GL-AR750S and Huawei 3372

Hi
My new 750s just arrived today, seems to work fine except for accessing the web-ui of the 3372.
I changed the lan ip on the router to 10.68.0.1 and huawei shows up as a tethered device.
However I cannot access huaweis web interface on 192.168.8.1. I want to see signal strength and be able to change APN.

How do I access this information?
Is there a way to get the modem to show up under 4G modems instead of tethered?

Thanks

Oops! Some Huawei modems will be identified as Tethering, but it doesn’t affect use. You can click on Connect button.

I think the Huawei modem only works as tethering, i.e. hostless

So you mean after you change IP address, network works but cannot access 192.168.8.1 which is E3372’s IP, right?

Can you try change the IP to 192.168.9.1 rather than 10.68.0.1? Just a try.

No luck on 9.1.

Below is the teathering info:
IP Address 192.168.8.100 Netmask 255.255.255.0 Gateway 192.168.8.1 DNS Server 192.168.8.1
192.168.8.1

But the ui does not respond on 192.168.8.1

Once I updated to latest testing firmware and dont enable wireguard I can access the modems web interface from my computers web browser.

If I enable wireguard the ui is inaccessible from wifi but the modem is acceessible from the router itself (logged in via ssh)

As a workaround I installed privoxy proxy, then I can access web ui from my computer browser via the proxy.

Is there any better way to accomplish this? some forward rule in the firewall maybe?

thanks

If you enable wireguard then all data is forwarded to wireguard. You can add a static route or iptables rules if you don’t want certain website goes throught wireguard.

@kyson-lok is expert.

Thanks, maybe some kind person can give me a hint on how to accomplish this.

I’ve been using Linux for some time but this is my first OpenWRT router and I’m no networking expert…

I have the same router and modem (HiLink)

Try to ping 192.168.8.1 and telnet 192.168.8.1 port 80 from PC.
If responds and Huawei’s web interface not show up then
clear browser cache or try chrome private mode
(because the default router address was the same as modem 192.168.8.1).

Below is my configuration

I changed the local network to 192.168.13.0/24 and

  1. Go to Advanced settings → Network → interfaces
  • set WAN iface (physical interface) to eth1
  • protocol dhcp client (it will become 192.168.8.100)
  • create firewall zone named wan_usb
  1. Go to o to Advanced settings → Network → firewall
    and edit wan_usb zone
  • input: reject
  • output: accept
  • forward: reject
  • masqerading ON
  • MSS clamping ON
  • Allow forward from source zones: LAN

thank you very much for your answer!

a couple of questions:

when changing the WAN interface to eth1, will the other connection methods still work? (wifi repeater, ethernet wan port) ?

when using vpn, will all traffic except for 192.168.8.1 be routed through the vpn tunnel?

thanks

@manderss99 Could you ssh to the router, and then issue ip route show, please show me the output?

After Boot (UI accessible):

root@GL-AR750S:~# ip route show
default via 192.168.8.1 dev eth1 proto static src 192.168.8.100 metric 30
192.168.8.0/24 dev eth1 proto static scope link metric 30
192.168.18.0/24 dev br-lan proto kernel scope link src 192.168.18.1

mullvad wireguard active (UI not accessible)

root@GL-AR750S:~# ip route show
0.0.0.0/1 dev wg0 scope link
default via 192.168.8.1 dev eth1 proto static src 192.168.8.100 metric 30
43.245.162.234 via 192.168.8.1 dev eth1
128.0.0.0/1 dev wg0 scope link
192.168.8.0/24 dev eth1 proto static scope link metric 30
192.168.18.0/24 dev br-lan proto kernel scope link src 192.168.18.1

openvpn active (UI not accessible)

root@GL-AR750S:~# ip route show
default via 192.168.8.1 dev eth1 proto static src 192.168.8.100 metric 30
10.9.0.0/24 dev tun0 proto kernel scope link src 10.9.0.4
192.168.8.0/24 dev eth1 proto static scope link metric 30
192.168.18.0/24 dev br-lan proto kernel scope link src 192.168.18.1
213.112.16.6 via 192.168.8.1 dev eth1

Thanks for your information.

Maybe I know which causes this problem. Because we disabled data from lan forward to wan when enable vpn which avoid data leak.

If you want to disable it, find string lan2wan_forwarding disable on the two shell scripts /etc/init.d/startvpn and /etc/init.d/wireguard, please change it to lan2wan_forwarding enable.

That did the trick!
VPN seem to work ok and modem ui is accessible.
Many thanks.

a couple of questions:

What is the risk of data leaks?

Is it possible to make this a configurable option that survives upgrades? It is not ideal to have to edit your scripts after each upgrade.

Thanks

If vpn lost connection, your data won’t be encrypted.

We should find a solution to solve this problem.

great, look forward to a better solution.
I’ll help in testing if you want.