What's new
  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Traffic Analyzer - Statistic

whsbuss

Senior Member
Running Merlin 380.62_1 on my AC68R and when I select the Traffic Analyzer - Statistics screen I get "*You should turn on the Traffic Statistics" message (see attached).

Running in AP mode because I'm FiOS TV bound.

Can someone point me in the right direction for this?
 

Attachments

  • Screen Shot 2017-03-31 at 3.11.48 PM.png
    Screen Shot 2017-03-31 at 3.11.48 PM.png
    49.1 KB · Views: 627
Can't use this in AP mode, since the traffic analyzer is designed to monitor what goes between a LAN and a WAN.
 
Running Merlin 380.62_1 on my AC68R and when I select the Traffic Analyzer - Statistics screen I get "*You should turn on the Traffic Statistics" message (see attached).

Running in AP mode because I'm FiOS TV bound.

Can someone point me in the right direction for this?

It won't work in the AP mode as previously stated. If you want the stats then run the AC68 double NATed behind the FIOS router. It will then show you all the traffic run on the AC68, but it will not show you the traffic on the other subnet. I ran this way when I had FIOS and I only had the TVs on the FIOS router's subnet.
 
It won't work in the AP mode as previously stated. If you want the stats then run the AC68 double NATed behind the FIOS router. It will then show you all the traffic run on the AC68, but it will not show you the traffic on the other subnet. I ran this way when I had FIOS and I only had the TVs on the FIOS router's subnet.

I just did setup the 68U in router mode on a different subnet than FiOS but I still get the same error message in the stats screen.
 
Last edited:
I just did setup the 68U in router mode on a different subnet than FiOS but I still get the same error message in the stats screen.
It has worked for me fine in the past. Currently I am running a router running Double NATed behind a router running Merlin and it is working fine.

If I have a chance on Saturday afternoon I will rearrange my network so a router running Merlin is double NATed behind another router and see what happens. If it continues to work for me then you will know there is something wrong with your double NAT setup.
 
It has worked for me fine in the past. Currently I am running a router running Double NATed behind a router running Merlin and it is working fine.

If I have a chance on Saturday afternoon I will rearrange my network so a router running Merlin is double NATed behind another router and see what happens. If it continues to work for me then you will know there is something wrong with your double NAT setup.

No need.... operator error. I didn't turn on the Stats switch about the error message (egg on my face..). Thanks for offering the help!
 
No need.... operator error. I didn't turn on the Stats switch about the error message (egg on my face..). Thanks for offering the help!

Glad you figured it out. There is a lot of misinformation out there about running double NATed. It works very well without having to make any special adjustments to either router. Do not put your second router in the DMZ just because someone tells you to do so. Not necessary. It may be necessary to do some double port forwards if you have an application or device that requires it, for example on your FIOS router forward for instance say port 5000 to the LAN IP of the second router then and then again from the second router to the device that needs Port 5000. Normally I get by by just leaving UPnP setting activated.

What I haven't found away to do through the GUI at least is to run a VPN server on the double NATed router. No problem running a VPN client.
 
Glad you figured it out. There is a lot of misinformation out there about running double NATed. It works very well without having to make any special adjustments to either router. Do not put your second router in the DMZ just because someone tells you to do so. Not necessary. It may be necessary to do some double port forwards if you have an application or device that requires it, for example on your FIOS router forward for instance say port 5000 to the LAN IP of the second router then and then again from the second router to the device that needs Port 5000. Normally I get by by just leaving UPnP setting activated.

What I haven't found away to do through the GUI at least is to run a VPN server on the double NATed router. No problem running a VPN client.

I did re-setup the 68U in router mode with its own subnet. However I did use a FiOS IP (outside DHCP) as the DMZ on the ActionTec and the static WAN IP for the 68U. I do have a WD MyCloud NAS I moved to the new subnet which required some port forwarding for remote access which worked very well. However, even with the DMZ, I had to put a port forward rule in the ActionTec for a remote security DVR from Lorex. Strange but without it the Lorex DVR on the new subnet would not get remote access even with a port forward rule on the 68U.

So far so good
 
I did re-setup the 68U in router mode with its own subnet. However I did use a FiOS IP (outside DHCP) as the DMZ on the ActionTec and the static WAN IP for the 68U. I do have a WD MyCloud NAS I moved to the new subnet which required some port forwarding for remote access which worked very well. However, even with the DMZ, I had to put a port forward rule in the ActionTec for a remote security DVR from Lorex. Strange but without it the Lorex DVR on the new subnet would not get remote access even with a port forward rule on the 68U.

So far so good
I have never had to put my double NATed router into the DMZ. I assign my double NATed router a static LAN IP on the first router so if my first router was 192.168.1.1 my second router would be assigned 192.168.1.2 then on the second router I just set the WAN IP to auto.

I also have WD MyCloud NAS which runs behind my VPN client and is connected to the double NATed router. I connect to it using the MyClound app on my Iphone and tablet with no problem. No DMZ and no explicit port forwards.

I did have to set up a double port forward when I was running an FTP server on the double NATed router, but because of the lack of real security with FTP I stopped using it.
 
I have never had to put my double NATed router into the DMZ. I assign my double NATed router a static LAN IP on the first router so if my first router was 192.168.1.1 my second router would be assigned 192.168.1.2 then on the second router I just set the WAN IP to auto.

I also have WD MyCloud NAS which runs behind my VPN client and is connected to the double NATed router. I connect to it using the MyClound app on my Iphone and tablet with no problem. No DMZ and no explicit port forwards.

I did have to set up a double port forward when I was running an FTP server on the double NATed router, but because of the lack of real security with FTP I stopped using it.

Interesting.... That's what I did when it was in AP mode. So explain how it works....

Does the 2nd router supply DHCP on its own subnet? If you local LAN is 1.2 what IP gets assigned to the WAN? Is the WAN connected to the FiOS router? I'm a bit confused.
 
Interesting.... That's what I did when it was in AP mode. So explain how it works....

Does the 2nd router supply DHCP on its own subnet? If you local LAN is 1.2 what IP gets assigned to the WAN? Is the WAN connected to the FiOS router? I'm a bit confused.

The WAN is connected to the FIOS router. Its WAN IP is 192.168.1.2

You set the LAN is set up in a diffrent Subnet.

For instance if the FIOS router was 192.168.1 with a DHCP range of 1 -254

You could set the double NATed router as LAN IP 192.168.2.1 Then you would set the DHCP range as 1-254 but probably much less such as 12.168.2.100 -120. Many options for what you can use for none routable private IPs for a routers DHCP subnet.

I usually set my DHCP ranges as small as possible and assign regulary attached devices with a static IPs out side of the small DHCP range I selected. This makes it easier for me to look at the network map and if I see attached devices in the DHCP range to investigate and determine who/ what they are. I have assign computers in one range, phones in another, etc.
 
The WAN is connected to the FIOS router. Its WAN IP is 192.168.1.2

You set the LAN is set up in a diffrent Subnet.

For instance if the FIOS router was 192.168.1 with a DHCP range of 1 -254

You could set the double NATed router as LAN IP 192.168.2.1 Then you would set the DHCP range as 1-254 but probably much less such as 12.168.2.100 -120. Many options for what you can use for none routable private IPs for a routers DHCP subnet.

I usually set my DHCP ranges as small as possible and assign regulary attached devices with a static IPs out side of the small DHCP range I selected. This makes it easier for me to look at the network map and if I see attached devices in the DHCP range to investigate and determine who/ what they are. I have assign computers in one range, phones in another, etc.

Okay that makes sense. The only difference on my end is I selected an IP address outside the DHCP of the FiOS router for the DMZ on the FiOS router. Then I set the WAN IP on the 68U to that DMZ IP - other than that I'm setup the same.
 

Similar threads

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Back
Top