Sending all lan traffic to monitor PC

Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking
Goto page Previous  1, 2, 3  Next
Author Message
goofy3785
DD-WRT Novice


Joined: 30 Jun 2022
Posts: 14

PostPosted: Thu Jun 30, 2022 18:51    Post subject: Reply with quote
eibgrad wrote:
goofy3785 wrote:
I don't want to update my firmware if I don't have to. The version I am on now is pretty stable. How do I find and load the `ROUTE` module?


It would only make sense to update the *dd-wrt* firmware if we knew a recent update contained the module. But I have no way of knowing that.

That's why I said, if it's NOT available, you're stuck, and may have to consider a capture file w/ tcpdump (who knows, maybe some dd-wrt firmware already has this installed). If NOT, then you need to install Entware and the tcpdump package. This does NOT change your firmware! It installs additional packages of apps and services on USB (or temporarily in memory, if you prefer, so it won't survive a reboot).


I have the hard requirement that I need to see live traffic.

I updated to the latest version(DD-WRT v3.0-r49392 std (06/29/22)) and here's the telnet from keeping the same rules:

;
Code:
root@DD-WRT: ~root@DD-WRT:~# iptables -t mangle -vnL
Chain PREROUTING (policy ACCEPT 662 packets, 403K bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain INPUT (policy ACCEPT 33 packets, 3660 bytes)
 pkts bytes target     prot opt in     out     source               destination
   71  8012 RRDIPT_INPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy ACCEPT 629 packets, 399K bytes)
 pkts bytes target     prot opt in     out     source               destination
 1546  860K RRDIPT_FORWARD  all  --  *      *       0.0.0.0/0            0.0.0.0/0
   91  4776 TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain OUTPUT (policy ACCEPT 18 packets, 1855 bytes)
 pkts bytes target     prot opt in     out     source               destination
   52  5605 RRDIPT_OUTPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 645 packets, 401K bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain RRDIPT_FORWARD (1 references)
 pkts bytes target     prot opt in     out     source               destination
    3   192 RETURN     all  --  *      *       192.168.1.101        0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.1.101
    0     0 RETURN     all  --  *      *       192.168.1.110        0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.1.110
    2   278 RETURN     all  --  *      *       192.168.1.111        0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.1.111
    0     0 RETURN     all  --  *      *       192.168.1.103        0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.1.103
    0     0 RETURN     all  --  *      *       192.168.1.104        0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.1.104
    0     0 RETURN     all  --  *      *       192.168.1.121        0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.1.121
  342  225K RETURN     all  --  *      *       192.168.1.107        0.0.0.0/0
  365  237K RETURN     all  --  *      *       0.0.0.0/0            192.168.1.107
    0     0 RETURN     all  --  *      *       192.168.1.117        0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.1.117
    0     0 RETURN     all  --  *      *       192.168.1.144        0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.1.144
    0     0 RETURN     all  --  *      *       192.168.1.146        0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            192.168.1.146
    0     0 RETURN     all  --  *      *       73.167.112.1         0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            73.167.112.1

Chain RRDIPT_INPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 RETURN     all  --  eth0   *       0.0.0.0/0            0.0.0.0/0
   30  4172 RETURN     all  --  vlan2  *       0.0.0.0/0            0.0.0.0/0

Chain RRDIPT_OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 RETURN     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0
   11   717 RETURN     all  --  *      vlan2   0.0.0.0/0            0.0.0.0/0
0;root@DD-WRT: ~root@DD-WRT:~# modprobe ipt_ROUTE
modprobe: module ipt_ROUTE not found
modprobe: failed to load module ipt_ROUTE: No such file or directory


I am not sure what the actual command I should enter for the firewall rule.
Sponsor
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12885
Location: Netherlands

PostPosted: Thu Jun 30, 2022 18:56    Post subject: Reply with quote
I will upload the TEE module tomorrow.

Alternatively use Entware I think iptables-full will also have those

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
goofy3785
DD-WRT Novice


Joined: 30 Jun 2022
Posts: 14

PostPosted: Thu Jun 30, 2022 20:24    Post subject: Reply with quote
egc wrote:
I will upload the TEE module tomorrow.

Alternatively use Entware I think iptables-full will also have those


What's iptables-full?
eibgrad
DD-WRT Guru


Joined: 18 Sep 2010
Posts: 9157

PostPosted: Thu Jun 30, 2022 20:44    Post subject: Reply with quote
goofy3785 wrote:
What's iptables-full?


I believe he's referring to the Entware package for iptables.

What I see presently available is the following:

Code:
iptables - 1.4.21-3 - IP firewall administration tool.  Matches: - icmp - tcp - udp - comment - conntrack - limit - mac - mark - multiport - set - state - time  Targets: - ACCEPT - CT - DNAT - DROP - REJECT - LOG - MARK - MASQUERADE - REDIRECT - SET - SNAT - TCPMSS  Tables: - filter - mangle - nat - raw


Notice, there's no apparent support for the ROUTE or TEE targets.

But I don't see an iptables-full package, which presumably would be more extensive in its feature support.

BTW, @egc is on Netherlands time, so that's why I responded for him.

_________________
ddwrt-ovpn-split-basic.sh (UPDATED!) * ddwrt-ovpn-split-advanced.sh (UPDATED!) * ddwrt-ovpn-client-killswitch.sh * ddwrt-ovpn-client-watchdog.sh * ddwrt-ovpn-remote-access.sh * ddwrt-ovpn-client-backup.sh * ddwrt-mount-usb-drives.sh * ddwrt-blacklist-domains.sh * ddwrt-wol-port-forward.sh * ddwrt-dns-monitor.sh (NEW!)
the-joker
DD-WRT Developer/Maintainer


Joined: 31 Jul 2021
Posts: 2146
Location: All over YOUR webs

PostPosted: Thu Jun 30, 2022 21:36    Post subject: Reply with quote
egc wrote:
I will upload the TEE module tomorrow.

Alternatively use Entware I think iptables-full will also have those

You're too nice... That is one of the many reasons why you been crowned DD-WRT's community M.C.H.O by me Wink

Me on the other hand, would just point towards this thread

Teaching someone to fish rather than giving them a fish is my moto, maybe I'm just a grumpy and mean old fart Wink

_________________
Saving your retinas from the burn!🔥
DD-WRT Inspired themes for routers
DD-WRT Inspired themes for the phpBB Forum
DD-WRT Inspired themes for the SVN Trac & FTP site
Join in for a chat @ #style_it_themes_public:matrix.org or #style_it_themes:discord

DD-WRT UI Themes Bug Reporting and Discussion thread

Router: ANus RT-AC68U E1 (recognized as C1)
goofy3785
DD-WRT Novice


Joined: 30 Jun 2022
Posts: 14

PostPosted: Thu Jun 30, 2022 23:30    Post subject: Reply with quote
the-joker wrote:
egc wrote:
I will upload the TEE module tomorrow.

Alternatively use Entware I think iptables-full will also have those

You're too nice... That is one of the many reasons why you been crowned DD-WRT's community M.C.H.O by me Wink

Me on the other hand, would just point towards this thread

Teaching someone to fish rather than giving them a fish is my moto, maybe I'm just a grumpy and mean old fart Wink

He is incredibly nice for giving support and I would like to buy him a couple of beers for the trouble. What's your paypal e-mail?

While I like doing things myself it takes alot of time and patience for someone with no experience building these firmwares or with dd-wrt than someone who is a professional in it. I don't plan to do anything more exotic than this so it makes sense to have a professional who works with everyday than someone like me who is only going to do this once or maybe even twice.
eibgrad
DD-WRT Guru


Joined: 18 Sep 2010
Posts: 9157

PostPosted: Fri Jul 01, 2022 5:56    Post subject: Reply with quote
BTW, something I've noticed is that ROUTE/TEE will NOT work when the client doing the sniffing is behind a traditional client/repeater bridge.

In my case, it's an FT (FreshTomato) router and client bridge, but I suspect that would include other similar wireless bridges, since most use the same "hack". As soon as I substitute an end-to-end wired connection from the sniffing client to the router, it works perfectly.

This may be another case where a WDS bridge would probably work better.

I just thought I'd mention it since it could be frustrating for any newbs.

_________________
ddwrt-ovpn-split-basic.sh (UPDATED!) * ddwrt-ovpn-split-advanced.sh (UPDATED!) * ddwrt-ovpn-client-killswitch.sh * ddwrt-ovpn-client-watchdog.sh * ddwrt-ovpn-remote-access.sh * ddwrt-ovpn-client-backup.sh * ddwrt-mount-usb-drives.sh * ddwrt-blacklist-domains.sh * ddwrt-wol-port-forward.sh * ddwrt-dns-monitor.sh (NEW!)
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12885
Location: Netherlands

PostPosted: Fri Jul 01, 2022 6:16    Post subject: Reply with quote
Thanks @eibgrad for responding yes was past my bed time Smile

I have to see again what is available on Entware was a long time ago I used it.

