GL-AR750 Connection Loss

Hello everyone,

I know that similar topics regarding periodic connection interruptions exist, but none of them were ever properly answered or the topic of debate was delegated between two users who then solved it in private.
But, in the last two months this issue has been really annoying me.
My GL-AR750 is connected (in Repeater mode) to an enterprise University network. The connection works, but sometimes it doesn’t. What happens is that the connection just drops, according to the gl-inet interface, the router isn’t connect anymore. Since I wanted to find out why, I looked into the system log but can’t explain why that keeps happening. It always has to do with a DHCP renewal:

Mon May 31 15:29:05 2021 daemon.notice netifd: wwan (8589): udhcpc: sending renew to 1.1.1.1 Mon May 31 15:29:05 2021 daemon.notice netifd: wwan (8589): udhcpc: lease of 10.29.10.165 obtained, lease time 1200 Mon May 31 15:29:38 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-STARTED EAP authentication started Mon May 31 15:29:38 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 Mon May 31 15:29:38 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected Mon May 31 15:29:38 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2' hash=91e2f5788d5810eba7ba58737de1548a8ecacd014598bc0b143e041b17052552 Mon May 31 15:29:38 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2' hash=91e2f5788d5810eba7ba58737de1548a8ecacd014598bc0b143e041b17052552 Mon May 31 15:29:38 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=DE/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=DFN-PKI/CN=DFN-Verein Certification Authority 2' hash=f660b0c256481cb2bfc67661c1ea8feee395b7141bcac36c36e04d08cd9e1582 Mon May 31 15:29:38 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=DE/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=DFN-PKI/CN=DFN-Verein Global Issuing CA' hash=1257aac2f4eeac6ca4942c2c83f0b67b41a3b47120c4d53429929513acad468c Mon May 31 15:29:39 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=DE/ST=Baden-Wuerttemberg/L=Mosbach/O=Duale Hochschule Baden-Wuerttemberg/OU=Mosbach/CN=radius-mgh.dhbw-mosbach.de' hash=990e151f6e434bcc4d66509a1e23e2f979a4e23158072be1d74103d0782e0a14 Mon May 31 15:29:39 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius-mgh.dhbw-mosbach.de Mon May 31 15:29:39 2021 daemon.notice wpa_supplicant[8539]: EAP-MSCHAPV2: Authentication succeeded Mon May 31 15:29:39 2021 daemon.notice wpa_supplicant[8539]: EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed Mon May 31 15:29:39 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully Mon May 31 15:29:39 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: PMKSA-CACHE-REMOVED 64:e9:50:b9:db:f3 0 Mon May 31 15:29:39 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: PMKSA-CACHE-ADDED 64:e9:50:b9:db:f3 0 Mon May 31 15:29:39 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: WPA: Key negotiation completed with 64:e9:50:b9:db:f3 [PTK=CCMP GTK=CCMP] Mon May 31 15:29:42 2021 daemon.notice netifd: Network device 'wlan-sta' link is down Mon May 31 15:29:42 2021 daemon.notice netifd: Interface 'wwan' has link connectivity loss Mon May 31 15:29:42 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-DISCONNECTED bssid=64:e9:50:b9:db:f3 reason=15 Mon May 31 15:29:42 2021 kern.info kernel: [ 3934.453685] wlan-sta: deauthenticated from 64:e9:50:b9:db:f3 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT) Mon May 31 15:29:42 2021 daemon.notice netifd: wwan (8589): udhcpc: received SIGTERM Mon May 31 15:29:42 2021 daemon.notice netifd: Interface 'wwan' is now down Mon May 31 15:29:42 2021 daemon.notice netifd: Interface 'wwan' is disabled Mon May 31 15:29:42 2021 daemon.notice netifd: Interface 'wwan' is enabled Mon May 31 15:29:42 2021 daemon.warn dnsmasq[3084]: no servers found in /tmp/resolv.conf.auto, will retry Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: SME: Trying to authenticate with 64:e9:50:b9:db:f3 (SSID='wohnheim' freq=2462 MHz) Mon May 31 15:29:43 2021 kern.info kernel: [ 3935.455699] wlan-sta: authenticate with 64:e9:50:b9:db:f3 Mon May 31 15:29:43 2021 kern.info kernel: [ 3935.474757] wlan-sta: send auth to 64:e9:50:b9:db:f3 (try 1/3) Mon May 31 15:29:43 2021 kern.info kernel: [ 3935.482619] wlan-sta: authenticated Mon May 31 15:29:43 2021 daemon.notice netifd: Network device 'wlan1' link is down Mon May 31 15:29:43 2021 kern.info kernel: [ 3935.531025] br-lan: port 3(wlan1) entered disabled state Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: Trying to associate with 64:e9:50:b9:db:f3 (SSID='wohnheim' freq=2462 MHz) Mon May 31 15:29:43 2021 kern.info kernel: [ 3935.549367] wlan-sta: associate with 64:e9:50:b9:db:f3 (try 1/3) Mon May 31 15:29:43 2021 daemon.notice netifd: Network device 'wlan-sta' link is up Mon May 31 15:29:43 2021 daemon.notice netifd: Interface 'wwan' has link connectivity Mon May 31 15:29:43 2021 daemon.notice netifd: Interface 'wwan' is setting up now Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: Associated with 64:e9:50:b9:db:f3 Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-STARTED EAP authentication started Mon May 31 15:29:43 2021 kern.info kernel: [ 3935.562092] wlan-sta: RX AssocResp from 64:e9:50:b9:db:f3 (capab=0x431 status=0 aid=137) Mon May 31 15:29:43 2021 kern.info kernel: [ 3935.570797] wlan-sta: associated Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected Mon May 31 15:29:43 2021 kern.debug kernel: [ 3935.625209] wlan-sta: Limiting TX power to 18 dBm as advertised by 64:e9:50:b9:db:f3 Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2' hash=91e2f5788d5810eba7ba58737de1548a8ecacd014598bc0b143e041b17052552 Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2' hash=91e2f5788d5810eba7ba58737de1548a8ecacd014598bc0b143e041b17052552 Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=DE/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=DFN-PKI/CN=DFN-Verein Certification Authority 2' hash=f660b0c256481cb2bfc67661c1ea8feee395b7141bcac36c36e04d08cd9e1582 Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=DE/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=DFN-PKI/CN=DFN-Verein Global Issuing CA' hash=1257aac2f4eeac6ca4942c2c83f0b67b41a3b47120c4d53429929513acad468c Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=DE/ST=Baden-Wuerttemberg/L=Mosbach/O=Duale Hochschule Baden-Wuerttemberg/OU=Mosbach/CN=radius-mgh.dhbw-mosbach.de' hash=990e151f6e434bcc4d66509a1e23e2f979a4e23158072be1d74103d0782e0a14 Mon May 31 15:29:43 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius-mgh.dhbw-mosbach.de Mon May 31 15:29:44 2021 daemon.notice netifd: wwan (472): udhcpc: started, v1.30.1 Mon May 31 15:29:44 2021 daemon.notice hostapd: handle_probe_req: send failed Mon May 31 15:29:44 2021 daemon.notice hostapd: handle_probe_req: send failed Mon May 31 15:29:44 2021 daemon.notice hostapd: handle_probe_req: send failed Mon May 31 15:29:44 2021 daemon.notice netifd: wwan (472): udhcpc: sending discover Mon May 31 15:29:46 2021 daemon.notice hostapd: handle_probe_req: send failed Mon May 31 15:29:46 2021 daemon.notice hostapd: handle_probe_req: send failed Mon May 31 15:29:46 2021 daemon.notice hostapd: handle_probe_req: send failed Mon May 31 15:29:46 2021 daemon.notice hostapd: handle_probe_req: send failed Mon May 31 15:29:46 2021 kern.info kernel: [ 3938.991317] br-lan: port 3(wlan1) entered blocking state Mon May 31 15:29:46 2021 kern.info kernel: [ 3938.996814] br-lan: port 3(wlan1) entered forwarding state Mon May 31 15:29:46 2021 daemon.notice netifd: Network device 'wlan1' link is up Mon May 31 15:29:47 2021 daemon.notice netifd: wwan (472): udhcpc: sending discover Mon May 31 15:29:50 2021 daemon.notice netifd: wwan (472): udhcpc: sending discover Mon May 31 15:30:14 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 Mon May 31 15:30:14 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected Mon May 31 15:30:14 2021 daemon.notice wpa_supplicant[8539]: SSL: SSL3 alert: write (local SSL3 detected an error):fatal:unexpected_message Mon May 31 15:30:14 2021 daemon.notice wpa_supplicant[8539]: OpenSSL: openssl_handshake - SSL_connect error:140940F4:SSL routines:ssl3_read_bytes:unexpected message Mon May 31 15:30:15 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-FAILURE EAP authentication failed Mon May 31 15:30:17 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: Authentication with 64:e9:50:b9:db:f3 timed out. Mon May 31 15:30:17 2021 kern.info kernel: [ 3969.265309] wlan-sta: deauthenticating from 64:e9:50:b9:db:f3 by local choice (Reason: 3=DEAUTH_LEAVING) Mon May 31 15:30:17 2021 daemon.notice netifd: Network device 'wlan-sta' link is down Mon May 31 15:30:17 2021 daemon.notice netifd: Interface 'wwan' has link connectivity loss Mon May 31 15:30:17 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-DISCONNECTED bssid=64:e9:50:b9:db:f3 reason=3 locally_generated=1 Mon May 31 15:30:17 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="wohnheim" auth_failures=1 duration=10 reason=AUTH_FAILED Mon May 31 15:30:17 2021 daemon.notice netifd: wwan (472): udhcpc: received SIGTERM Mon May 31 15:30:17 2021 daemon.notice netifd: Interface 'wwan' is now down Mon May 31 15:30:17 2021 daemon.notice netifd: Interface 'wwan' is disabled Mon May 31 15:30:17 2021 daemon.notice netifd: Interface 'wwan' is enabled Mon May 31 15:30:18 2021 daemon.notice netifd: Network device 'wlan1' link is down Mon May 31 15:30:18 2021 kern.info kernel: [ 3970.729239] br-lan: port 3(wlan1) entered disabled state Mon May 31 15:30:23 2021 kern.info kernel: [ 3975.018175] br-lan: port 3(wlan1) entered blocking state Mon May 31 15:30:23 2021 kern.info kernel: [ 3975.023728] br-lan: port 3(wlan1) entered forwarding state Mon May 31 15:30:23 2021 daemon.notice netifd: Network device 'wlan1' link is up Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-SSID-REENABLED id=0 ssid="wohnheim" Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: SME: Trying to authenticate with 64:e9:50:b9:db:f3 (SSID='wohnheim' freq=2462 MHz) Mon May 31 15:30:28 2021 kern.info kernel: [ 3980.563296] wlan-sta: authenticate with 64:e9:50:b9:db:f3 Mon May 31 15:30:28 2021 kern.info kernel: [ 3980.569377] wlan-sta: send auth to 64:e9:50:b9:db:f3 (try 1/3) Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: Trying to associate with 64:e9:50:b9:db:f3 (SSID='wohnheim' freq=2462 MHz) Mon May 31 15:30:28 2021 kern.info kernel: [ 3980.588744] wlan-sta: authenticated Mon May 31 15:30:28 2021 kern.info kernel: [ 3980.593938] br-lan: port 3(wlan1) entered disabled state Mon May 31 15:30:28 2021 daemon.notice netifd: Network device 'wlan1' link is down Mon May 31 15:30:28 2021 kern.info kernel: [ 3980.609135] wlan-sta: associate with 64:e9:50:b9:db:f3 (try 1/3) Mon May 31 15:30:28 2021 daemon.notice netifd: Network device 'wlan-sta' link is up Mon May 31 15:30:28 2021 daemon.notice netifd: Interface 'wwan' has link connectivity Mon May 31 15:30:28 2021 daemon.notice netifd: Interface 'wwan' is setting up now Mon May 31 15:30:28 2021 kern.info kernel: [ 3980.623227] wlan-sta: RX AssocResp from 64:e9:50:b9:db:f3 (capab=0x431 status=0 aid=137) Mon May 31 15:30:28 2021 kern.info kernel: [ 3980.631936] wlan-sta: associated Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: Associated with 64:e9:50:b9:db:f3 Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0 Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-STARTED EAP authentication started Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected Mon May 31 15:30:28 2021 kern.debug kernel: [ 3980.642953] wlan-sta: Limiting TX power to 18 dBm as advertised by 64:e9:50:b9:db:f3 Mon May 31 15:30:28 2021 daemon.notice netifd: wwan (1941): udhcpc: started, v1.30.1 Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2' hash=91e2f5788d5810eba7ba58737de1548a8ecacd014598bc0b143e041b17052552 Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2' hash=91e2f5788d5810eba7ba58737de1548a8ecacd014598bc0b143e041b17052552 Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=DE/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=DFN-PKI/CN=DFN-Verein Certification Authority 2' hash=f660b0c256481cb2bfc67661c1ea8feee395b7141bcac36c36e04d08cd9e1582 Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=DE/O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V./OU=DFN-PKI/CN=DFN-Verein Global Issuing CA' hash=1257aac2f4eeac6ca4942c2c83f0b67b41a3b47120c4d53429929513acad468c Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=DE/ST=Baden-Wuerttemberg/L=Mosbach/O=Duale Hochschule Baden-Wuerttemberg/OU=Mosbach/CN=radius-mgh.dhbw-mosbach.de' hash=990e151f6e434bcc4d66509a1e23e2f979a4e23158072be1d74103d0782e0a14 Mon May 31 15:30:28 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:radius-mgh.dhbw-mosbach.de Mon May 31 15:30:28 2021 daemon.notice netifd: wwan (1941): udhcpc: sending discover Mon May 31 15:30:29 2021 kern.info kernel: [ 3981.033359] br-lan: port 3(wlan1) entered blocking state Mon May 31 15:30:29 2021 kern.info kernel: [ 3981.038890] br-lan: port 3(wlan1) entered forwarding state Mon May 31 15:30:29 2021 daemon.notice netifd: Network device 'wlan1' link is up Mon May 31 15:30:29 2021 daemon.notice wpa_supplicant[8539]: EAP-MSCHAPV2: Authentication succeeded Mon May 31 15:30:29 2021 daemon.notice wpa_supplicant[8539]: EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed Mon May 31 15:30:29 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully Mon May 31 15:30:29 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: PMKSA-CACHE-REMOVED 64:e9:50:b9:db:f3 0 Mon May 31 15:30:29 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: PMKSA-CACHE-ADDED 64:e9:50:b9:db:f3 0 Mon May 31 15:30:29 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: WPA: Key negotiation completed with 64:e9:50:b9:db:f3 [PTK=CCMP GTK=CCMP] Mon May 31 15:30:29 2021 daemon.notice wpa_supplicant[8539]: wlan-sta: CTRL-EVENT-CONNECTED - Connection to 64:e9:50:b9:db:f3 completed [id=0 id_str=] Mon May 31 15:30:29 2021 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 60:32:b1:bd:ca:7a Mon May 31 15:30:29 2021 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 60:32:b1:bd:b9:05 Mon May 31 15:30:31 2021 daemon.notice netifd: wwan (1941): udhcpc: sending discover Mon May 31 15:30:32 2021 daemon.notice netifd: wwan (1941): udhcpc: sending select for 10.29.10.165 Mon May 31 15:30:32 2021 daemon.notice netifd: wwan (1941): udhcpc: lease of 10.29.10.165 obtained, lease time 1113 Mon May 31 15:30:32 2021 daemon.notice netifd: Interface 'wwan' is now up Mon May 31 15:30:32 2021 daemon.info dnsmasq[3084]: reading /tmp/resolv.conf.auto Mon May 31 15:30:32 2021 daemon.info dnsmasq[3084]: using local addresses only for domain test Mon May 31 15:30:32 2021 daemon.info dnsmasq[3084]: using local addresses only for domain onion Mon May 31 15:30:32 2021 daemon.info dnsmasq[3084]: using local addresses only for domain localhost Mon May 31 15:30:32 2021 daemon.info dnsmasq[3084]: using local addresses only for domain local Mon May 31 15:30:32 2021 daemon.info dnsmasq[3084]: using local addresses only for domain invalid Mon May 31 15:30:32 2021 daemon.info dnsmasq[3084]: using local addresses only for domain bind Mon May 31 15:30:32 2021 daemon.info dnsmasq[3084]: using local addresses only for domain lan Mon May 31 15:30:32 2021 daemon.info dnsmasq[3084]: using nameserver 10.29.1.1#53 Mon May 31 15:30:33 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:b9:05 IEEE 802.11: authenticated Mon May 31 15:30:33 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:b9:05 IEEE 802.11: associated (aid 1) Mon May 31 15:30:33 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a IEEE 802.11: authenticated Mon May 31 15:30:34 2021 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 60:32:b1:bd:b9:05 Mon May 31 15:30:34 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:b9:05 RADIUS: starting accounting session 29F89DC9A94E29C2 Mon May 31 15:30:34 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:b9:05 WPA: pairwise key handshake completed (RSN) Mon May 31 15:30:35 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a IEEE 802.11: associated (aid 2) Mon May 31 15:30:35 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a IEEE 802.11: associated (aid 2) Mon May 31 15:30:35 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a IEEE 802.11: associated (aid 2) Mon May 31 15:30:35 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a IEEE 802.11: associated (aid 2) Mon May 31 15:30:35 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a IEEE 802.11: associated (aid 2) Mon May 31 15:30:37 2021 user.info mwan3rtmon[3006]: Detect rtchange event. Mon May 31 15:30:37 2021 daemon.info dnsmasq-dhcp[3084]: DHCPDISCOVER(br-lan) 60:32:b1:bd:b9:05 Mon May 31 15:30:37 2021 daemon.info dnsmasq-dhcp[3084]: DHCPOFFER(br-lan) 192.168.8.230 60:32:b1:bd:b9:05 Mon May 31 15:30:37 2021 daemon.info dnsmasq-dhcp[3084]: DHCPDISCOVER(br-lan) 60:32:b1:bd:b9:05 Mon May 31 15:30:37 2021 daemon.info dnsmasq-dhcp[3084]: DHCPOFFER(br-lan) 192.168.8.230 60:32:b1:bd:b9:05 Mon May 31 15:30:37 2021 daemon.info dnsmasq-dhcp[3084]: DHCPREQUEST(br-lan) 192.168.8.230 60:32:b1:bd:b9:05 Mon May 31 15:30:37 2021 daemon.info dnsmasq-dhcp[3084]: DHCPACK(br-lan) 192.168.8.230 60:32:b1:bd:b9:05 Tapo_SmartPlug Mon May 31 15:30:37 2021 user.notice firewall: Reloading firewall due to ifup of wwan (wlan-sta) Mon May 31 15:30:39 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a IEEE 802.11: authenticated Mon May 31 15:30:39 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a IEEE 802.11: authenticated Mon May 31 15:30:39 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a IEEE 802.11: authenticated Mon May 31 15:30:39 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a IEEE 802.11: associated (aid 2) Mon May 31 15:30:39 2021 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 60:32:b1:bd:ca:7a Mon May 31 15:30:39 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a RADIUS: starting accounting session 2CB86217129346A6 Mon May 31 15:30:39 2021 daemon.info hostapd: wlan1: STA 60:32:b1:bd:ca:7a WPA: pairwise key handshake completed (RSN) Mon May 31 15:30:42 2021 daemon.info dnsmasq-dhcp[3084]: DHCPDISCOVER(br-lan) 60:32:b1:bd:ca:7a Mon May 31 15:30:42 2021 daemon.info dnsmasq-dhcp[3084]: DHCPOFFER(br-lan) 192.168.8.130 60:32:b1:bd:ca:7a Mon May 31 15:30:42 2021 daemon.info dnsmasq-dhcp[3084]: DHCPDISCOVER(br-lan) 60:32:b1:bd:ca:7a Mon May 31 15:30:42 2021 daemon.info dnsmasq-dhcp[3084]: DHCPOFFER(br-lan) 192.168.8.130 60:32:b1:bd:ca:7a Mon May 31 15:30:42 2021 daemon.info dnsmasq-dhcp[3084]: DHCPREQUEST(br-lan) 192.168.8.130 60:32:b1:bd:ca:7a Mon May 31 15:30:42 2021 daemon.info dnsmasq-dhcp[3084]: DHCPACK(br-lan) 192.168.8.130 60:32:b1:bd:ca:7a Tapo_SmartPlug Mon May 31 15:32:48 2021 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp Mon May 31 15:32:48 2021 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd Mon May 31 15:32:48 2021 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network Mon May 31 15:32:48 2021 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash Mon May 31 15:32:48 2021 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos Mon May 31 15:32:48 2021 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd Mon May 31 15:32:48 2021 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd Mon May 31 15:32:48 2021 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount Mon May 31 15:32:48 2021 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led Mon May 31 15:32:49 2021 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics Mon May 31 15:32:49 2021 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp Mon May 31 15:32:59 2021 daemon.err uhttpd[7290]: bind(): Address in use Mon May 31 15:32:59 2021 daemon.err uhttpd[7290]: bind(): Address in use

I’m running the latest firmware for the device (v1 folder) which is: openwrt-ar750-3.201-0402
I have already re-installed the firmware several times. First few times through the 192.168.8.1 interface and then by uploading the firmware to LuCI without keeping profiles or settings.
The connection is established through the stock router interface by using the repeater functionality.

It would be great if someone knew what steps to take next or even how to solve that issue.