just filter on LAN1 please, and ping from the laptop on that network.If it is not appearing on the live log, the packet is not hitting the firewall. That simple.
Then is not getting to OPN.Worth remembering what is meant to happen:Devices on the same netwkork i.e. on LAN1 will NOT go _through_ OPN. So all devices on that switch will only go through the switch, port to port. Unless you are enabling some routing funtions on that switch. If it is unmanaged, then is a moot point.Devices on different networks i.e. on different interfaces of OPN will go from one to the other _through_ OPN. So a packet from say client A on LAN1 192.168.101.116 to LAN3 on 192.168.103.101 will go _through_ OPN and once all is logged in OPN, will appear there.If it doesn't, then is not hitting OPN. At that point you must go back to checking physical connections, interface setup on OPN and your switches.Start breaking up the problem with this overview and go in a systematic manner.Another suggestion: skip pings for a moment and try other type of connections. iperf, maybe a webserver, etc. Easy with a laptop on each end.
sophie@T440p:~$ iperf -d 192.168.103.101WARNING: option -d is not valid for server modeiperf: ignoring extra argument -- 192.168.103.101Usage: iperf [-s|-c host] [options]Try `iperf --help' for more information.sophie@T440p:~$ iperf -c 192.168.103.101 -d------------------------------------------------------------Server listening on TCP port 5001TCP window size: 128 KByte (default)------------------------------------------------------------------------------------------------------------------------Client connecting to 192.168.103.101, TCP port 5001TCP window size: 16.0 KByte (default)------------------------------------------------------------ERROR: expected reverse connect did not occurtcp connect failed: Connection timed out[ 1] local 0.0.0.0 port 0 connected with 192.168.103.101 port 5001sophie@T440p:~$
quick check before reading your last post properly. Is the problem to reach only one device on the other network or any and all (that you can tell of course) ?
sophie@T440p:~$ traceroute 192.168.103.118traceroute to 192.168.103.118 (192.168.103.118), 30 hops max, 60 byte packets 1 * * * 2 * * * 3 * * * 4 * * * 5 * * * 6 * * * 7 * * * 8 * * * 9 * * *10 * * *
C:\Users\xxxx>tracert 192.168.103.118tracing route to NAS653D [192.168.103.118]over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms 192.168.102.101 2 <1 ms <1 ms <1 ms NAS653D [192.168.103.118] Trace complete.
So far, apparently, only 1 Windows computer can reach out to other LANsLaptop2 (LAN2) can ping NAS2 (LAN3) and browse to its GUI, can ping any LANs interface (.101.101; .102.101; .103.101)Laptop2 can reach LAN2 interface, and it can reach WiFI AP GUI
Traceroute from Laptop1 to NAS2:Code: [Select]sophie@T440p:~$ traceroute 192.168.103.118traceroute to 192.168.103.118 (192.168.103.118), 30 hops max, 60 byte packets 1 * * * 2 * * * 3 * * * 4 * * * 5 * * * 6 * * * 7 * * * 8 * * * 9 * * *10 * * *Tracert from Laptop2 to NAS2Code: [Select]C:\Users\xxxx>tracert 192.168.103.118tracing route to NAS653D [192.168.103.118]over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms 192.168.102.101 2 <1 ms <1 ms <1 ms NAS653D [192.168.103.118] Trace complete.
Right then. First recap.QuoteSo far, apparently, only 1 Windows computer can reach out to other LANsLaptop2 (LAN2) can ping NAS2 (LAN3) and browse to its GUI, can ping any LANs interface (.101.101; .102.101; .103.101)Laptop2 can reach LAN2 interface, and it can reach WiFI AP GUISo that tells us your LAN2 has a firewall rule that allows to reach LAN1. One network good.So we're back to LAN1, right ? LAN3 will be next.So we need to view the firewall rules on this one. Compare to the known good. Share it here as before (lost track if is the one you shared already). And share your interface setup. Could it be set as not /24 I wonder.
For the purpose of diagnosing the network, leave IoT, mobiles phones, smart toasters, etc. out of the picture. If you have a device with a console like a laptop that you seem to have, just stick with them. Keep it simple.Once problem solved, then you can start looking at those in the knowledge your firewall and rules are not in the way.
p.s. And on your iperf test. a) you did set the server in listening mode (-s), right? ;b) the error suggests there was no return so could be the missing rule on that interface to get the packets back to sender.In fact, time to do it in pairs.
sophie@T440p:$ iperf -s 192.168.103.101 -dWARNING: option -d is not valid for server modeiperf: ignoring extra argument -- 192.168.103.101------------------------------------------------------------Server listening on TCP port 5001TCP window size: 128 KByte (default)------------------------------------------------------------
Second one is nice and healthy. Shows hitting the OPN LAN3 interface before going out to the device on LAN2 interface.The first one is not healthy obviously but is not reaching the interface. You need to check the interface second. First, the network stack of that laptop. Suggest you disable and re-enable to recreate the routes when it gets a fresh dhcp lease. If set manually, verify those and the gateway you have set. I thought I had mentioned that before.
> I'm not sure I understand correctly ? Are you suggesting that automatic rules could be different from one LAN to the other ? They are logically identical but you might need to go and change the interface.So say you have a rule on LAN1 interface. Then you clone it to use it on LAN2. You should then verify that the new rule has LAN2 as its interface that it applies to. The cloning won't know what you intended to use it for.
Please post them here instead of assuming.