From what I know and from glancing through my notes it is like this (I think):

Older kernels (e.g. 2.6 like Fresh Tomato which is stuck on K2.6) use iptables 1.4 and those use the ROUTE target.
Entware might also still use iptables 1.4 for compatibility, not sure as it is a long time ago I used Entware

Newer kernels use iptables 1.8 which uses TEE

To use it on DDWRT you have to copy the three attached modules to your router (preferably to permanent storage but using /tmp should also work but then you have to redo after reboot)

I made a quick test with a router with standard DDWRT and copied the three modules to /tmp with WinSCP

Then do the following, open a CLI (telnet/Putty/SSH):
Code:
cd /tmp
modprobe ipv6
insmod nf_dup_ipv4.ko
insmod nf_dup_ipv6.ko
insmod xt_TEE.ko


Code:
root@MyR6400-v1:/tmp# iptables -t mangle -A PREROUTING ! -s 192.168.1.100 -j TEE --gateway 192.168.1.100
root@MyR6400-v1:/tmp# iptables -t mangle -A POSTROUTING ! -d 192.168.4.100 -j TEE --gateway 192.168.4.100

root@MyR6400-v1:/tmp# iptables -vnL -t mangle
Chain PREROUTING (policy ACCEPT 87 packets, 12597 bytes)
 pkts bytes target     prot opt in     out     source               destination
  222 25281 TEE        all  --  *      *      !192.168.1.100        0.0.0.0/0            TEE gw:192.168.1.100

Chain POSTROUTING (policy ACCEPT 367 packets, 69541 bytes)
 pkts bytes target     prot opt in     out     source               destination
  367 69541 TEE        all  --  *      *       0.0.0.0/0           !192.168.4.100        TEE gw:192.168.4.100


I have not actually tested if it really works but at least the rules are there. But this is all I can do

When using insmod it usually checks if the kernel is the same, this will work on build 49392 and builds with the same kernel 4.4.302
When using an other kernel with different minor version, if necessary, you can force insmodding with:
Code:
insmod -f


Note: To see and download attachments you have to be logged in!

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087


Last edited by egc on Fri Jul 08, 2022 5:49; edited 1 time in total
eibgrad
DD-WRT Guru


Joined: 18 Sep 2010
Posts: 9157

PostPosted: Fri Jul 01, 2022 6:37    Post subject: Reply with quote
Something else I've discovered.

dd-wrt x86 *does* have the xt_TEE module, so as you said, you can use the TEE target for dd-wrt.

However, I found that if you mirror the *whole* IP network (e.g., ! -s 192.168.1.100 and ! -d 192.168.1.100, where 192.168.1.100 is the sniffing client), it brings the router to its knees! I had to power-cycle to recover. But if I specify mirroring of just a single IP, it works fine. And remember, this is x86, not ARM or MIPS.

I don't know if the same can be said of something like the RT-AC68U until I have a chance to try it w/ your modules.

Anyway, just something to beware.

FWIW, I had no such problems w/ FT (FreshTomato) running on the RT-AC68U.

P.S. I'm not sure the x86 is a fair test. I'm using it in a bridged configuration, w/ an OpenVPN client and acting as an alternate gateway for the network. So there may be other issues there that I introduced w/ the configuration.

_________________
ddwrt-ovpn-split-basic.sh (UPDATED!) * ddwrt-ovpn-split-advanced.sh (UPDATED!) * ddwrt-ovpn-client-killswitch.sh * ddwrt-ovpn-client-watchdog.sh * ddwrt-ovpn-remote-access.sh * ddwrt-ovpn-client-backup.sh * ddwrt-mount-usb-drives.sh * ddwrt-blacklist-domains.sh * ddwrt-wol-port-forward.sh * ddwrt-dns-monitor.sh (NEW!)
eibgrad
DD-WRT Guru


Joined: 18 Sep 2010
Posts: 9157

PostPosted: Fri Jul 01, 2022 7:04    Post subject: Reply with quote
Just tried your uploaded modules w/ my RT-AC68U, seems to be working now!

No issues w/ mirroring the entire network either (must be something I did w/ x86).

_________________
ddwrt-ovpn-split-basic.sh (UPDATED!) * ddwrt-ovpn-split-advanced.sh (UPDATED!) * ddwrt-ovpn-client-killswitch.sh * ddwrt-ovpn-client-watchdog.sh * ddwrt-ovpn-remote-access.sh * ddwrt-ovpn-client-backup.sh * ddwrt-mount-usb-drives.sh * ddwrt-blacklist-domains.sh * ddwrt-wol-port-forward.sh * ddwrt-dns-monitor.sh (NEW!)
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12885
Location: Netherlands

PostPosted: Fri Jul 01, 2022 7:08    Post subject: Reply with quote
Great info many thanks for testing!
_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
goofy3785
DD-WRT Novice


Joined: 30 Jun 2022
Posts: 14

PostPosted: Fri Jul 08, 2022 2:44    Post subject: Reply with quote
egc wrote:
Thanks @eibgrad for responding yes was past my bed time Smile

I have to see again what is available on Entware was a long time ago I used it.

From what I know and from glancing through my notes it is like this (I think):

Older kernels (e.g. 2.6 like Fresh Tomato which is stuck on K2.6) use iptables 1.4 and those use the ROUTE target.
Entware might also still use iptables 1.4 for compatibility, not sure as it is a long time ago I used Entware

Newer kernels use iptables 1.8 which uses TEE

To use it on DDWRT you have to copy the three attached modules to your router (preferably to permanent storage but using /tmp should also work but then you have to redo after reboot)

I made a quick test with a router with standard DDWRT and copied the three modules to /tmp with WinSCP

Then do the following, open a CLI (telnet/Putty/SSH):
Code:
cd /tmp
modprobe ipv6
insmod nf_dup_ipv4.ko
insmod nf_dup_ipv6.ko
insmod xt_TEE.ko


Code:
root@MyR6400-v1:/tmp# iptables -t mangle -A PREROUTING ! -s 192.168.1.100 -j TEE --gateway 192.168.1.100
root@MyR6400-v1:/tmp# iptables -t mangle -A POSTROUTING ! -d 192.168.4.100 -j TEE --gateway 192.168.4.100

root@MyR6400-v1:/tmp# iptables -vnL -t mangle
Chain PREROUTING (policy ACCEPT 87 packets, 12597 bytes)
 pkts bytes target     prot opt in     out     source               destination
  222 25281 TEE        all  --  *      *      !192.168.1.100        0.0.0.0/0            TEE gw:192.168.1.100

Chain POSTROUTING (policy ACCEPT 367 packets, 69541 bytes)
 pkts bytes target     prot opt in     out     source               destination
  367 69541 TEE        all  --  *      *       0.0.0.0/0           !192.168.4.100        TEE gw:192.168.4.100


I have not actually tested if it really works but at least the rules are there. But this is all I can do

When using insmod it usually checks if the kernel is the same, this will work on build 49392 and builds with the same kernel 4.4.302
When using an other kernel with different minor version, if necessary, you can force insmodding with:
Code:
insmod -f


Sorry I don't see the attached packages in your post. Can I do this without installing entwire and just using the packages?

edit --
thanks for updating your post. Just to confirm the first IP is the address for the entire subnet and the second one should be the ip address of the monitor pc right?
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12885
Location: Netherlands

PostPosted: Fri Jul 08, 2022 5:47    Post subject: Reply with quote
You have to login to see downloadable stuff Smile
_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
goofy3785
DD-WRT Novice


Joined: 30 Jun 2022
Posts: 14

PostPosted: Sat Jul 09, 2022 18:39    Post subject: Reply with quote
This what I have under my firewall rules:

Code:
iptables -t mangle -A PREROUTING ! -s 192.168.1.100 -j TEE --gateway 192.168.1.144
iptables -t mangle -A POSTROUTING ! -s 192.168.1.100 -j TEE --gateway 192.168.1.144


I am still not catching the traffic on wireshark. Any ideas?

Code:
0;root@DD-WRT: ~root@DD-WRT:~# iptables -t mangle -vnL
Chain PREROUTING (policy ACCEPT 7071K packets, 3185M bytes)
 pkts bytes target     prot opt in     out     source               destination
6932K 3158M TEE        all  --  *      *      !192.168.1.100        0.0.0.0/0            TEE gw:192.168.1.144

Chain INPUT (policy ACCEPT 323K packets, 36M bytes)
 pkts bytes target     prot opt in     out     source               destination
 323K   36M RRDIPT_INPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy ACCEPT 6588K packets, 3116M bytes)
 pkts bytes target     prot opt in     out     source               destination
6589K 3117M RRDIPT_FORWARD  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 255K   15M TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp flags:0x06/0x02 TCPMSS clamp to PMTU

Chain OUTPUT (policy ACCEPT 14M packets, 6319M bytes)
 pkts bytes target     prot opt in     out     source               destination
  14M 6321M RRDIPT_OUTPUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 21M packets, 9434M bytes)
 pkts bytes target     prot opt in     out     source               destination
  20M 9413M TEE        all  --  *      *      !192.168.1.100        0.0.0.0/0            TEE gw:192.168.1.144

Chain RRDIPT_FORWARD (1 references)
 pkts bytes target     prot opt in     out     source               destination
 118K   25M RETURN     all  --  *      *       192.168.1.100        0.0.0.0/0
 121K   69M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.100
46612   12M RETURN     all  --  *      *       192.168.1.102        0.0.0.0/0
59320   40M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.102
77995   29M RETURN     all  --  *      *       192.168.1.111        0.0.0.0/0
95183   37M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.111
 161K   32M RETURN     all  --  *      *       192.168.1.103        0.0.0.0/0
 161K   89M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.103
49213   13M RETURN     all  --  *      *       192.168.1.120        0.0.0.0/0
49610   30M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.120
 8522  839K RETURN     all  --  *      *       192.168.1.104        0.0.0.0/0
 8408 1628K RETURN     all  --  *      *       0.0.0.0/0            192.168.1.104
40712   13M RETURN     all  --  *      *       192.168.1.113        0.0.0.0/0
51204   31M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.113
 7287 1586K RETURN     all  --  *      *       192.168.1.114        0.0.0.0/0
 7986 3952K RETURN     all  --  *      *       0.0.0.0/0            192.168.1.114
 242K   40M RETURN     all  --  *      *       192.168.1.107        0.0.0.0/0
 317K  259M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.107
 106K   31M RETURN     all  --  *      *       192.168.1.115        0.0.0.0/0
 113K   71M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.115
 245K   78M RETURN     all  --  *      *       192.168.1.123        0.0.0.0/0
 289K  196M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.123
 6131 1272K RETURN     all  --  *      *       192.168.1.140        0.0.0.0/0
 6269 3601K RETURN     all  --  *      *       0.0.0.0/0            192.168.1.140
42995   12M RETURN     all  --  *      *       192.168.1.124        0.0.0.0/0
45086   29M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.124
25740 7357K RETURN     all  --  *      *       192.168.1.108        0.0.0.0/0
29183   22M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.108
 176K   38M RETURN     all  --  *      *       192.168.1.119        0.0.0.0/0
 223K  182M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.119
34652 9819K RETURN     all  --  *      *       192.168.1.143        0.0.0.0/0
36654   19M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.143
 8027 1384K RETURN     all  --  *      *       192.168.1.144        0.0.0.0/0
 5801 3099K RETURN     all  --  *      *       0.0.0.0/0            192.168.1.144
 498K  147M RETURN     all  --  *      *       192.168.1.129        0.0.0.0/0
 526K  350M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.129
  256 40509 RETURN     all  --  *      *       192.168.1.137        0.0.0.0/0
  243 97062 RETURN     all  --  *      *       0.0.0.0/0            192.168.1.137
 233K   48M RETURN     all  --  *      *       192.168.1.146        0.0.0.0/0
 248K  145M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.146
 336K   83M RETURN     all  --  *      *       192.168.1.147        0.0.0.0/0
 365K  242M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.147
93003   21M RETURN     all  --  *      *       192.168.1.149        0.0.0.0/0
 106K   72M RETURN     all  --  *      *       0.0.0.0/0            192.168.1.149
    0     0 RETURN     all  --  *      *       73.167.112.1         0.0.0.0/0
    0     0 RETURN     all  --  *      *       0.0.0.0/0            73.167.112.1

Chain RRDIPT_INPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 RETURN     all  --  eth0   *       0.0.0.0/0            0.0.0.0/0
 154K   23M RETURN     all  --  vlan2  *       0.0.0.0/0            0.0.0.0/0

Chain RRDIPT_OUTPUT (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 RETURN     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0
 139K   11M RETURN     all  --  *      vlan2   0.0.0.0/0            0.0.0.
eibgrad
DD-WRT Guru


Joined: 18 Sep 2010
Posts: 9157

PostPosted: Sat Jul 09, 2022 20:39    Post subject: Reply with quote
Make sure the network adapter on the PC is in promiscuous mode.

Also, remember what I said earlier; the packets will likely NOT make their way through a traditional wireless bridge (e.g., client or repeater bridge). WDS bridge will probably be ok.

_________________
ddwrt-ovpn-split-basic.sh (UPDATED!) * ddwrt-ovpn-split-advanced.sh (UPDATED!) * ddwrt-ovpn-client-killswitch.sh * ddwrt-ovpn-client-watchdog.sh * ddwrt-ovpn-remote-access.sh * ddwrt-ovpn-client-backup.sh * ddwrt-mount-usb-drives.sh * ddwrt-blacklist-domains.sh * ddwrt-wol-port-forward.sh * ddwrt-dns-monitor.sh (NEW!)
Goto page Previous  1, 2, 3  Next Display posts from previous:    Page 2 of 3
Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum