Page 4 of 6

Re: Gargoyle 1.15.x OpenWrt 24.10 - 2026-01-28

Posted: Thu Feb 19, 2026 6:17 am
by fifonik
Thanks.
I did not think I was crazy, but I was slightly frustrated as I know if dev unable to find/re-produce the issue -- it will never be fixed.
Now I have a hope.

Re: Gargoyle 1.15.x OpenWrt 24.10 - 2026-01-28

Posted: Thu Feb 19, 2026 11:46 am
by boldga
Lantis wrote:
Sat Feb 14, 2026 7:10 am
boldga wrote:
Thu Feb 12, 2026 4:34 am
If I recall correctly, guest Wi-Fi should not be able to connect to LAN hosts. However, after Flash the firmware in AX4200Q, when connected to guest Wi-Fi, it can connect to LAN hosts. Is this a bug?

Guest Network:
Enabled (2.4GHz Only)
Encryption:
WPA3/WPA2 SAE/PSK

Fast Roaming:
Disabled
Broadcast SSID:
Enabled
Wireless Client Isolation:
Enabled

wireguard enabled as server.
I have PM'd you a fix.
If I haven't heard back in a week I'll push it out anyway, but it would be great to get a verification, if you have the time and are able to assist.

Thank you
Thanks Lantis,
I'm currently on vacation and will test it next Monday.

Re: Gargoyle 1.15.x OpenWrt 24.10 - 2026-01-28

Posted: Sun Feb 22, 2026 11:52 pm
by boldga
Lantis wrote:
Sat Feb 14, 2026 7:10 am
boldga wrote:
Thu Feb 12, 2026 4:34 am
If I recall correctly, guest Wi-Fi should not be able to connect to LAN hosts. However, after Flash the firmware in AX4200Q, when connected to guest Wi-Fi, it can connect to LAN hosts. Is this a bug?

Guest Network:
Enabled (2.4GHz Only)
Encryption:
WPA3/WPA2 SAE/PSK

Fast Roaming:
Disabled
Broadcast SSID:
Enabled
Wireless Client Isolation:
Enabled

wireguard enabled as server.
I have PM'd you a fix.
If I haven't heard back in a week I'll push it out anyway, but it would be great to get a verification, if you have the time and are able to assist.

Thank you
I found it partially works, but there still seem to be some bugs with wireguard.
Since I use WireGuard to connect two routers (192.168.1.1 and 192.168.8.1), if I connect to the guest Wi-Fi of the 192.168.1.1 router, it isolates me from 192.168.1.0/24 but allows access to 192.168.8.0/24. Conversely, connecting to the guest Wi-Fi of the router at 192.168.8.1 isolates me from 192.168.8.0/24 but permits access to 192.168.1.0/24.

Re: Gargoyle 1.15.x OpenWrt 24.10 - 2026-01-28

Posted: Mon Feb 23, 2026 6:35 am
by Lantis
boldga wrote:
Sun Feb 22, 2026 11:52 pm
Lantis wrote:
Sat Feb 14, 2026 7:10 am
boldga wrote:
Thu Feb 12, 2026 4:34 am
If I recall correctly, guest Wi-Fi should not be able to connect to LAN hosts. However, after Flash the firmware in AX4200Q, when connected to guest Wi-Fi, it can connect to LAN hosts. Is this a bug?

Guest Network:
Enabled (2.4GHz Only)
Encryption:
WPA3/WPA2 SAE/PSK

Fast Roaming:
Disabled
Broadcast SSID:
Enabled
Wireless Client Isolation:
Enabled

wireguard enabled as server.
I have PM'd you a fix.
If I haven't heard back in a week I'll push it out anyway, but it would be great to get a verification, if you have the time and are able to assist.

Thank you
I found it partially works, but there still seem to be some bugs with wireguard.
Since I use WireGuard to connect two routers (192.168.1.1 and 192.168.8.1), if I connect to the guest Wi-Fi of the 192.168.1.1 router, it isolates me from 192.168.1.0/24 but allows access to 192.168.8.0/24. Conversely, connecting to the guest Wi-Fi of the router at 192.168.8.1 isolates me from 192.168.8.0/24 but permits access to 192.168.1.0/24.
Ah got it!
Have a look here: https://github.com/lantis1008/gargoyle/ ... #L716-L719
If you add in lines 716-719 to your file that should fix that as well.
I did think those might still be required but convinced myself otherwise. WireGuard (and OpenVPN) are the exceptions.

Re: Gargoyle 1.15.x OpenWrt 24.10 - 2026-01-28

Posted: Mon Feb 23, 2026 10:45 am
by boldga
Lantis wrote:
Mon Feb 23, 2026 6:35 am
boldga wrote:
Sun Feb 22, 2026 11:52 pm
Lantis wrote:
Sat Feb 14, 2026 7:10 am


I have PM'd you a fix.
If I haven't heard back in a week I'll push it out anyway, but it would be great to get a verification, if you have the time and are able to assist.

Thank you
I found it partially works, but there still seem to be some bugs with wireguard.
Since I use WireGuard to connect two routers (192.168.1.1 and 192.168.8.1), if I connect to the guest Wi-Fi of the 192.168.1.1 router, it isolates me from 192.168.1.0/24 but allows access to 192.168.8.0/24. Conversely, connecting to the guest Wi-Fi of the router at 192.168.8.1 isolates me from 192.168.8.0/24 but permits access to 192.168.1.0/24.
Ah got it!
Have a look here: https://github.com/lantis1008/gargoyle/ ... #L716-L719
If you add in lines 716-719 to your file that should fix that as well.
I did think those might still be required but convinced myself otherwise. WireGuard (and OpenVPN) are the exceptions.
Thanks Lantis!

Another question. I noticed that when I restarted the firewall in one of my routers, which I set some restrictions by MAC addresses, it displayed the following prompt:
/usr/lib/gargoyle/restart_firewall.sh
nft add rule inet fw4 egress_restrictions meta l4proto tcp ether saddr {some MAC addresses here} reject with tcp reset
nft add rule inet fw4 egress_restrictions ether saddr {some MAC addresses here} reject
Error: There is no such init script like 'miniupnpd'.
Is this an error?

Re: Gargoyle 1.15.x OpenWrt 24.10 - 2026-01-28

Posted: Thu Feb 26, 2026 8:14 am
by Lantis
boldga wrote:
Mon Feb 23, 2026 10:45 am
Lantis wrote:
Mon Feb 23, 2026 6:35 am
boldga wrote:
Sun Feb 22, 2026 11:52 pm

I found it partially works, but there still seem to be some bugs with wireguard.
Since I use WireGuard to connect two routers (192.168.1.1 and 192.168.8.1), if I connect to the guest Wi-Fi of the 192.168.1.1 router, it isolates me from 192.168.1.0/24 but allows access to 192.168.8.0/24. Conversely, connecting to the guest Wi-Fi of the router at 192.168.8.1 isolates me from 192.168.8.0/24 but permits access to 192.168.1.0/24.
Ah got it!
Have a look here: https://github.com/lantis1008/gargoyle/ ... #L716-L719
If you add in lines 716-719 to your file that should fix that as well.
I did think those might still be required but convinced myself otherwise. WireGuard (and OpenVPN) are the exceptions.
Thanks Lantis!

Another question. I noticed that when I restarted the firewall in one of my routers, which I set some restrictions by MAC addresses, it displayed the following prompt:
/usr/lib/gargoyle/restart_firewall.sh
nft add rule inet fw4 egress_restrictions meta l4proto tcp ether saddr {some MAC addresses here} reject with tcp reset
nft add rule inet fw4 egress_restrictions ether saddr {some MAC addresses here} reject
Error: There is no such init script like 'miniupnpd'.
Is this an error?
No not a problem unless you are using upnp.
The printing of the nft commands is just part of debugging and only happens when you invoke the script manually. You would normally not see them in logs etc.

Re: Gargoyle 1.15.x OpenWrt 24.10 - 2026-01-28

Posted: Thu Feb 26, 2026 8:17 am
by Lantis
Before I update all the release information etc, a soft release has been made available to tackle the pppoe bandwidth graph issue, pppoe uptime issue and guest isolation issue.

Feedback appreciated.

https://lantisproject.com/downloads/gar ... DIyNCJdXX0


I have a strong feeling that dual stack pppoe (IPv4 + IPv6) will not record any IPv6 traffic in the bandwidth graphs. I’m investigating, would appreciate anyone confirming as such.

Re: Gargoyle 1.15.x OpenWrt 24.10 - 2026-01-28

Posted: Wed Mar 18, 2026 4:17 am
by angus
Lantis wrote:
Thu Feb 26, 2026 8:17 am
Feedback appreciated.

https://lantisproject.com/downloads/gar ... DIyNCJdXX0
Hi Lantis,
This version will make WAN/LAN IPv6 addresses disappear when using PPPoE connectivity. IPv6 addresses in fact are configured after rebooting my device. But they are gone a few days later. I didn't observe this from a previous version e.g. 1.15.x_20260128. Can you please take a look? Thanks.

Re: Gargoyle 1.15.x OpenWrt 24.10 - 2026-01-28

Posted: Wed Mar 18, 2026 8:15 am
by Lantis
What do you mean by that sorry I'm not following. Disappear from where?
The only change this should have (positively impacted) is the bandwidth monitor showing data on PPPoE connections now.

Re: Gargoyle 1.15.x OpenWrt 24.10 - 2026-01-28

Posted: Wed Mar 18, 2026 10:33 am
by angus
Lantis wrote:
Wed Mar 18, 2026 8:15 am
What do you mean by that sorry I'm not following. Disappear from where?
They disappear from WebUI -> Status -> Overview -> WAN IP Address and LAN IP Address. In my case, I should have an SLAAC for pppoe-wan as well as a delegated IPv6 address for br-lan. They won't exist a few days later. At that time, I also can't see an IPv6 default route by using "ip -6 ro" command. I will double check for this with an old firmware.