Deco P7 drops internet connection several times a week
Hi, i'm having issues with my Deco P7, the internet connection works fine for a while, good reception and speeds and all, but after a couple of days, it goes berserk and I completely lose the internet connection until I shutdown all P7's.
My setup is as follows:
Experia v10 router - switch - Main deco p7 cabled, in Access Point mode
- switch - 2nd deco p7 cabled
- 3rd P7 powerlined
When the issue occurs, all devices lose internet connection, including the wired ones. When I disconnect all P7's, internet connection sometimes restores, sometimes I need to reset the Experia too. The experia always shows green lights on the internet connection.
P7's are all up to date, I have tried resetting them all and reconfiguring the network yesterday, and the issue got even stranger. Today, some devices work fine, others are thrown off the wifi until you manually reconnect. I have removed wifi config from the devices (android phones) and reconnected them, but the issue keeps coming back.
Anyone have any suggestions on how to fix this?
- Copy Link
- Subscribe
- Bookmark
- Report Inappropriate Content
Same here, unstable :(.
Tried eveything, routed/AP, switch slaves and master, full reset. Mesh on/of , sip alg on/of etc. I really tested every setting. Master is directly connected to the kpn modom\router (experiabox), standard dhcp settings (as said tested with different dns settings).
After a few day's the internet (from devices connected to the p7) becomes really slow ( weird because tp link internal internet speed test says good and full connection). I treid to change dns server to google, my own ips, but no speed up at resolving. (When i reconnect a device at take some time before there is a internet connection (possible no internet connection message from multiple android devices) LG tv reconnect multiple times a day.
Workarround? Herstart, then it works for a few days.
In the past? No isseus, after update to latest firmware it has becone unstable.
Fw: 1.3.1 Build 20190704 rel. 46693
Greets
- Copy Link
- Report Inappropriate Content
I have exactly same problem here. Every morning I turn off and on all the P7. This problem start with latest firmware and whish to go back or new fixed firmware soon.
- Copy Link
- Report Inappropriate Content
As requested i've exported some log files. See below.
First scenario, we've connected all 3 deco's, around 20:26 we've connected the third one and then the sh*t hits the fan. See log below around that time:
Tue Oct 29 20:18:02 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 14:20:5E:36:88:2C disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:18:02 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:18:02 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath1, client_action:disassociate
Tue Oct 29 20:18:02 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) disassocaite by if(ath1).
Tue Oct 29 20:18:03 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 14:20:5E:36:88:2C associated on APId 255 ChanId 48 ESSId 0 , Capabilities: BTM RRM SMPS, Max bandwidth: 2, Num of spatial streams: 1, PHY mode: 19, Max MCS: 9. Max TX power: 19
Tue Oct 29 20:18:03 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:18:03 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath1, client_action:associate
Tue Oct 29 20:18:03 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) assocaite by if(ath1).
Tue Oct 29 20:18:03 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:18:03 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.104
Tue Oct 29 20:18:04 2019 daemon.err nrd[6678]: triggerMonSteering: Failed to get uplink rssi for 4C:56:9D:75:95:56
Tue Oct 29 20:18:04 2019 daemon.err udhcpd[7208]: Sending ACK to 192.168.68.104
Tue Oct 29 20:18:04 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 48 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:18:04 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Invalid beacon report for 4C:56:9D:75:95:56
Tue Oct 29 20:18:04 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:18:05 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 14:20:5E:36:88:2C disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:18:05 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:18:05 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath1, client_action:disassociate
Tue Oct 29 20:18:05 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) disassocaite by if(ath1).
Tue Oct 29 20:18:11 2019 daemon.err udhcpd[7208]: Sending ACK to 192.168.68.100
Tue Oct 29 20:18:11 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.252 is Local Network Control Block
Tue Oct 29 20:18:11 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.252 is Local Network Control Block
Tue Oct 29 20:18:11 2019 daemon.err udhcpd[7208]: clear ip 6444a8c0
Tue Oct 29 20:18:12 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:18:12 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:18:12 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2E, client_ifname:ath02, client_action:associate
Tue Oct 29 20:18:12 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2E) assocaite by if(ath02).
Tue Oct 29 20:18:13 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 1 ChanId 8 ESSId 0 bssid 98:DA:C4:53:36:2E rcpi: -68
Tue Oct 29 20:18:13 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 2 ChanId 8 ESSId 0 bssid 98:DA:C4:53:2C:EE rcpi: -65
Tue Oct 29 20:18:13 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 8 ESSId 0 rcpi: -72
Tue Oct 29 20:18:13 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 0 ChanId 48 ESSId 0 bssid 98:DA:C4:53:36:2F rcpi: -75
Tue Oct 29 20:18:13 2019 daemon.notice nrd[6678]: stadbEntry_modifyTriggerThreshold: For client 4C:56:9D:75:95:56 RSSI: 22 | RCPI: -72 | threshold RSSI: 38
Tue Oct 29 20:18:13 2019 daemon.notice nrd[6678]: steerexecStartSteer: Starting new steer for 4C:56:9D:75:95:56(transaction 0)
Tue Oct 29 20:18:13 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 48 ESSId 0 rcpi: -72
Tue Oct 29 20:18:13 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -73
Tue Oct 29 20:18:13 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Beacon report for STA 4C:56:9D:75:95:56 in unexpected state 2
Tue Oct 29 20:18:13 2019 daemon.notice nrd[6678]: steerexecHandleBTMResponseEvent: Received BTM response from 4C:56:9D:75:95:56 with non-success code (6) (transaction 0)
Tue Oct 29 20:18:13 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:18:13 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2E, client_ifname:ath02, client_action:disassociate
Tue Oct 29 20:18:13 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2E) disassocaite by if(ath02).
Tue Oct 29 20:18:13 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:18:13 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-2C-EE, client_ifname:ath02, client_action:associate
Tue Oct 29 20:18:13 2019 daemon.err client_mgmt: client(A2-DA-C4-53-2C-EE) assocaite by if(ath02).
Tue Oct 29 20:18:14 2019 authpriv.notice dropbear[8624]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.1:41458
Tue Oct 29 20:18:19 2019 daemon.err nrd[6678]: triggerMonSteering: Failed to get uplink rssi for 4C:56:9D:75:95:56
Tue Oct 29 20:18:20 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:18:20 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 8 ESSId 0 rcpi: -66
Tue Oct 29 20:18:20 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 2 ChanId 8 ESSId 0 bssid 98:DA:C4:53:2C:EE rcpi: -64
Tue Oct 29 20:18:20 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 48 ESSId 0 rcpi: -78
Tue Oct 29 20:18:20 2019 daemon.notice nrd[6678]: stadbEntry_modifyTriggerThreshold: For client 4C:56:9D:75:95:56 RSSI: 19 | RCPI: -66 | threshold RSSI: 29
Tue Oct 29 20:18:26 2019 daemon.err nrd[6678]: triggerMonSteering: Failed to get uplink rssi for 4C:56:9D:75:95:56
Tue Oct 29 20:18:26 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 48 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:18:26 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 48 ESSId 0 rcpi: -74
Tue Oct 29 20:18:31 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:18:31 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2E, client_ifname:ath02, client_action:associate
Tue Oct 29 20:18:31 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2E) assocaite by if(ath02).
