As of today I can't access any websites via my router. I have a wrt54g-tm. It had intermittently not allowed me access in the past. I have been using 1.3.7 for a while now without an major problems other than the intermittent inability to access the web. The odd thing is that utorrent on my computer is still using bandwidth so the problem seems to only be with the web. I spent the last several hours doing factory resets and upgrading and downgrading firmware to no avail. Can ayone help me with this?
Thanks,
Matt
Can't access the internet.
Moderator: Moderators
Re: Can't access the internet.
What version are you using now?
If you know how please get to the command line of your router and post the output of the following commands.
iptables -vnL
iptables -vnL -t nat
iptables -vnL -t mangle
Also a screen shot of your status screen would be cool.
If you know how please get to the command line of your router and post the output of the following commands.
iptables -vnL
iptables -vnL -t nat
iptables -vnL -t mangle
Also a screen shot of your status screen would be cool.
Linksys WRT1900ACv2
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
-
- Posts: 7
- Joined: Fri Jul 09, 2010 7:08 pm
Re: Can't access the internet.
I'm using 1.3.8. At times I won't be able to connect to the network at all even though I can see that its broadcasting.
Here is the output from what you asked for and the screenshot. This seems to happen intermittently so I have no idea whats going on. However I have also noticed that while it only rarely completely cuts off my internet access my lag will spike through the roof when I am playing on my ps3 and it will take a long time to access webpages. Thanks for the help sorry I didn't reply sooner but the problem seemed to be resolved for a while and then it happened again last night.

1st iptables -vnL
2nd iptables -vnL -t nat
3rd iptables -vnL -t mangle
Here is the output from what you asked for and the screenshot. This seems to happen intermittently so I have no idea whats going on. However I have also noticed that while it only rarely completely cuts off my internet access my lag will spike through the roof when I am playing on my ps3 and it will take a long time to access webpages. Thanks for the help sorry I didn't reply sooner but the problem seemed to be resolved for a while and then it happened again last night.
1st iptables -vnL
Code: Select all
192.168.1.0/24 --reset_interval hour --intervals_to_save 24
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total4A-download-7200-359 --type combined --current_bandwidth 7719054 --reset_interval 7200 --reset_time 7200 --intervals_to_save 359
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total4B-download-day-31 --type combined --current_bandwidth 1968721446 --reset_interval day --intervals_to_save 31
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id bdist4-download-day-31 --type individual_local --subnet 192.168.1.0/24 --reset_interval day --intervals_to_save 31
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total5A-download-day-365 --type combined --current_bandwidth 1968723104 --reset_interval day --intervals_to_save 365
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total5B-download-month-12 --type combined --current_bandwidth 88728517164 --reset_interval month --intervals_to_save 12
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id bdist5-download-month-12 --type individual_local --subnet 192.168.1.0/24 --reset_interval month --intervals_to_save 12
Chain egress_restrictions (2 references)
pkts bytes target prot opt in out source destination
77970 51M egress_whitelist all -- * * 0.0.0.0/0 0.0.0.0/0
77986 51M egress_whitelist all -- * * 0.0.0.0/0 0.0.0.0/0
Chain egress_whitelist (2 references)
pkts bytes target prot opt in out source destination
Chain forward (1 references)
pkts bytes target prot opt in out source destination
1430 132K zone_lan_forward all -- br-lan * 0.0.0.0/0 0.0.0.0/0
31 3893 zone_wan_forward all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0
Chain forwarding_lan (1 references)
pkts bytes target prot opt in out source destination
Chain forwarding_rule (1 references)
pkts bytes target prot opt in out source destination
1459 136K nat_reflection_fwd all -- * * 0.0.0.0/0 0.0.0.0/0
Chain forwarding_wan (1 references)
pkts bytes target prot opt in out source destination
Chain ingress_restrictions (2 references)
pkts bytes target prot opt in out source destination
76072 60M ingress_whitelist all -- * * 0.0.0.0/0 0.0.0.0/0
76100 60M ingress_whitelist all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ingress_whitelist (2 references)
pkts bytes target prot opt in out source destination
Chain input (1 references)
pkts bytes target prot opt in out source destination
200 14816 zone_lan all -- br-lan * 0.0.0.0/0 0.0.0.0/0
333 37714 zone_wan all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0
Chain input_lan (1 references)
pkts bytes target prot opt in out source destination
Chain input_rule (1 references)
pkts bytes target prot opt in out source destination
Chain input_wan (1 references)
pkts bytes target prot opt in out source destination
Chain nat_reflection_fwd (1 references)
pkts bytes target prot opt in out source destination
Chain output (1 references)
pkts bytes target prot opt in out source destination
143 9407 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
142 9079 zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain output_rule (1 references)
pkts bytes target prot opt in out source destination
Chain pf_loopback_B (1 references)
pkts bytes target prot opt in out source destination
Chain reject (5 references)
pkts bytes target prot opt in out source destination
1 48 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
360 40295 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain syn_flood (1 references)
pkts bytes target prot opt in out source destination
14 724 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 25/sec burst 50
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan (1 references)
pkts bytes target prot opt in out source destination
200 14816 input_lan all -- * * 0.0.0.0/0 0.0.0.0/0
200 14816 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
200 14816 ACCEPT all -- br-lan * 0.0.0.0/0 0.0.0.0/0
1 328 ACCEPT all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_MSSFIX (0 references)
pkts bytes target prot opt in out source destination
0 0 TCPMSS tcp -- * br-lan 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain zone_lan_REJECT (1 references)
pkts bytes target prot opt in out source destination
1 48 reject all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
1422 132K pf_loopback_B all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- br-lan br-lan 0.0.0.0/0 0.0.0.0/0
1430 132K zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
1 48 forwarding_lan all -- * * 0.0.0.0/0 0.0.0.0/0
1 48 zone_lan_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan (1 references)
pkts bytes target prot opt in out source destination
4 1312 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:68
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
329 36402 input_wan all -- * * 0.0.0.0/0 0.0.0.0/0
329 36402 zone_wan_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0
1571 141K ACCEPT all -- * eth0.1 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * eth0.1 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_MSSFIX (1 references)
pkts bytes target prot opt in out source destination
433 22364 TCPMSS tcp -- * eth0.1 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain zone_wan_REJECT (2 references)
pkts bytes target prot opt in out source destination
360 40295 reject all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * eth0.1 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_forward (1 references)
pkts bytes target prot opt in out source destination
31 3893 forwarding_wan all -- * * 0.0.0.0/0 0.0.0.0/0
31 3893 zone_wan_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
root@Gargoyle:~#
Code: Select all
tcp flags:0x17/0x02 limit: avg 25/sec burst 50
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan (1 references)
pkts bytes target prot opt in out source destination
200 14816 input_lan all -- * * 0.0.0.0/0 0.0.0.0/0
200 14816 zone_lan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
200 14816 ACCEPT all -- br-lan * 0.0.0.0/0 0.0.0.0/0
1 328 ACCEPT all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_MSSFIX (0 references)
pkts bytes target prot opt in out source destination
0 0 TCPMSS tcp -- * br-lan 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain zone_lan_REJECT (1 references)
pkts bytes target prot opt in out source destination
1 48 reject all -- br-lan * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * br-lan 0.0.0.0/0 0.0.0.0/0
Chain zone_lan_forward (1 references)
pkts bytes target prot opt in out source destination
1422 132K pf_loopback_B all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- br-lan br-lan 0.0.0.0/0 0.0.0.0/0
1430 132K zone_wan_ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
1 48 forwarding_lan all -- * * 0.0.0.0/0 0.0.0.0/0
1 48 zone_lan_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan (1 references)
pkts bytes target prot opt in out source destination
4 1312 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:68
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
329 36402 input_wan all -- * * 0.0.0.0/0 0.0.0.0/0
329 36402 zone_wan_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_ACCEPT (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0
1571 141K ACCEPT all -- * eth0.1 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_DROP (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * eth0.1 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_MSSFIX (1 references)
pkts bytes target prot opt in out source destination
433 22364 TCPMSS tcp -- * eth0.1 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain zone_wan_REJECT (2 references)
pkts bytes target prot opt in out source destination
360 40295 reject all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * eth0.1 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_forward (1 references)
pkts bytes target prot opt in out source destination
31 3893 forwarding_wan all -- * * 0.0.0.0/0 0.0.0.0/0
31 3893 zone_wan_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
root@Gargoyle:~#
iptables -vnL -t nat
Chain PREROUTING (policy ACCEPT 2707 packets, 234K bytes)
pkts bytes target prot opt in out source destination
1304 88594 zone_wan_prerouting all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0
1486 157K zone_lan_prerouting all -- br-lan * 0.0.0.0/0 0.0.0.0/0
2819 248K prerouting_rule all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 1 packets, 328 bytes)
pkts bytes target prot opt in out source destination
1363 129K zone_wan_nat all -- * eth0.1 0.0.0.0/0 0.0.0.0/0
2 368 zone_lan_nat all -- * br-lan 0.0.0.0/0 0.0.0.0/0
3 442 postrouting_rule all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 133 packets, 8739 bytes)
pkts bytes target prot opt in out source destination
Chain nat_reflection_in (1 references)
pkts bytes target prot opt in out source destination
Chain nat_reflection_out (1 references)
pkts bytes target prot opt in out source destination
Chain pf_loopback_A (1 references)
pkts bytes target prot opt in out source destination
Chain pf_loopback_C (1 references)
pkts bytes target prot opt in out source destination
Chain postrouting_rule (1 references)
pkts bytes target prot opt in out source destination
1 328 pf_loopback_C all -- * br-lan 0.0.0.0/0 0.0.0.0/0
2 402 nat_reflection_out all -- * * 0.0.0.0/0 0.0.0.0/0
Chain prerouting_lan (1 references)
pkts bytes target prot opt in out source destination
Chain prerouting_rule (1 references)
pkts bytes target prot opt in out source destination
2757 243K nat_reflection_in all -- * * 0.0.0.0/0 0.0.0.0/0
Chain prerouting_wan (1 references)
pkts bytes target prot opt in out source destination
Chain quota_redirects (1 references)
pkts bytes target prot opt in out source destination
1430 147K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xff000000
0 0 CONNMARK all -- * * 192.168.1.20 0.0.0.0/0 CONNMARK set 0xf000000/0xf000000
0 0 REDIRECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 multiport dports 80,443 bandwidth --check --id 192.168.1.20_combined
0 0 CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 CONNMARK set 0xf0000000/0xf0000000
1429 147K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xf000000
1429 147K CONNMARK all -- * * 192.168.1.21 0.0.0.0/0 CONNMARK set 0xf000000/0xf000000
0 0 REDIRECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 multiport dports 80,443 bandwidth --check --id 192.168.1.21_ingress
1429 147K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 CONNMARK set 0xf0000000/0xf0000000
1428 147K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xf000000
0 0 REDIRECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0xf0000000 multiport dports 80,443 bandwidth --check --id ALL_OTHERS_COMBINED_ingress
1425 147K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xff000000
Chain zone_lan_nat (1 references)
pkts bytes target prot opt in out source destination
Chain zone_lan_prerouting (1 references)
pkts bytes target prot opt in out source destination
0 0 pf_loopback_A all -- * * 0.0.0.0/0 128.208.47.15
1430 147K quota_redirects all -- * * 0.0.0.0/0 0.0.0.0/0
1486 157K prerouting_lan all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_nat (1 references)
pkts bytes target prot opt in out source destination
1363 129K MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_prerouting (1 references)
pkts bytes target prot opt in out source destination
1304 88594 prerouting_wan all -- * * 0.0.0.0/0 0.0.0.0/0
root@Gargoyle:~#
Code: Select all
pkts bytes target prot opt in out source destination
1430 147K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xff000000
0 0 CONNMARK all -- * * 192.168.1.20 0.0.0.0/0 CONNMARK set 0xf000000/0xf000000
0 0 REDIRECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 multiport dports 80,443 bandwidth --check --id 192.168.1.20_combined
0 0 CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 CONNMARK set 0xf0000000/0xf0000000
1429 147K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xf000000
1429 147K CONNMARK all -- * * 192.168.1.21 0.0.0.0/0 CONNMARK set 0xf000000/0xf000000
0 0 REDIRECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 multiport dports 80,443 bandwidth --check --id 192.168.1.21_ingress
1429 147K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 CONNMARK set 0xf0000000/0xf0000000
1428 147K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xf000000
0 0 REDIRECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0xf0000000 multiport dports 80,443 bandwidth --check --id ALL_OTHERS_COMBINED_ingress
1425 147K CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xff000000
Chain zone_lan_nat (1 references)
pkts bytes target prot opt in out source destination
Chain zone_lan_prerouting (1 references)
pkts bytes target prot opt in out source destination
0 0 pf_loopback_A all -- * * 0.0.0.0/0 128.208.47.15
1430 147K quota_redirects all -- * * 0.0.0.0/0 0.0.0.0/0
1486 157K prerouting_lan all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_nat (1 references)
pkts bytes target prot opt in out source destination
1363 129K MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0
Chain zone_wan_prerouting (1 references)
pkts bytes target prot opt in out source destination
1304 88594 prerouting_wan all -- * * 0.0.0.0/0 0.0.0.0/0
root@Gargoyle:~#
iptables -vnL -t mangle
Chain PREROUTING (policy ACCEPT 93395 packets, 67M bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 1580 packets, 202K bytes)
pkts bytes target prot opt in out source destination
512 79646 ingress_quotas all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0x8000
512 79646 combined_quotas all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0x8000
Chain FORWARD (policy ACCEPT 90748 packets, 66M bytes)
pkts bytes target prot opt in out source destination
90763 66M forward_quotas all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 1510 packets, 278K bytes)
pkts bytes target prot opt in out source destination
404 46606 egress_quotas all -- * eth0.1 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0x8000
404 46606 combined_quotas all -- * eth0.1 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0x8000
Chain POSTROUTING (policy ACCEPT 92226 packets, 67M bytes)
pkts bytes target prot opt in out source destination
46532 31M bw_egress all -- * eth0.1 0.0.0.0/0 0.0.0.0/0
Chain bw_egress (1 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total1A-upload-2-449 --type combined --current_bandwidth 78675 --reset_interval 2 --reset_time 2 --intervals_to_save 449
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total1B-upload-minute-15 --type combined --current_bandwidth 1805545 --reset_interval minute --intervals_to_save 15
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id bdist1-upload-minute-15 --type individual_local --subnet 192.168.1.0/24 --reset_interval minute --intervals_to_save 15
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total2A-upload-minute-359 --type combined --current_bandwidth 1805545 --reset_interval minute --intervals_to_save 359
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total2B-upload-900-24 --type combined --current_bandwidth 14828293 --reset_interval 900 --reset_time 900 --intervals_to_save 24
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id bdist2-upload-900-24 --type individual_local --subnet 192.168.1.0/24 --reset_interval 900 --reset_time 900 --intervals_to_save 24
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total3A-upload-180-479 --type combined --current_bandwidth 5134524 --reset_interval 180 --reset_time 180 --intervals_to_save 479
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total3B-upload-hour-24 --type combined --current_bandwidth 14828293 --reset_interval hour --intervals_to_save 24
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id bdist3-upload-hour-24 --type individual_local --subnet 192.168.1.0/24 --reset_interval hour --intervals_to_save 24
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total4A-upload-7200-359 --type combined --current_bandwidth 14828293 --reset_interval 7200 --reset_time 7200 --intervals_to_save 359
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total4B-upload-day-31 --type combined --current_bandwidth 1154104936 --reset_interval day --intervals_to_save 31
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id bdist4-upload-day-31 --type individual_local --subnet 192.168.1.0/24 --reset_interval day --intervals_to_save 31
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total5A-upload-day-365 --type combined --current_bandwidth 1154105070 --reset_interval day --intervals_to_save 365
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id total5B-upload-month-12 --type combined --current_bandwidth 56689426547 --reset_interval month --intervals_to_save 12
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 bandwidth --id bdist5-upload-month-12 --type individual_local --subnet 192.168.1.0/24 --reset_interval month --intervals_to_save 12
Chain combined_quotas (3 references)
pkts bytes target prot opt in out source destination
91679 67M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0x8000
91679 67M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xff000000
0 0 CONNMARK all -- eth0.1 * 0.0.0.0/0 192.168.1.20 CONNMARK set 0xf000000/0xf000000
0 0 CONNMARK all -- * eth0.1 192.168.1.20 0.0.0.0/0 CONNMARK set 0xf000000/0xf000000
0 0 CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 CONNMARK set 0xf0000000/0xf0000000
0 0 CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 bandwidth --id 192.168.1.20_combined --type combined --greater_than 1073741824 --current_bandwidth 106712452 --reset_interval day CONNMARK set 0x8000/0x8000
91678 67M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xf000000
44638 35M CONNMARK all -- eth0.1 * 0.0.0.0/0 192.168.1.21 CONNMARK set 0xf000000/0xf000000
46085 31M CONNMARK all -- * eth0.1 192.168.1.21 0.0.0.0/0 CONNMARK set 0xf000000/0xf000000
90721 66M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000 CONNMARK set 0xf0000000/0xf0000000
91665 67M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xf000000
91658 67M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xf000000
91658 67M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xff000000
Chain egress_quotas (2 references)
pkts bytes target prot opt in out source destination
46524 31M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0x8000
46524 31M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xff000000
0 0 CONNMARK all -- * * 192.168.1.20 0.0.0.0/0 CONNMARK set 0xf0000000/0xf0000000
46086 31M CONNMARK all -- * * 192.168.1.21 0.0.0.0/0 CONNMARK set 0xf0000000/0xf0000000
46514 31M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xf000000
46514 31M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xff000000
Chain forward_quotas (1 references)
pkts bytes target prot opt in out source destination
46120 31M egress_quotas all -- * eth0.1 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0x8000
44675 35M ingress_quotas all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0x8000
44675 35M CONNMARK all -- eth0.1 * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0x8000 CONNMARK set 0xf000000/0xf000000
46120 31M CONNMARK all -- * eth0.1 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0x8000 CONNMARK set 0xf000000/0xf000000
90763 66M combined_quotas all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0xf000000/0xf000000
90763 66M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xf000000
Chain ingress_quotas (2 references)
pkts bytes target prot opt in out source destination
45187 35M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0x8000
45187 35M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xff000000
0 0 CONNMARK all -- * * 0.0.0.0/0 192.168.1.20 CONNMARK set 0xf0000000/0xf0000000
44640 35M CONNMARK all -- * * 0.0.0.0/0 192.168.1.21 CONNMARK set 0xf0000000/0xf0000000
0 0 CONNMARK all -- * * 0.0.0.0/0 192.168.1.21 bandwidth --id 192.168.1.21_ingress --type combined --greater_than 5905580032 --current_bandwidth 1917431685 --reset_interval day CONNMARK set 0x8000/0x8000
0 0 CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK match 0x0/0xf0000000 bandwidth --id ALL_OTHERS_COMBINED_ingress --type combined --greater_than 629145600 --current_bandwidth 8371767 --reset_interval day CONNMARK set 0x8000/0x8000
45177 35M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xf000000
45176 35M CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK set 0x0/0xff000000
root@Gargoyle:~#
Re: Can't access the internet.
Can I assume the data you posted was taken while you were having the issue? I cannot see any problems with this information. I use the WRT54G-TM myself and have never had such an issue.
You never mentioned how you get out of this situation. Knowing how this situation is resolved might give a clue.
Is it possible that this is an intermittent problem on your ISP's side of things?
I see you are using quota's which is something I do not use. While I have never seen a report of problems with quotas you might try disabling that as well.
Other things to try the next time it happens.
ping your wan gateway 128.208.47.100
ping your DNS server.
post a screenshot of your connection table and your status page. Did you WAN IP change?
The key to solving this is some detailed investigations while the problem is happening.
Thats all I can think of and good luck.
You never mentioned how you get out of this situation. Knowing how this situation is resolved might give a clue.
Is it possible that this is an intermittent problem on your ISP's side of things?
I see you are using quota's which is something I do not use. While I have never seen a report of problems with quotas you might try disabling that as well.
Other things to try the next time it happens.
ping your wan gateway 128.208.47.100
ping your DNS server.
post a screenshot of your connection table and your status page. Did you WAN IP change?
The key to solving this is some detailed investigations while the problem is happening.
Thats all I can think of and good luck.
Linksys WRT1900ACv2
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
-
- Posts: 7
- Joined: Fri Jul 09, 2010 7:08 pm
Re: Can't access the internet.
This data was taken immediately after the issue had cleared up.
Usually nothing I can do really speeds up fixing this issue I just have to wait it out. Although this time resetting the wireless adapter on my laptop would let me access the internet for a few seconds before it went out again. I would suspect my laptops adapter as well except this happens for several different devices , my laptop, a PS3, my girlfriends laptop ect.
At times when this happens sometimes I cannot reach the router at 192.168.1.1 at all. I've triend power cycling it and changing the firmware but that doesn't seem to have much of an effect.
I would suspect the ISP except I can disconnect the router and plug the Ethernet into my laptop and it works just fine.
Next time this happens I'll try what you suggest. How likely is it that this is the router hardware itself going out?
Thanks again for all the help.
Usually nothing I can do really speeds up fixing this issue I just have to wait it out. Although this time resetting the wireless adapter on my laptop would let me access the internet for a few seconds before it went out again. I would suspect my laptops adapter as well except this happens for several different devices , my laptop, a PS3, my girlfriends laptop ect.
At times when this happens sometimes I cannot reach the router at 192.168.1.1 at all. I've triend power cycling it and changing the firmware but that doesn't seem to have much of an effect.
I would suspect the ISP except I can disconnect the router and plug the Ethernet into my laptop and it works just fine.
Next time this happens I'll try what you suggest. How likely is it that this is the router hardware itself going out?
Thanks again for all the help.
Re: Can't access the internet.
Hmm,
Well screen shots and iptable dumps while the router is working are not very helpful. You need to get these while the router is not working.
It seems to me that it is very likely some kind of hardware issue. There are no know firmware issues like this.
Another interesting place to look would be the dmesg and logread outputs immediately after a reboot. That is of course while the router is not working. If the router starts working again then these are not helpful.
How can you update the firmware when you cannot access the router?
Might be the cable between the modem and the routers.
Or you can go buy a new router on Ebay for $50 and be done with it.
Well screen shots and iptable dumps while the router is working are not very helpful. You need to get these while the router is not working.
It seems to me that it is very likely some kind of hardware issue. There are no know firmware issues like this.
Another interesting place to look would be the dmesg and logread outputs immediately after a reboot. That is of course while the router is not working. If the router starts working again then these are not helpful.
How can you update the firmware when you cannot access the router?
Might be the cable between the modem and the routers.
Or you can go buy a new router on Ebay for $50 and be done with it.
Linksys WRT1900ACv2
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
-
- Posts: 7
- Joined: Fri Jul 09, 2010 7:08 pm
Re: Can't access the internet.
Dang I was hoping it wasn't hardware related oh well.
How do I get the dmesg and logread outputs?
I can't update the firmware unless the router is at least intermittently working.
Thought it might be the cable too so I switched cables a couple times with spares I had lying around.
I think I might try and get you the outputs when its not working one more time before I throw in the towel and get a new router.
How do I get the dmesg and logread outputs?
I can't update the firmware unless the router is at least intermittently working.
Thought it might be the cable too so I switched cables a couple times with spares I had lying around.
I think I might try and get you the outputs when its not working one more time before I throw in the towel and get a new router.
Re: Can't access the internet.
Just type "dmesg" and "logread" at the command prompt.
Pipe the results to a file. You can practice on your router while its working.
Pipe the results to a file. You can practice on your router while its working.
Linksys WRT1900ACv2
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM
Netgear WNDR3700v2
TP Link 1043ND v3
TP-Link TL-WDR3600 v1
Buffalo WZR-HP-G300NH2
WRT54G-TM