First Look: DSA VLAN Filtering [EA8500]

Post new topic   Reply to topic    DD-WRT Forum Index -> Qualcomm Atheros based Hardware
Goto page 1, 2  Next
Author Message
lexridge
DD-WRT Guru


Joined: 07 Jun 2006
Posts: 2152
Location: WV, USA

PostPosted: Mon May 05, 2025 17:44    Post subject: First Look: DSA VLAN Filtering [EA8500] Reply with quote
After many hours of testing the new DSA Vlan Filtering options in dd-wrt, with much trial and error and some pointers from BS, it is mostly working.

The concept seems to be that the Bridges, or in my case, br1 does the heavy lifting with all vlan handling. The biggest issue I am seeing is in regards to the default vlan1, I cannot access the router on the Trunk port whether vlan1 is tagged or untagged and the managed switch configured both ways accordingly in an attempt to get passed this. This could be a bug as this is still in very early development....or just a misconfiguration on my behalf too.

There is a new bridge command that lets you see the internal configuration of bridges and vlans:
Code:
# bridge vlan show                                                                                                                                   
port              vlan-id
lan1              1
                  10
                  11
                  12
lan2              1 PVID Egress Untagged
lan3              1 PVID Egress Untagged
lan4              1 PVID Egress Untagged
br0               1 PVID Egress Untagged
br1               1
                  10
                  11
                  12
wlan0             10 PVID Egress Untagged
wlan0.1           11 PVID Egress Untagged
wlan0.2           12 PVID Egress Untagged

As you can see in this current configuration, br1 and lan1 both have a tagged vlan1 and tagged vlans 10-12. These vlans are using lan1 as the Trunk port and using wlan0 w/VAPs for each PVID to assign the proper subnets to each access point. This works. The hell of it is, I have to have both a cable plugged into the trunk port and another plugged into another lan port just to access the router via br0. Changing tagged or untagged vlan1 on br1 and/or lan1 does not fix this.

NOTE: The older (ie pre-60771 builds on AX Routers) DSA vlan tagging also still works but was told it uses more resources than the vlan filtering method. I will test on an AX router soon.



FireShot Capture 163 - DD-WRT (build 60942).png
 Description:
 Filesize:  141.04 KB
 Viewed:  21796 Time(s)

FireShot Capture 163 - DD-WRT (build 60942).png



_________________
- Linksys EA8500: I-Gateway, WAP/VAP 5ghz only. Features: VLANs, Samba, WG, Entware - r60xxx
- Linksys EA8500: 802.11s Secondary w/VLAN Trunk over 5ghz - r60xxx
- Linksys MX4300: 802.11s Primary w/VLAN Trunk over 5ghz. 2.4ghz WAP/VAP only - r60xxx
- Linksys MX4300: (WAP/VAP (7)) Multiple VLANs over single trunk port. Entware/Samba r60xxx
- Linksys MR7350: WDS Station for extended Ethernet r60xxx
- Linksys MR7500, MX8500: None in production. Just testing. r60xxx
- OSes: Fedora 40, 10 RPis (2,3,4,5), 23 ESP8266s: Straight from Amiga to Linux in '95, never having owned a Windows PC.
- Forum member #248
Sponsor
lexridge
DD-WRT Guru


Joined: 07 Jun 2006
Posts: 2152
Location: WV, USA

PostPosted: Mon May 05, 2025 20:37    Post subject: Reply with quote
Yeah, r60983 is bugged. I found that both the Vlan Filtering switch and trunk switches were not writing to nvram correctly. I suspect it's a Webui issue as I could manually set them. I have reported these issues already. This testing was done on 60942 and with the exception of vlan1, seems to mostly work. It's also been running on my main gateway now for 27 hours with vlans, but not vlan filtering.

While this is still very much a work-in-progress, BS has a great track record of getting bugs sorted out rather quickly.

By chance, did you have serial port access to the R7800? One thing I noticed on my ea8500 is that occasionally (not always) when making changes to the Networking tab, br0 gets locked out. The serial console reports something like "waiting for br0 to become free. Usage count = 2". You can ONLY see this error with the serial console as once br0 gets in this state, Ethernet access is blocked and probably wlanN as well. This bug has been around for quite a while now and was reported last year, but until recently I have only seen this on AX routers. A power toggle takes care of the problem and gets me back in immediately.

_________________
- Linksys EA8500: I-Gateway, WAP/VAP 5ghz only. Features: VLANs, Samba, WG, Entware - r60xxx
- Linksys EA8500: 802.11s Secondary w/VLAN Trunk over 5ghz - r60xxx
- Linksys MX4300: 802.11s Primary w/VLAN Trunk over 5ghz. 2.4ghz WAP/VAP only - r60xxx
- Linksys MX4300: (WAP/VAP (7)) Multiple VLANs over single trunk port. Entware/Samba r60xxx
- Linksys MR7350: WDS Station for extended Ethernet r60xxx
- Linksys MR7500, MX8500: None in production. Just testing. r60xxx
- OSes: Fedora 40, 10 RPis (2,3,4,5), 23 ESP8266s: Straight from Amiga to Linux in '95, never having owned a Windows PC.
- Forum member #248
ho1Aetoo
DD-WRT Guru


Joined: 19 Feb 2019
Posts: 3764
Location: Germany

PostPosted: Tue May 06, 2025 8:47    Post subject: Reply with quote
VLAN1 (tagged) had worked in build r60889...
I was able to access all routers without any problems, either directly connected or via the trunk.

root@OCTEON-TX2:~# ssh 192.168.1.2
DD-WRT v3.0-r60889 std (c) 2025 NewMedia-NET GmbH
Release: 05/02/25
Board: Netgear R7800

ho1Aetoo:~$ ssh root@192.168.1.2
DD-WRT v3.0-r60889 std (c) 2025 NewMedia-NET GmbH
Release: 05/02/25
Board: Netgear R7800

now in r60983 it does not work anymore, as soon as I configure any port with VLAN1 I have NO access to the R7800 neither via LAN nor via WLAN.

The answer I get is that I should leave VLAN1 alone and not use it. (lol)

and i still think it's great how some people destroy a well-established system that has been tested for hundreds of hours and was bug-free out of envy and pure ignorance.

If any questions or problems arise here in the future, I will no longer answer them but refer them to you who got us into all this trouble.

And I will also delete the stickies, I don't care, I don't need them and I can configure VLANs.

And I don't intend to use dd-wrt any longer anyway, because it's important to me that the firmware is stable and works. (which you can't say about dd-wrt)

Then the last 5 people here alone can be annoyed with recurring bugs that have not been solved for years.

_________________
Quickstart guides:

use Pi-Hole as simple DNS-Server with DD-WRT

Routers
Marvell OCTEON TX2 - QHora-322 - OpenWrt 24.10.4 - Gateway
Qualcomm IPQ8065 - R7800 - dd-wrt r53562 - WAP
Mevunky
DD-WRT Novice


Joined: 06 May 2013
Posts: 38

PostPosted: Sun May 11, 2025 0:14    Post subject: Reply with quote
ho1Aetoo wrote:
VLAN1 (tagged) had worked in build r60889...
I was able to access all routers without any problems, either directly connected or via the trunk.

root@OCTEON-TX2:~# ssh 192.168.1.2
DD-WRT v3.0-r60889 std (c) 2025 NewMedia-NET GmbH
Release: 05/02/25
Board: Netgear R7800

ho1Aetoo:~$ ssh root@192.168.1.2
DD-WRT v3.0-r60889 std (c) 2025 NewMedia-NET GmbH
Release: 05/02/25
Board: Netgear R7800

now in r60983 it does not work anymore, as soon as I configure any port with VLAN1 I have NO access to the R7800 neither via LAN nor via WLAN.

The answer I get is that I should leave VLAN1 alone and not use it. (lol)

and i still think it's great how some people destroy a well-established system that has been tested for hundreds of hours and was bug-free out of envy and pure ignorance.

If any questions or problems arise here in the future, I will no longer answer them but refer them to you who got us into all this trouble.

And I will also delete the stickies, I don't care, I don't need them and I can configure VLANs.

And I don't intend to use dd-wrt any longer anyway, because it's important to me that the firmware is stable and works. (which you can't say about dd-wrt)

Then the last 5 people here alone can be annoyed with recurring bugs that have not been solved for years.


On almost all enterprise networking gear its advisable to never use VLAN 0 or 1 and doing so is at your own peril. So this is not uncommon at all and its always advisable to use VLAN 2 and higher if you don't want to have a bad time. This is in no way unique or unusual.

It is also bad practice as you have a higher chance of leaking traffic into the default plane on a lot of gear if any mistakes are made.
ho1Aetoo
DD-WRT Guru


Joined: 19 Feb 2019
Posts: 3764
Location: Germany

PostPosted: Sun May 11, 2025 6:39    Post subject: Reply with quote
VLAN1 has always been used on every single comsumer router and it has always worked fine.

I have also been able to configure it via CLI... so it's nothing more than a dd-wrt bug.Smile

and i'm not interested in such wisdom, i know that there is problematic hardware, but i don't own it

_________________
Quickstart guides:

use Pi-Hole as simple DNS-Server with DD-WRT

Routers
Marvell OCTEON TX2 - QHora-322 - OpenWrt 24.10.4 - Gateway
Qualcomm IPQ8065 - R7800 - dd-wrt r53562 - WAP
ho1Aetoo
DD-WRT Guru


Joined: 19 Feb 2019
Posts: 3764
Location: Germany

PostPosted: Mon May 12, 2025 16:53    Post subject: Reply with quote
It works now, well at least my configuration does.

I'll post an example of a trunk here.
VLAN1 VLAN3 VLAN4 are fully tagged on the trunk.

VLAN1 = LAN
VLAN3 = Guests
VLAN4 = Wireguard

LAN2 = Trunk Port

br0.3 and br0.4 have no IP addresses on the WAP
you can add IP addresses if you need management access to the GUI...
However, it is advisable not to do this as otherwise you will need additional firewall rules

i hope this makes the changeover easier for some...

question to the users: does this really look easier than the "switch config" ?



Main-Router2.png
 Description:
 Filesize:  465.66 KB
 Viewed:  21533 Time(s)

Main-Router2.png



Wireless-Access-Point2.png
 Description:
 Filesize:  474.01 KB
 Viewed:  21533 Time(s)

Wireless-Access-Point2.png



_________________
Quickstart guides:

use Pi-Hole as simple DNS-Server with DD-WRT

Routers
Marvell OCTEON TX2 - QHora-322 - OpenWrt 24.10.4 - Gateway
Qualcomm IPQ8065 - R7800 - dd-wrt r53562 - WAP
BrainSlayer
Site Admin


Joined: 06 Jun 2006
Posts: 7750
Location: Dresden, Germany

PostPosted: Mon May 12, 2025 17:23    Post subject: Re: First Look: DSA VLAN Filtering [EA8500] Reply with quote
lexridge wrote:
After many hours of testing the new DSA Vlan Filtering options in dd-wrt, with much trial and error and some pointers from BS, it is mostly working.

The concept seems to be that the Bridges, or in my case, br1 does the heavy lifting with all vlan handling. The biggest issue I am seeing is in regards to the default vlan1, I cannot access the router on the Trunk port whether vlan1 is tagged or untagged and the managed switch configured both ways accordingly in an attempt to get passed this. This could be a bug as this is still in very early development....or just a misconfiguration on my behalf too.

There is a new bridge command that lets you see the internal configuration of bridges and vlans:
Code:
# bridge vlan show                                                                                                                                   
port              vlan-id
lan1              1
                  10
                  11
                  12
lan2              1 PVID Egress Untagged
lan3              1 PVID Egress Untagged
lan4              1 PVID Egress Untagged
br0               1 PVID Egress Untagged
br1               1
                  10
                  11
                  12
wlan0             10 PVID Egress Untagged
wlan0.1           11 PVID Egress Untagged
wlan0.2           12 PVID Egress Untagged

As you can see in this current configuration, br1 and lan1 both have a tagged vlan1 and tagged vlans 10-12. These vlans are using lan1 as the Trunk port and using wlan0 w/VAPs for each PVID to assign the proper subnets to each access point. This works. The hell of it is, I have to have both a cable plugged into the trunk port and another plugged into another lan port just to access the router via br0. Changing tagged or untagged vlan1 on br1 and/or lan1 does not fix this.

NOTE: The older (ie pre-60771 builds on AX Routers) DSA vlan tagging also still works but was told it uses more resources than the vlan filtering method. I will test on an AX router soon.


vlan1 is the default vlan for "untagged packets". you tagged vlan1 on port1. from my point of view this could lead to the problem. no matter where you bridged it that vlan1 is forwarded within the switch chipset since you reuse the same vlan on other ports. just a guess. avoiding vlan1 as instruced by the bridge filtering documentation of linux could be the solution. another way is setting br0 bridge to trunking. then the default rule is not added. but pvid 0 is assigned. from what i see in your config. create vlan1 on br1 so get br1.1 since these packets are received tagged on br1. thats another thing

_________________
"So you tried to use the computer and it started smoking? Sounds like a Mac to me.." - Louis Rossmann https://www.youtube.com/watch?v=eL_5YDRWqGE&t=60s
lexridge
DD-WRT Guru


Joined: 07 Jun 2006
Posts: 2152
Location: WV, USA

PostPosted: Mon May 12, 2025 17:41    Post subject: Re: First Look: DSA VLAN Filtering [EA8500] Reply with quote
BrainSlayer wrote:
vlan1 is the default vlan for "untagged packets". you tagged vlan1 on port1. from my point of view this could lead to the problem. no matter where you bridged it that vlan1 is forwarded within the switch chipset since you reuse the same vlan on other ports. just a guess. avoiding vlan1 as instruced by the bridge filtering documentation of linux could be the solution. another way is setting br0 bridge to trunking. then the default rule is not added. but pvid 0 is assigned. from what i see in your config. create vlan1 on br1 so get br1.1 since these packets are received tagged on br1. thats another thing


Yes and things have changed a lot since that first post. For instance, we didn't yet have the option of Trunking on the bridge at that time, which we do now (which is a game changer). Also, I have since dumped br1 and tagged vlan1 and everything is now done on br0. This was indeed a learning experience as this DSA/Vlan Filtering work-in-progress was ongoing and changing almost daily. I think it's very solid now and I plan to put my test config into production either this afternoon or tomorrow. Thanks BS.

Current working configuration w/Vlan Filtering and trunking enabled:
Code:
# bridge v                                                                                                                                           
port              vlan-id                                                                                                                                                         
lan1              1 PVID Egress Untagged
                  10     
                  11
                  12
lan2              1 PVID Egress Untagged
lan3              1 PVID Egress Untagged
lan4              1 PVID Egress Untagged
br0               1 PVID Egress Untagged
                  10
                  11
                  12                               
wlan0             10 PVID Egress Untagged
wlan0.1           11 PVID Egress Untagged
wlan0.2           12 PVID Egress Untagged

_________________
- Linksys EA8500: I-Gateway, WAP/VAP 5ghz only. Features: VLANs, Samba, WG, Entware - r60xxx
- Linksys EA8500: 802.11s Secondary w/VLAN Trunk over 5ghz - r60xxx
- Linksys MX4300: 802.11s Primary w/VLAN Trunk over 5ghz. 2.4ghz WAP/VAP only - r60xxx
- Linksys MX4300: (WAP/VAP (7)) Multiple VLANs over single trunk port. Entware/Samba r60xxx
- Linksys MR7350: WDS Station for extended Ethernet r60xxx
- Linksys MR7500, MX8500: None in production. Just testing. r60xxx
- OSes: Fedora 40, 10 RPis (2,3,4,5), 23 ESP8266s: Straight from Amiga to Linux in '95, never having owned a Windows PC.
- Forum member #248
lexridge
DD-WRT Guru


Joined: 07 Jun 2006
Posts: 2152
Location: WV, USA

PostPosted: Mon May 12, 2025 18:38    Post subject: Reply with quote
ho1Aetoo wrote:
It works now, well at least my configuration does.

I'll post an example of a trunk here.

Great post! Thanks for this.
ho1Aetoo wrote:
question to the users: does this really look easier than the "switch config" ?

In my opinion, DSA is a little easier than the switch config tab. However, throwing in Vlan Filtering does complicate things but the configurability of it is pretty darned amazing. But backing up a bit, with Switch Config tab builds, there was no way to unbridge a specific LAN port. We had eth0 and eth1 and that's it. With DSA each Interface can be unbridged and independent. Nice for some, but probably not the masses.

Thing is, we now have two completely different ways to configure vlans. ie You can use only the Vlan Tagging section at the top of the Networking tab to create all your vlans and then use Bridge Assignments to place them (with a slight performance hit on older routers), OR you can use the Vlan Filtering option without needing any Bridge Assignments (which uses switch h/w acceleration when present). Not saying one is better than the other, but personally I will take expanded flexibility any day.

Something else cool with Vlan Filtering, you can turn it off with two (or three if trunking is enabled) clicks without needing to reconfigure anything and you can leave the vlan filters in place.

_________________
- Linksys EA8500: I-Gateway, WAP/VAP 5ghz only. Features: VLANs, Samba, WG, Entware - r60xxx
- Linksys EA8500: 802.11s Secondary w/VLAN Trunk over 5ghz - r60xxx
- Linksys MX4300: 802.11s Primary w/VLAN Trunk over 5ghz. 2.4ghz WAP/VAP only - r60xxx
- Linksys MX4300: (WAP/VAP (7)) Multiple VLANs over single trunk port. Entware/Samba r60xxx
- Linksys MR7350: WDS Station for extended Ethernet r60xxx
- Linksys MR7500, MX8500: None in production. Just testing. r60xxx
- OSes: Fedora 40, 10 RPis (2,3,4,5), 23 ESP8266s: Straight from Amiga to Linux in '95, never having owned a Windows PC.
- Forum member #248
daru
DD-WRT Novice


Joined: 29 May 2025
Posts: 3

PostPosted: Fri May 30, 2025 20:36    Post subject: Reply with quote
*full disclosure* I'm a GUI user currently---haven't set anything up in the startup scripts or anything.

I've *almost* got my setup on my MR7350 working using your work as a reference---it appears that the LAN connections are filtered and tagged as is appropriate, but I noticed that my wlans didn't seem to get configured correctly.

My setup is using the MR7350 as an AP connected to a switch, which is connected to my firewall. I'll share my config once I actually have things working a bit more. Aside from the wlan WPA security just bricking (I had to disable wireless security to connect to any SSID), I also wouldn't get an IP address from my firewall (which is running my DHCP servers) through the wlan, but I would through the LAN ports.

I don't think the wlan issue was due to the VLAN config---it seemed like things became unstable after upgrading firmware. I'm planning to do a full wipe of settings to fix that.

One goofy behavior after upgrading firmware was that I had to delete my tagged ports, save & apply, then recreate the tagged ports in order for my VLAN bridges to be created. I think there are likely other settings which need to be created from scratch for things to work correctly.

One question I do have is this: what are the VLAN bridges intended to be used for, if anything, for the DSA setup? All I did with mine was set them to 'unbridged' and call it a day.
ho1Aetoo
DD-WRT Guru


Joined: 19 Feb 2019
Posts: 3764
Location: Germany

PostPosted: Sat May 31, 2025 6:01    Post subject: Reply with quote
The VLAN bridges are required so that the router/WAP itself has access to the VLANs.

The VLAN bridges are also required to assign IP addresses and DHCP servers to the VLANs or if you want to have management access to the router/WAP. (GUI access via vlanX)

On a pure WAP these VLAN bridges are not necessarily needed (actually only if you want to access the GUI of the WAP via vlan3/vlan4)

But I already explained that in my post

_________________
Quickstart guides:

use Pi-Hole as simple DNS-Server with DD-WRT

Routers
Marvell OCTEON TX2 - QHora-322 - OpenWrt 24.10.4 - Gateway
Qualcomm IPQ8065 - R7800 - dd-wrt r53562 - WAP
foz111
DD-WRT Guru


Joined: 01 Oct 2017
Posts: 812
Location: Earth

PostPosted: Mon Jul 21, 2025 8:27    Post subject: Reply with quote
Seems something still broken with DSA on Linksys mr7350, if I configure the Linksys mr7350 with the same settings as your example Main-Router2.png the VAP's no longer connect to the wireless network, its like the password is wrong. if I move the VAP's back to vlan ID 1, they connect just fine without changing anything else other than a reboot after changing the VLAN id setting.
Tested this on a few recent builds same result. Current version / last build I tested this on Firmware: DD-WRT v3.0-r61848 std (06/24/25)

Added:
This is the same on Dynalink running DD-WRT v3.0-r61954 std (07/17/25)
Noticed on both routers, in the Interface setup under the WAN port assignment there is now Network Configuration bond0, left this as is, assuming that's correct, everything is the same as ho1Aetoo example apart from the VLan id's i've used 34 & 35 .
As soon as the VAP's get added to the Vlan ID 34 or 35 it prompts for a password, if on vlan ID 1 the vap's connect fine. VLan's seem to be working correctly as far as my testing, it's just the clients lose the ability to connect to any VAPs. when trying to connect all i see in the log is: WRX36 daemon.info hostapd: wlan0.2: STA 16:9a:f9:xx:xx:xx IEEE 802.11: deauthenticated due to local deauth request


Added: Tested VAP's on WPA2 & 3 also tested with password disabled still unable to connect!

_________________
Main Router: Dynalink WRX36, PPPoE, Gateway Mode, Network IPV4 - Isolated Vlan's. Unifi AC-Pro x 3 AP's, Router Wi-Fi Disabled. Paid Commercial Wireguard Client's & WG server, DNSMasq, Static Leases with Quad9 SmartDNS, DNSMasq Adblocking thanks to egc script.

No one can build you the bridge on which you, and only you, must cross the river of life!


Last edited by foz111 on Wed Jul 23, 2025 16:28; edited 2 times in total
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 7065
Location: UK, London, just across the river..

PostPosted: Tue Jul 22, 2025 16:01    Post subject: Reply with quote
Dynalink running DD-WRT v3.0-r61954 on mine is buggy as hell...no NTP TIME to start with.. Razz
_________________
Atheros
TP-Link WR1043NDv2 -DD-WRT 62606 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 -DD-WRT 63257 GTW/SmDNS/DoT,AD-Blk,Forced DNS,AP&Net Isolation,x2VLAN,Vanilla
Netgear R7800 --DD-WRT 62606 Gateway/DNSCryptv2,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla,VPN cli
Netgear R9000 --DD-WRT 62606 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Dynalink DL-WRX36-DDWRT 62606
Broadcom
Netgear R7000 --DD-WRT 63257 GTW/DNScrypt-proxy2/AD-Block,IPset Firewall,Forced DNS,x4VLAN,VPN cli
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913
ho1Aetoo
DD-WRT Guru


Joined: 19 Feb 2019
Posts: 3764
Location: Germany

PostPosted: Wed Jul 30, 2025 17:00    Post subject: Reply with quote
@foz111

Without screenshots and without the output of “bridge v”, I have no idea...

_________________
Quickstart guides:

use Pi-Hole as simple DNS-Server with DD-WRT

Routers
Marvell OCTEON TX2 - QHora-322 - OpenWrt 24.10.4 - Gateway
Qualcomm IPQ8065 - R7800 - dd-wrt r53562 - WAP
foz111
DD-WRT Guru


Joined: 01 Oct 2017
Posts: 812
Location: Earth

PostPosted: Thu Jul 31, 2025 7:48    Post subject: Reply with quote
BusyBox v1.37.0 (2025-07-29 05:39:23 +07) built-in shell (ash)

root@MR7350:~# bridge v
port vlan-id
lan1 1 PVID Egress Untagged
lan2 1
15
16
lan3 1 PVID Egress Untagged
lan4 1 PVID Egress Untagged
br0 1 PVID Egress Untagged
15
16
wlan1 1 PVID Egress Untagged
wlan0 1 PVID Egress Untagged
wlan1.1 1 PVID Egress Untagged
wlan1.2 15 PVID Egress Untagged
wlan1.3 16 PVID Egress Untagged
wlan0.1 1 PVID Egress Untagged
wlan0.2 15 PVID Egress Untagged
wlan0.3 16 PVID Egress Untagged
root@MR7350:~#




As stated VLAN's working, the issue is the wireless asking for a password when the VLAN Id 15 or 16 is added to the VAP interface, it prompts for a password, on VLAN ID 1 they work as expected

_________________
Main Router: Dynalink WRX36, PPPoE, Gateway Mode, Network IPV4 - Isolated Vlan's. Unifi AC-Pro x 3 AP's, Router Wi-Fi Disabled. Paid Commercial Wireguard Client's & WG server, DNSMasq, Static Leases with Quad9 SmartDNS, DNSMasq Adblocking thanks to egc script.

No one can build you the bridge on which you, and only you, must cross the river of life!
Goto page 1, 2  Next Display posts from previous:    Page 1 of 2
Post new topic   Reply to topic    DD-WRT Forum Index -> Qualcomm Atheros based Hardware All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum