tarzan2000
Regular Contributor
ok, doneI would need debug logs to diagnose this further, I'd recommend opening up an issue in GitHub.
ok, doneI would need debug logs to diagnose this further, I'd recommend opening up an issue in GitHub.
iptables -I OUTPUT 1 -s 192.168.50.0/24 -o eth5 -j DROP
iptables -I FORWARD 1 -s 192.168.50.0/24 -o eth5 -j DROP
You would create ip rules to block the traffic, not ip table rules.I have an ax86u on latest merlin firmware running Dual WAN failover. My 1G port fails over to my 2.5G port no problem. No other addons. So thank you.
I am interested in restricting access to the internet during failover to a subset of IPs and I'm not sure how to accomplish this. One kink perhaps is that I'm leveraging the vlans created by the router and the ip range I'd like to allow access is on the 501 vlan (192.168.101.0/24) while the 'main' network and most devices are on vlan 1 (192.168.50.0/24).
I tried doing something like this in my ssh session on router (read: not in startup script):
The idea was to only allow traffic from the 192.168.101.0/24 network through the 2.5G port, but that did not seem have any effect.
Any thoughts on how to approach this?
why ?You would create ip rules to block the traffic, not ip table rules.
I’d recommend opening up an issue on GitHub for this.Thanks for your work, after i installed in ssh amtm it said status: failover disabled, my main connection is fiber 100/1000 whit PPPOE the second wan is Cisco 881 4g whit sim card behind CGNAT of the cellular provider, why in the dual wan main menu says status: failover disabled after I enabled via asus webui?
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!