnL', 'iptables -t nat -vnL', 'iptables -t mangle -vnL' and /tmp/.ipt file.
• Search SVN tickets & discuss in forum before opening. Before reporting: reset & manually set up, not restore from a backup.
• Please include operating & wireless modes (e.g. Gateway, Router, AP, CB, WDS, Mesh) & relevant configuration information.

Example Template:
Code:
[b]Router/Version: [/b]
[b]File/Kernel: [/b]
[b]Previous/Reset: [/b]
[b]Mode/Status: [/b]
[b]Issues/Errors: [/b]

_________________
Official Forum Rules, Guidelines & Helpful InformationFirmware FAQInstallation WikiWhere Do I Download Firmware?
DON'T use Chromium-based browsersRTFM/STFW TL;DR is NOT an excuse. • Why Should I Care What Color the Bikeshed Is?
Please DO NOT PM me with questions; Ask in the forum. ---------------------- Linux User #377467 counter.li.org / linuxcounter.net
Sponsor
MLandi
DD-WRT User


Joined: 04 Dec 2007
Posts: 470

PostPosted: Thu Jul 22, 2021 18:27    Post subject: Reply with quote
Update method: SSH / CLI
Router/Version: Netgear R9000 Nighthawk X10
File/Kernel: DD-WRT v3.0-r47086 std (07/22/21)
Previous/Reset: DD-WRT v3.0-r47074 std (07/20/21) / No
Mode/Status: Gateway / Working Normally
Issues/Errors: Incoming & Outgoing logs show nothing (not a new issue)

Thanks, BrainSlayer!

_________________
Netgear R9000 X10
DD-WRT v3.0-r47381 std (09/08/21)
Gateway, AP, DNSMasq, SFE, Clock 2000MHz
IPv4 & IPv6 (Prefix Delegation)
Static Leases & DHCP
CloudFlare, QoS Disabled
Vanilla, WiFi & Ethernet
2.4GHz: NG-Mixed, 10 + 6 (2457 MHz HT40), ACK Timing 3150, WPA2 w/AES
5GHz: AC/N Mixed, 100 + 114 (5500 MHz VHT160), ACK Timing 3160, WPA2 w/AES
Xfinity 1.2Gbps/42Mbps
mac913
DD-WRT Guru


Joined: 02 May 2008
Posts: 1675
Location: Canada

PostPosted: Fri Jul 23, 2021 1:46    Post subject: Reply with quote
Home Main Gateway Router
Router/Version: R7800
File/Kernel: DD-WRT v3.0-r47086 std (07/22/21)
Kernel Version: Linux 4.9.276 #334 SMP Thu Jul 22 01:05:54 +07 2021 armv7l
Previous/Reset: r47074 / No, CLI Update
Mode/Status: GW / Working Well
Issues/Errors: none / none
Services Used: DHCP WAN,IPv6-PD,NTP,WG Client,VLANx,BRx,SSH,Syslog,Cron,USB Storage,Entware DNSCrypt v2.0.45,YAMon3.4.7
Services Disabled: WiFi,QoS,ttraff,SFE,Telnet,NAS,Samba

Home Main AP Router
Router/Version: R7800
File/Kernel: DD-WRT v3.0-r47086 std (07/22/21)
Kernel Version: Linux 4.9.276 #334 SMP Thu Jul 22 01:05:54 +07 2021 armv7l
Previous/Reset: r47074 / No, CLI Update
Mode/Status: GW(double-nat) & AP / Working Well
Issues/Errors: none / none
Services Used: Static WAN,IPv6 6to4,WiFi Vannilla,NTP,2xWG Clients,VAPx,VLANx,BRx,SSH,Syslog,Cron,USB Storage,Entware DNSCrypt v2.0.45
Services Disabled: QoS,ttraff,SFE,Telnet,NAS,Samba

Thank-you BrianSlyer for your Great Work and everyone else who makes DD-WRT Great on the Forum!

_________________
Home Network on Telus PureFibre - 10GbE Copper Backbone
2x R7800 - Gateway & WiFi & 3xWireGuard - DDWRT r47377 Std
R7000 - Wired ISP 4K IPTV Gateway - DDWRT r47117 Std

Off Site 1

R7000 - Gateway & WiFi & WireGuard - DDWRT r47117 Std
E3000 - Client Bridge - DDWRT r46979 Mega K4.4

Off Site 2

R7000 - Gateway & WiFi - DDWRT r47117 Std
E2000 - Wired ISP IPTV PVR Blocker - DDWRT r35531


YAMon 3.4.6 | DNSCrypt-Proxy V2
jimj
DD-WRT Novice


Joined: 18 Oct 2015
Posts: 34
Location: Sioux Falls SD

PostPosted: Fri Jul 23, 2021 3:32    Post subject: iPhone/Safari admin web page issue is still present Reply with quote
Router Model: Netgear R7800
Update method: Web GUI
Firmware Version: DD-WRT v3.0-r47086 std (07/22/21)
Kernel Version: Linux 4.9.276 #334 SMP Thu Jul 22 01:05:54 +07 2021 armv7l
Upgraded from: DD-WRT v3.0-r47074 std (07/20/21)
Reset config: No
Status: Gateway, static leases, QoS, access restrictions, firewall rules (iptables), 2.4 GHz and 5 GHz (vanilla firmware), VLAN tagged trunk port between two r7800s all working
Errors: The iPhone/Safari admin web page issue I first noticed with r47074 is still present. The forum thread on this issue is
Something funky going on with MacOS 11.4/iOS 14.5 and DDWRT. I'm not sure when it was introduced, I've rapidly jumped through a few recent firmwares since leaving 44719 (where I did not have this problem).

_________________
R7800 v3.0-r47086 std (07/22/21)
set "tcp_tw_recycle" to 0


Last edited by jimj on Mon Jul 26, 2021 4:14; edited 4 times in total
Gameman Advanced Kid
DD-WRT Guru


Joined: 18 Nov 2012
Posts: 978

PostPosted: Sun Jul 25, 2021 5:46    Post subject: Reply with quote
Sorry im late to the party. Was doing a thorough reset on this router followed by some testing.

Router Model: Netgear R7500v2
Firmware Version: DD-WRT v3.0-r47086 std (07/22/21)
Kernel Version: Linux 4.9.276 #333 SMP Thu Jul 22 00:51:26 +07 2021 armv7l

Reset: yes. Did a hard "scorched earth" reset. flashed back to netgears stock firmware, factory reset, and then abck to dd-wrt followed by another factory reset.

Samba is still broken. I also cannot make an anonymous samba share without having to make a samba account share.

miniDLNA works fine. Bittorrent seems a bit sluggish.

BrainSlayer, please look into the samba issue.

_________________
For people who are new to the dd-wrt forums >> http://www.catb.org/~esr/faqs/smart-questions.html#rtfm

barryware wrote:
It takes a "community" to raise a router..


Internet Connection 1
Gateway Router > WRT1900ACv1

Internet connection 2
NAS-AP > WRT32x
blkt
DD-WRT Guru


Joined: 20 Jan 2019
Posts: 3135

PostPosted: Sun Jul 25, 2021 7:30    Post subject: Reply with quote
Erasing NVRAM

https://svn.dd-wrt.com/changeset/47087
Gameman Advanced Kid
DD-WRT Guru


Joined: 18 Nov 2012
Posts: 978

PostPosted: Sun Jul 25, 2021 7:55    Post subject: Reply with quote
blkt wrote:
Erasing NVRAM

https://svn.dd-wrt.com/changeset/47087


I did not state that I did a 30-30-30 reset. I know better. I explained how I did my reset.

Yes, I did see the changeset. let me ask you all a question.

Have you also tried doing a hard reset yourself and setup everything from scratch? or did you flash to new build while retaining old settings?

_________________
For people who are new to the dd-wrt forums >> http://www.catb.org/~esr/faqs/smart-questions.html#rtfm

barryware wrote:
It takes a "community" to raise a router..


Internet Connection 1
Gateway Router > WRT1900ACv1

Internet connection 2
NAS-AP > WRT32x
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 4495
Location: UK, London, just across the river..

PostPosted: Sun Jul 25, 2021 8:14    Post subject: Reply with quote
Gameman Advanced Kid wrote:
blkt wrote:
Erasing NVRAM

https://svn.dd-wrt.com/changeset/47087


I did not state that I did a 30-30-30 reset. I know better. I explained how I did my reset.

Yes, I did see the changeset. let me ask you all a question.

Have you also tried doing a hard reset yourself and setup everything from scratch? or did you flash to new build while retaining old settings?


reset via reset button, GUI or via CLI does the job...no need going back to stock and all that hassle...
I go back to stock only, if i doubt router hardware functionality...

reset means all from scratch, loading save file afterwards its bad bad idea, especially from a different build... Laughing

p.s. there ware positive samba reports, just look around ask the correct person, follow instructions...(im not using samba)

_________________
Atheros
TP-Link WR740Nv1 ---DD-WRT 47117 BS AP,NAT
TP-Link WR1043NDv2 -DD-WRT 47381 BS AP,NAT,AP Isolation,Ad-Block,Firewall,Local DNS,Forced DNS,DoT,VPN,VLAN
TP-Link WR1043NDv2 -DD-WRT 47381 BS AP,NAT,AD/Block,Firewall,Local DNS,Forced DNS,DoT,VPN,VLAN
TP-Link WR1043NDv2 -Gargoyle OS 1.12.0 AP,NAT,QoS,Quotas
Qualcomm Atheros/
Netgear R7800 --DD-WRT 47381 BS AP,NAT,AD-Block,AP&Net Isolation,VLAN's,Firewall,Local DNS,DoT,Vanilla
Netgear R9000 --DD-WRT 47381 BS AP,NAT,AD-Block,AP Isolation,Firewall,Local DNS,DoT,2,4Ghz only,Vanilla
Broadcom
Netgear R7000 ---DD-WRT 47381 BS AP,Wi-Fi OFF,NAT,AD-Block,Firewall,Local DNS,Forced DNS,VLAN's,DoT,VPN
------------------------------------------------------
Stubby for DNS over TLS I DNSCrypt v2 by mac913
blkt
DD-WRT Guru


Joined: 20 Jan 2019
Posts: 3135

PostPosted: Sun Jul 25, 2021 10:00    Post subject: Reply with quote
Gameman Advanced Kid wrote:
I did not state that I did a 30-30-30 reset. I know better. I explained how I did my reset.

R7500v2 there is no need to flash factory stock firmware for a hardware reset (button 7 to 10 seconds).

I linked to nvram erase && reboot with links for more explanation. Nobody was talking about 30-30-30.

"Yes, I did see the changeset." Then nothing to investigate as of three days ago, maybe configuration.
Gameman Advanced Kid
DD-WRT Guru


Joined: 18 Nov 2012
Posts: 978

PostPosted: Sun Jul 25, 2021 16:23    Post subject: Reply with quote
blkt wrote:
Gameman Advanced Kid wrote:
I did not state that I did a 30-30-30 reset. I know better. I explained how I did my reset.

1. R7500v2 there is no need to flash factory stock firmware for a hardware reset (button 7 to 10 seconds).

I linked to nvram erase && reboot with links for more explanation. Nobody was talking about 30-30-30.

2. "Yes, I did see the changeset." Then nothing to investigate as of three days ago, maybe configuration.


1. I wanted to make absolutely sure there was no record of any saved values from previous builds. but I will try the commands you were talking about.

2, I saw the changeset he did for the whole anonymous user issue in samba. not the one that's about samba not working at all. I can see the router showing up in windows explorer. but when i click on it, it tells me that it cannot connect to the router.

If i go back to a build before 46979, I am able to make the share and connect to it in windows explorer.

Those users who said samba is working properly altogether is probably because they did not do a factory reset which means there are some values still in their nvram that keep samba working.

Try doing a factory reset and setup samba. You should see what I am talking about.

_________________
For people who are new to the dd-wrt forums >> http://www.catb.org/~esr/faqs/smart-questions.html#rtfm

barryware wrote:
It takes a "community" to raise a router..


Internet Connection 1
Gateway Router > WRT1900ACv1

Internet connection 2
NAS-AP > WRT32x
mickelalloy
DD-WRT Novice


Joined: 25 Jul 2021
Posts: 10

PostPosted: Sun Jul 25, 2021 21:24    Post subject: Reply with quote
Router/Version: Netgear R7800
File/Kernel: DD-WRT v3.0-r47086 std (07/22/21)
Previous/Reset: DD-WRT v3.0-r47040 std (07/12/21) / No
Mode/Status: Gateway / Working with QoS Disabled
Issues/Errors: Firewall Rules Not Applied When QoS Enabled
SFE: Disabled

Enabling QoS for the first time last week, so unknown if QoS worked in previous firmwares.

QoS Details:
Firewall rules (forwarding, masquerading, etc) are applied correctly when QoS is disabled. Access to the WAN works correctly. However, when QoS is enabled, the firewall rules appear not to be applied at all, even after a reboot or power cycle, resulting in no access to the WAN for client (wired and wireless) devices.

Logging into the router via ssh and running manually:
stopservice firewall
startservice firewall

Applies the firewall rules correctly and QoS works as expected. WAN access for all clients works correctly.

Also, pressing the Apply Settings button on the Services > Services screen of the web GUI restarts the firewall correctly, which allows routing and QoS to work as expected.

Results of "iptables -t mangle -nvL" before and after (public IP removed):

Code:
root@DD-WRT:~# iptables -t mangle -vnL
Chain PREROUTING (policy ACCEPT 2099 packets, 292K bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain INPUT (policy ACCEPT 644 packets, 76762 bytes)
 pkts bytes target     prot opt in     out     source               destination
  644 76762 RRDIPT_INPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy ACCEPT 948 packets, 57363 bytes)
 pkts bytes target     prot opt in     out     source               destination
  948 57363 RRDIPT_FORWARD  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 552 packets, 75707 bytes)
 pkts bytes target     prot opt in     out     source               destination
  552 75707 RRDIPT_OUTPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 1500 packets, 133K bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain FILTER_IN (0 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FILTER_OUT (0 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FILTER_br0_IN (0 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FILTER_br0_OUT (0 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FILTER_wlan1.1_IN (0 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FILTER_wlan1.1_OUT (0 references)
 pkts bytes target     prot opt in     out     source               destination

Chain RRDIPT_FORWARD (1 references)
 pkts bytes target     prot opt in     out     source               destination
   19   808 RETURN     all  --  *      *       192.168.42.220       0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.42.220
    0     0 RETURN     all  --  *      *       X.X.X.X              0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            X.X.X.X
  100  5200 RETURN     all  --  *      *       192.168.42.50        0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.42.50
    2   152 RETURN     all  --  *      *       192.168.42.2         0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.42.2

Chain RRDIPT_INPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
  194 37386 RETURN     all  --  eth0   *       0.0.0.0/0            0.0.0.0/0

Chain RRDIPT_OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
  192 12873 RETURN     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0

Chain SVQOS_SVCS (0 references)
 pkts bytes target     prot opt in     out     source               destination


Code:
root@DD-WRT:~# stopservice firewall
root@DD-WRT:~# startservice firewall


Code:
root@DD-WRT:~# iptables -t mangle -vnL
Chain PREROUTING (policy ACCEPT 424 packets, 190K bytes)
 pkts bytes target     prot opt in     out     source               destination
  440  199K FILTER_IN  all  --  *      *       0.0.0.0/0            0.0.0.0/0
  425  190K CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0            CONNMARK save

Chain INPUT (policy ACCEPT 14 packets, 1264 bytes)
 pkts bytes target     prot opt in     out     source               destination
   37 10382 RRDIPT_INPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    3   500 IMQ        all  --  eth0   *       0.0.0.0/0            0.0.0.0/0           IMQ: todev 0

Chain FORWARD (policy ACCEPT 408 packets, 188K bytes)
 pkts bytes target     prot opt in     out     source               destination
  467  207K RRDIPT_FORWARD  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   49  2812 TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:0x06/0x02 TCPMSS clamp to PMTU
  183  122K IMQ        all  --  eth0   *       0.0.0.0/0            0.0.0.0/0           IMQ: todev 0

Chain OUTPUT (policy ACCEPT 11 packets, 1496 bytes)
 pkts bytes target     prot opt in     out     source               destination
   25  2850 RRDIPT_OUTPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 419 packets, 189K bytes)
 pkts bytes target     prot opt in     out     source               destination
  434  198K FILTER_OUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FILTER_IN (1 references)
 pkts bytes target     prot opt in     out     source               destination
  440  199K CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0            CONNMARK restore
  249 74407 FILTER_br0_IN  all  --  br0    *       0.0.0.0/0            0.0.0.0/0
    0     0 FILTER_wlan1.1_IN  all  --  wlan1.1 *       0.0.0.0/0            0.0.0.0/0
    4   540 SVQOS_SVCS  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x7ffc00
  424  190K CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0            CONNMARK save
  424  190K RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FILTER_OUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
  434  198K CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0            CONNMARK restore
  187  118K FILTER_br0_OUT  all  --  *      br0     0.0.0.0/0            0.0.0.0/0
    0     0 FILTER_wlan1.1_OUT  all  --  *      wlan1.1  0.0.0.0/0            0.0.0.0/0
    3   188 SVQOS_SVCS  all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x7ffc00
  419  189K CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0            CONNMARK save
  419  189K RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FILTER_br0_IN (1 references)
 pkts bytes target     prot opt in     out     source               destination
   24  5673 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x7ffc00 MARK xset 0x35400/0x7ffc00
  247 74296 RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FILTER_br0_OUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    2   192 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x7ffc00 MARK xset 0x35400/0x7ffc00
  184  117K RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FILTER_wlan1.1_IN (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x7ffc00 MARK xset 0x37c00/0x7ffc00
    0     0 RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FILTER_wlan1.1_OUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0            mark match 0x0/0x7ffc00 MARK xset 0x37c00/0x7ffc00
    0     0 RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain RRDIPT_FORWARD (1 references)
 pkts bytes target     prot opt in     out     source               destination
   13  2407 RETURN     all  --  *      *       192.168.42.100       0.0.0.0/0
   12  5380 RETURN     all  --  *      *       0.0.0.0/0            192.168.42.100
    0     0 RETURN     all  --  *      *       192.168.42.220       0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.42.220
    0     0 RETURN     all  --  *      *       X.X.X.X              0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            X.X.X.X
  230 72732 RETURN     all  --  *      *       192.168.42.239       0.0.0.0/0
  171  115K RETURN     all  --  *      *       0.0.0.0/0            192.168.42.239
    8  1130 RETURN     all  --  *      *       192.168.42.50        0.0.0.0/0
    9  6154 RETURN     all  --  *      *       0.0.0.0/0            192.168.42.50
   10  1656 RETURN     all  --  *      *       192.168.42.51        0.0.0.0/0
   12  2509 RETURN     all  --  *      *       0.0.0.0/0            192.168.42.51
    0     0 RETURN     all  --  *      *       192.168.42.2         0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.42.2
    0     0 RETURN     all  --  *      *       192.168.42.7         0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.42.7

Chain RRDIPT_INPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    5   877 RETURN     all  --  eth0   *       0.0.0.0/0            0.0.0.0/0

Chain RRDIPT_OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    5   325 RETURN     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0

Chain SVQOS_SVCS (2 references)
 pkts bytes target     prot opt in     out     source               destination
    6   688 RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0
jimj
DD-WRT Novice


Joined: 18 Oct 2015
Posts: 34
Location: Sioux Falls SD

PostPosted: Sun Jul 25, 2021 21:47    Post subject: Reply with quote
mickelalloy wrote:
Router/Version: Netgear R7800
File/Kernel: DD-WRT v3.0-r47086 std (07/22/21)
Previous/Reset: DD-WRT v3.0-r47040 std (07/12/21) / No
Mode/Status: Gateway / Working with QoS Disabled
Issues/Errors: Firewall Rules Not Applied When QoS Enabled
SFE: Disabled

Enabling QoS for the first time last week, so unknown if QoS worked in previous firmwares.

QoS Details:
Firewall rules (forwarding, masquerading, etc) are applied correctly when QoS is disabled. Access to the WAN works correctly. However, when QoS is enabled, the firewall rules appear not to be applied at all, even after a reboot or power cycle, resulting in no access to the WAN for client (wired and wireless) devices.

Logging into the router via ssh and running manually:
stopservice firewall
startservice firewall

Applies the firewall rules correctly and QoS works as expected. WAN access for all clients works correctly.

Also, pressing the Apply Settings button on the Services > Services screen of the web GUI restarts the firewall correctly, which allows routing and QoS to work as expected.
...

I also have an R7800 running r47086 with SFE disabled, QoS enabled and it's all working fine. Maybe you need to nvram erase && reboot and then manually reconfig?

By "WAN access" you mean access to the Internet through your router?

_________________
R7800 v3.0-r47086 std (07/22/21)
set "tcp_tw_recycle" to 0
mickelalloy
DD-WRT Novice


Joined: 25 Jul 2021
Posts: 10

PostPosted: Sun Jul 25, 2021 21:57    Post subject: Reply with quote
jimj wrote:
mickelalloy wrote:
Router/Version: Netgear R7800
File/Kernel: DD-WRT v3.0-r47086 std (07/22/21)
Previous/Reset: DD-WRT v3.0-r47040 std (07/12/21) / No
Mode/Status: Gateway / Working with QoS Disabled
Issues/Errors: Firewall Rules Not Applied When QoS Enabled
SFE: Disabled

Enabling QoS for the first time last week, so unknown if QoS worked in previous firmwares.

QoS Details:
Firewall rules (forwarding, masquerading, etc) are applied correctly when QoS is disabled. Access to the WAN works correctly. However, when QoS is enabled, the firewall rules appear not to be applied at all, even after a reboot or power cycle, resulting in no access to the WAN for client (wired and wireless) devices.

Logging into the router via ssh and running manually:
stopservice firewall
startservice firewall

Applies the firewall rules correctly and QoS works as expected. WAN access for all clients works correctly.

Also, pressing the Apply Settings button on the Services > Services screen of the web GUI restarts the firewall correctly, which allows routing and QoS to work as expected.
...

I also have an R7800 running r47086 with SFE disabled, QoS enabled and it's all working fine. Maybe you need to nvram erase && reboot and then manually reconfig?

By "WAN access" you mean access to the Internet through your router?


Yes, "WAN access" means the Internet in my description.

Thanks, I'll try erasing it then reconfiguring manually.
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 4495
Location: UK, London, just across the river..

PostPosted: Sun Jul 25, 2021 22:41    Post subject: Reply with quote
mickelalloy wrote:
Router/Version: Netgear R7800
File/Kernel: DD-WRT v3.0-r47086 std (07/22/21)
Previous/Reset: DD-WRT v3.0-r47040 std (07/12/21) / No
Mode/Status: Gateway / Working with QoS Disabled
Issues/Errors: Firewall Rules Not Applied When QoS Enabled
SFE: Disabled

Enabling QoS for the first time last week, so unknown if QoS worked in previous firmwares.

QoS Details:
Firewall rules (forwarding, masquerading, etc) are applied correctly when QoS is disabled. Access to the WAN works correctly. However, when QoS is enabled, the firewall rules appear not to be applied at all, even after a reboot or power cycle, resulting in no access to the WAN for client (wired and wireless) devices.

Logging into the router via ssh and running manually:
stopservice firewall
startservice firewall

Applies the firewall rules correctly and QoS works as expected. WAN access for all clients works correctly.

Also, pressing the Apply Settings button on the Services > Services screen of the web GUI restarts the firewall correctly, which allows routing and QoS to work as expected.
...

I also have an R7800 running r47086 with SFE disabled, QoS enabled and it's all working fine. Maybe you need to nvram erase && reboot and then manually reconfig?

By "WAN access" you mean access to the Internet through your router?
Yes, "WAN access" means the Internet in my description.

Thanks, I'll try erasing it then reconfiguring manually.


Important:
• For issues provide applicable info: 'dmesg', 'cat /tmp/var/log/messages', syslog, klog, serial, strace, tcpdump, wireshark etc.
• Any firewall NAT or WAN issues, show output: 'iptables -vnL', 'iptables -t nat -vnL', 'iptables -t mangle -vnL' and /tmp/.ipt file. .....

also which services you run that may interfere with QoS...SFE, Access restrictions and ect. ...more details and testing needed...

_________________
Atheros
TP-Link WR740Nv1 ---DD-WRT 47117 BS AP,NAT
TP-Link WR1043NDv2 -DD-WRT 47381 BS AP,NAT,AP Isolation,Ad-Block,Firewall,Local DNS,Forced DNS,DoT,VPN,VLAN
TP-Link WR1043NDv2 -DD-WRT 47381 BS AP,NAT,AD/Block,Firewall,Local DNS,Forced DNS,DoT,VPN,VLAN
TP-Link WR1043NDv2 -Gargoyle OS 1.12.0 AP,NAT,QoS,Quotas
Qualcomm Atheros/
Netgear R7800 --DD-WRT 47381 BS AP,NAT,AD-Block,AP&Net Isolation,VLAN's,Firewall,Local DNS,DoT,Vanilla
Netgear R9000 --DD-WRT 47381 BS AP,NAT,AD-Block,AP Isolation,Firewall,Local DNS,DoT,2,4Ghz only,Vanilla
Broadcom
Netgear R7000 ---DD-WRT 47381 BS AP,Wi-Fi OFF,NAT,AD-Block,Firewall,Local DNS,Forced DNS,VLAN's,DoT,VPN
------------------------------------------------------
Stubby for DNS over TLS I DNSCrypt v2 by mac913
mickelalloy
DD-WRT Novice


Joined: 25 Jul 2021
Posts: 10

PostPosted: Sun Jul 25, 2021 23:58    Post subject: Reply with quote
Alozaros wrote:
Important:
• For issues provide applicable info: 'dmesg', 'cat /tmp/var/log/messages', syslog, klog, serial, strace, tcpdump, wireshark etc.
• Any firewall NAT or WAN issues, show output: 'iptables -vnL', 'iptables -t nat -vnL', 'iptables -t mangle -vnL' and /tmp/.ipt file. .....

also which services you run that may interfere with QoS...SFE, Access restrictions and ect. ...more details and testing needed...


I have not erased the nvram and manually reconfigured yet.

Additional Configuration Info: SFE Disabled, STP Enabled, WDS AP (5GHz - With 2 R7500v2 WDS Stations), AP (2GHz),Guest VAP (2GHz), OpenVPN Server, No Access Restrictions, UPnP Disabled, DMZ Disabled
WDS How-To Used: https://wiki.dd-wrt.com/wiki/index.php/WDS_Linked_router_network
QoS: Interface Priority (Currently Both Set to Manual 0,0,0 for Troubleshooting)
Goto page 1, 2  Next Display posts from previous:    Page 1 of 2
Post new topic   Reply to topic    DD-WRT Forum Forum Index -> Atheros WiSOC based Hardware All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum