Hi
My new 750s just arrived today, seems to work fine except for accessing the web-ui of the 3372.
I changed the lan ip on the router to 10.68.0.1 and huawei shows up as a tethered device.
However I cannot access huaweis web interface on 192.168.8.1. I want to see signal strength and be able to change APN.
How do I access this information?
Is there a way to get the modem to show up under 4G modems instead of tethered?
If you enable wireguard then all data is forwarded to wireguard. You can add a static route or iptables rules if you don’t want certain website goes throught wireguard.
Try to ping 192.168.8.1 and telnet 192.168.8.1 port 80 from PC.
If responds and Huawei’s web interface not show up then
clear browser cache or try chrome private mode
(because the default router address was the same as modem 192.168.8.1).
Below is my configuration
I changed the local network to 192.168.13.0/24 and
Go to Advanced settings → Network → interfaces
set WAN iface (physical interface) to eth1
protocol dhcp client (it will become 192.168.8.100)
create firewall zone named wan_usb
Go to o to Advanced settings → Network → firewall
and edit wan_usb zone
root@GL-AR750S:~# ip route show
default via 192.168.8.1 dev eth1 proto static src 192.168.8.100 metric 30
192.168.8.0/24 dev eth1 proto static scope link metric 30
192.168.18.0/24 dev br-lan proto kernel scope link src 192.168.18.1
root@GL-AR750S:~# ip route show
0.0.0.0/1 dev wg0 scope link
default via 192.168.8.1 dev eth1 proto static src 192.168.8.100 metric 30
43.245.162.234 via 192.168.8.1 dev eth1
128.0.0.0/1 dev wg0 scope link
192.168.8.0/24 dev eth1 proto static scope link metric 30
192.168.18.0/24 dev br-lan proto kernel scope link src 192.168.18.1
root@GL-AR750S:~# ip route show
default via 192.168.8.1 dev eth1 proto static src 192.168.8.100 metric 30
10.9.0.0/24 dev tun0 proto kernel scope link src 10.9.0.4
192.168.8.0/24 dev eth1 proto static scope link metric 30
192.168.18.0/24 dev br-lan proto kernel scope link src 192.168.18.1
213.112.16.6 via 192.168.8.1 dev eth1
Maybe I know which causes this problem. Because we disabled data from lan forward to wan when enable vpn which avoid data leak.
If you want to disable it, find string lan2wan_forwarding disable on the two shell scripts /etc/init.d/startvpn and /etc/init.d/wireguard, please change it to lan2wan_forwarding enable.