MT3000 won't connect to hotspot as repeater

I am currently connected to a cell phone hot spot directly with this laptop to post this message. When I try to connect the router to the same hotspot, it tries to connect, but never gets an IP address. What is going on and how do I resolve this? Here are some of the last entries of the system log, if it’s any help.

Thu Jun 8 17:58:55 2023 kern.err kernel: [ 520.036346] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:58:55 2023 kern.err kernel: [ 520.044690] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:58:55 2023 kern.err kernel: [ 520.053037] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:58:55 2023 kern.err kernel: [ 520.061381] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:58:56 2023 kern.err kernel: [ 521.005510] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:58:56 2023 kern.err kernel: [ 521.013911] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:58:57 2023 kern.err kernel: [ 522.264020] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:58:58 2023 kern.err kernel: [ 523.252390] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:58:58 2023 kern.err kernel: [ 523.260750] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:58:58 2023 kern.err kernel: [ 523.269091] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:58:59 2023 kern.err kernel: [ 523.872280] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:02 2023 kern.err kernel: [ 526.941534] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:03 2023 daemon.err mqtt[6545]: url = https://gslb-us.goodcloud.xyz/gslb/getbucket?deviceType=1&mac=xxxxxxxx&sn=xxxxxxxx&ddns=xxxxxxxx&timestamp=1686268738&sign=bc260cf45a34962335af6feb5a54193b
Thu Jun 8 17:59:03 2023 daemon.err mqtt[6545]: utils_NLB failed!
Thu Jun 8 17:59:03 2023 kern.err kernel: [ 528.165898] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:05 2023 kern.err kernel: [ 530.012783] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:06 2023 kern.err kernel: [ 531.035288] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:08 2023 kern.err kernel: [ 533.292258] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:08 2023 kern.err kernel: [ 533.300611] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:08 2023 kern.err kernel: [ 533.308963] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:11 2023 daemon.err mqtt[6545]: url = https://gslb-us.goodcloud.xyz/gslb/getbucket?deviceType=1&mac=xxxxxxxx&sn=xxxxxxxx&ddns=xxxxxxxx&timestamp=1686268746&sign=3262a22b8d4c20b20df4b192e59bc243
Thu Jun 8 17:59:11 2023 daemon.err mqtt[6545]: utils_NLB failed!
Thu Jun 8 17:59:11 2023 kern.err kernel: [ 536.155292] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:11 2023 kern.err kernel: [ 536.163654] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:13 2023 kern.err kernel: [ 538.403760] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:14 2023 kern.err kernel: [ 539.024050] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:16 2023 kern.err kernel: [ 540.656653] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:16 2023 kern.err kernel: [ 540.665018] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:17 2023 kern.err kernel: [ 542.093065] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:18 2023 kern.err kernel: [ 543.136967] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!
Thu Jun 8 17:59:18 2023 kern.err kernel: [ 543.318804] 7981@C11L1,header_packet_process() 7108: header_packet_process(): CheckRxError!

What’s your iPhone’s model and IOS version?

It’s a Google Pixel 7A. Not an iPhone.

More information. My primary internet provider is Starlink. The Starlink router has an ethernet adapter which is connected directly to the WAN input of the Beryl AX. Since arriving at our latest destination, the ethernet connection has been showing ‘Connecting’ for the past 20 minutes or so. I managed to connect to the wifi signal of the Starlink router in the meantime.

Here is the last few lines of the system log, again. What gives? Why is it so hard to connect to an internet source?

idx = 2
Fri Jun 9 15:15:32 2023 kern.notice kernel: [ 490.064893] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=2
Fri Jun 9 15:15:32 2023 kern.notice kernel: [ 490.186029] 7981@C15L3,WPABuildPairMsg1() 5286: <=== send Msg1 of 4-way
Fri Jun 9 15:15:32 2023 kern.notice kernel: [ 490.192693] 7981@C15L3,PeerPairMsg2Action() 6209: ===>Receive msg 2
Fri Jun 9 15:15:32 2023 kern.notice kernel: [ 490.199462] 7981@C15L3,WPABuildPairMsg3() 5571: <=== send Msg3 of 4-way
Fri Jun 9 15:15:32 2023 kern.notice kernel: [ 490.206173] 7981@C15L3,PeerPairMsg4Action() 6639: ===>Receive msg 4
Fri Jun 9 15:15:32 2023 kern.warn kernel: [ 490.219688] 7981@C15L2,PeerPairMsg4Action() 7002: AP SETKEYS DONE(rax0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=6 from 16:b1:b8:52:1d:0a
Fri Jun 9 15:15:32 2023 kern.warn kernel: [ 490.219688]
Fri Jun 9 15:15:32 2023 kern.err kernel: [ 490.251897] 7981@C14L1,ReceiveBTMQuery() 1510: Find peer address in BTMPeerList already
Fri Jun 9 15:15:32 2023 daemon.info dnsmasq-dhcp[7076]: DHCPREQUEST(br-lan) 10.192.45.125 16:b1:b8:52:1d:0a
Fri Jun 9 15:15:32 2023 daemon.info dnsmasq-dhcp[7076]: DHCPACK(br-lan) 10.192.45.125 16:b1:b8:52:1d:0a Pixel-6a
Fri Jun 9 15:15:33 2023 kern.warn kernel: [ 491.249423] 7981@C01L2,wifi_sys_disconn_act() 1002: wdev_idx=2
Fri Jun 9 15:15:33 2023 kern.warn kernel: [ 491.255614] 7981@C13L2,MacTableDeleteEntry() 1921: Del Sta:e2:60:d7:38:63:d6
Fri Jun 9 15:15:33 2023 daemon.info repeater: (/usr/sbin/repeater:1082) connected to ‘Stinknet(6E:AB:5B:38:F6:C6)’ channel: 36, spent 4s
Fri Jun 9 15:15:33 2023 daemon.notice netifd: Interface ‘wwan’ is enabled
Fri Jun 9 15:15:33 2023 daemon.notice netifd: Interface ‘wwan’ is setting up now
Fri Jun 9 15:15:33 2023 daemon.notice netifd: wwan (26244): udhcpc: started, v1.33.2
Fri Jun 9 15:15:33 2023 daemon.notice netifd: wwan (26244): udhcpc: sending discover
Fri Jun 9 15:15:33 2023 daemon.notice netifd: wwan (26244): udhcpc: sending select for 192.168.1.227
Fri Jun 9 15:15:33 2023 daemon.notice netifd: wwan (26244): udhcpc: lease of 192.168.1.227 obtained, lease time 3600
Fri Jun 9 15:15:33 2023 daemon.info avahi-daemon[3664]: Joining mDNS multicast group on interface apclix0.IPv4 with address 192.168.1.227.
Fri Jun 9 15:15:33 2023 daemon.info avahi-daemon[3664]: New relevant interface apclix0.IPv4 for mDNS.
Fri Jun 9 15:15:33 2023 daemon.info avahi-daemon[3664]: Registering new address record for 192.168.1.227 on apclix0.IPv4.
Fri Jun 9 15:15:33 2023 daemon.notice netifd: Interface ‘wwan’ is now up
Fri Jun 9 15:15:33 2023 daemon.info dnsmasq[7076]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Jun 9 15:15:33 2023 daemon.info dnsmasq[7076]: using only locally-known addresses for domain test
Fri Jun 9 15:15:33 2023 daemon.info dnsmasq[7076]: using only locally-known addresses for domain onion
Fri Jun 9 15:15:33 2023 daemon.info dnsmasq[7076]: using only locally-known addresses for domain localhost
Fri Jun 9 15:15:33 2023 daemon.info dnsmasq[7076]: using only locally-known addresses for domain local
Fri Jun 9 15:15:33 2023 daemon.info dnsmasq[7076]: using only locally-known addresses for domain invalid
Fri Jun 9 15:15:33 2023 daemon.info dnsmasq[7076]: using only locally-known addresses for domain bind
Fri Jun 9 15:15:33 2023 daemon.info dnsmasq[7076]: using only locally-known addresses for domain lan
Fri Jun 9 15:15:33 2023 daemon.info dnsmasq[7076]: using nameserver 192.168.1.1#53
Fri Jun 9 15:15:33 2023 kern.debug kernel: [ 491.769203] BcnCheck start after 2500 ms (ra0)
Fri Jun 9 15:15:33 2023 kern.debug kernel: [ 491.773650] BcnCheck start after 2500 ms (ra0)
Fri Jun 9 15:15:33 2023 user.notice mwan3[26257]: Execute ifup event on interface wwan (apclix0)
Fri Jun 9 15:15:33 2023 kern.debug kernel: [ 491.885025] entrytb_aid_aquire(): found non-occupied aid:6, allocated from:4
Fri Jun 9 15:15:33 2023 kern.warn kernel: [ 491.892118] 7981@C13L2,MacTableInsertEntry() 1559: New Sta:10:98:c3:d9:29:fc
Fri Jun 9 15:15:33 2023 kern.notice kernel: [ 491.901994] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1652: Recv Assoc from STA - 10:98:c3:d9:29:fc
Fri Jun 9 15:15:33 2023 kern.notice kernel: [ 491.911301] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2175: ASSOC Send ASSOC response (Status=0)…
Fri Jun 9 15:15:33 2023 kern.notice kernel: [ 491.920441] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 0
Fri Jun 9 15:15:33 2023 kern.notice kernel: [ 491.926561] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=0
Fri Jun 9 15:15:34 2023 user.notice mwan3[26257]: Starting tracker on interface wwan (apclix0)
Fri Jun 9 15:15:34 2023 kern.notice kernel: [ 492.049997] 7981@C15L3,WPABuildPairMsg1() 5286: <=== send Msg1 of 4-way
Fri Jun 9 15:15:34 2023 kern.notice kernel: [ 492.057430] 7981@C15L3,PeerPairMsg2Action() 6209: ===>Receive msg 2
Fri Jun 9 15:15:34 2023 kern.notice kernel: [ 492.064242] 7981@C15L3,WPABuildPairMsg3() 5571: <=== send Msg3 of 4-way
Fri Jun 9 15:15:34 2023 kern.notice kernel: [ 492.070887] 7981@C15L3,PeerPairMsg4Action() 6639: ===>Receive msg 4
Fri Jun 9 15:15:34 2023 kern.warn kernel: [ 492.082431] 7981@C15L2,PeerPairMsg4Action() 7002: AP SETKEYS DONE(ra0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=3 from 10:98:c3:d9:29:fc
Fri Jun 9 15:15:34 2023 kern.warn kernel: [ 492.082431]
Fri Jun 9 15:15:35 2023 kern.debug kernel: [ 493.099516] add link apclix0, blk_mc:0, link_tbl_cnt=1
Fri Jun 9 15:15:35 2023 kern.debug kernel: [ 493.104740] nf_register_hooks()
Fri Jun 9 15:15:35 2023 kern.debug kernel: [ 493.117184] add new: rax0(UP)->apclix0(UP), active path:1
Fri Jun 9 15:15:35 2023 kern.debug kernel: [ 493.122655] add new: rax1(UP)->apclix0(UP), active path:2
Fri Jun 9 15:15:35 2023 kern.debug kernel: [ 493.133437] add new: eth1(UP)->apclix0(UP), active path:3
Fri Jun 9 15:15:35 2023 user.info mwan3rtmon[7320]: Detect rtchange event.
Fri Jun 9 15:15:35 2023 user.notice firewall: Reloading firewall due to ifup of wwan (apclix0)
Fri Jun 9 15:15:38 2023 kern.err kernel: [ 496.734044] 7981@C13L1,tx_free_v3_notify_handler() 3526: ContTxFailCntTotal = 1, ContTxFailCnt300ms = 1
Fri Jun 9 15:15:38 2023 kern.err kernel: [ 496.743440] 7981@C13L1,tx_free_v3_notify_handler() 3529: token used by current wcid = 1, free_token_cnt = 2298
Fri Jun 9 15:15:41 2023 kern.debug kernel: [ 499.630801] entrytb_aid_aquire(): found non-occupied aid:10, allocated from:4
Fri Jun 9 15:15:41 2023 kern.warn kernel: [ 499.637959] 7981@C13L2,MacTableInsertEntry() 1559: New Sta:62:32:b1:0b:6c:5f
Fri Jun 9 15:15:41 2023 kern.notice kernel: [ 499.647244] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1652: Recv Assoc from STA - 62:32:b1:0b:6c:5f
Fri Jun 9 15:15:41 2023 kern.notice kernel: [ 499.656531] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2175: ASSOC Send ASSOC response (Status=0)…
Fri Jun 9 15:15:41 2023 kern.notice kernel: [ 499.665618] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 0
Fri Jun 9 15:15:41 2023 kern.notice kernel: [ 499.671646] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=0
Fri Jun 9 15:15:41 2023 kern.notice kernel: [ 499.793374] 7981@C15L3,WPABuildPairMsg1() 5286: <=== send Msg1 of 4-way
Fri Jun 9 15:15:41 2023 kern.notice kernel: [ 499.800011] 7981@C15L3,PeerPairMsg2Action() 6209: ===>Receive msg 2
Fri Jun 9 15:15:41 2023 kern.notice kernel: [ 499.806761] 7981@C15L3,WPABuildPairMsg3() 5571: <=== send Msg3 of 4-way
Fri Jun 9 15:15:41 2023 kern.notice kernel: [ 499.813425] 7981@C15L3,PeerPairMsg4Action() 6639: ===>Receive msg 4
Fri Jun 9 15:15:41 2023 kern.warn kernel: [ 499.824962] 7981@C15L2,PeerPairMsg4Action() 7002: AP SETKEYS DONE(ra0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=7 from 62:32:b1:0b:6c:5f
Fri Jun 9 15:15:41 2023 kern.warn kernel: [ 499.824962]
Fri Jun 9 15:15:45 2023 kern.warn kernel: [ 503.380846] 7981@C01L2,wifi_sys_disconn_act() 1002: wdev_idx=0
Fri Jun 9 15:15:45 2023 kern.notice kernel: [ 503.387022] 7981@C08L3,hw_ctrl_flow_v2_disconnt_act() 172: wdev_idx=0
Fri Jun 9 15:15:45 2023 kern.warn kernel: [ 503.394057] 7981@C13L2,MacTableDeleteEntry() 1921: Del Sta:3a:60:63:fd:9c:f9
Fri Jun 9 15:15:45 2023 kern.notice kernel: [ 503.401238] 7981@C08L3,ap_peer_deauth_action() 430: AUTH - receive DE-AUTH(seq-2666) from 3a:60:63:fd:9c:f9, reason=3
Fri Jun 9 15:15:45 2023 kern.debug kernel: [ 503.565743] entrytb_aid_aquire(): found non-occupied aid:7, allocated from:4
Fri Jun 9 15:15:45 2023 kern.warn kernel: [ 503.572808] 7981@C13L2,MacTableInsertEntry() 1559: New Sta:e2:60:d7:38:63:d6
Fri Jun 9 15:15:45 2023 kern.notice kernel: [ 503.582222] 7981@C08L3,ap_cmm_peer_assoc_req_action() 1652: Recv Assoc from STA - e2:60:d7:38:63:d6
Fri Jun 9 15:15:45 2023 kern.notice kernel: [ 503.591472] 7981@C08L3,ap_cmm_peer_assoc_req_action() 2175: ASSOC Send ASSOC response (Status=0)…
Fri Jun 9 15:15:45 2023 kern.notice kernel: [ 503.600557] 7981@C01L3,wifi_sys_conn_act() 1115: wdev idx = 2
Fri Jun 9 15:15:45 2023 kern.notice kernel: [ 503.606579] 7981@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=2
Fri Jun 9 15:15:45 2023 kern.notice kernel: [ 503.729101] 7981@C15L3,WPABuildPairMsg1() 5286: <=== send Msg1 of 4-way
Fri Jun 9 15:15:45 2023 kern.notice kernel: [ 503.735722] 7981@C15L3,PeerPairMsg2Action() 6209: ===>Receive msg 2
Fri Jun 9 15:15:45 2023 kern.notice kernel: [ 503.742482] 7981@C15L3,WPABuildPairMsg3() 5571: <=== send Msg3 of 4-way
Fri Jun 9 15:15:45 2023 kern.notice kernel: [ 503.749181] 7981@C15L3,PeerPairMsg4Action() 6639: ===>Receive msg 4
Fri Jun 9 15:15:45 2023 kern.warn kernel: [ 503.760808] 7981@C15L2,PeerPairMsg4Action() 7002: AP SETKEYS DONE(rax0) - AKMMap=WPA2PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=4 from e2:60:d7:38:63:d6
Fri Jun 9 15:15:45 2023 kern.warn kernel: [ 503.760808]
Fri Jun 9 15:15:45 2023 daemon.info dnsmasq-dhcp[7076]: DHCPREQUEST(br-lan) 10.192.45.182 e2:60:d7:38:63:d6
Fri Jun 9 15:15:45 2023 daemon.info dnsmasq-dhcp[7076]: DHCPACK(br-lan) 10.192.45.182 e2:60:d7:38:63:d6 Pixel-5
Fri Jun 9 15:16:35 2023 daemon.warn dnsmasq[7076]: possible DNS-rebind attack detected: 10-192-45-198.abcdefghijklmnopqrstuvwxyz012345.plex.direct
Fri Jun 9 15:19:50 2023 daemon.warn dnsmasq[7076]: possible DNS-rebind attack detected: 10-192-45-198.abcdefghijklmnopqrstuvwxyz012345.plex.direct
Fri Jun 9 15:19:50 2023 daemon.warn dnsmasq[7076]: possible DNS-rebind attack detected: 172-17-0-1.abcdefghijklmnopqrstuvwxyz012345.plex.direct

Never mind about the Starlink. The ethernet cable came loose while traveling. :thinking:

1 Like

About WiFi repeater, can you try set up a static IP address?

I’ll try and report back.

Sorry for the delay. I set up the phone as a hotspot and manually set an IP address. It worked.

2 Likes

Can you let me know the model of the cell phone?

It’s a Pixel 6a. There more though. Last night, Wifi stopped responding and didn’t broadcast SSIDs. Wired devices could see each other, but no internet. The web UI was unreachable. For the second time, I had to do a factory reset to get it to work. I set up the router again.

This morning, no SSIDs, no internet again. There’s something fundamentally wrong with this router. It needs to be replaced.

I purchased it on Feb. 13. Is it still under warranty? I am traveling in Alaska and will have to get something in a relatively tight window when I’ll be able to receive something.

Please respond. I’ll try a factory reset again, but I doubt it will provide a different result.

Did you use any USB accessories on the router? That could intefere with the wifi greatly.

If not then pls get an exchange.

I use a cellular hotspot as a backup internet provider. When I report unresponsive wifi, I am less than 8 feet (2.5 meters) from the router with nothing blocking it. I have been using this cellular hotspot since the router was new so no conditions have changed since it was working. I have sent an email to support asking about an exchange.

I see I never updated this. I received an email from GL.Inet. It seems the included power supply failed. I replaced it with a 3A USB power supply and it started working again.

2 Likes

Thanks for the update!

One more update, I had another router (MT1300) that used the same power supply. I connected my MT3000 to that power supply. After a couple of days, the MT3000 became non-responsive again. I had to do a factory reset with the reset button. It wouldn’t stay running. The 2.4G band broadcast, but the 5G band didn’t. Neither one would allow access to the user interface. I replaced the power supply with a high-amp phone charger and it has been working fine ever since. That’s two different included power supplies that caused the same problem with this router.

The included power supply says it’s 3.0 amps. A high-amp phone charger is only 2.4 amps. Either there is a design flaw with the power supplies provided or this particular router has a problem with the included supply.

When traveling in Alaska, I was nervous that the router would fail again and leave us stranded with no internet. Since we depended on it for phone service also, I bought a spare MT3000 just in case.

I am going to save my config and transfer it to the new spare I have. I’ll power it with the included supply. If it fails, it’s the power supply. If it doesn’t, there’s something wrong with the router.

Can there be a hardware problem with the router that can cause it to fail with the included power supply?