It can take several minuts to get 5Ghz up and working.I have an issue with 5Ghz wifi in Beta 2.
If I choose to Enable 160 Mhz and Control Channel: Auto, the channel 100 is on and all seems to be working. However, if I set the channel 100 manually, 5Ghz is off and doesn't present in Air. The same problem with other manually set up channels, 112, 116 etc.
Dec 28 07:10:36 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=3c:7c:3f:6a:24:f8:00:01:5c:63:2c:46:08:00 SRC=46.148.233.53 DST=xxx LEN=40 TOS=0x00 PREC=0x20 TTL=227 ID=15269 PROTO=TCP SPT=58355 DPT=16306 SEQ=3691414351 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Dec 28 07:10:47 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=3c:7c:3f:6a:24:f8:00:01:5c:63:2c:46:08:00 SRC=46.148.233.50 DST=xxx LEN=40 TOS=0x00 PREC=0x20 TTL=228 ID=35637 PROTO=TCP SPT=58508 DPT=17848 SEQ=3992996309 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Dec 28 07:10:48 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=3c:7c:3f:6a:24:f8:00:01:5c:63:2c:46:08:00 SRC=46.148.233.44 DST=xxx LEN=40 TOS=0x00 PREC=0x20 TTL=224 ID=41593 PROTO=TCP SPT=57563 DPT=8960 SEQ=1662191137 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Dec 28 07:10:48 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=3c:7c:3f:6a:24:f8:00:01:5c:63:2c:46:08:00 SRC=193.27.229.207 DST=xxx LEN=40 TOS=0x00 PREC=0x20 TTL=226 ID=45300 PROTO=TCP SPT=41126 DPT=8299 SEQ=2525042631 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Dec 28 07:10:50 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=3c:7c:3f:6a:24:f8:00:01:5c:63:2c:46:08:00 SRC=45.129.33.56 DST=xxx LEN=40 TOS=0x00 PREC=0x20 TTL=231 ID=56467 PROTO=TCP SPT=48840 DPT=32077 SEQ=1824859782 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Dec 28 07:10:58 rc_service: httpd 1501:notify_rc start_vpnmgr
Dec 28 07:10:58 custom_script: Running /jffs/scripts/service-event (args: start vpnmgr)
Dec 28 07:10:58 custom_script: Running /jffs/scripts/service-event-end (args: start vpnmgr)
Dec 28 07:10:58 vpnmgr: Updated settings from WebUI found, merging into /jffs/addons/vpnmgr.d/config
Dec 28 07:10:59 vpnmgr: Merge of updated settings from WebUI completed successfully
Dec 28 07:10:59 vpnmgr: Configuring scheduled update for VPN client 2
Dec 28 07:10:59 vpnmgr: Scheduled update created for VPN client 2
Dec 28 07:10:59 vpnmgr: Retrieving recommended VPN server using NordVPN API with below parameters
Dec 28 07:10:59 vpnmgr: Protocol: UDP - Type: Standard - Country: United States - City: San Francisco
Dec 28 07:11:00 vpnmgr: Updating VPN client 2 to NordVPN server
Dec 28 07:11:00 rc_service: service 7336:notify_rc restart_vpnclient2
Dec 28 07:11:00 custom_script: Running /jffs/scripts/service-event (args: restart vpnclient2)
Dec 28 07:11:00 vpnmgr: VPN client 2 updated successfully (US6510 Standard UDP)
Dec 28 07:11:00 ovpn-client2[3050]: event_wait : Interrupted system call (code=4)
Dec 28 07:11:00 ovpn-client2[3050]: SIGTERM received, sending exit notification to peer
Dec 28 07:11:01 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=3c:7c:3f:6a:24:f8:00:01:5c:63:2c:46:08:00 SRC=46.148.233.45 DST=xxx LEN=40 TOS=0x00 PREC=0x20 TTL=227 ID=53402 PROTO=TCP SPT=57961 DPT=9262 SEQ=1796961260 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Dec 28 07:11:01 ovpn-client2[3050]: vpnrouting.sh tun12 1500 1584 10.8.0.6 255.255.255.0 init
Dec 28 07:11:01 openvpn-routing: Configuring policy rules for client 2
Dec 28 07:11:01 openvpn-routing: Tunnel down - VPN client access blocked
Dec 28 07:11:02 ovpn-client2[3050]: Closing TUN/TAP interface
Dec 28 07:11:02 ovpn-client2[3050]: net_addr_v4_del: 10.8.0.6 dev tun12
Dec 28 07:11:02 lldpd[1367]: removal request for address of 10.8.0.6%38, but no knowledge of it
Dec 28 07:11:02 ovpn-client2[3050]: ovpn-down 2 client tun12 1500 1584 10.8.0.6 255.255.255.0 init
Dec 28 07:11:02 ovpn-client2[3050]: SIGTERM[soft,exit-with-notification] received, process exiting
Dec 28 07:11:02 ovpn-client2[7578]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
Dec 28 07:11:02 ovpn-client2[7578]: OpenVPN 2.5.0 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 14 2020
Dec 28 07:11:02 ovpn-client2[7578]: library versions: OpenSSL 1.1.1i 8 Dec 2020, LZO 2.08
Dec 28 07:11:02 custom_script: Running /jffs/scripts/service-event-end (args: restart vpnclient2)
Dec 28 07:11:02 ovpn-client2[7579]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Dec 28 07:11:02 ovpn-client2[7579]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Dec 28 07:11:02 ovpn-client2[7579]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Dec 28 07:11:02 ovpn-client2[7579]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Dec 28 07:11:02 ovpn-client2[7579]: TCP/UDP: Preserving recently used remote address: [AF_INET]209.58.128.96:1194
Dec 28 07:11:02 ovpn-client2[7579]: Socket Buffers: R=[524288->1048576] S=[524288->1048576]
Dec 28 07:11:02 ovpn-client2[7579]: UDP link local: (not bound)
Dec 28 07:11:02 ovpn-client2[7579]: UDP link remote: [AF_INET]209.58.128.96:1194
Dec 28 07:11:02 ovpn-client2[7579]: TLS: Initial packet from [AF_INET]209.58.128.96:1194, sid=372b52a8 6f2a6399
Dec 28 07:11:02 ovpn-client2[7579]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Dec 28 07:11:02 ovpn-client2[7579]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Dec 28 07:11:02 ovpn-client2[7579]: VERIFY KU OK
Dec 28 07:11:02 ovpn-client2[7579]: Validating certificate extended key usage
Dec 28 07:11:02 ovpn-client2[7579]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 28 07:11:02 ovpn-client2[7579]: VERIFY EKU OK
Dec 28 07:11:02 ovpn-client2[7579]: VERIFY OK: depth=0, CN=us6510.nordvpn.com
Dec 28 07:11:02 ovpn-client2[7579]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Dec 28 07:11:02 ovpn-client2[7579]: [us6510.nordvpn.com] Peer Connection Initiated with [AF_INET]209.58.128.96:1194
Dec 28 07:11:03 ovpn-client2[7579]: SENT CONTROL [us6510.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Dec 28 07:11:03 ovpn-client2[7579]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.3.9 255.255.255.0,peer-id 5,cipher AES-256-GCM'
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: timers and/or timeouts modified
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: explicit notify parm(s) modified
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: compression parms modified
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Dec 28 07:11:03 ovpn-client2[7579]: Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: --ifconfig/up options modified
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: route options modified
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: route-related options modified
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: peer-id set
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: adjusting link_mtu to 1656
Dec 28 07:11:03 ovpn-client2[7579]: OPTIONS IMPORT: data channel crypto options modified
Dec 28 07:11:03 ovpn-client2[7579]: Data Channel: using negotiated cipher 'AES-256-GCM'
Dec 28 07:11:03 ovpn-client2[7579]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 28 07:11:03 ovpn-client2[7579]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 28 07:11:03 ovpn-client2[7579]: net_route_v4_best_gw query: dst 0.0.0.0
Dec 28 07:11:03 ovpn-client2[7579]: net_route_v4_best_gw result: via 25.0.8.1 dev tun11
Dec 28 07:11:03 ovpn-client2[7579]: TUN/TAP device tun12 opened
Dec 28 07:11:03 ovpn-client2[7579]: TUN/TAP TX queue length set to 1000
Dec 28 07:11:03 ovpn-client2[7579]: net_iface_mtu_set: mtu 1500 for tun12
Dec 28 07:11:03 ovpn-client2[7579]: net_iface_up: set tun12 up
Dec 28 07:11:03 ovpn-client2[7579]: net_addr_v4_add: 10.8.3.9/24 dev tun12
Dec 28 07:11:03 ovpn-client2[7579]: ovpn-up 2 client tun12 1500 1584 10.8.3.9 255.255.255.0 init
Dec 28 07:11:03 openvpn: Forcing 192.168.50.49 to use DNS server 103.86.96.100
Dec 28 07:11:05 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=3c:7c:3f:6a:24:f8:00:01:5c:63:2c:46:08:00 SRC=162.142.125.64 DST=xxx LEN=44 TOS=0x00 PREC=0x20 TTL=34 ID=63280 PROTO=TCP SPT=65519 DPT=8845 SEQ=1107300190 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 OPT (020405B4) MARK=0x8000000 [/FONT][/SIZE]
I have an issue with 5Ghz wifi in Beta 2.
If I choose to Enable 160 Mhz and Control Channel: Auto, the channel 100 is on and all seems to be working. However, if I set the channel 100 manually, 5Ghz is off and doesn't present in Air. The same problem with other manually set up channels, 112, 116 etc.
The third guest network shows "Default setting by Alexa/IFTTT". Anyone know what this means? Trying to maintain an Alexa free household here (I hope my new AX-86U does not have a microphone ).
Good for you and all your neighbours using the same 36-40 channels.I manually set the channel to 36 and all works fine.
Good for you and all your neighbours using the same 36-40 channels.
The correct answer comes straight after my question. I should wait for 10 minutes.
1b79675d07 Updated documentation
e39ec6d7a4 amas-utils: update RT-AX86U components from 386_41157
1f605b7e5f SDK 5.02: Update addvtoken tool for RT-AC86U
ff2a2d09d7 bwdpi: update RT-AX86U components from 384_41157 FW image
809348cdf6 SDK 5.02p1: add wl_server_socket retrieved from 386_41156 RT-AX86U FW image
04dc297351 Add missing binary blobs for RT-AX56U and RT-AX58U
e07bac6faf Refresh 386_41350 binary blobs for RT-AC68U/RT-AC86U/RT-AC88U/RT-AC5300 from GPL tarballs
380955f012 httpd: delete backed up cert when generating a new cert was requested by the user
1a7ee5b918 build: added addvtoken to copy-prebuilt
d56beb5779 Merge 386_41350 binary blobs for GT-AC2900
b24eb3c656 Merge HND5.02 SDK from 386_41350
94adc38000 build: remove exception that disabled Ookla speedtest on RT-AX56U/RT-AX58U
9fc204773a httpd: implement runner status report for RT-AC86U/GT-AC2900; fix unknown status report
8848e1dc18 webui: add Wifi Radar images to RT-AX56U sysdeps
a1d0a960e4 openvpn: use iproute2 instead of netlink for all platforms
e80b4095e4 others: remove legacy entware-setup.sh symlink
33964aba35 build: disable RSAv2 key usage
96aec67417 Bumped revision to beta 3
8b34a6ff41 Updated documentation
37f085dca2 build: updated copy-prebuilt: handle both GPL and prebuilt archives, removed cloudcheck
488dd205e9 Merge 386_41350 SDK + binary blobs for RT-AX56U and RT-AX58U
7e4c6049c9 Merge 386_41350 binary blobs for RT-AC86U
101cfdadbc Merge 386_41350 binary blobs for RT-AC3100
5eb87e84b6 Merge 386_41350 binary blobs for RT-AC5300
cc7bc87f3f Merge 386_41350 binary blobs for RT-AC88U
1df62e60ec Merge 386_41350 SDK + binary blobs for RT-AX88U
db2cd91504 webui: switched to Asus's own clientid/vendorid WAN fields; fixed JS error due to missing element IDs
c9a308469a inadyn: resync with Asus's code
a87997fce3 Merge 386_41350 binary blobs for RT-AC68U
8a6519445b Merge with GPL 386_41350 (from RT-AX88U)
I thought you didn't want to do more of this and keep it simple?386.1 Beta 3 is now available.
Note that the RT-AX86U build is a Frankenbuild containing pieces from four different releases...
Sweet. LET'S GO!386.1 Beta 3 is now available.
I thought you didn't want to do more of this and keep it simple?
Dec 29 14:08:25 RT-AX86U-AC30 ovpn-server2[3021]: client/1.129.110.41:19678 SIGTERM[soft,remote-exit] received, client-instance exiting
Dec 29 14:08:39 RT-AX86U-AC30 ovpn-server1[2734]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 29 14:08:39 RT-AX86U-AC30 ovpn-server1[2734]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 29 14:08:39 RT-AX86U-AC30 ovpn-server1[2734]: TCP connection established with [AF_INET]1.129.110.41:1714
Dec 29 14:08:39 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 TLS: Initial packet from [AF_INET]1.129.110.41:1714, sid=b24fb0c1 bef02c69
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=RT-AX86U, emailAddress=me@asusrouter.lan
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=client, emailAddress=me@asusrouter.lan
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_VER=3.git::2952f561
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_PLAT=ios
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_NCP=2
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_TCPNL=1
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_PROTO=2
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_IPv6=0
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.2.2-3507
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_SSO=openurl
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_BS64DL=1
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 TLS: Username/Password authentication succeeded for username 'joescian'
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 [client] Peer Connection Initiated with [AF_INET]1.129.110.41:1714
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 MULTI: Learn: 10.8.0.2 -> client/1.129.110.41:1714
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 MULTI: primary virtual IP for client/1.129.110.41:1714: 10.8.0.2
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 Data Channel: using negotiated cipher 'AES-256-GCM'
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 PUSH: Received control message: 'PUSH_REQUEST'
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0 vpn_gateway 500,dhcp-option DOMAIN RT-AX86U-DOMAIN,dhcp-option DNS 192.168.2.242,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Dec 29 14:10:31 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 Connection reset, restarting [0]
Dec 29 14:10:31 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 SIGUSR1[soft,connection-reset] received, client-instance restarting
Dec 29 14:10:33 RT-AX86U-AC30 ovpn-server2[3021]: 1.129.110.41:14158 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 29 14:10:33 RT-AX86U-AC30 ovpn-server2[3021]: 1.129.110.41:14158 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 29 14:10:33 RT-AX86U-AC30 ovpn-server2[3021]: 1.129.110.41:14158 TLS: Initial packet from [AF_INET]1.129.110.41:14158, sid=06b57b9f dd8734ca
Dec 29 14:10:34 RT-AX86U-AC30 ovpn-server2[3021]: 1.129.110.41:14158 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=RT-AX86U, emailAddress=me@asusrouter.lan
Dec 29 14:10:34 RT-AX86U-AC30 ovpn-server2[3021]: 1.129.110.41:14158 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=client, emailAddress=me@asusrouter.lan
D
Dec 29 14:07:51 RT-AX86U-AC30 kernel: CONSOLE: 077364.104 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:08:51 RT-AX86U-AC30 kernel: CONSOLE: 077423.796 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:09:51 RT-AX86U-AC30 kernel: CONSOLE: 077483.489 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:10:51 RT-AX86U-AC30 kernel: CONSOLE: 077543.182 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:11:51 RT-AX86U-AC30 kernel: CONSOLE: 077602.874 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:12:51 RT-AX86U-AC30 kernel: CONSOLE: 077662.568 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:13:51 RT-AX86U-AC30 kernel: CONSOLE: 077722.262 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:14:42 RT-AX86U-AC30 kernel: wl0: random key value: FF71090D3A1EEA3215BE004E8EA680869EEBAF29E5FB0C3BA5C3CDB7FF6A67CB
Dec 29 14:14:42 RT-AX86U-AC30 hostapd: eth6: STA 04:d4:c4:45:f4:41 IEEE 802.11: disassociated
Dec 29 14:14:42 RT-AX86U-AC30 kernel: wl0: set timeout 5 secs to wait dev reg finish
Dec 29 14:14:42 RT-AX86U-AC30 kernel: wfd_unregisterdevice Successfully unregistered ifidx 2 wfd_idx 0
Dec 29 14:14:42 RT-AX86U-AC30 kernel: br0: port 11(wds0.0.1) entered disabled state
Dec 29 14:14:42 RT-AX86U-AC30 kernel: br0: port 10(wds0.0.1.0) entered disabled state
Dec 29 14:14:42 RT-AX86U-AC30 kernel: br1: port 9(wds0.0.1.501) entered disabled state
Dec 29 14:14:42 RT-AX86U-AC30 kernel: device wds0.0.1 left promiscuous mode
Dec 29 14:14:42 RT-AX86U-AC30 kernel: br0: port 11(wds0.0.1) entered disabled state
Dec 29 14:14:42 RT-AX86U-AC30 kernel: br0: port 10(wds0.0.1.0) entered disabled state
Dec 29 14:14:42 RT-AX86U-AC30 kernel: br1: port 9(wds0.0.1.501) entered disabled state
Dec 29 14:14:42 RT-AX86U-AC30 kernel: [0;33;41m[ERROR vlan] vlanIoctl ,657: Failed to delete VLAN device wds0.0.1.501[0m
Dec 29 14:14:42 RT-AX86U-AC30 kernel: [0;33;41m[ERROR vlan] vlanIoctl ,657: Failed to delete VLAN device wds0.0.1.0[0m
Dec 29 14:14:51 RT-AX86U-AC30 kernel: CONSOLE: 077781.957 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy
Dec 29 14:16:51 RT-AX86U-AC30 kernel: CONSOLE: 077901.346 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:17:51 RT-AX86U-AC30 kernel: CONSOLE: 077961.039 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:18:51 RT-AX86U-AC30 kernel: CONSOLE: 078020.734 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:19:51 RT-AX86U-AC30 kernel: CONSOLE: 078080.426 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:20:51 RT-AX86U-AC30 kernel: CONSOLE: 078140.117 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:21:51 RT-AX86U-AC30 kernel: CONSOLE: 078199.810 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:22:29 RT-AX86U-AC30 kernel: wl0: PSM microcode watchdog fired at 2306 (seconds). Resetting.
Dec 29 14:22:29 RT-AX86U-AC30 kernel: wl0: reason = psm watchdog at 2306 seconds. corerev 131 ucode revision 1570.159 features 0x3106
Dec 29 14:22:29 RT-AX86U-AC30 kernel: psmdebug 0x01ff000c phydebug 0x0 macctl 0x84160403 maccmd 0x4
Dec 29 14:22:29 RT-AX86U-AC30 kernel: psm_brc 0x0080 psm_brc_1 0x0240 M_UCODE_DBGST 0x2
Dec 29 14:22:29 RT-AX86U-AC30 kernel: brwk_0 0x058b brwk_1 0x0014 brwk_2 0x2a80 brwk_3 0x0ff0 brwk_4 0x0006
Dec 29 14:22:29 RT-AX86U-AC30 kernel: ifsstat 0xaf ifsstat1 0xff txectl 0x4992 txestat 0x405
Dec 29 14:22:29 RT-AX86U-AC30 kernel: rxestat1 0x481 rxestat2 0x80 rcv_frmcnt 0x0 rxe_rxcnt 0x0
Dec 29 14:22:29 RT-AX86U-AC30 kernel: wepctl 0x35
Dec 29 14:22:29 RT-AX86U-AC30 kernel: aqmf_ready0 0x0 aqmf_ready1 0x10 aqmf_ready2 0x0 aqmf_ready3 0x0
Dec 29 14:22:29 RT-AX86U-AC30 kernel: aqmf_ready4 0x0 wepstat 0x8000 wep_ivloc 0x1a wep_psdulen 0x0
Dec 29 14:22:29 RT-AX86U-AC30 kernel: rxe_errval 0x80 rxe_errmask 0x20f rxe_status3 0x20a txe_status2 0x405
Dec 29 14:22:29 RT-AX86U-AC30 kernel: dbg_bmc_status 0x0 psm_chk0_err 0x0 psm_chk1_err 0x0
Dec 29 14:22:29 RT-AX86U-AC30 kernel: PC :
Dec 29 14:22:29 RT-AX86U-AC30 kernel: R0: 0x1860 0x1860 0x1860 0x1860
Dec 29 14:22:29 RT-AX86U-AC30 kernel: psm stack_status : 0x8000
Dec 29 14:22:29 RT-AX86U-AC30 kernel: psm stack_entries:
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 0x1860
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 0x1965
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 0x1dff
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 0x1ab0
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 0x36cb
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 0x0299
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 0x10f0
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 0x0afd
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 0) usr_count = 0, schedid = 0
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 1) usr_count = 0, schedid = 0
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 2) usr_count = 0, schedid = 0
Dec 29 14:22:29 RT-AX86U-AC30 kernel: 3) usr_count = 0, schedid = 0
Dec 29 14:22:29 RT-AX86U-AC30 kernel: wl0: fatal error, reinitializing, total count of reinit's[1]
Dec 29 14:22:51 RT-AX86U-AC30 kernel: CONSOLE: 078259.505 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Dec 29 14:23:52 RT-AX86U-AC30 kernel: CONSOLE: 078319.199 wl1: wlc_ampdu_recv_addba_resp: 54:60:09:7c:93:9e: Failed. status 37 wsize 16 policy 1
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!