Cannot connect to hotel Wifi with new Beryl AX - IOS devices work fine

There is no captive portal needed to connect at this hotel. My apple devices work on the hotel network when connecting directly whether PIA VPN is enabled or not on them. I usually leave OpenVPN/wireguard disabled on Beyrl AX when attempting to get it connected and only enable it on Beryl AX when I am satisfied internet is working.

@JerryZhao I do not know how to do that.

After repeater connected, then enter your Beyrl AX via ssh.
Then execute command ping gateway.

@JerryZhao
root@GL-MT3000:~# ping gateway
ping: bad address ‘gateway’
root@GL-MT3000:~#

I think you probably mean ping the IP address that appears for the Gateway.

root@GL-MT3000:~# ping 172.18.172.1
PING 172.18.172.1 (172.18.172.1): 56 data bytes
64 bytes from 172.18.172.1: seq=0 ttl=255 time=22.737 ms
64 bytes from 172.18.172.1: seq=1 ttl=255 time=19.124 ms
64 bytes from 172.18.172.1: seq=2 ttl=255 time=1.027 ms
64 bytes from 172.18.172.1: seq=3 ttl=255 time=20.316 ms
^C
— 172.18.172.1 ping statistics —
4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max = 1.027/15.801/22.737 ms
root@GL-MT3000:~#

Also I should say Beryl AX appears to be working on this hotel network for the moment. I did not do anything except sleep a few hours and try again and now Beryl AX is connected to Internet OK. Inconsistent results. I think the hotel network may have some kind of issues of its own, but it works fine with iPad and iPhone, only Beryl AX seems to suffer.

I mean you should disable the vpn on your phone when configure the router to connect to the hotel.

It is good practice whether or not the hotel has a portal.

After connected normally you can enable vpn again, on your phone or router.

1 Like

ok, I understand. Most of the time that is what I do - no VPN enabled when working on Beryl AX Admin panel. You may have seen a log entry to the contrary. I was connecting and reconnecting to Beryl AX an awful lot to try to get it to work. Usually I don’t use VPN on idevices when traveling because my goal is to let Beryl AX do Wireguard after all devices connect to it……but since Beryl AX network wasn’t working out I had moved to VPN enabled on iPad at various points.

I’m checking out of this hotel right after posting this, have to go to work and then home.

Things were OK for a while and then out of nowhere my Beryl AX network drops and then comes back to life. Log attached. Hopefully it helps gl inet Development. I will be traveling again in about a month and would like to use the Beryl AX - but not to this same hotel.

logread 4.zip (27.0 KB)

I have the same router Beryl AX and also have the same bug: MT-3000 cannot connect to hotel WiFi with Captive portal, it says on the main page:
IP: Obtaining
Gateway: Obtaining
DNS: Obtaining

The good old AR300M works like a charm, unfortunately I left the hotel and cannot provide the logs, but another two WPA2 networks without captive portal work fine. I cannot connect to my home network, trying to locate DHCP client logs to try to find the issue.

1 Like

So can you provide more details about the connecting to home wifi? Also make sure Beryl AX upgrade to 4.2.1

@alzhao Hmmm, strange, today I was able to connect to my home network. The only issue I see so far, that the router can see only 2.4G WiFI of my home SSID, and my main router broadcasts 2.4G and 5G under the same name. Not a big deal so far, I will keep an eye on it…

I have so far collated 16 various threads (not counting this one) on these and other fora from people including myself with various problems when it comes to GL.iNet working in WISP repeater mode or trying to get through captive portals. Various other people try to come up with some justification for the shortcomings of these routers but the fact remains that other devices and other travel routers that I carry with me at times like Huawei or TP-Link work flawlessly and with no issues whatsoever. Other routers lack lot of the GL.iNet features but the latter is unfortunately not always guaranteed to fulfil its main function as a travel router by repeating a WiFi connection.

