OpenVPN from "Station Bridge" mode connecting but

Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking
Goto page 1, 2  Next
Author Message
retry
DD-WRT User


Joined: 05 Mar 2017
Posts: 59

PostPosted: Tue Nov 18, 2025 3:11    Post subject: OpenVPN from "Station Bridge" mode connecting but Reply with quote
My LAN setup involves two DD-wrt routers. The main router is a netgear r6700. The second router, the one I'm trying to run openvpn from, is set to Station Bridge on the 2.4ghz channel. It is effectively a wireless client for a VOIP phone and nothing more.

I have run with this setup for YEARS with no real issues. Today I decided I wanted to set up an openvpn client on the secondary router so my VOIP phone can tunnel straight to the service I use.

The openvpn server is self administered and successfully works with several clients, both windows and linux, including NAT'ed VMs. I know the server is not the issue.

OK back to the dd-wrt router. The client connects successfully. I can see the logs both server side and client side showing successful cipher negotiation, route pushing, MTU setting, etc. From the logs, you'd think everything was great.

Here's the server side log (looks good to me):

2025-11-17 18:43:47 74.xx.xx.xx:39696 VERIFY OK: depth=1, CN=ca.redacted.com
2025-11-17 18:43:47 74.xx.xx.xx:39696 VERIFY KU OK
2025-11-17 18:43:47 74.xx.xx.xx:39696 Validating certificate extended key usage
2025-11-17 18:43:47 74.xx.xx.xx:39696 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2025-11-17 18:43:47 74.xx.xx.xx:39696 VERIFY EKU OK
2025-11-17 18:43:47 74.xx.xx.xx:39696 VERIFY OK: depth=0, CN=xxx
2025-11-17 18:43:47 74.xx.xx.xx:39696 peer info: IV_VER=2.6.15
2025-11-17 18:43:47 74.xx.xx.xx:39696 peer info: IV_PLAT=linux
2025-11-17 18:43:47 74.xx.xx.xx:39696 peer info: IV_TCPNL=1
2025-11-17 18:43:47 74.xx.xx.xx:39696 peer info: IV_MTU=1600
2025-11-17 18:43:47 74.xx.xx.xx:39696 peer info: IV_CIPHERS=AES-256-GCM:CHACHA20-POLY1305
2025-11-17 18:43:47 74.xx.xx.xx:39696 peer info: IV_PROTO=990
2025-11-17 18:43:47 74.xx.xx.xx:39696 peer info: IV_LZO_STUB=1
2025-11-17 18:43:47 74.xx.xx.xx:39696 peer info: IV_COMP_STUB=1
2025-11-17 18:43:47 74.xx.xx.xx:39696 peer info: IV_COMP_STUBv2=1
2025-11-17 18:43:47 74.xx.xx.xx:39696 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-11-17 18:43:47 74.xx.xx.xx:39696 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-11-17 18:43:47 74.xx.xx.xx:39696 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 384 bit ECsecp384r1, signature: ecdsa-with-SHA256
2025-11-17 18:43:47 74.xx.xx.xx:39696 [xxx] Peer Connection Initiated with [AF_INET]74.xx.xx.xx:39696
2025-11-17 18:43:47 MULTI_sva: pool returned IPv4=10.7.1.2, IPv6=(Not enabled)
2025-11-17 18:43:47 MULTI: Learn: 10.7.1.2 -> xxx/74.xx.xx.xx:39696
2025-11-17 18:43:47 MULTI: primary virtual IP for xxx/74.xx.xx.xx:39696: 10.7.1.2
2025-11-17 18:43:47 SENT CONTROL [xxx]: 'PUSH_REPLY,sndbuf 393216,rcvbuf 393216,route 10.7.7.0 255.255.255.0,route 10.7.11.0 255.255.255.0,route 10.9.1.1 255.255.255.255,route 10.10.2.1 255.255.255.255,dhcp-option DNS 9.9.9.9,dhcp-option DNS 1.1.1.1,route-gateway 10.7.1.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.7.1.2 255.255.255.0,peer-id 1,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-11-17 18:43:48 xxx/74.xx.xx.xx:39696 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-11-17 18:43:48 xxx/74.xx.xx.xx:39696 Timers: ping 10, ping-restart 120
2025-11-17 18:43:48 xxx/74.xx.xx.xx:39696 Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt

Here's the client side log (looks good except whatever is getting muted):

Nov 18 02:55:42.368 wangchung user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Nov 18 02:55:42.369 wangchung user.info : [openvpn] : Router is not in Gateway mode, WAP detected will try to adjust firewall rules but checking is necessary!
Nov 18 02:55:42.397 wangchung daemon.warn openvpn[31624]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Nov 18 02:55:42.398 wangchung daemon.warn openvpn[31624]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Nov 18 02:55:42.398 wangchung daemon.notice openvpn[31624]: Current Parameter Settings:
Nov 18 02:55:42.398 wangchung daemon.notice openvpn[31624]: NOTE: --mute triggered...
Nov 18 02:55:42.398 wangchung daemon.notice openvpn[31624]: 242 variation(s) on previous 3 message(s) suppressed by --mute
Nov 18 02:55:42.399 wangchung daemon.notice openvpn[31624]: OpenVPN 2.6.15 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH/PKTINFO] [AEAD]
Nov 18 02:55:42.399 wangchung daemon.notice openvpn[31624]: library versions: OpenSSL 1.1.1w 11 Sep 2023, LZO 2.10
Nov 18 02:55:42.401 wangchung user.info : [openvpn] : successfully started
Nov 18 02:55:42.404 wangchung daemon.notice openvpn[31625]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Nov 18 02:55:42.405 wangchung daemon.warn openvpn[31625]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Nov 18 02:55:42.419 wangchung daemon.notice openvpn[31625]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Nov 18 02:55:42.419 wangchung daemon.notice openvpn[31625]: NOTE: --mute triggered...
Nov 18 02:55:42.422 wangchung daemon.notice openvpn[31625]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Nov 18 02:55:42.422 wangchung daemon.notice openvpn[31625]: Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Nov 18 02:55:42.457 wangchung daemon.notice openvpn[31625]: NOTE: --mute triggered...
Nov 18 02:55:42.458 wangchung daemon.notice openvpn[31625]: 1 variation(s) on previous 3 message(s) suppressed by --mute
Nov 18 02:55:42.458 wangchung daemon.notice openvpn[31625]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.xx.xx.xx:1194
Nov 18 02:55:42.458 wangchung daemon.notice openvpn[31625]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Nov 18 02:55:42.458 wangchung daemon.notice openvpn[31625]: UDPv4 link local: (not bound)
Nov 18 02:55:42.459 wangchung daemon.notice openvpn[31625]: UDPv4 link remote: [AF_INET]185.xx.xx.xx:1194
Nov 18 02:55:42.502 wangchung daemon.notice openvpn[31625]: TLS: Initial packet from [AF_INET]185.xx.xx.xx:1194, sid=a9f95f75 61c9b80c
Nov 18 02:55:42.577 wangchung daemon.notice openvpn[31625]: NOTE: --mute triggered...
Nov 18 02:55:42.910 wangchung daemon.notice openvpn[31625]: 8 variation(s) on previous 3 message(s) suppressed by --mute
Nov 18 02:55:42.911 wangchung daemon.notice openvpn[31625]: [vpniad] Peer Connection Initiated with [AF_INET]185.xx.xx.xx:1194
Nov 18 02:55:42.911 wangchung daemon.notice openvpn[31625]: TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Nov 18 02:55:42.912 wangchung daemon.notice openvpn[31625]: NOTE: --mute triggered...
Nov 18 02:55:42.957 wangchung daemon.notice openvpn[31625]: 1 variation(s) on previous 3 message(s) suppressed by --mute
Nov 18 02:55:42.957 wangchung daemon.notice openvpn[31625]: PUSH: Received control message: 'PUSH_REPLY,sndbuf 393216,rcvbuf 393216,route 10.7.7.0 255.255.255.0,route 10.7.11.0 255.255.255.0,route 10.9.1.1 255.255.255.255,route 10.10.2.1 255.255.255.255,dhcp-option DNS 9.9.9.9,d
Nov 18 02:55:42.958 wangchung daemon.notice openvpn[31625]: NOTE: --mute triggered...
Nov 18 02:55:42.959 wangchung daemon.notice openvpn[31625]: 1 variation(s) on previous 3 message(s) suppressed by --mute
Nov 18 02:55:42.959 wangchung daemon.notice openvpn[31625]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Nov 18 02:55:42.959 wangchung daemon.notice openvpn[31625]: OPTIONS IMPORT: --ifconfig/up options modified
Nov 18 02:55:42.959 wangchung daemon.notice openvpn[31625]: NOTE: --mute triggered...
Nov 18 02:55:42.960 wangchung daemon.notice openvpn[31625]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Nov 18 02:55:42.960 wangchung daemon.notice openvpn[31625]: net_route_v4_best_gw query: dst 0.0.0.0
Nov 18 02:55:42.960 wangchung daemon.notice openvpn[31625]: net_route_v4_best_gw result: via 192.168.1.1 dev br0
Nov 18 02:55:42.964 wangchung daemon.notice openvpn[31625]: TUN/TAP device tun1 opened
Nov 18 02:55:42.964 wangchung daemon.notice openvpn[31625]: do_ifconfig, ipv4=1, ipv6=0
Nov 18 02:55:42.964 wangchung daemon.notice openvpn[31625]: net_iface_mtu_set: mtu 1500 for tun1
Nov 18 02:55:42.965 wangchung daemon.notice openvpn[31625]: net_iface_up: set tun1 up
Nov 18 02:55:42.966 wangchung daemon.notice openvpn[31625]: net_addr_v4_add: 10.7.1.2/24 dev tun1
Nov 18 02:55:42.967 wangchung daemon.notice openvpn[31625]: net_route_v4_add: 185.xx.xx.xx/32 via 192.168.1.1 dev [NULL] table 0 metric -1
Nov 18 02:55:42.967 wangchung daemon.notice openvpn[31625]: net_route_v4_add: 0.0.0.0/1 via 10.7.1.1 dev [NULL] table 0 metric -1
Nov 18 02:55:42.968 wangchung daemon.notice openvpn[31625]: net_route_v4_add: 128.0.0.0/1 via 10.7.1.1 dev [NULL] table 0 metric -1
Nov 18 02:55:42.969 wangchung daemon.notice openvpn[31625]: net_route_v4_add: 10.7.7.0/24 via 10.7.1.1 dev [NULL] table 0 metric -1
Nov 18 02:55:42.969 wangchung daemon.notice openvpn[31625]: net_route_v4_add: 10.7.11.0/24 via 10.7.1.1 dev [NULL] table 0 metric -1
Nov 18 02:55:42.970 wangchung daemon.notice openvpn[31625]: net_route_v4_add: 10.9.1.1/32 via 10.7.1.1 dev [NULL] table 0 metric -1
Nov 18 02:55:42.970 wangchung daemon.notice openvpn[31625]: net_route_v4_add: 10.10.2.1/32 via 10.7.1.1 dev [NULL] table 0 metric -1
Nov 18 02:55:43.173 wangchung daemon.notice openvpn[31625]: Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
Nov 18 02:55:43.174 wangchung daemon.notice openvpn[31625]: Outgoing dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key
Nov 18 02:55:43.174 wangchung daemon.notice openvpn[31625]: NOTE: --mute triggered...
Nov 18 02:55:43.177 wangchung daemon.notice openvpn[31625]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Nov 18 02:55:43.177 wangchung daemon.notice openvpn[31625]: Initialization Sequence Completed
Nov 18 02:55:43.177 wangchung daemon.notice openvpn[31625]: Data Channel: cipher 'AES-256-GCM', peer-id: 0
Nov 18 02:55:43.177 wangchung daemon.notice openvpn[31625]: NOTE: --mute triggered...

Here's the openvpn.conf

ca /tmp/openvpncl/ca.crt
cert /tmp/openvpncl/client.crt
key /tmp/openvpncl/client.key
management 127.0.0.1 16
management-log-cache 100
verb 3
mute 3
syslog
writepid /var/run/openvpncl.pid
resolv-retry infinite
script-security 2
nobind
client
dev tun1
proto udp
cipher AES-256-GCM
auth sha256
data-ciphers AES-256-GCM:CHACHA20-POLY1305
remote vpn.xxx.com 1194
mtu-disc yes
remote-cert-tls server
fast-io
tls-crypt /tmp/openvpncl/ta.key
route-up /tmp/openvpncl/route-up.sh
route-pre-down /tmp/openvpncl/route-down.sh
verify-x509-name xxx name
redirect-gateway def1
verb 5

As you can see I'm adding the following additional config:

verify-x509-name xxx name
redirect-gateway def1
verb 5

ip stuff

# ip rule show
0: from all lookup local
32762: from all iif br0 lookup 16802
32763: from all iif wlan0 lookup 16801
32764: from all iif lo lookup 16800
32765: from all iif lo lookup 16800
32766: from all lookup main
32767: from all lookup default

# ip route show
0.0.0.0/1 via 10.7.1.1 dev tun1
default via 192.168.1.1 dev br0
1.1.1.1 via 10.7.1.1 dev tun1
9.9.9.9 via 10.7.1.1 dev tun1
10.7.1.0/24 dev tun1 scope link src 10.7.1.2
10.7.7.0/24 via 10.7.1.1 dev tun1
10.7.11.0/24 via 10.7.1.1 dev tun1
10.9.1.1 via 10.7.1.1 dev tun1
10.10.2.1 via 10.7.1.1 dev tun1
127.0.0.0/8 dev lo scope link
128.0.0.0/1 via 10.7.1.1 dev tun1
185.xx.xx.xx via 192.168.1.1 dev br0
192.168.1.0/24 dev br0 scope link src 192.168.1.254

To be clear, the main home router is 192.168.1.1 and this station bridged router is 192.168.1.254.

I cannot reach anything on the 10.x.x.x routes, neither ping nor any other way. I can ping and reach the rest of the internet, but none of that is actually routing through the vpn as it should be. Even 1.1.1.1 and 9.9.9.9 are not routing over the vpn, which is odd. I would have expected those would fail to ping since there are explicit routes for them through the vpn.

It feels like maybe a metric issue where the real gw is getting precedence over the vpn.

Just for laughs, here's the old-fashioned route command output:

# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 10.7.1.1 128.0.0.0 UG 0 0 0 tun1
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 br0
1.1.1.1 10.7.1.1 255.255.255.255 UGH 0 0 0 tun1
9.9.9.9 10.7.1.1 255.255.255.255 UGH 0 0 0 tun1
10.7.1.0 0.0.0.0 255.255.255.0 U 0 0 0 tun1
10.7.7.0 10.7.1.1 255.255.255.0 UG 0 0 0 tun1
10.7.11.0 10.7.1.1 255.255.255.0 UG 0 0 0 tun1
10.9.1.1 10.7.1.1 255.255.255.255 UGH 0 0 0 tun1
10.10.2.1 10.7.1.1 255.255.255.255 UGH 0 0 0 tun1
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
128.0.0.0 10.7.1.1 128.0.0.0 UG 0 0 0 tun1
185.xx.xx.xx 192.168.1.1 255.255.255.255 UGH 0 0 0 br0
192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 br0

The fact that there are two entries for 0.0.0.0 and both have the same metric feels wrong to me, but I'm not certain.

Is this all because I'm using Station Bridged mode? If so, how can I set this router up to just act like a client on my LAN but also be a working openvpn client for the VOIP phone?[/b]
Sponsor
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 13880
Location: Netherlands

PostPosted: Tue Nov 18, 2025 14:22    Post subject: Reply with quote
First of all I have never done this on a Station bridge connected router, I do anything to avoid that and use a cable or MoCA or powerline adapters.

That said I did set this up on a Wireless Access Point which is similar but connected by a cable and there are instructions for that in the OpenVPN Client setup guide which might point in the right direction.

The main problem is that everything connect to this router is just bypassing the router on its way to the main router.
The easiest solution is to add an unbridged interface with lan ports/wifi, everything connected to this unbridged interface will then go through the router and thus go through the VPN.
But just setting the gateway on your phone pointing to this router should also do the trick, all described in the guide.

OpenVPN guides are a sticky (first few sticky threads) in this forum

Oh and WireGuard is three times as fast and easier to setup but of course the problems you are facing in your setup are the same.

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
retry
DD-WRT User


Joined: 05 Mar 2017
Posts: 59

PostPosted: Tue Nov 18, 2025 18:08    Post subject: Reply with quote
Thanks, egc. I did download the openvpn setup guide pdf, but did not see what you're referring to.

Anyway I had a hunch it was something like that. I was surprised that even ssh'd into the router, I could not route anything from the command line either.

I'll look for what you are describing in the guides though.
retry
DD-WRT User


Joined: 05 Mar 2017
Posts: 59

PostPosted: Wed Nov 19, 2025 5:13    Post subject: Reply with quote
So I tried to follow your guide, but I was confused by several things.

• Disable WAN (already done)
• Set Local IP Address inside scope of primary router e.g. if primary router is 192.168.1.1 set WAP as 192.168.1.2 / 24 (I'm using .254 but same thing)
• Set Gateway and Local DNS to the primary router (already done)
• DHCP server Disabled (=off and NOT set as Forwarder!) (already done)
• Leave DNSMasq on (why? Not using DNS caching or DHCP here)
• Router kept in the default Gateway mode (the wiki says Router mode but do not do that, either it does not matter (this case) or break things) (not sure where this setting is located)
• Connect LAN <> LAN (do not use the WAN port unless you really need that extra port, for most routers traffic still must use the CPU so performance is lacklustre )
Is this a setting or just talking about cabling to a LAN port?
• I do not change the Firewall settings although you do not want a firewall, the Firewall is automatically disabled as there is no WAN, but it does not hurt to follow the wiki and Disable the Firewall anyway. (already had it disabled)

I told the VOIP phone to use 192.168.1.254 as a gateway and just assigned it an unused IP in the non-DHCP range (192.168.1.10) with sub mask 255.255.255.0.

With all that, the phone is online but still not using the VPN. I then tried to use 10.7.1.2 as a GW (the VPN IP assigned to the station bridged router) and gave the phone an IP of 10.7.1.100 with sub mask of 255.0.0.0. That knocked it completely offline.

I have no idea what to try now. Obviously the issue is the routing. What must I do? Something on the Advanced Routing page?
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 13880
Location: Netherlands

PostPosted: Wed Nov 19, 2025 6:53    Post subject: Reply with quote
retry wrote:
So I tried to follow your guide, but I was confused by several things.

• Disable WAN (already done)
• Set Local IP Address inside scope of primary router e.g. if primary router is 192.168.1.1 set WAP as 192.168.1.2 / 24 (I'm using .254 but same thing)
• Set Gateway and Local DNS to the primary router (already done)
• DHCP server Disabled (=off and NOT set as Forwarder!) (already done)
• Leave DNSMasq on (why? Not using DNS caching or DHCP here)
• Router kept in the default Gateway mode (the wiki says Router mode but do not do that, either it does not matter (this case) or break things) (not sure where this setting is located)
• Connect LAN <> LAN (do not use the WAN port unless you really need that extra port, for most routers traffic still must use the CPU so performance is lacklustre )
Is this a setting or just talking about cabling to a LAN port?
• I do not change the Firewall settings although you do not want a firewall, the Firewall is automatically disabled as there is no WAN, but it does not hurt to follow the wiki and Disable the Firewall anyway. (already had it disabled)

I told the VOIP phone to use 192.168.1.254 as a gateway and just assigned it an unused IP in the non-DHCP range (192.168.1.10) with sub mask 255.255.255.0.

With all that, the phone is online but still not using the VPN. I then tried to use 10.7.1.2 as a GW (the VPN IP assigned to the station bridged router) and gave the phone an IP of 10.7.1.100 with sub mask of 255.0.0.0. That knocked it completely offline.

I have no idea what to try now. Obviously the issue is the routing. What must I do? Something on the Advanced Routing page?


Those instructions are for a wired router not for Station bridge.

A said I will never use Station bridge so have no experience with it, but there are analogies with a wired WAP, I would try to add the the firewall rules and see if that helps. But not sure this can/will ever work on a station bridge.

Make sure the VPN is setup according to the guide so with NAT enabled etc.

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
retry
DD-WRT User


Joined: 05 Mar 2017
Posts: 59

PostPosted: Wed Nov 19, 2025 7:10    Post subject: Reply with quote
alright I might take another crack at it later this week...

Meanwhile I decided to set up openvpn on my main router and have it default to not send all traffic through. Then I added a few IP/CIDR entries to the PBR box.

Oddly this didn't work right. The internal servers became accessible via the pushed routes from the openvpn server, including to local PCs. But the custom routes from the PBR box were nowhere to be found. So I added the routes manually with ip add route x.x.x.x dev tun1 . Once I did that, it started working for my local PCs too.

And yet the VOIP phone on the station bridged router did not use the vpn at all. I saw it provisioning itself with my ISP IP (the provisioning server is one of the PBR routes I ended up manually adding with ip add route). And then after that, it failed to register at the SIP server domain and was thus unusable.

So that's weird too. That station bridged router is pure voodoo.

Is there another way I can use the 2nd wifi router to wirelessly connect my phone to the internet? If I were to use the Station mode (unbridged), and have the whole thing exist on a separate LAN subnet, how does one then route it to the main router for internet access? Then there's the WDS question. The main router is a broadcom chipset, and the secondary is atheros. It seems like WDS is out of the question or at least very risky.

I really just want the least steps possible to get the phone using openvpn, ideally not forcing my entire LAN to use it. I just want syntax and steps, not theory and abstract notions.
Per Yngve Berg
DD-WRT Guru


Joined: 13 Aug 2013
Posts: 7115
Location: Romerike, Norway

PostPosted: Wed Nov 19, 2025 8:36    Post subject: Reply with quote
I think you should use Client Mode instead of Repeater Mode and have the second router on a separate sub-net.

Add a static route on route on the main router to the sub-net on the second router.
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 13880
Location: Netherlands

PostPosted: Wed Nov 19, 2025 8:43    Post subject: Reply with quote
Per Yngve Berg wrote:
I think you should use Client Mode instead of Repeater Mode and have the second router on a separate sub-net.

Add a static route on route on the main router to the sub-net on the second router.


that would indeed has a much better chance for it to work

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
retry
DD-WRT User


Joined: 05 Mar 2017
Posts: 59

PostPosted: Wed Nov 19, 2025 9:09    Post subject: Reply with quote
Funny you guys mention that, because I tried it earlier tonight but failed somehow. I didn't even get around to openvpn set up. I set the secondary to Station mode (not bridged). I changed its IP to 192.162.2.1 and created a DHCP range from 192.168.2.100 -- gateway set to 192.168.1.1 .

The wifi only has the SSID to go by. It never seemed to connect properly to the main router. I also added the static route to the main router but never got it to ping. I could see the routers connected on the wlan tab.

I must have messed up a setting somewhere. Where's the guide for this? I'm frustrated with all the guesswork. While this is technically 'advanced' routing, it's also fairly standard and vanilla for using this particular mode on a secondary wifi router.

In the end I had to cable in to the secondary router to restore station bridge setup to get the phone back online.
Per Yngve Berg
DD-WRT Guru


Joined: 13 Aug 2013
Posts: 7115
Location: Romerike, Norway

PostPosted: Wed Nov 19, 2025 13:34    Post subject: Reply with quote
Your Gateway address is wrong. It must be the same sub-net as the Interface. As you have no other router connected, leave it at 0.0.0.0. The wifi connecting to the main router will have an ip 192.168.1.x and gateway 192.168.1.1.
retry
DD-WRT User


Joined: 05 Mar 2017
Posts: 59

PostPosted: Wed Nov 19, 2025 14:32    Post subject: Reply with quote
is that what this says to do? https://wiki.dd-wrt.com/wiki/index.php/Station_Mode
retry
DD-WRT User


Joined: 05 Mar 2017
Posts: 59

PostPosted: Wed Nov 19, 2025 22:23    Post subject: Reply with quote
Per Yngve Berg wrote:
Your Gateway address is wrong. It must be the same sub-net as the Interface. As you have no other router connected, leave it at 0.0.0.0. The wifi connecting to the main router will have an ip 192.168.1.x and gateway 192.168.1.1.


From the Station setup instructions in the wiki:

Go to Setup->Basic Setup: if needed, change Connection Type to Static IP from "Automatic Configuration - DHCP"

Static IP allows easier access remote GUI, SSH, or telnet access is enabled under Administration
If the station router requires external management, go to Setup->Basic Setup, set the WAN port protocol as needed and enter info provided by your ISP. This is the setting that is bonded to the wireless interface.

In Network Setup set the Local IP Address to a different subnet from the primary host router (e.g. 192.168.2.1)
Set the Gateway address to the primary host router gateway or internet will not work (e.g. 192.168.1.1)


The device should be in GATEWAY Advanced Routing mode, not ROUTER, or Masquerade/NAT does not happen. (hmm maybe this is the part I got wrong?)
retry
DD-WRT User


Joined: 05 Mar 2017
Posts: 59

PostPosted: Wed Nov 19, 2025 23:05    Post subject: Reply with quote
Tried it again with the advanced routing set to Gateway. Still didn't work. There's just no assignment of any route to/from 192.168.2.x/24 happening. If it's up to me to set up static routes on both routers, the instructions are totally unclear about it.
retry
DD-WRT User


Joined: 05 Mar 2017
Posts: 59

PostPosted: Thu Nov 20, 2025 0:20    Post subject: Reply with quote
Alright finally success. I figured out everything that was wrong. There were several factors:

1) I did have to change Advanced routing to Gateway on the Station router
2) I also had to reenable the WAN interface on the basic setup, which was disabled under Station Bridged. That made everything so clear. 192.168.1.254 there and then 192.168.2.1 on the Local Network side.
3) I added a static route on the main router so I could reach resources on 192.168.2.x (like the phone's web UI)
4) I also had to allow remote access to ssh and the web UI on the secondary router (restricted to 192.168.1.x clients) to make everything finally accessible.

I set up openvpn again and now everything is working near perfectly.

There is ONE caveat, that maybe you guys can still help me with. The phone's provisioning server is on a subdomain with the same IP as the openvpn server. So when I go there, it goes outside the vpn. Is there a way I can make it use the vpn for everything but the actual establishment of the vpn itself (i.e. all traffic that isn't 1194 udp)?
retry
DD-WRT User


Joined: 05 Mar 2017
Posts: 59

PostPosted: Thu Nov 20, 2025 2:55    Post subject: Reply with quote
I guess this is just a technical problem with openvpn itself.

Fortunately my openvpn servers have an alternative IP which I have now bound the vpn domain to. It's an adequate workaround.

At this point, I can finally say hooray. Everything is stable and good.
Goto page 1, 2  Next Display posts from previous:    Page 1 of 2
Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum