I have an AR300 and was setting it up on my network for later use. Connected via wireless and also connected via Wan and then Lan port so that I could use my desktop computer rather than a tablet. All went well, added vpn configs etc. Setup as a repeater, WISP mode , added my wireless SSID’s, checked that all was running, then removed from network
Now I have a “rogue” DCHPv4 server device on the network which hands out addresses in the 192.68.30.x range. This overrides my network DCHP server. Scanning the forum I saw a previous post in September/October 17 by oli-hall about an issue which is similar relating to DHCPv6 and there was allegedly script for a configuration file modifying the “switch_mode” script. I ssh’ed into my unit and noted that this has not been incorporated into my firmware which is 2.27.
I registered on this forum to download this script but could not find it at all . The gist of it was described was in a post called “bug report …/2359/3” by oli-hall
Two issues now
How can do to remove the rogue dchp server
What can I do to “update” my ARM300 to remove itself completely upon removal to stop this happening again when I add the unit to my network (or in fact any network) again. I assume the script if incorporated into my AR300 “config” will solve the issue?