7 Likes

Unfortunately I have to agree with you. I bought the beryl a. mt-3000 in the hopes I could use it rather than the heavier slate ax 1800. Unfortunately I too have had very BAD luck in getting the beryl ax to connect to a hotel WiFi either with or without a captive portal. I don’t want to say I wasted my mo ey on the beryl ax, but it certainly seems like I did.

5 Likes

Let’s just hope that these issues could be resolved with future firmware updates although they have been going on for such a long time that I have almost lost any hope for future fixes.

1 Like

Same issue here. Just updated to the newest stable 4.2.1 release 2 and have exactly same problem as well. This is my short log :

Mon Apr 3 19:31:58 2023 kern.err kernel: [ 4154.417576] 7981@C00L1,mt7981_hw_auto_debug() 12131: RxFifoFullCount = 51260, Old_FRxFifoFullCount = 51151, RxMpduCount 644067981@C00L1,mt7981_hw_auto_debug() 12131: RxFifoFullCount = 51556, Old_FRxFifoFullCount = 51438, RxMpduCount 644217981@C00L1,mt7981_hw_auto_debug() 12131: RxFifoFullCount = 54395, Old_FRxFifoFullCount = 54284, RxMpduCount 64621
Mon Apr 3 19:31:58 2023 kern.notice kernel: [ 4464.223261] 7981@C09L3,sta_cntl_disassoc_conf() 1821: CNTL - Dis-associate successful
Mon Apr 3 19:31:58 2023 kern.notice kernel: [ 4464.262036] 7981@C23L3,operate_loader_phy() 394: oper_cfg: prim_ch(1), ht_bw(1), extcha(1), vht_bw(0), cen_ch_2(0), PhyMode=78!
Mon Apr 3 19:31:58 2023 kern.notice kernel: [ 4464.273518] 7981@C23L3,operate_loader_phy() 408: oper_dev after adjust: bw(1), prim_ch(1), cen_ch_1(3), cen_ch_2(0),ext_cha(1)!
Mon Apr 3 19:31:58 2023 kern.notice kernel: [ 4464.285000] 7981@C23L3,operate_loader_phy() 428: oper_radio after decision: bw(1), prim_ch(1), cen_ch_1(3), cen_ch_2(0)!
Mon Apr 3 19:31:58 2023 kern.err kernel: [ 4464.295922] 7981@C00L1,mt7981_apply_dpd_flatness_data() 624: eeprom 0x19a bit 0 is 0, do runtime cal
Mon Apr 3 19:31:58 2023 kern.notice kernel: [ 4464.305098] 7981@C03L3,MtCmdChannelSwitch() 2538: ctrl_chl=1, ctrl_ch2=0, cent_ch=3 DBDCIdx=0, ChBand=0, BW=1, TXStream=2, RXStream=2, scan(0)
Mon Apr 3 19:31:58 2023 daemon.notice netifd: Network device ‘apcli0’ link is dowm

another one after 30 mins :
Mon Apr 3 20:01:52 2023 daemon.notice netifd: wwan (3921): udhcpc: sending renew to 1.1.1.1
Mon Apr 3 20:01:52 2023 daemon.notice netifd: wwan (3921): udhcpc: lease of 10.240.50.233 obtained, lease time 1800
Mon Apr 3 20:02:09 2023 kern.notice kernel: [ 6275.086048] 7981@C09L3,sta_cntl_disassoc_conf() 1821: CNTL - Dis-associate successful
Mon Apr 3 20:02:09 2023 kern.notice kernel: [ 6275.093911] 7981@C23L3,operate_loader_phy() 394: oper_cfg: prim_ch(1), ht_bw(1), extcha(1), vht_bw(0), cen_ch_2(0), PhyMode=78!
Mon Apr 3 20:02:09 2023 kern.notice kernel: [ 6275.105396] 7981@C23L3,operate_loader_phy() 408: oper_dev after adjust: bw(1), prim_ch(1), cen_ch_1(3), cen_ch_2(0),ext_cha(1)!
Mon Apr 3 20:02:09 2023 kern.notice kernel: [ 6275.116877] 7981@C23L3,operate_loader_phy() 428: oper_radio after decision: bw(1), prim_ch(1), cen_ch_1(3), cen_ch_2(0)!
Mon Apr 3 20:02:09 2023 kern.err kernel: [ 6275.127804] 7981@C00L1,mt7981_apply_dpd_flatness_data() 624: eeprom 0x19a bit 0 is 0, do runtime cal
Mon Apr 3 20:02:09 2023 kern.notice kernel: [ 6275.136948] 7981@C03L3,MtCmdChannelSwitch() 2538: ctrl_chl=1, ctrl_ch2=0, cent_ch=3 DBDCIdx=0, ChBand=0, BW=1, TXStream=2, RXStream=2, scan(0)
Mon Apr 3 20:02:09 2023 daemon.notice netifd: Network device ‘apcli0’ link is down
Mon Apr 3 20:02:09 2023 daemon.notice netifd: Interface ‘wwan’ has link connectivity loss

