Pericynthion
Senior Member
Is there a way to expose lower layer protocol conversation logging anywhere? (specifically WPA2 , CCMP type conversations between the client and the AP). Maybe a different logging or debug level (either through the system log or at the cmd line)?
If you saw my other thread, I was about to RMA my 66U because the 2.4Ghz was unusable - so I installed an old Apple Time Capsule in preparation.
However what I saw in the wireless log on the Apple was that 2 rogue devices with embedded clients (dropcam devices) seem to have got their config corrupted, and were 'stamping' on the radio - reauthenticating, dropping, even sending the wrong passwords on occasion over and over again. Once I reset their firmware and re-established the AP connection, all is fine.
When I saw these same devices in the 66U log, all I could see if that they were requesting new DHCP addresses along with everything else that was getting bumped on the radio, but I had zero visibility into how the STA -> AP negotiation is going on.
So the good news is I fixed my problem, but the bad news is I will need another router to diagnose it if it occurs again.
If you saw my other thread, I was about to RMA my 66U because the 2.4Ghz was unusable - so I installed an old Apple Time Capsule in preparation.
However what I saw in the wireless log on the Apple was that 2 rogue devices with embedded clients (dropcam devices) seem to have got their config corrupted, and were 'stamping' on the radio - reauthenticating, dropping, even sending the wrong passwords on occasion over and over again. Once I reset their firmware and re-established the AP connection, all is fine.
When I saw these same devices in the 66U log, all I could see if that they were requesting new DHCP addresses along with everything else that was getting bumped on the radio, but I had zero visibility into how the STA -> AP negotiation is going on.
So the good news is I fixed my problem, but the bad news is I will need another router to diagnose it if it occurs again.