找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 2833|回复: 20

[openwrt(x86)] LXC OpenWRT直通网卡无法拨号?

[复制链接]
发表于 2023-4-23 11:39 | 显示全部楼层 |阅读模式
今天一直在折腾LXC,环境为PVE7.4-3,自己编译了iStoreOS rootfs,虚拟机直通运行没问题,一放到LXC上运行,PPPoE拨号就不成功,有大神知道是什么原因吗?


创建CT,不用虚拟网卡
  1. pct create 100 local:vztmpl/istoreos-x86-64-generic-rootfs.tar.gz --rootfs local:2 --ostype unmanaged --hostname iStoreOS --arch amd64 --cores 4 --memory 1024 --swap 0
复制代码
编辑配置文件 vim /etc/pve/lxc/100.conf  添加以下参数,enp2s0为直通网卡,作为WAN口,enp3s0为直通网卡,作为LAN口。
  1. lxc.include: /usr/share/lxc/config/openwrt.common.conf
  2. lxc.cgroup.devices.allow: c 108:0 rwm
  3. hookscript: local:snippets/hookscript.pl
  4. lxc.net.0.type: phys
  5. lxc.net.0.link: enp2s0
  6. lxc.net.0.flags: up
  7. lxc.net.1.type: phys
  8. lxc.net.1.link: enp3s0
  9. lxc.net.1.flags: up
复制代码

创建拨号的文件链接,添加参数
  1. mkdir /var/lib/vz/snippets
  2. cp /usr/share/pve-docs/examples/guest-example-hookscript.pl /var/lib/vz/snippets/hookscript.pl
  3. vim /var/lib/vz/snippets/hookscript.pl
复制代码

不知道还有哪一步没做吗?求大神指教。


防火墙在PVE和数据中心那都设置了这样。








本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

×
发表于 2023-4-23 16:07 | 显示全部楼层
日志发出来看看

点评

现在我加了几个参数,拨号拨上了,但是上网上不了,Openwrt本身可以上网,但是下面连接的客户端都没办法上网,这是什么情况呢?求指教  详情 回复 发表于 2023-4-24 22:13
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-4-24 22:12 | 显示全部楼层
  1. Mon Apr 24 22:04:56 2023 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
  2. Mon Apr 24 22:04:56 2023 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
  3. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: Connected to system UBus
  4. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: started, version 2.85 cachesize 150
  5. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: DNS service limited to local subnets
  6. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
  7. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: UBus support enabled: connected to system bus
  8. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: using only locally-known addresses for domain test
  9. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: using only locally-known addresses for domain onion
  10. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: using only locally-known addresses for domain localhost
  11. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: using only locally-known addresses for domain local
  12. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: using only locally-known addresses for domain invalid
  13. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: using only locally-known addresses for domain bind
  14. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: using only locally-known addresses for domain lan
  15. Mon Apr 24 22:04:56 2023 daemon.warn dnsmasq[629]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
  16. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: read /etc/hosts - 4 addresses
  17. Mon Apr 24 22:04:56 2023 daemon.info dnsmasq[629]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
  18. Mon Apr 24 22:04:56 2023 authpriv.info dropbear[691]: Not backgrounding
  19. Mon Apr 24 22:04:56 2023 daemon.notice wpa_supplicant[839]: Successfully initialized wpa_supplicant
  20. Mon Apr 24 22:04:56 2023 user.notice : Added device handler type: bonding
  21. Mon Apr 24 22:04:56 2023 user.notice : Added device handler type: 8021ad
  22. Mon Apr 24 22:04:56 2023 user.notice : Added device handler type: 8021q
  23. Mon Apr 24 22:04:56 2023 user.notice : Added device handler type: macvlan
  24. Mon Apr 24 22:04:56 2023 user.notice : Added device handler type: veth
  25. Mon Apr 24 22:04:56 2023 user.notice : Added device handler type: bridge
  26. Mon Apr 24 22:04:56 2023 user.notice : Added device handler type: Network device
  27. Mon Apr 24 22:04:56 2023 user.notice : Added device handler type: tunnel
  28. Mon Apr 24 22:04:56 2023 user.notice wan_drop: current proto pppoe
  29. Mon Apr 24 22:04:57 2023 cron.err crond[1226]: crond (busybox 1.33.2) started, log level 5
  30. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Found user 'nobody' (UID 65534) and group 'nogroup' (GID 65534).
  31. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Successfully dropped root privileges.
  32. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: avahi-daemon 0.8 starting up.
  33. Mon Apr 24 22:04:57 2023 daemon.warn avahi-daemon[1367]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
  34. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: No service file found in /etc/avahi/services.
  35. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Network interface enumeration completed.
  36. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Registering HINFO record with values 'X86_64'/'LINUX'.
  37. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Server startup complete. Host name is iStoreOS.local. Local service cookie is 3043175712.
  38. Mon Apr 24 22:04:57 2023 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/network
  39. Mon Apr 24 22:04:57 2023 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/wireless
  40. Mon Apr 24 22:04:57 2023 user.notice ucitrack: Setting up /etc/config/luci-splash reload dependency on /etc/config/firewall
  41. Mon Apr 24 22:04:57 2023 user.notice ucitrack: Setting up /etc/config/qos reload dependency on /etc/config/firewall
  42. Mon Apr 24 22:04:57 2023 user.notice ucitrack: Setting up /etc/config/miniupnpd reload dependency on /etc/config/firewall
  43. Mon Apr 24 22:04:57 2023 user.notice ucitrack: Setting up /etc/config/odhcpd reload dependency on /etc/config/dhcp
  44. Mon Apr 24 22:04:57 2023 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
  45. Mon Apr 24 22:04:57 2023 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
  46. Mon Apr 24 22:04:57 2023 user.notice ucitrack: Setting up /etc/config/luci_statistics reload dependency on /etc/config/system
  47. Mon Apr 24 22:04:57 2023 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/system
  48. Mon Apr 24 22:04:57 2023 daemon.notice netifd: Interface 'lan' is enabled
  49. Mon Apr 24 22:04:57 2023 daemon.notice netifd: Interface 'lan' is setting up now
  50. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Joining mDNS multicast group on interface enp3s0.IPv4 with address 192.168.88.1.
  51. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: New relevant interface enp3s0.IPv4 for mDNS.
  52. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Registering new address record for 192.168.88.1 on enp3s0.IPv4.
  53. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Joining mDNS multicast group on interface enp3s0.IPv6 with address fdb2:9d16:23f7::1.
  54. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: New relevant interface enp3s0.IPv6 for mDNS.
  55. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Registering new address record for fdb2:9d16:23f7::1 on enp3s0.*.
  56. Mon Apr 24 22:04:57 2023 daemon.notice netifd: Interface 'lan' is now up
  57. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.0.1.
  58. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: New relevant interface lo.IPv4 for mDNS.
  59. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Registering new address record for 127.0.0.1 on lo.IPv4.
  60. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Joining mDNS multicast group on interface lo.IPv6 with address ::1.
  61. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: New relevant interface lo.IPv6 for mDNS.
  62. Mon Apr 24 22:04:57 2023 daemon.info avahi-daemon[1367]: Registering new address record for ::1 on lo.*.
  63. Mon Apr 24 22:04:57 2023 daemon.notice netifd: Interface 'loopback' is enabled
  64. Mon Apr 24 22:04:57 2023 daemon.notice netifd: Interface 'loopback' is setting up now
  65. Mon Apr 24 22:04:57 2023 daemon.notice netifd: Interface 'loopback' is now up
  66. Mon Apr 24 22:04:57 2023 daemon.info smartd[1790]: smartd 7.2 2020-12-30 r5155 [x86_64-linux-6.2.6-1-pve] (localbuild)
  67. Mon Apr 24 22:04:57 2023 daemon.info smartd[1790]: Copyright (C) 2002-20, Bruce Allen, Christian Franke, www.smartmontools.org
  68. Mon Apr 24 22:04:57 2023 daemon.info smartd[1790]: Opened configuration file /etc/smartd.conf
  69. Mon Apr 24 22:04:57 2023 daemon.info smartd[1790]: Configuration file /etc/smartd.conf parsed.
  70. Mon Apr 24 22:04:57 2023 daemon.info smartd[1790]: Device: /dev/hdb, open() failed: No such device
  71. Mon Apr 24 22:04:57 2023 daemon.info smartd[1790]: Device: /dev/hdb, not available
  72. Mon Apr 24 22:04:57 2023 daemon.info smartd[1790]: Monitoring 0 ATA/SATA, 0 SCSI/SAS and 0 NVMe devices
  73. Mon Apr 24 22:04:57 2023 daemon.notice netifd: Interface 'wan' is enabled
  74. Mon Apr 24 22:04:57 2023 daemon.notice netifd: Network device 'lo' link is up
  75. Mon Apr 24 22:04:57 2023 daemon.notice netifd: Interface 'loopback' has link connectivity
  76. Mon Apr 24 22:04:57 2023 user.notice firewall: Reloading firewall due to ifup of lan (enp3s0)
  77. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd: mount: /proc/fs/nfsd: permission denied.
  78. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd: sysctl: error setting key 'fs.nfs.nlm_tcpport': Read-only file system
  79. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd: sysctl: error setting key 'fs.nfs.nlm_udpport': Read-only file system
  80. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd: point 1
  81. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd: exportfs: /etc/exports [1]: Neither 'subtree_check' or 'no_subtree_check' specified for export "*:/mnt".
  82. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd:   Assuming default behaviour ('no_subtree_check').
  83. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd:   NOTE: this default has changed since nfs-utils version 1.0.x
  84. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd:
  85. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd: point 2
  86. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd: point 3
  87. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd: rpc.nfsd: Unable to access /proc/fs/nfsd errno 2 (No such file or directory).
  88. Mon Apr 24 22:04:57 2023 daemon.notice procd: /etc/rc.d/S99nfsd: Please try, as root, 'mount -t nfsd nfsd /proc/fs/nfsd' and then restart rpc.nfsd to correct the problem
  89. Mon Apr 24 22:04:57 2023 daemon.err rpc.nfsd[2052]: error starting threads: errno 2 (No such file or directory)
  90. Mon Apr 24 22:04:57 2023 daemon.notice rpc.statd[2065]: Version 2.5.2 starting
  91. Mon Apr 24 22:04:57 2023 daemon.warn rpc.statd[2065]: Flags: No-Daemon TI-RPC
  92. Mon Apr 24 22:04:57 2023 daemon.notice rpc.mountd[2066]: Version 2.5.2 starting
  93. Mon Apr 24 22:04:57 2023 daemon.warn rpc.statd[2065]: Running as root.  chown /var/lib/nfs to choose different user
  94. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[629]: exiting on receipt of SIGTERM
  95. Mon Apr 24 22:04:58 2023 daemon.err odhcpd[1028]: Failed to send to ff02::1%lan@enp3s0 (Address not available)
  96. Mon Apr 24 22:04:58 2023 daemon.err procd: Got unexpected signal 1
  97. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: Connected to system UBus
  98. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: started, version 2.85 cachesize 150
  99. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: DNS service limited to local subnets
  100. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
  101. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: UBus support enabled: connected to system bus
  102. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq-dhcp[2326]: DHCP, IP range 192.168.88.100 -- 192.168.88.249, lease time 12h
  103. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain test
  104. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain onion
  105. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain localhost
  106. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain local
  107. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain invalid
  108. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain bind
  109. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain lan
  110. Mon Apr 24 22:04:58 2023 daemon.warn dnsmasq[2326]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
  111. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: read /etc/hosts - 4 addresses
  112. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq[2326]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
  113. Mon Apr 24 22:04:58 2023 daemon.info dnsmasq-dhcp[2326]: read /etc/ethers - 0 addresses
  114. Mon Apr 24 22:05:01 2023 daemon.notice netifd: Network device 'enp3s0' link is up
  115. Mon Apr 24 22:05:01 2023 daemon.notice netifd: Interface 'lan' has link connectivity
  116. Mon Apr 24 22:05:02 2023 daemon.err odhcpd[1028]: Failed to send to ff02::1%lan@enp3s0 (Address not available)
  117. Mon Apr 24 22:05:02 2023 daemon.info dnsmasq[2326]: read /etc/hosts - 4 addresses
  118. Mon Apr 24 22:05:02 2023 daemon.info dnsmasq[2326]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
  119. Mon Apr 24 22:05:02 2023 daemon.info dnsmasq-dhcp[2326]: read /etc/ethers - 0 addresses
  120. Mon Apr 24 22:05:02 2023 daemon.err wsdd2: samba36/4 or ksmbd is not running, can't start wsdd2!
  121. Mon Apr 24 22:05:02 2023 daemon.notice procd: /etc/rc.d/S99zprintk: /etc/rc.common: line 8: can't create /proc/sys/kernel/printk: Read-only file system
  122. Mon Apr 24 22:05:03 2023 daemon.info procd: - init complete -
  123. Mon Apr 24 22:05:03 2023 daemon.notice netifd: Network device 'enp2s0' link is up
  124. Mon Apr 24 22:05:03 2023 daemon.notice netifd: Interface 'wan' has link connectivity
  125. Mon Apr 24 22:05:03 2023 daemon.notice netifd: Interface 'wan' is setting up now
  126. Mon Apr 24 22:05:03 2023 daemon.err insmod: no module folders for kernel version 6.2.6-1-pve found
  127. Mon Apr 24 22:05:03 2023 daemon.err insmod: no module folders for kernel version 6.2.6-1-pve found
  128. Mon Apr 24 22:05:03 2023 daemon.err insmod: no module folders for kernel version 6.2.6-1-pve found
  129. Mon Apr 24 22:05:03 2023 daemon.err insmod: no module folders for kernel version 6.2.6-1-pve found
  130. Mon Apr 24 22:05:03 2023 daemon.notice netifd: wan (2586): uci: Entry not found
  131. Mon Apr 24 22:05:03 2023 daemon.info pppd[2596]: Plugin pppoe.so loaded.
  132. Mon Apr 24 22:05:03 2023 daemon.info pppd[2596]: PPPoE plugin from pppd 2.4.9
  133. Mon Apr 24 22:05:03 2023 daemon.notice pppd[2596]: pppd 2.4.9 started by root, uid 0
  134. Mon Apr 24 22:05:04 2023 daemon.info dnsmasq-dhcp[2326]: DHCPDISCOVER(enp3s0) 192.168.88.160 3c:cd:57:f3:87:0c
  135. Mon Apr 24 22:05:04 2023 daemon.info dnsmasq-dhcp[2326]: DHCPOFFER(enp3s0) 192.168.88.160 3c:cd:57:f3:87:0c
  136. Mon Apr 24 22:05:04 2023 daemon.info dnsmasq-dhcp[2326]: DHCPREQUEST(enp3s0) 192.168.88.160 3c:cd:57:f3:87:0c
  137. Mon Apr 24 22:05:04 2023 daemon.info dnsmasq-dhcp[2326]: DHCPACK(enp3s0) 192.168.88.160 3c:cd:57:f3:87:0c MiWiFi-RA72
  138. Mon Apr 24 22:05:05 2023 daemon.info avahi-daemon[1367]: Joining mDNS multicast group on interface enp2s0.IPv6 with address fe80::2d0:4cff:fe10:60c.
  139. Mon Apr 24 22:05:05 2023 daemon.info avahi-daemon[1367]: New relevant interface enp2s0.IPv6 for mDNS.
  140. Mon Apr 24 22:05:05 2023 daemon.info avahi-daemon[1367]: Registering new address record for fe80::2d0:4cff:fe10:60c on enp2s0.*.
  141. Mon Apr 24 22:05:08 2023 daemon.info pppd[2596]: PPP session is 61422
  142. Mon Apr 24 22:05:08 2023 daemon.warn pppd[2596]: Connected to c0:f6:c2:32:0f:c4 via interface enp2s0
  143. Mon Apr 24 22:05:08 2023 daemon.info pppd[2596]: Renamed interface ppp0 to pppoe-wan
  144. Mon Apr 24 22:05:08 2023 daemon.info pppd[2596]: Using interface pppoe-wan
  145. Mon Apr 24 22:05:08 2023 daemon.notice pppd[2596]: Connect: pppoe-wan <--> enp2s0
  146. Mon Apr 24 22:05:08 2023 daemon.info pppd[2596]: syncppp not active
  147. Mon Apr 24 22:05:08 2023 daemon.info pppd[2596]: Remote message: Authentication success,Welcome!
  148. Mon Apr 24 22:05:08 2023 daemon.notice pppd[2596]: PAP authentication succeeded
  149. Mon Apr 24 22:05:08 2023 daemon.notice pppd[2596]: peer from calling number C0:F6:C2:32:0F:C4 authorized
  150. Mon Apr 24 22:05:08 2023 daemon.notice pppd[2596]: local  IP address 219.159.153.50
  151. Mon Apr 24 22:05:08 2023 daemon.info avahi-daemon[1367]: Joining mDNS multicast group on interface pppoe-wan.IPv4 with address 219.159.153.50.
  152. Mon Apr 24 22:05:08 2023 daemon.notice pppd[2596]: remote IP address 219.159.153.1
  153. Mon Apr 24 22:05:08 2023 daemon.notice pppd[2596]: primary   DNS address 202.103.225.68
  154. Mon Apr 24 22:05:08 2023 daemon.notice pppd[2596]: secondary DNS address 202.103.224.68
  155. Mon Apr 24 22:05:08 2023 daemon.info avahi-daemon[1367]: New relevant interface pppoe-wan.IPv4 for mDNS.
  156. Mon Apr 24 22:05:08 2023 daemon.info avahi-daemon[1367]: Registering new address record for 219.159.153.50 on pppoe-wan.IPv4.
  157. Mon Apr 24 22:05:08 2023 daemon.notice netifd: Network device 'pppoe-wan' link is up
  158. Mon Apr 24 22:05:08 2023 daemon.notice netifd: Interface 'wan' is now up
  159. Mon Apr 24 22:05:08 2023 daemon.info dnsmasq[2326]: reading /tmp/resolv.conf.d/resolv.conf.auto
  160. Mon Apr 24 22:05:08 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain test
  161. Mon Apr 24 22:05:08 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain onion
  162. Mon Apr 24 22:05:08 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain localhost
  163. Mon Apr 24 22:05:08 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain local
  164. Mon Apr 24 22:05:08 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain invalid
  165. Mon Apr 24 22:05:08 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain bind
  166. Mon Apr 24 22:05:08 2023 daemon.info dnsmasq[2326]: using only locally-known addresses for domain lan
  167. Mon Apr 24 22:05:08 2023 daemon.info dnsmasq[2326]: using nameserver 202.103.225.68#53
  168. Mon Apr 24 22:05:08 2023 daemon.info dnsmasq[2326]: using nameserver 202.103.224.68#53
  169. Mon Apr 24 22:05:08 2023 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
  170. Mon Apr 24 22:05:08 2023 user.notice miniupnpd: restart miniupnpd due to pppoe-wan up
复制代码
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-4-24 22:13 | 显示全部楼层
本帖最后由 119744220 于 2023-4-24 22:30 编辑

现在我加了几个参数,拨号拨上了,但是上网上不了,Openwrt本身可以上网,但是下面连接的客户端都没办法上网,应该不是DNS的问题,因为我ping 223.5.5.5 也不通,这是什么情况呢?求指教,

点评

lxc op可以上网客户端不行的试试这个99_firewall_lxc_workaround脚本 https://github.com/fw867/pve-edge-kernel  详情 回复 发表于 2023-4-26 11:06
回复 支持 反对

使用道具 举报

发表于 2023-4-26 11:06 | 显示全部楼层
119744220 发表于 2023-4-24 22:13
现在我加了几个参数,拨号拨上了,但是上网上不了,Openwrt本身可以上网,但是下面连接的客户端都没办法 ...

lxc op可以上网客户端不行的试试这个99_firewall_lxc_workaround脚本
https://github.com/fw867/pve-edge-kernel

点评

这是直接更换PVE内核的节奏吗?  详情 回复 发表于 2023-4-26 19:54
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-4-26 19:54 | 显示全部楼层
smdx 发表于 2023-4-26 11:06
lxc op可以上网客户端不行的试试这个99_firewall_lxc_workaround脚本
https://github.com/fw867/pve-edg ...

这是直接更换PVE内核的节奏吗?

点评

内核换不换随你,不过用lxc运行op换打好补丁的内核方便些。你下载那个99_firewall_lxc_workaround脚本复制到op指定目录应该就能解决Openwrt本身可以上网,但是下面连接的客户端都没办法上网这个问题了。  详情 回复 发表于 2023-4-27 12:07
回复 支持 反对

使用道具 举报

发表于 2023-4-27 12:07 | 显示全部楼层
119744220 发表于 2023-4-26 19:54
这是直接更换PVE内核的节奏吗?

内核换不换随你,不过用lxc运行op换打好补丁的内核方便些。你下载那个99_firewall_lxc_workaround脚本复制到op指定目录应该就能解决Openwrt本身可以上网,但是下面连接的客户端都没办法上网这个问题了。

点评

大佬这个脚本添加后,下面的设备依然无法联网!  详情 回复 发表于 2023-8-5 20:02
感谢你。  详情 回复 发表于 2023-4-27 20:10
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-4-27 20:10 | 显示全部楼层
smdx 发表于 2023-4-27 12:07
内核换不换随你,不过用lxc运行op换打好补丁的内核方便些。你下载那个99_firewall_lxc_workaround脚本复 ...

感谢你。

点评

老哥我安装内核的时候错误,请问下是什么原因?  详情 回复 发表于 2023-4-30 08:02
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-4-30 08:02 | 显示全部楼层

老哥我安装内核的时候错误,请问下是什么原因?
  1. root@PVE:~/Kernel# dpkg -i *.deb
  2. dpkg-deb: error: archive 'linux-tools-6.0_6.0.19-1_amd64.deb' uses unknown compression for member 'control.tar.zst', giving up
  3. dpkg: error processing archive linux-tools-6.0_6.0.19-1_amd64.deb (--install):
  4. dpkg-deb --control subprocess returned error exit status 2
  5. dpkg-deb: error: archive 'pve-headers-6.0.19-pve_6.0.19-1_amd64.deb' uses unknown compression for member 'control.tar.zst', giving up
  6. dpkg: error processing archive pve-headers-6.0.19-pve_6.0.19-1_amd64.deb (--install):
  7. dpkg-deb --control subprocess returned error exit status 2
  8. dpkg-deb: error: archive 'pve-headers-6.0-pve_6.0.19-1_all.deb' uses unknown compression for member 'control.tar.zst', giving up
  9. dpkg: error processing archive pve-headers-6.0-pve_6.0.19-1_all.deb (--install):
  10. dpkg-deb --control subprocess returned error exit status 2
  11. dpkg-deb: error: archive 'pve-kernel-6.0.19-pve_6.0.19-1_amd64.deb' uses unknown compression for member 'control.tar.zst', givingup
  12. dpkg: error processing archive pve-kernel-6.0.19-pve_6.0.19-1_amd64.deb (--install):
  13. dpkg-deb --control subprocess returned error exit status 2
  14. dpkg-deb: error: archive 'pve-kernel-6.0-pve_6.0.19-1_all.deb' uses unknown compression for member 'control.tar.zst', giving up
  15. dpkg: error processing archive pve-kernel-6.0-pve_6.0.19-1_all.deb (--install):
  16. dpkg-deb --control subprocess returned error exit status 2
  17. dpkg-deb: error: archive 'pve-kernel-libc-dev_6.0.19-1_amd64.deb' uses unknown compression for member 'control.tar.zst', giving up
  18. dpkg: error processing archive pve-kernel-libc-dev_6.0.19-1_amd64.deb (--install):
  19. dpkg-deb --control subprocess returned error exit status 2
  20. Errors were encountered while processing:
  21. linux-tools-6.0_6.0.19-1_amd64.deb
  22. pve-headers-6.0.19-pve_6.0.19-1_amd64.deb
  23. pve-headers-6.0-pve_6.0.19-1_all.deb
  24. pve-kernel-6.0.19-pve_6.0.19-1_amd64.deb
  25. pve-kernel-6.0-pve_6.0.19-1_all.deb
  26. pve-kernel-libc-dev_6.0.19-1_amd64.deb
复制代码

点评

下载6.0.9的版本, 最新的版本debian DPKG 不支持, 我查了好久才查到  详情 回复 发表于 2023-5-5 18:06
回复 支持 反对

使用道具 举报

发表于 2023-5-5 18:06 | 显示全部楼层
119744220 发表于 2023-4-30 08:02
老哥我安装内核的时候错误,请问下是什么原因?

下载6.0.9的版本, 最新的版本debian  DPKG 不支持, 我查了好久才查到

点评

你说的6.0.9是pve版本吗?  详情 回复 发表于 2023-8-2 14:58
PVE切换内核到6.0.9,然后再安装吗?  详情 回复 发表于 2023-5-27 14:04
回复 支持 反对

使用道具 举报

 楼主| 发表于 2023-5-27 14:04 | 显示全部楼层
hzhz020261 发表于 2023-5-5 18:06
下载6.0.9的版本, 最新的版本debian  DPKG 不支持, 我查了好久才查到

PVE切换内核到6.0.9,然后再安装吗?
回复 支持 反对

使用道具 举报

发表于 2023-8-2 14:58 | 显示全部楼层
hzhz020261 发表于 2023-5-5 18:06
下载6.0.9的版本, 最新的版本debian  DPKG 不支持, 我查了好久才查到

你说的6.0.9是pve版本吗?
回复 支持 反对

使用道具 举报

发表于 2023-8-5 20:02 | 显示全部楼层
smdx 发表于 2023-4-27 12:07
内核换不换随你,不过用lxc运行op换打好补丁的内核方便些。你下载那个99_firewall_lxc_workaround脚本复 ...

大佬这个脚本添加后,下面的设备依然无法联网!

点评

你先试一下在路由系统里面的 状态-防火墙 点一下重启防火墙看能不能正常上网  详情 回复 发表于 2023-8-5 21:29
回复 支持 反对

使用道具 举报

发表于 2023-8-5 21:29 | 显示全部楼层
liuhaicun 发表于 2023-8-5 20:02
大佬这个脚本添加后,下面的设备依然无法联网!

你先试一下在路由系统里面的 状态-防火墙 点一下重启防火墙看能不能正常上网

点评

一开始能,出去尿个尿的时间回来就断网了!  详情 回复 发表于 2023-8-6 10:48
回复 支持 反对

使用道具 举报

发表于 2023-8-6 10:48 | 显示全部楼层
smdx 发表于 2023-8-5 21:29
你先试一下在路由系统里面的 状态-防火墙 点一下重启防火墙看能不能正常上网 ...

一开始能,出去尿个尿的时间回来就断网了!

点评

你lxc的conf内容粘贴上来看看  详情 回复 发表于 2023-8-6 12:21
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-6-6 19:25

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com 举报电话:0519-86695797

快速回复 返回顶部 返回列表