Every else device works just fine. My setup is default with no VPN or any other services enabled which can potentially cause the issue ! I really would like to see quick fix in the next FW release.

I have done firmware reset after fw update, still no luck.

Firmware version 4.2.2 includes an upgrade to the WiFi driver. Could you please try it out?

Same issue here with my Beryl AX. Was on a trip and stayed at La Quinta Inn & Suites a week ago and wasted an hour trying to get my Beryl AX to connect. My phone and laptop would directly connect to the hotel wifi just fine. I even tried mac cloning my phone on the Beryl AX after accepting terms on the captive portal through my cell phone. I then gave up…and magically after a couple hours later, it started working somehow.

Same error in my case,
If lease time 1800 is 30min then I had to wait around 30 sec without internet access to establish connection.

In 4.2.2 now is like 15 sec but now I am loosing most my packets in the low internet load.
I can now access to 5G in my hotel room, when before it was impossible.

Fri Apr 7 10:29:40 2023 daemon.notice netifd: wwan (9914): udhcpc: sending renew to 1.1.1.1
Fri Apr 7 10:29:40 2023 daemon.notice netifd: wwan (9914): udhcpc: lease of 10.240.51.203 obtained, lease time 1800
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.689612] 7981@C09L3,sta_cntl_disassoc_conf() 1823: CNTL - Dis-associate successful
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.697499] 7981@C23L3,operate_loader_phy() 360: oper_cfg: prim_ch(116), ht_bw(0), extcha(1), vht_bw(0), cen_ch_2(0), PhyMode=177!
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.709267] 7981@C23L3,operate_loader_phy() 374: oper_dev after adjust: bw(0), prim_ch(116), cen_ch_1(116), cen_ch_2(0),ext_cha(0)!
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.721112] 7981@C23L3,operate_loader_phy() 393: oper_dev after decision: bw(0), prim_ch(116), cen_ch_1(116), cen_ch_2(0)!
Fri Apr 7 10:29:45 2023 kern.err kernel: [ 1870.732174] 7981@C08L1,AsicSwitchChannel() 334: AsicSwitchChannel::bandIdx:1 ch_band:1 htbw:0 vht_bw:0 bw:0 extcha:0
Fri Apr 7 10:29:45 2023 kern.err kernel: [ 1870.743089] 7981@C08L1,AsicSwitchChannel() 339: AsicSwitchChannel::primch:116 cench1:116 cench2:0 rxstream:2 ap_bw:0 apCenCh:0 Scan:0
Fri Apr 7 10:29:45 2023 kern.err kernel: [ 1870.755262] 7981@C00L1,mt7981_apply_dpd_flatness_data() 624: eeprom 0x19a bit 0 is 0, do runtime cal
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.764448] 7981@C03L3,MtCmdChannelSwitch() 2539: ctrl_chl=116, ctrl_ch2=0, cent_ch=116 DBDCIdx=1, ChBand=1, BW=0, TXStream=3, RXStream=3, scan(0)
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.778139] 7981@C03L3,MtCmdSetTxRxPath() 2799: ctrl_chl=116, ctrl_ch2=0, cent_ch=116, RxPath=7, BandIdx=1, ChBand=1, BW=0,TXStream=3, RXStream=7, scan(0)
Fri Apr 7 10:29:45 2023 kern.err kernel: [ 1870.794923] 7981@C12L1,EDCCAInit() 21078: EDCCA compensation: uni_compensation=0, bw_compensation=0, final compensation=0
Fri Apr 7 10:29:45 2023 daemon.notice netifd: Network device ‘apclix0’ link is down
Fri Apr 7 10:29:45 2023 daemon.notice netifd: Interface ‘wwan’ has link connectivity loss
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.805974] 7981@C23L3,DfsCacNormalStart() 3755: [RDM] Normal start. Enable MAC TX
Fri Apr 7 10:29:45 2023 kern.warn kernel: [ 1870.813684] 7981@C01L2,wifi_sys_disconn_act() 1002: wdev_idx=5
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.820119] 7981@C08L3,hw_ctrl_flow_v2_disconnt_act() 172: wdev_idx=5
Fri Apr 7 10:29:45 2023 kern.warn kernel: [ 1870.829942] 7981@C13L2,MacTableDeleteEntry() 1921: Del Sta:d0:ec:35:1e:e7:2f
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.837256] 7981@C01L3,wifi_sys_linkdown() 1363: wdev idx = 5
Fri Apr 7 10:29:45 2023 daemon.notice netifd: wwan (9914): udhcpc: received SIGTERM
Fri Apr 7 10:29:45 2023 daemon.notice netifd: wwan (9914): udhcpc: unicasting a release of 10.240.51.203 to 1.1.1.1
Fri Apr 7 10:29:45 2023 daemon.notice netifd: wwan (9914): udhcpc: sending release
Fri Apr 7 10:29:45 2023 daemon.notice netifd: wwan (9914): udhcpc: entering released state
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.843759] 7981@C08L3,hw_ctrl_flow_v2_link_down() 123: wdev_idx=5
Fri Apr 7 10:29:45 2023 kern.debug kernel: [ 1870.850526] del link apclix0
Fri Apr 7 10:29:45 2023 kern.debug kernel: [ 1870.853467] nf_unregister_hooks()
Fri Apr 7 10:29:45 2023 daemon.notice netifd: wwan (9914): Command failed: Permission denied
Fri Apr 7 10:29:45 2023 daemon.notice netifd: Interface ‘wwan’ is now down
Fri Apr 7 10:29:45 2023 daemon.notice netifd: Interface ‘wgclient’ has lost the connection
Fri Apr 7 10:29:45 2023 kern.debug kernel: [ 1870.857468] del path: rax0(UP)->apclix0(DN), active path:2
Fri Apr 7 10:29:45 2023 daemon.warn dnsmasq[11637]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
Fri Apr 7 10:29:45 2023 daemon.notice netifd: Interface ‘wwan’ is disabled
Fri Apr 7 10:29:45 2023 daemon.info avahi-daemon[4510]: Withdrawing address record for 10.240.51.203 on apclix0.
Fri Apr 7 10:29:45 2023 daemon.info avahi-daemon[4510]: Leaving mDNS multicast group on interface apclix0.IPv4 with address 10.240.51.203.
Fri Apr 7 10:29:45 2023 daemon.info avahi-daemon[4510]: Interface apclix0.IPv4 no longer relevant for mDNS.
Fri Apr 7 10:29:45 2023 kern.debug kernel: [ 1870.863941] nf_register_hooks()
Fri Apr 7 10:29:45 2023 daemon.notice netifd: Interface ‘wwan’ is enabled
Fri Apr 7 10:29:45 2023 daemon.notice netifd: Network device ‘wgclient’ link is down
Fri Apr 7 10:29:45 2023 kern.debug kernel: [ 1870.868323] del path: rax1(UP)->apclix0(DN), active path:1
Fri Apr 7 10:29:45 2023 kern.debug kernel: [ 1870.873895] nf_unregister_hooks()
Fri Apr 7 10:29:45 2023 kern.notice kernel: [ 1870.878372] 7981@C09L3,sta_peer_deauth_action() 311: Receive DE-AUTH from our AP
Fri Apr 7 10:29:45 2023 kern.debug kernel: [ 1870.887138] del path: eth1(UP)->apclix0(DN), active path:0
Fri Apr 7 10:29:45 2023 daemon.info dnsmasq[11637]: exiting on receipt of SIGTERM
Fri Apr 7 10:29:45 2023 user.notice mwan3[13913]: Execute ifdown event on interface wgclient (unknown)
Fri Apr 7 10:29:46 2023 daemon.notice netifd: wgclient (13914): udhcpc: started, v1.33.2
Fri Apr 7 10:29:46 2023 daemon.notice netifd: wgclient (13914): udhcpc: sending discover
Fri Apr 7 10:29:46 2023 daemon.err repeater: (/usr/sbin/repeater:1047) disconnected, wait reconnect…
Fri Apr 7 10:29:46 2023 daemon.notice netifd: Interface ‘wwan’ is disabled
Fri Apr 7 10:29:46 2023 user.notice firewall: Reloading firewall due to ifdown of wgclient ()
Fri Apr 7 10:29:46 2023 kern.warn kernel: [ 1871.883917] 7981@C09L2,cntl_connect_request() 395: type=2,len=0,caller:ApCliIfUp+0x184/0x338 [mt_wifi]
Fri Apr 7 10:29:46 2023 kern.debug kernel: [ 1871.894610] entrytb_aid_aquire(): found non-occupied aid:4, allocated from:4
Fri Apr 7 10:29:46 2023 kern.err kernel: [ 1871.901748] 7981@C12L1,SetWPAPSKKey() 1642: WPAPSK Key length(0) error, required 8 ~ 64 characters!(keyStr=)
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1871.911618] 7981@C23L3,operate_loader_phy() 360: oper_cfg: prim_ch(116), ht_bw(0), extcha(0), vht_bw(0), cen_ch_2(0), PhyMode=177!
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1871.923387] 7981@C23L3,operate_loader_phy() 374: oper_dev after adjust: bw(0), prim_ch(116), cen_ch_1(116), cen_ch_2(0),ext_cha(0)!
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1871.935216] 7981@C23L3,operate_loader_phy() 393: oper_dev after decision: bw(0), prim_ch(116), cen_ch_1(116), cen_ch_2(0)!
Fri Apr 7 10:29:46 2023 kern.err kernel: [ 1871.946297] 7981@C08L1,AsicSwitchChannel() 334: AsicSwitchChannel::bandIdx:1 ch_band:1 htbw:0 vht_bw:0 bw:0 extcha:0
Fri Apr 7 10:29:46 2023 kern.err kernel: [ 1871.956828] 7981@C08L1,AsicSwitchChannel() 339: AsicSwitchChannel::primch:116 cench1:116 cench2:0 rxstream:0 ap_bw:0 apCenCh:0 Scan:0
Fri Apr 7 10:29:46 2023 kern.err kernel: [ 1871.968960] 7981@C00L1,mt7981_apply_dpd_flatness_data() 624: eeprom 0x19a bit 0 is 0, do runtime cal
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1871.978155] 7981@C03L3,MtCmdChannelSwitch() 2539: ctrl_chl=116, ctrl_ch2=0, cent_ch=116 DBDCIdx=1, ChBand=1, BW=0, TXStream=3, RXStream=3, scan(0)
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1871.992161] 7981@C03L3,MtCmdSetTxRxPath() 2799: ctrl_chl=116, ctrl_ch2=0, cent_ch=116, RxPath=7, BandIdx=1, ChBand=1, BW=0,TXStream=3, RXStream=7, scan(0)
Fri Apr 7 10:29:46 2023 kern.err kernel: [ 1872.006342] 7981@C12L1,EDCCAInit() 21078: EDCCA compensation: uni_compensation=0, bw_compensation=0, final compensation=0
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1872.017367] 7981@C23L3,DfsCacNormalStart() 3755: [RDM] Normal start. Enable MAC TX
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1872.025159] 7981@C09L3,sta_mlme_auth_req_action() 201: wdev(type=2,wdev_idx=5,wdev_func_idx=1
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1872.033700] 7981@C09L3,sta_send_auth_req() 68: STA Start send Auth req
Fri Apr 7 10:29:46 2023 kern.err kernel: [ 1872.040231] 7981@C09L1,sta_send_auth_req() 107: AUTH - Send AUTH request seq#1 (Alg=0)…
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1872.049316] 7981@C09L3,sta_mlme_assoc_req_action() 783: ASSOC - Send ASSOC request…
Fri Apr 7 10:29:46 2023 kern.debug kernel: [ 1872.057320] ======================================> check WPA2PSK :0
Fri Apr 7 10:29:46 2023 kern.warn kernel: [ 1872.068996] 7981@C09L2,LinkUp() 3066: !!! LINK UP !!! wdev(name=apclix0,type=2,func_idx=1,PortSecured=22)
Fri Apr 7 10:29:46 2023 kern.warn kernel: [ 1872.078613] 7981@C09L2,LinkUp() 3069: BssType=1, AID=1, ssid=CYC-LincolnCourt, Channel=116, CentralChannel = 116
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1872.088848] 7981@C01L3,wifi_sys_linkup() 1231: wdev idx = 5
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1872.094694] 7981@C00L3,wtc_acquire_groupkey_wcid() 84: Found a non-occupied wtbl_idx:286 for WDEV_TYPE:2
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1872.094694] LinkToOmacIdx = 1, LinkToWdevType = 2
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1872.109137] 7981@C08L3,hw_ctrl_flow_v2_link_up() 72: wdev_idx=5
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1872.120166] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 5
Fri Apr 7 10:29:46 2023 kern.notice kernel: [ 1872.126226] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=5
Fri Apr 7 10:29:46 2023 daemon.notice netifd: Network device ‘apclix0’ link is up
Fri Apr 7 10:29:46 2023 daemon.notice netifd: Interface ‘wwan’ has link connectivity
Fri Apr 7 10:29:46 2023 user.notice mwan3[14441]: Execute ifdown event on interface wwan (unknown)
Fri Apr 7 10:29:46 2023 user.info mwan3track[10367]: Detect ifdown event on interface wwan (apclix0)
Fri Apr 7 10:29:46 2023 user.notice mwan3track[10367]: Interface wwan (apclix0) is offline
Fri Apr 7 10:29:47 2023 user.notice firewall: Reloading firewall due to ifdown of wwan ()
Fri Apr 7 10:29:47 2023 kern.debug kernel: [ 1873.145593] add link apclix0, blk_mc:0, link_tbl_cnt=1
Fri Apr 7 10:29:47 2023 kern.debug kernel: [ 1873.150779] nf_register_hooks()
Fri Apr 7 10:29:47 2023 kern.debug kernel: [ 1873.153948] add new: rax0(UP)->apclix0(UP), active path:1
Fri Apr 7 10:29:47 2023 kern.debug kernel: [ 1873.159356] add new: rax1(UP)->apclix0(UP), active path:2
Fri Apr 7 10:29:47 2023 kern.debug kernel: [ 1873.164796] add new: eth1(UP)->apclix0(UP), active path:3
Fri Apr 7 10:29:48 2023 daemon.info repeater: (/usr/sbin/repeater:1030) connected to ‘CYC-LincolnCourt(D0:EC:35:1E:E7:2F)’ channel: 116, spent 2s
Fri Apr 7 10:29:48 2023 daemon.notice netifd: Interface ‘wwan’ is enabled
Fri Apr 7 10:29:48 2023 daemon.notice netifd: Interface ‘wwan’ is setting up now
Fri Apr 7 10:29:48 2023 daemon.notice netifd: wwan (14912): udhcpc: started, v1.33.2
Fri Apr 7 10:29:48 2023 daemon.notice netifd: wwan (14912): udhcpc: sending discover
Fri Apr 7 10:29:48 2023 daemon.notice netifd: wwan (14912): udhcpc: sending select for 10.240.51.203
Fri Apr 7 10:29:48 2023 daemon.notice netifd: wwan (14912): udhcpc: lease of 10.240.51.203 obtained, lease time 1792
Fri Apr 7 10:29:48 2023 daemon.info avahi-daemon[4510]: Joining mDNS multicast group on interface apclix0.IPv4 with address 10.240.51.203.
Fri Apr 7 10:29:48 2023 daemon.info avahi-daemon[4510]: New relevant interface apclix0.IPv4 for mDNS.
Fri Apr 7 10:29:48 2023 daemon.info avahi-daemon[4510]: Registering new address record for 10.240.51.203 on apclix0.IPv4.
Fri Apr 7 10:29:48 2023 daemon.notice netifd: Interface ‘wwan’ is now up
Fri Apr 7 10:29:48 2023 user.notice mwan3[14925]: Execute ifup event on interface wwan (apclix0)
Fri Apr 7 10:29:48 2023 user.notice mwan3[14925]: Starting tracker on interface wwan (apclix0)
Fri Apr 7 10:29:48 2023 user.notice mwan3track[10367]: Stopping mwan3track for interface “wwan”
Fri Apr 7 10:29:49 2023 daemon.notice netifd: wgclient (13914): udhcpc: no lease, failing
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: Connected to system UBus
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: started, version 2.85 cachesize 150
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: DNS service limited to local subnets
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: UBus support enabled: connected to system bus
Fri Apr 7 10:29:49 2023 daemon.notice netifd: Interface ‘wgclient’ is now down
Fri Apr 7 10:29:49 2023 daemon.notice netifd: Interface ‘wgclient’ is setting up now
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq-dhcp[15161]: DHCP, IP range 192.168.9.100 – 192.168.9.249, lease time 12h
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq-dhcp[15161]: DHCP, IP range 192.168.8.100 – 192.168.8.249, lease time 12h
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain test
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain onion
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain localhost
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain local
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain invalid
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain bind
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain lan
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain test
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain onion
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain localhost
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain local
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain invalid
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain bind
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using only locally-known addresses for domain lan
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: using nameserver 10.240.48.3#53
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: read /etc/hosts - 4 addresses
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq[15161]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Apr 7 10:29:49 2023 daemon.info dnsmasq-dhcp[15161]: read /etc/ethers - 0 addresses
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’ Default
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’ Default
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’ Default
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’ Default
Fri Apr 7 10:29:49 2023 kern.debug kernel: [ 1874.698743] BcnCheck start after 2500 ms (ra0)
Fri Apr 7 10:29:49 2023 kern.debug kernel: [ 1874.703233] BcnCheck start after 2500 ms (ra0)
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’ Default
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’ Default
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’ Default
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’ Default
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’ Default
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’ Default
Fri Apr 7 10:29:49 2023 user.warn : skip line without ‘=’
Fri Apr 7 10:29:49 2023 user.notice wireguard-debug: USER=root ifname=wgclient ACTION=KEYPAIR-CREATED SHLVL=1 HOME=/ HOTPLUG_TYPE=wireguard LOGNAME=root DEVICENAME= TERM=linux SUBSYSTEM=wireguard PATH=/usr/sbin:/usr/bin:/sbin:/bin PWD=/
Fri Apr 7 10:29:50 2023 user.info mwan3rtmon[8241]: Detect rtchange event.
Fri Apr 7 10:29:50 2023 user.notice firewall: Reloading firewall due to ifup of wwan (apclix0)
Fri Apr 7 10:29:52 2023 daemon.notice netifd: Interface ‘wgclient’ is now up
Fri Apr 7 10:29:52 2023 daemon.notice netifd: Network device ‘wgclient’ link is up
Fri Apr 7 10:29:52 2023 daemon.info dnsmasq[15161]: exiting on receipt of SIGTERM
Fri Apr 7 10:29:53 2023 user.notice mwan3[16076]: Execute ifup event on interface wgclient (wgclient)
Fri Apr 7 10:29:53 2023 user.notice mwan3[16076]: Starting tracker on interface wgclient (wgclient)
Fri Apr 7 10:29:54 2023 user.info mwan3rtmon[8241]: Detect rtchange event.
Fri Apr 7 10:29:54 2023 user.notice firewall: Reloading firewall due to ifup of wgclient (wgclient)
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: Connected to system UBus
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: started, version 2.85 cachesize 150
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: DNS service limited to local subnets
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: UBus support enabled: connected to system bus
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq-dhcp[16909]: DHCP, IP range 192.168.9.100 – 192.168.9.249, lease time 12h
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq-dhcp[16909]: DHCP, IP range 192.168.8.100 – 192.168.8.249, lease time 12h
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain test
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain onion
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain localhost
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain local
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain invalid
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain bind
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain lan
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: reading /tmp/resolv.conf.wg
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain test
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain onion
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain localhost
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain local
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain invalid
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain bind
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using only locally-known addresses for domain lan
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using nameserver 10.10.10.1#53
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: using nameserver 10.10.11.1#53
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: read /etc/hosts - 4 addresses
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq[16909]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses
Fri Apr 7 10:29:56 2023 daemon.info dnsmasq-dhcp[16909]: read /etc/ethers - 0 addresses

Bumping this thread. I was in Renaissance In DC (Marriott) with my new Beryl AX and Puli. Beryl AX couldn’t even find hotel wifi. Puli was able to find the hotel wifi, but I couldn’t get past the captive portal. On entering last name and room no, it wouldn’t connect. iOS devices worked fine.

Went down to Starbucks where both devices worked. Then, came back to the room and used Puli via T-mobile.

Any progress on why Beryl AX can’t find some hotel wifi? Sadly, I was in a hurry and didn’t capture any logs.

Puli actually connect and get IP address? If the captive portal pop up, it should work.
So you put your last name and room no and nothing happen? If you suspect that it is a browser issue, can you try another browser? Just open another browser, access http (not https) website, e.g. neverssl.com and check.

@alzhao Isn’t it time to really get this sorted out starting possibly by adding a browser built into the router like so many other similar devices? I hate the need to always carry another travel router to be able to get through these captive portals and then use GL.iNET for VPN purposes. If a Firestick (not to mention android and apple phones, laptops, tablets and other travel routers) could easily navigate its way around captive portals with no problems whatsoever, then I can not really understand why one of the arguably greatest travel routers cannot achieve this absolutely vital task with minimal fuss. Pleading again with your developers to get this resolved as an absolute priority (after all of these years discussing these issues).

I am sure you know about the depth of this problem but just have a look (I can list many more posts all over the web - not to mention the countless posts on these fora- if you wish):

https://www.reddit.com/r/HomeNetworking/comments/613iu6/travel_router_doesnt_automatically_open_captive/

https://www.reddit.com/r/GlInet/comments/ss85kp/beryl_and_captive_portal_not_working/

https://www.reddit.com/r/GlInet/comments/u1q2tc/cant_connect_to_hotel_wifi_glmt1300/

https://www.reddit.com/r/GlInet/comments/w12piq/how_and_when_does_the_captive_portal_support_work/

7 Likes