Tue Oct 29 20:18:33 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 4C:56:9D:75:95:56 disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:18:34 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:18:34 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2E, client_ifname:ath02, client_action:disassociate
Tue Oct 29 20:18:34 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2E) disassocaite by if(ath02).
Tue Oct 29 20:18:34 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:18:34 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2F, client_ifname:ath12, client_action:associate
Tue Oct 29 20:18:34 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2F) assocaite by if(ath12).
Tue Oct 29 20:18:34 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:18:34 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2F, client_ifname:ath12, client_action:disassociate
Tue Oct 29 20:18:34 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2F) disassocaite by if(ath12).
Tue Oct 29 20:18:39 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:18:39 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:18:48 2019 authpriv.notice dropbear[8999]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:57945
Tue Oct 29 20:18:48 2019 authpriv.notice dropbear[9002]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:57946
Tue Oct 29 20:18:57 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:19:00 2019 daemon.err nrd[6678]: estimatorDot11kIterateCB: Timeout waiting for 802.11k response from 4C:56:9D:75:95:56
Tue Oct 29 20:19:02 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 14:20:5E:36:88:2C associated on APId 255 ChanId 48 ESSId 0 , Capabilities: BTM RRM SMPS, Max bandwidth: 2, Num of spatial streams: 1, PHY mode: 19, Max MCS: 9. Max TX power: 19
Tue Oct 29 20:19:02 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:19:02 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath1, client_action:associate
Tue Oct 29 20:19:02 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) assocaite by if(ath1).
Tue Oct 29 20:19:02 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:19:02 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.104
Tue Oct 29 20:19:03 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 14:20:5E:36:88:2C disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:19:03 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:19:03 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath1, client_action:disassociate
Tue Oct 29 20:19:03 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) disassocaite by if(ath1).
Tue Oct 29 20:19:06 2019 daemon.err nrd[6678]: triggerMonSteering: Failed to get uplink rssi for 4C:56:9D:75:95:56
Tue Oct 29 20:19:06 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 48 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:19:07 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -76
Tue Oct 29 20:19:07 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 48 ESSId 0 rcpi: -78
Tue Oct 29 20:19:07 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 0 ChanId 48 ESSId 0 bssid 98:DA:C4:53:36:2F rcpi: -76
Tue Oct 29 20:19:08 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 00:5B:94:08:8A:49 associated on APId 255 ChanId 48 ESSId 0 , Capabilities: BTM RRM , Max bandwidth: 2, Num of spatial streams: 2, PHY mode: 19, Max MCS: 9. Max TX power: 21
Tue Oct 29 20:19:08 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:19:08 2019 daemon.err client_mgmt: client_mac:00-5B-94-08-8A-49, client_ifname:ath1, client_action:associate
Tue Oct 29 20:19:08 2019 daemon.err client_mgmt: client(00-5B-94-08-8A-49) assocaite by if(ath1).
Tue Oct 29 20:19:09 2019 daemon.err udhcpd[7208]: clear ip 6544a8c0
Tue Oct 29 20:19:09 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.101
Tue Oct 29 20:19:10 2019 daemon.err udhcpd[7208]: Sending ACK to 192.168.68.101
Tue Oct 29 20:19:10 2019 daemon.err udhcpd[7208]: clear ip 6544a8c0
Tue Oct 29 20:19:25 2019 authpriv.notice dropbear[9502]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:57950
Tue Oct 29 20:19:37 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 00:5B:94:08:8A:49 on channel 48 from serving BSS APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:19:37 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Invalid beacon report for 00:5B:94:08:8A:49
Tue Oct 29 20:19:38 2019 daemon.err nrd[6678]: triggerMonSteering: Failed to get uplink rssi for 4C:56:9D:75:95:56
Tue Oct 29 20:19:43 2019 authpriv.notice dropbear[9718]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:57952
Tue Oct 29 20:19:44 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 00:5B:94:08:8A:49 on channel 48 from serving BSS APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:19:45 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 00:5B:94:08:8A:49 disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:19:45 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:19:45 2019 daemon.err client_mgmt: client_mac:00-5B-94-08-8A-49, client_ifname:ath1, client_action:disassociate
Tue Oct 29 20:19:45 2019 daemon.err client_mgmt: client(00-5B-94-08-8A-49) disassocaite by if(ath1).
Tue Oct 29 20:19:47 2019 daemon.err nrd[6678]: estimatorDot11kIterateCB: Timeout waiting for 802.11k response from 00:5B:94:08:8A:49
Tue Oct 29 20:19:51 2019 authpriv.notice dropbear[9845]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:57955
Tue Oct 29 20:19:53 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 4C:56:9D:75:95:56 disassociated on APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:19:53 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:19:53 2019 daemon.err client_mgmt: client_mac:4C-56-9D-75-95-56, client_ifname:ath0, client_action:disassociate
Tue Oct 29 20:19:53 2019 daemon.err client_mgmt: client(4C-56-9D-75-95-56) disassocaite by if(ath0).
Tue Oct 29 20:19:54 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 14:20:5E:36:88:2C associated on APId 255 ChanId 48 ESSId 0 , Capabilities: BTM RRM SMPS, Max bandwidth: 2, Num of spatial streams: 1, PHY mode: 19, Max MCS: 9. Max TX power: 19
Tue Oct 29 20:19:54 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:19:54 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath1, client_action:associate
Tue Oct 29 20:19:54 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) assocaite by if(ath1).
Tue Oct 29 20:19:54 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:19:54 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.104
Tue Oct 29 20:19:55 2019 daemon.err udhcpd[7208]: Sending ACK to 192.168.68.104
Tue Oct 29 20:19:56 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:19:56 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 14:20:5E:36:88:2C disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:19:56 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:19:56 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath1, client_action:disassociate
Tue Oct 29 20:19:56 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) disassocaite by if(ath1).
Tue Oct 29 20:20:02 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 14:20:5E:36:88:2C associated on APId 255 ChanId 48 ESSId 0 , Capabilities: BTM RRM SMPS, Max bandwidth: 2, Num of spatial streams: 1, PHY mode: 19, Max MCS: 9. Max TX power: 19
Tue Oct 29 20:20:03 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:20:03 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.104
Tue Oct 29 20:20:03 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:20:03 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath1, client_action:associate
Tue Oct 29 20:20:03 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) assocaite by if(ath1).
Tue Oct 29 20:20:04 2019 daemon.err udhcpd[7208]: Sending ACK to 192.168.68.104
Tue Oct 29 20:20:04 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:20:17 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:20:27 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 00:5B:94:08:8A:49 associated on APId 255 ChanId 8 ESSId 0 , Capabilities: BTM RRM , Max bandwidth: 0, Num of spatial streams: 2, PHY mode: 8, Max MCS: 15. Max TX power: 21
Tue Oct 29 20:20:27 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:20:27 2019 daemon.err client_mgmt: client_mac:00-5B-94-08-8A-49, client_ifname:ath0, client_action:associate
Tue Oct 29 20:20:27 2019 daemon.err client_mgmt: client(00-5B-94-08-8A-49) assocaite by if(ath0).
Tue Oct 29 20:20:28 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 00:5B:94:08:8A:49 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:20:28 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 255 ChanId 8 ESSId 0 rcpi: -67
Tue Oct 29 20:20:28 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 1 ChanId 8 ESSId 0 bssid 98:DA:C4:53:36:2E rcpi: -84
Tue Oct 29 20:20:28 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 2 ChanId 8 ESSId 0 bssid 98:DA:C4:53:2C:EE rcpi: -73
Tue Oct 29 20:20:28 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -82
Tue Oct 29 20:20:28 2019 daemon.notice nrd[6678]: stadbEntry_modifyTriggerThreshold: For client 00:5B:94:08:8A:49 RSSI: 25 | RCPI: -67 | threshold RSSI: 36
Tue Oct 29 20:20:28 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 255 ChanId 48 ESSId 0 rcpi: -66
Tue Oct 29 20:20:28 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 0 ChanId 48 ESSId 0 bssid 98:DA:C4:53:36:2F rcpi: -84
Tue Oct 29 20:20:28 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Beacon report for STA 00:5B:94:08:8A:49 in unexpected state 2
Tue Oct 29 20:20:33 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:20:33 2019 daemon.err client_mgmt: client_mac:00-5B-94-08-8A-49, client_ifname:ath0, client_action:disassociate
Tue Oct 29 20:20:33 2019 daemon.err client_mgmt: client(00-5B-94-08-8A-49) disassocaite by if(ath0).
Tue Oct 29 20:20:33 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 00:5B:94:08:8A:49 associated on APId 255 ChanId 48 ESSId 0 , Capabilities: BTM RRM , Max bandwidth: 2, Num of spatial streams: 2, PHY mode: 19, Max MCS: 9. Max TX power: 21
Tue Oct 29 20:20:33 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 00:5B:94:08:8A:49 disassociated on APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:20:33 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:20:33 2019 daemon.err client_mgmt: client_mac:00-5B-94-08-8A-49, client_ifname:ath1, client_action:associate
Tue Oct 29 20:20:33 2019 daemon.err client_mgmt: client(00-5B-94-08-8A-49) assocaite by if(ath1).
Tue Oct 29 20:20:36 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 00:5B:94:08:8A:49 on channel 48 from serving BSS APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:20:36 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 255 ChanId 48 ESSId 0 rcpi: -61
Tue Oct 29 20:20:36 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 0 ChanId 48 ESSId 0 bssid 98:DA:C4:53:36:2F rcpi: -72
Tue Oct 29 20:20:36 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -84
Tue Oct 29 20:20:36 2019 daemon.notice nrd[6678]: stadbEntry_modifyTriggerThreshold: For client 00:5B:94:08:8A:49 RSSI: 27 | RCPI: -61 | threshold RSSI: 26
Tue Oct 29 20:20:42 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 00:5B:94:08:8A:49 on channel 48 from serving BSS APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:20:42 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Invalid beacon report for 00:5B:94:08:8A:49
Tue Oct 29 20:20:44 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:20:44 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:20:46 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:20:48 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 00:5B:94:08:8A:49 on channel 48 from serving BSS APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:20:49 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -76
Tue Oct 29 20:20:49 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 255 ChanId 48 ESSId 0 rcpi: -70
Tue Oct 29 20:20:49 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 00:5B:94:08:8A:49: APId 0 ChanId 48 ESSId 0 bssid 98:DA:C4:53:36:2F rcpi: -71
Tue Oct 29 20:20:49 2019 daemon.notice nrd[6678]: stadbEntry_modifyTriggerThreshold: For client 00:5B:94:08:8A:49 RSSI: 23 | RCPI: -70 | threshold RSSI: 31
Tue Oct 29 20:20:55 2019 daemon.err nrd[6678]: triggerMonSteering: Failed to get uplink rssi for 00:5B:94:08:8A:49
Tue Oct 29 20:20:56 2019 authpriv.notice dropbear[10635]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.103:59305
Tue Oct 29 20:21:00 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:21:07 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:21:18 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 00:5B:94:08:8A:49 disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:21:18 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:21:18 2019 daemon.err client_mgmt: client_mac:00-5B-94-08-8A-49, client_ifname:ath1, client_action:disassociate
Tue Oct 29 20:21:18 2019 daemon.err client_mgmt: client(00-5B-94-08-8A-49) disassocaite by if(ath1).
Tue Oct 29 20:21:18 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 00:5B:94:08:8A:49 associated on APId 255 ChanId 48 ESSId 0 , Capabilities: BTM RRM , Max bandwidth: 2, Num of spatial streams: 2, PHY mode: 19, Max MCS: 9. Max TX power: 21
Tue Oct 29 20:21:18 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:21:18 2019 daemon.err client_mgmt: client_mac:00-5B-94-08-8A-49, client_ifname:ath1, client_action:associate
Tue Oct 29 20:21:18 2019 daemon.err client_mgmt: client(00-5B-94-08-8A-49) assocaite by if(ath1).
Tue Oct 29 20:21:33 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:21:34 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) not found in arp table disconnect_counter=0
Tue Oct 29 20:21:47 2019 authpriv.notice dropbear[11114]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.103:59310
Tue Oct 29 20:21:50 2019 authpriv.notice dropbear[11136]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:57964
Tue Oct 29 20:21:51 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 00:5B:94:08:8A:49 disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:21:52 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:21:52 2019 daemon.err client_mgmt: client_mac:00-5B-94-08-8A-49, client_ifname:ath1, client_action:disassociate
Tue Oct 29 20:21:52 2019 daemon.err client_mgmt: client(00-5B-94-08-8A-49) disassocaite by if(ath1).
Tue Oct 29 20:21:58 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 4C:56:9D:75:95:56 associated on APId 255 ChanId 48 ESSId 0 , Capabilities: BTM RRM , Max bandwidth: 2, Num of spatial streams: 2, PHY mode: 19, Max MCS: 9. Max TX power: 21
Tue Oct 29 20:21:58 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:21:58 2019 daemon.err client_mgmt: client_mac:4C-56-9D-75-95-56, client_ifname:ath1, client_action:associate
Tue Oct 29 20:21:58 2019 daemon.err client_mgmt: client(4C-56-9D-75-95-56) assocaite by if(ath1).
Tue Oct 29 20:21:59 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 48 from serving BSS APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:22:00 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:22:02 2019 daemon.err nrd[6678]: estimatorDot11kIterateCB: Timeout waiting for 802.11k response from 4C:56:9D:75:95:56
Tue Oct 29 20:22:03 2019 authpriv.notice dropbear[11274]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.103:59313
Tue Oct 29 20:22:03 2019 authpriv.notice dropbear[11281]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.103:59312
Tue Oct 29 20:22:05 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 4C:56:9D:75:95:56 disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:22:05 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:22:05 2019 daemon.err client_mgmt: client_mac:4C-56-9D-75-95-56, client_ifname:ath1, client_action:disassociate
Tue Oct 29 20:22:05 2019 daemon.err client_mgmt: client(4C-56-9D-75-95-56) disassocaite by if(ath1).
Tue Oct 29 20:22:10 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 00:5B:94:08:8A:49 associated on APId 255 ChanId 48 ESSId 0 , Capabilities: BTM RRM , Max bandwidth: 2, Num of spatial streams: 2, PHY mode: 19, Max MCS: 9. Max TX power: 21
Tue Oct 29 20:22:15 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:22:19 2019 user.err syslog: Error: ssh_connect: Timeout connecting to 192.168.68.102
Tue Oct 29 20:22:19 2019 user.err syslog: Error: connect
Tue Oct 29 20:22:23 2019 authpriv.notice dropbear[11383]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.1:41521
Tue Oct 29 20:22:28 2019 user.err syslog: Error: ssh_connect: Timeout connecting to 192.168.68.102
Tue Oct 29 20:22:28 2019 user.err syslog: Error: connect
Tue Oct 29 20:22:29 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:22:29 2019 daemon.err client_mgmt: client_mac:00-5B-94-08-8A-49, client_ifname:ath1, client_action:associate
Tue Oct 29 20:22:29 2019 daemon.err client_mgmt: client(00-5B-94-08-8A-49) assocaite by if(ath1).
Tue Oct 29 20:22:29 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:22:29 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-2C-EF, client_ifname:ath12, client_action:disassociate
Tue Oct 29 20:22:29 2019 daemon.err client_mgmt: client(A2-DA-C4-53-2C-EF) disassocaite by if(ath12).
Tue Oct 29 20:22:36 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:22:38 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:22:38 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2E, client_ifname:ath02, client_action:associate
Tue Oct 29 20:22:38 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2E) assocaite by if(ath02).
Tue Oct 29 20:22:46 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:22:46 2019 user.err syslog: Error: connect
Tue Oct 29 20:22:49 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:22:49 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:22:50 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:22:50 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2F, client_ifname:ath12, client_action:associate
Tue Oct 29 20:22:50 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2F) assocaite by if(ath12).
Tue Oct 29 20:22:57 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:23:08 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:23:08 2019 user.err syslog: Error: connect
Tue Oct 29 20:23:08 2019 daemon.warn radvd[6549]: RDNSS address fe80::3299:35ff:fe91:a80a received on br-lan from fe80::3299:35ff:fe91:a80a is not advertised by us
Tue Oct 29 20:23:08 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.252 is Local Network Control Block
Tue Oct 29 20:23:22 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:23:24 2019 daemon.err tipc-server: tipc_config_request
Tue Oct 29 20:23:27 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:23:27 2019 user.err syslog: Error: connect
Tue Oct 29 20:23:28 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:23:28 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2F, client_ifname:ath12, client_action:disassociate
Tue Oct 29 20:23:28 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2F) disassocaite by if(ath12).
Tue Oct 29 20:23:28 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:23:28 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2F, client_ifname:ath12, client_action:associate
Tue Oct 29 20:23:28 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2F) assocaite by if(ath12).
Tue Oct 29 20:23:28 2019 daemon.err udhcpd[7208]: Found static lease: 6644a8c0
Tue Oct 29 20:23:28 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.102
Tue Oct 29 20:23:29 2019 daemon.err udhcpd[7208]: Found static lease: 6644a8c0
Tue Oct 29 20:23:29 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.102
Tue Oct 29 20:23:46 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:23:46 2019 user.err syslog: Error: connect
Tue Oct 29 20:23:58 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:23:58 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-2C-EE, client_ifname:ath02, client_action:disassociate
Tue Oct 29 20:23:58 2019 daemon.err client_mgmt: client(A2-DA-C4-53-2C-EE) disassocaite by if(ath02).
Tue Oct 29 20:24:00 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:24:01 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:24:01 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-2C-EE, client_ifname:ath02, client_action:associate
Tue Oct 29 20:24:01 2019 daemon.err client_mgmt: client(A2-DA-C4-53-2C-EE) assocaite by if(ath02).
Tue Oct 29 20:24:01 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:24:01 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-2C-EF, client_ifname:ath12, client_action:associate
Tue Oct 29 20:24:01 2019 daemon.err client_mgmt: client(A2-DA-C4-53-2C-EF) assocaite by if(ath12).
Tue Oct 29 20:24:06 2019 authpriv.notice dropbear[12207]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.103:59324
Tue Oct 29 20:24:06 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:24:06 2019 user.err syslog: Error: connect
Tue Oct 29 20:24:10 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:24:10 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2F, client_ifname:ath12, client_action:disassociate
Tue Oct 29 20:24:10 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2F) disassocaite by if(ath12).
Tue Oct 29 20:24:11 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:24:11 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2E, client_ifname:ath02, client_action:disassociate
Tue Oct 29 20:24:11 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2E) disassocaite by if(ath02).
Tue Oct 29 20:24:13 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:24:13 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2E, client_ifname:ath02, client_action:associate
Tue Oct 29 20:24:13 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2E) assocaite by if(ath02).
Tue Oct 29 20:24:15 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:24:15 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2E, client_ifname:ath02, client_action:disassociate
Tue Oct 29 20:24:15 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2E) disassocaite by if(ath02).
Tue Oct 29 20:24:18 2019 user.emerg syslog: tp215,22[12318]:
Tue Oct 29 20:24:19 2019 daemon.err uhttpd[3299]: ath22 no frequency information.
Tue Oct 29 20:24:19 2019 daemon.err uhttpd[3299]:
Tue Oct 29 20:24:21 2019 daemon.err uhttpd[3299]: ath22 no frequency information.
Tue Oct 29 20:24:21 2019 daemon.err uhttpd[3299]:
Tue Oct 29 20:24:23 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:24:23 2019 user.err syslog: Error: connect
Tue Oct 29 20:24:23 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:24:23 2019 user.err syslog: Error: connect
Tue Oct 29 20:24:28 2019 authpriv.notice dropbear[12780]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.103:59327
Tue Oct 29 20:24:33 2019 daemon.err udhcpd[7208]: Found static lease: 6644a8c0
Tue Oct 29 20:24:33 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.102
Tue Oct 29 20:24:34 2019 daemon.err udhcpd[7208]: Found static lease: 6644a8c0
Tue Oct 29 20:24:34 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.102
Tue Oct 29 20:24:34 2019 daemon.err udhcpd[7208]: Found static lease: 6644a8c0
Tue Oct 29 20:24:34 2019 daemon.err udhcpd[7208]: Sending ACK to 192.168.68.102
Tue Oct 29 20:24:34 2019 daemon.err udhcpd[7208]: clear ip 6644a8c0
Tue Oct 29 20:24:35 2019 daemon.err udhcpd[7208]: Found static lease: 6644a8c0
Tue Oct 29 20:24:35 2019 daemon.err udhcpd[7208]: Sending ACK to 192.168.68.102
Tue Oct 29 20:24:35 2019 daemon.err udhcpd[7208]: clear ip 6644a8c0
Tue Oct 29 20:24:48 2019 daemon.err uhttpd[3299]: ath22 no frequency information.
Tue Oct 29 20:24:48 2019 daemon.err uhttpd[3299]:
Tue Oct 29 20:24:54 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:24:54 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:24:59 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:25:00 2019 authpriv.notice dropbear[13466]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.1:41549
Tue Oct 29 20:25:15 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 4C:56:9D:75:95:56 associated on APId 255 ChanId 8 ESSId 0 , Capabilities: BTM RRM , Max bandwidth: 0, Num of spatial streams: 2, PHY mode: 8, Max MCS: 15. Max TX power: 22
Tue Oct 29 20:25:15 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:25:15 2019 daemon.err client_mgmt: client_mac:4C-56-9D-75-95-56, client_ifname:ath0, client_action:associate
Tue Oct 29 20:25:15 2019 daemon.err client_mgmt: client(4C-56-9D-75-95-56) assocaite by if(ath0).
Tue Oct 29 20:25:15 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:25:16 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Invalid beacon report for 4C:56:9D:75:95:56
Tue Oct 29 20:25:22 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:25:23 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 1 ChanId 8 ESSId 0 bssid 98:DA:C4:53:36:2E rcpi: -71
Tue Oct 29 20:25:23 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 0 ChanId 48 ESSId 0 bssid 98:DA:C4:53:36:2F rcpi: -75
Tue Oct 29 20:25:23 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -77
Tue Oct 29 20:25:23 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 48 ESSId 0 rcpi: -79
Tue Oct 29 20:25:29 2019 authpriv.notice dropbear[13845]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:43929
Tue Oct 29 20:25:42 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:25:43 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 8 ESSId 0 rcpi: -78
Tue Oct 29 20:25:43 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 1 ChanId 8 ESSId 0 bssid 98:DA:C4:53:36:2E rcpi: -72
Tue Oct 29 20:25:43 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 48 ESSId 0 rcpi: -80
Tue Oct 29 20:25:43 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -76
Tue Oct 29 20:25:43 2019 daemon.notice nrd[6678]: stadbEntry_modifyTriggerThreshold: For client 4C:56:9D:75:95:56 RSSI: 12 | RCPI: -78 | threshold RSSI: 34
Tue Oct 29 20:25:43 2019 daemon.notice nrd[6678]: steerexecStartSteer: Starting new steer for 4C:56:9D:75:95:56(transaction 1)
Tue Oct 29 20:25:43 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 0 ChanId 48 ESSId 0 bssid 98:DA:C4:53:36:2F rcpi: -75
Tue Oct 29 20:25:43 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Beacon report for STA 4C:56:9D:75:95:56 in unexpected state 2
Tue Oct 29 20:25:43 2019 daemon.notice nrd[6678]: steerexecHandleBTMResponseEvent: Received BTM response from 4C:56:9D:75:95:56 with non-success code (6) (transaction 1)
Tue Oct 29 20:25:43 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:25:43 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2F, client_ifname:ath12, client_action:associate
Tue Oct 29 20:25:43 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2F) assocaite by if(ath12).
Tue Oct 29 20:25:50 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:25:50 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 8 ESSId 0 rcpi: -80
Tue Oct 29 20:25:50 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 1 ChanId 8 ESSId 0 bssid 98:DA:C4:53:36:2E rcpi: -71
Tue Oct 29 20:25:50 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 2 ChanId 8 ESSId 0 bssid 98:DA:C4:53:2C:EE rcpi: -75
Tue Oct 29 20:25:50 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 0 ChanId 48 ESSId 0 bssid 98:DA:C4:53:36:2F rcpi: -74
Tue Oct 29 20:25:50 2019 daemon.notice nrd[6678]: stadbEntry_modifyTriggerThreshold: For client 4C:56:9D:75:95:56 RSSI: 14 | RCPI: -80 | threshold RSSI: 38
Tue Oct 29 20:25:50 2019 daemon.notice nrd[6678]: steerexecStartSteer: Starting new steer for 4C:56:9D:75:95:56(transaction 2)
Tue Oct 29 20:25:50 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -74
Tue Oct 29 20:25:50 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 48 ESSId 0 rcpi: -78
Tue Oct 29 20:25:50 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Beacon report for STA 4C:56:9D:75:95:56 in unexpected state 2
Tue Oct 29 20:25:50 2019 daemon.notice nrd[6678]: steerexecHandleBTMResponseEvent: Received BTM response from 4C:56:9D:75:95:56 with non-success code (6) (transaction 2)
Tue Oct 29 20:25:56 2019 daemon.err nrd[6678]: triggerMonSteering: Failed to get uplink rssi for 4C:56:9D:75:95:56
Tue Oct 29 20:25:57 2019 daemon.err nrd[6678]: triggerMonSteering: Failed to get uplink rssi for 4C:56:9D:75:95:56
Tue Oct 29 20:25:58 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 48 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:25:58 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 0 ChanId 48 ESSId 0 bssid 98:DA:C4:53:36:2F rcpi: -74
Tue Oct 29 20:25:58 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 48 ESSId 0 rcpi: -81
Tue Oct 29 20:25:58 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -82
Tue Oct 29 20:25:59 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:26:11 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:26:11 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2F, client_ifname:ath12, client_action:disassociate
Tue Oct 29 20:26:11 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2F) disassocaite by if(ath12).
Tue Oct 29 20:26:16 2019 daemon.err nrd[6678]: stadbHandleRSSIMeasurement: Invalid RSSI measurement for 4C:56:9D:75:95:56
Tue Oct 29 20:26:19 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:26:19 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2F, client_ifname:ath12, client_action:associate
Tue Oct 29 20:26:19 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2F) assocaite by if(ath12).
Tue Oct 29 20:26:19 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:26:19 2019 daemon.err client_mgmt: client_mac:A2-DA-C4-53-36-2F, client_ifname:ath12, client_action:disassociate
Tue Oct 29 20:26:19 2019 daemon.err client_mgmt: client(A2-DA-C4-53-36-2F) disassocaite by if(ath12).
Tue Oct 29 20:26:29 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:26:29 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 8 ESSId 0 rcpi: -79
Tue Oct 29 20:26:29 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 1 ChanId 8 ESSId 0 bssid 98:DA:C4:53:36:2E rcpi: -76
Tue Oct 29 20:26:29 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -78
Tue Oct 29 20:26:29 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 48 ESSId 0 rcpi: -83
Tue Oct 29 20:26:29 2019 daemon.notice nrd[6678]: stadbEntry_modifyTriggerThreshold: For client 4C:56:9D:75:95:56 RSSI: 12 | RCPI: -79 | threshold RSSI: 35
Tue Oct 29 20:26:34 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:26:34 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:26:35 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:26:35 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:26:35 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:26:35 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 1 ChanId 8 ESSId 0 bssid 98:DA:C4:53:36:2E rcpi: -72
Tue Oct 29 20:26:35 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 2 ChanId 8 ESSId 0 bssid 98:DA:C4:53:2C:EE rcpi: -78
Tue Oct 29 20:26:35 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 3 ChanId 48 ESSId 0 bssid 98:DA:C4:53:2C:EF rcpi: -78
Tue Oct 29 20:26:35 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 0 ChanId 48 ESSId 0 bssid 98:DA:C4:53:36:2F rcpi: -74
Tue Oct 29 20:26:35 2019 daemon.err nrd[6678]: estimatorHandleValidBeaconReport: No local BSS reported in beacon report from 4C:56:9D:75:95:56
Tue Oct 29 20:26:41 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:26:42 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 8 ESSId 0 rcpi: -77
Tue Oct 29 20:26:42 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 1 ChanId 8 ESSId 0 bssid 98:DA:C4:53:36:2E rcpi: -77
Tue Oct 29 20:26:42 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleBeaconReport: Beacon report from 4C:56:9D:75:95:56: APId 255 ChanId 48 ESSId 0 rcpi: -84
Tue Oct 29 20:26:42 2019 daemon.notice nrd[6678]: stadbEntry_modifyTriggerThreshold: For client 4C:56:9D:75:95:56 RSSI: 15 | RCPI: -77 | threshold RSSI: 36
Tue Oct 29 20:26:42 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:26:42 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:26:43 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:26:43 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:26:44 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:26:44 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:26:48 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:26:51 2019 daemon.err nrd[6678]: estimatorDot11kIterateCB: Timeout waiting for 802.11k response from 4C:56:9D:75:95:56
Tue Oct 29 20:26:54 2019 user.err syslog: Error: ssh_connect: Timeout connecting to 192.168.68.103
Tue Oct 29 20:26:54 2019 user.err syslog: Error: connect
- Copy Link
- Report Inappropriate Content
And we did another test around 20:33 where the last deco was connected. See log below. If you can't get it fixed via a firmware update (or another waty) within this month please show us how to revert the firmware as we want to use the product where we've spend a lot of money for and is unusable at the moment. Later we can always go back to this firmware if there is a permanent sollution.
Tue Oct 29 20:26:57 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:26:57 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Invalid beacon report for 4C:56:9D:75:95:56
Tue Oct 29 20:26:58 2019 user.err syslog: Error: ssh_connect: Timeout connecting to 192.168.68.103
Tue Oct 29 20:26:58 2019 user.err syslog: Error: connect
Tue Oct 29 20:26:59 2019 user.info root: cloud ========== CLOUD: account status check is done before =========
Tue Oct 29 20:26:59 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:26:59 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:26:59 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:26:59 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:27:00 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:27:00 2019 authpriv.info dropbear[14977]: Child connection from 192.168.68.1:41575
Tue Oct 29 20:27:01 2019 authpriv.notice dropbear[14977]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.1:41575
Tue Oct 29 20:27:01 2019 authpriv.info dropbear[14977]: Exit (root): Exited normally
Tue Oct 29 20:27:03 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:27:03 2019 daemon.info conn-indicator: <31330300> Invoke led: conn[1]
Tue Oct 29 20:27:03 2019 daemon.info leds: Event: conn.offline
Tue Oct 29 20:27:03 2019 daemon.notice conn-indicator: Connectivity changed: ONLINE(0x0) -> OFFLINE(0x1)
Tue Oct 29 20:27:03 2019 daemon.info conn-indicator: Notify inet.down
Tue Oct 29 20:27:06 2019 daemon.err nrd[6678]: estimatorDot11kIterateCB: Timeout waiting for 802.11k response from 4C:56:9D:75:95:56
Tue Oct 29 20:27:12 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:27:14 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:27:14 2019 user.err syslog: Error: connect
Tue Oct 29 20:27:14 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:27:14 2019 user.err syslog: Error: connect
Tue Oct 29 20:27:15 2019 daemon.err nrd[6678]: estimatorDot11kIterateCB: Timeout waiting for 802.11k response from 4C:56:9D:75:95:56
Tue Oct 29 20:27:16 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:27:16 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:27:21 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:27:24 2019 daemon.err nrd[6678]: estimatorDot11kIterateCB: Timeout waiting for 802.11k response from 4C:56:9D:75:95:56
Tue Oct 29 20:27:30 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:27:30 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Invalid beacon report for 4C:56:9D:75:95:56
Tue Oct 29 20:27:32 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:27:32 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:27:33 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:27:33 2019 user.err syslog: Error: connect
Tue Oct 29 20:27:36 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:27:36 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Invalid beacon report for 4C:56:9D:75:95:56
Tue Oct 29 20:27:42 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:27:42 2019 daemon.err nrd[6678]: estimatorCmnHandleBeaconReportEvent: Invalid beacon report for 4C:56:9D:75:95:56
Tue Oct 29 20:27:47 2019 daemon.info conn-indicator: Dev 8019867E53778D868CD2AEDC03B8E9B71B9FD9B6 updated: 1f
Tue Oct 29 20:27:48 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:27:48 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:27:48 2019 daemon.notice nrd[6678]: estimatorPerformMeasurement: Do 11k measuremrent for 4C:56:9D:75:95:56 on channel 8 from serving BSS APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:27:51 2019 daemon.err nrd[6678]: estimatorDot11kIterateCB: Timeout waiting for 802.11k response from 4C:56:9D:75:95:56
Tue Oct 29 20:27:52 2019 daemon.info conn-indicator: Notify inet.down
Tue Oct 29 20:27:52 2019 daemon.info hostapd: ath0: STA 4c:56:9d:75:95:56 IEEE 802.11: disassociated
Tue Oct 29 20:27:52 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 4C:56:9D:75:95:56 disassociated on APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:27:52 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:27:52 2019 daemon.err client_mgmt: client_mac:4C-56-9D-75-95-56, client_ifname:ath0, client_action:disassociate
Tue Oct 29 20:27:52 2019 daemon.err client_mgmt: client(4C-56-9D-75-95-56) disassocaite by if(ath0).
Tue Oct 29 20:27:54 2019 daemon.err nrd[6678]: stadbHandleRSSIMeasurement: Invalid RSSI measurement for 4C:56:9D:75:95:56
Tue Oct 29 20:27:59 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:28:04 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:28:04 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:28:59 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:29:00 2019 daemon.info udhcpd[7208]: No arp reply received for this address
Tue Oct 29 20:29:00 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:29:00 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:29:00 2019 daemon.info udhcpd[7208]: No arp reply received for this address
Tue Oct 29 20:29:00 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:29:00 2019 daemon.err udhcpd[7208]: Sending ACK to 192.168.68.103
Tue Oct 29 20:29:00 2019 daemon.err udhcpd[7208]: clear ip 6744a8c0
Tue Oct 29 20:29:02 2019 daemon.info conn-indicator: Dev 8019867E53778D868CD2AEDC03B8E9B71B9FD9B6 updated: 1f
Tue Oct 29 20:29:04 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:29:07 2019 daemon.info conn-indicator: Notify inet.down
Tue Oct 29 20:29:09 2019 user.err syslog: Error: ssh_userauth_publickey_auto:
Tue Oct 29 20:29:09 2019 user.err syslog: Error: connect
Tue Oct 29 20:29:09 2019 daemon.info conn-indicator: <31330301> Invoke led: conn[0]
Tue Oct 29 20:29:09 2019 daemon.info leds: Event: conn.online
Tue Oct 29 20:29:09 2019 daemon.notice conn-indicator: Connectivity changed: OFFLINE(0x1) -> ONLINE(0x0)
Tue Oct 29 20:29:09 2019 daemon.info conn-indicator: Notify inet.up
Tue Oct 29 20:29:12 2019 authpriv.info dropbear[16396]: Child connection from 192.168.68.1:41594
Tue Oct 29 20:29:12 2019 user.info root: cloud ========== CLOUD: account status check is done before =========
Tue Oct 29 20:29:13 2019 authpriv.notice dropbear[16396]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.1:41594
Tue Oct 29 20:29:14 2019 authpriv.info dropbear[16396]: Exit (root): Exited normally
Tue Oct 29 20:29:21 2019 daemon.warn radvd[6549]: RDNSS address fe80::3299:35ff:fe91:a80a received on br-lan from fe80::3299:35ff:fe91:a80a is not advertised by us
Tue Oct 29 20:29:29 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:29:29 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:29:30 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:29:30 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:29:35 2019 authpriv.info dropbear[16664]: Child connection from 192.168.68.102:43949
Tue Oct 29 20:29:35 2019 authpriv.info dropbear[16665]: Child connection from 192.168.68.102:43950
Tue Oct 29 20:29:37 2019 authpriv.notice dropbear[16665]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:43950
Tue Oct 29 20:29:37 2019 authpriv.notice dropbear[16664]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:43949
Tue Oct 29 20:29:38 2019 authpriv.info dropbear[16665]: Exit (root): Exited normally
Tue Oct 29 20:29:38 2019 authpriv.info dropbear[16664]: Exit (root): Exited normally
Tue Oct 29 20:29:56 2019 authpriv.info dropbear[16981]: Child connection from 192.168.68.102:43953
Tue Oct 29 20:29:58 2019 authpriv.notice dropbear[16981]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:43953
Tue Oct 29 20:29:59 2019 authpriv.info dropbear[16981]: Exit (root): Exited normally
Tue Oct 29 20:29:59 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:30:30 2019 user.info root: cloud ========== CLOUD: account status check is done before =========
Tue Oct 29 20:30:32 2019 user.info root: cloud ========== CLOUD: account status check is done before =========
Tue Oct 29 20:30:47 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:30:47 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:30:48 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:30:48 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:30:59 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:31:09 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:31:09 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:31:23 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:31:23 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:31:24 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:31:24 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:31:59 2019 user.notice IMPROXY: INFO[imp_verify_multicast_addr@245]: Group address 224.0.0.251 is Local Network Control Block
Tue Oct 29 20:33:07 2019 daemon.info udhcpd[7208]: No arp reply received for this address
Tue Oct 29 20:33:07 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:33:07 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:33:07 2019 daemon.info hostapd: ath1: STA 14:20:5e:36:88:2c IEEE 802.11: disassociated
Tue Oct 29 20:33:07 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 14:20:5E:36:88:2C disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:33:07 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:33:07 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath1, client_action:disassociate
Tue Oct 29 20:33:07 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) disassocaite by if(ath1).
Tue Oct 29 20:33:07 2019 daemon.info udhcpd[7208]: No arp reply received for this address
Tue Oct 29 20:33:07 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:33:07 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:33:08 2019 daemon.info udhcpd[7208]: No arp reply received for this address
Tue Oct 29 20:33:08 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:33:08 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:33:14 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@753]: Don't exist this Downstream VIF
Tue Oct 29 20:33:14 2019 user.warn IMPROXY: WARNING[mcast_recv_igmp@808]: unknown igmp type 0x11
Tue Oct 29 20:33:19 2019 daemon.info udhcpd[7208]: No arp reply received for this address
Tue Oct 29 20:33:19 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:33:19 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:33:19 2019 daemon.info udhcpd[7208]: No arp reply received for this address
Tue Oct 29 20:33:19 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:33:19 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:33:20 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:33:20 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:33:33 2019 daemon.info hostapd: ath1: STA 14:20:5e:36:88:2c IEEE 802.11: disassociated
Tue Oct 29 20:33:33 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 14:20:5E:36:88:2C disassociated on APId 255 ChanId 48 ESSId 0
Tue Oct 29 20:33:34 2019 daemon.info hostapd: ath0: STA 14:20:5e:36:88:2c IEEE 802.11: associated
Tue Oct 29 20:33:34 2019 daemon.notice nrd[6678]: wlanifBSteerEventsHandleNodeAssociatedInd: Node 14:20:5E:36:88:2C associated on APId 255 ChanId 8 ESSId 0 , Capabilities: BTM RRM SMPS, Max bandwidth: 0, Num of spatial streams: 1, PHY mode: 8, Max MCS: 7. Max TX power: 20
Tue Oct 29 20:33:34 2019 daemon.info hostapd: ath0: STA 14:20:5e:36:88:2c RADIUS: starting accounting session FFEA7FAEEF20390E
Tue Oct 29 20:33:34 2019 daemon.info hostapd: ath0: STA 14:20:5e:36:88:2c WPA: pairwise key handshake completed (RSN)
Tue Oct 29 20:33:34 2019 daemon.info udhcpd[7208]: fscanf_num:3 device_mac:14-20-5E-36-88-2C device_ip:192.168.68.104 device_hostname:iPhone-van-Hans
Tue Oct 29 20:33:34 2019 daemon.err udhcpd[7208]: Sending ACK to 192.168.68.104
Tue Oct 29 20:33:34 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:33:34 2019 daemon.info udhcpd[7208]: fscanf_num:3 device_mac:14-20-5E-36-88-2C device_ip:192.168.68.104 device_hostname:iPhone-van-Hans
Tue Oct 29 20:33:34 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:33:34 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.104
Tue Oct 29 20:33:36 2019 daemon.info udhcpd[7208]: fscanf_num:3 device_mac:14-20-5E-36-88-2C device_ip:192.168.68.104 device_hostname:iPhone-van-Hans
Tue Oct 29 20:33:36 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:33:36 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.104
Tue Oct 29 20:33:37 2019 daemon.info udhcpd[7208]: fscanf_num:3 device_mac:14-20-5E-36-88-2C device_ip:192.168.68.104 device_hostname:iPhone-van-Hans
Tue Oct 29 20:33:37 2019 daemon.err udhcpd[7208]: Sending ACK to 192.168.68.104
Tue Oct 29 20:33:37 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:33:37 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:33:37 2019 daemon.err udhcpd[7208]: clear ip 6844a8c0
Tue Oct 29 20:33:37 2019 user.err syslog: Error: ssh_connect: Timeout connecting to 192.168.68.103
Tue Oct 29 20:33:37 2019 user.err syslog: Error: connect
Tue Oct 29 20:33:38 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:33:38 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath0, client_action:associate
Tue Oct 29 20:33:38 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) assocaite by if(ath0).
Tue Oct 29 20:33:38 2019 authpriv.info dropbear[19913]: Child connection from 192.168.68.102:43970
Tue Oct 29 20:33:39 2019 authpriv.notice dropbear[19913]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.102:43970
Tue Oct 29 20:33:40 2019 authpriv.info dropbear[19913]: Exit (root): Exited normally
Tue Oct 29 20:33:44 2019 daemon.info hostapd: ath0: STA 14:20:5e:36:88:2c IEEE 802.11: disassociated
Tue Oct 29 20:33:44 2019 daemon.notice nrd[6678]: wlanifLinkEventsCmnGenerateDisassocEvent: Client 14:20:5E:36:88:2C disassociated on APId 255 ChanId 8 ESSId 0
Tue Oct 29 20:33:44 2019 daemon.err client_mgmt: wireless client associate or disassociate.
Tue Oct 29 20:33:44 2019 daemon.err client_mgmt: client_mac:14-20-5E-36-88-2C, client_ifname:ath0, client_action:disassociate
Tue Oct 29 20:33:44 2019 daemon.err client_mgmt: client(14-20-5E-36-88-2C) disassocaite by if(ath0).
Tue Oct 29 20:33:46 2019 daemon.err nrd[6678]: stadbHandleRSSIMeasurement: Invalid RSSI measurement for 14:20:5E:36:88:2C
Tue Oct 29 20:33:51 2019 user.err syslog: Error: ssh_connect: Timeout connecting to 192.168.68.103
Tue Oct 29 20:33:51 2019 user.err syslog: Error: connect
Tue Oct 29 20:33:53 2019 authpriv.info dropbear[19974]: Child connection from 192.168.68.1:41647
Tue Oct 29 20:33:53 2019 user.info root: cloud ========== CLOUD: account status check is done before =========
Tue Oct 29 20:33:53 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:33:53 2019 daemon.err tmpsvr[3163]: Error(Operation not permitted): sendto
Tue Oct 29 20:33:54 2019 authpriv.notice dropbear[19974]: Pubkey auth succeeded for 'root' with key md5 23:19:9d:13:23:ae:e0:f9:41:6b:fc:53:41:89:7e:c8 from 192.168.68.1:41647
Tue Oct 29 20:33:54 2019 authpriv.info dropbear[19974]: Exit (root): Exited normally
Tue Oct 29 20:33:56 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:33:56 2019 user.err syslog: Error: connect
Tue Oct 29 20:34:15 2019 user.err syslog: Error: ssh_connect: No route to host
Tue Oct 29 20:34:15 2019 user.err syslog: Error: connect
Tue Oct 29 20:34:18 2019 daemon.info udhcpd[7208]: No arp reply received for this address
Tue Oct 29 20:34:18 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:34:18 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:34:19 2019 daemon.info udhcpd[7208]: No arp reply received for this address
Tue Oct 29 20:34:19 2019 daemon.err udhcpd[7208]: Found static lease: 6744a8c0
Tue Oct 29 20:34:19 2019 daemon.err udhcpd[7208]: Sending OFFER of 192.168.68.103
Tue Oct 29 20:34:22 2019 daemon.info conn-indicator: Dev 8019867E53778D868CD2AEDC03B8E9B71B9FD9B6 updated: 1f
Tue Oct 29 20:34:27 2019 daemon.info conn-indicator: Notify inet.up
- Copy Link
- Report Inappropriate Content
I have the same issue.
KPN experiabox V10, everything is working fine.
When connection the first deco (P7) to the experia, within 5-10 minuten (after the deco is started) all computers, setup tv boxes etc loose the internet connection.
When I disconnect the deco, and restart de experiabox than everything works fine and will be fine until I connect the deco again.
- Copy Link
- Report Inappropriate Content
@Kevin_Z GREEN
- Copy Link
- Report Inappropriate Content
Has someone got an answer of solution.
From my 3-pack I have 1 accesspoint that destroy all my netwerk traffic en connection to internet. From alle clients, and also wired client which are not behind the Deco's cannot ping the KPN Experia box anymore. Just 1 accesspoint destroy everything... TP-LINK please solve our issue.
- Copy Link
- Report Inappropriate Content
- Copy Link
- Report Inappropriate Content
Please respond, this product is not working for months now. We are very dissapointed at the moment with TP Link. At least give us the possibility to revert to an earlier version of the firmware so we can start using the product untill you've sorted out this problem internally.
- Copy Link
- Report Inappropriate Content
Once the second unit added, the internet connection became intermittent, have you ever tried to swap the locations of the two slave Decos? Therefore, we can verify whether it is the specific Deco itself or the location(network environment)
Besides, you can switch the slave Deco to the main Deco to give it a go as well.
https://www.tp-link.com/support/faq/2400/
Any updates please let us know.
- Copy Link
- Report Inappropriate Content
Information
Helpful: 2
Views: 27798
Replies: 39