I just purchased the AX 1800 Router for use on my boat. After successfully setting up the router, I lost my Internet connection after about 1 hour. I simply did a power restart and the router successfully connected. I thought it might be a lost lease problem after some period of time but then the connection remained all night and into the next day. Because I thought my test case was successful, I connected additional devices (which is why I also purchased the router). The connection remained active for the next several hours and then I left. The very next day (today), I attempted to access one of my cameras onboard. The connection was lost on this device and all others. Some of the devices are sensors that are critical if any of them are tripped. I did read about this issue but heard it had been solved. Are there any fixes known or just guesses and theories. If no known fix that is tried and tested works, I will return the device and unfortunately have to acquire a wireless hotspot.
First, pls make sure you upgrade to latest 4.2.1
Then pls send log when you have disconnect.
As I indicted on the email, I cannot find the logs from last Sunday. I asked if you have a way of going further back into the log history. I also cannot figure out how to attach the entire log report.
Thu Apr 6 06:56:20 2023 daemon.notice netifd: Network device ‘wlan0’ link is down
Thu Apr 6 06:56:20 2023 daemon.notice netifd: Wireless device ‘radio0’ is now down
Thu Apr 6 06:56:21 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0-1) → new PHY
Thu Apr 6 06:56:21 2023 kern.info kernel: [307379.126080] device wlan0-1 entered promiscuous mode
Thu Apr 6 06:56:21 2023 kern.info kernel: [307379.126208] br-lan: port 4(wlan0-1) entered forwarding state
Thu Apr 6 06:56:21 2023 kern.info kernel: [307379.130219] br-lan: port 4(wlan0-1) entered forwarding state
Thu Apr 6 06:56:21 2023 daemon.notice hostapd: wlan0-1: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Apr 6 06:56:21 2023 daemon.emerg hostapd: WDS: disable encap - /sys/kernel/debug/ieee80211/phy0/netdev:wlan0-1/disable_offload
Thu Apr 6 06:56:21 2023 daemon.notice hostapd: wlan0-1: interface state COUNTRY_UPDATE->ENABLED
Thu Apr 6 06:56:21 2023 daemon.notice hostapd: wlan0-1: AP-ENABLED
Thu Apr 6 06:56:21 2023 kern.info kernel: [307379.508993] br-lan: port 4(wlan0-1) entered disabled state
Thu Apr 6 06:56:22 2023 daemon.notice netifd: radio0 (2390): sh: out of range
Thu Apr 6 06:56:22 2023 daemon.err wpa_supplicant[2479]: Line 8: Invalid passphrase length 6 (expected: 8…63) ‘ONSPOT"’.
Thu Apr 6 06:56:22 2023 daemon.err wpa_supplicant[2479]: Line 8: failed to parse psk ‘“ONSPOT”’.
Thu Apr 6 06:56:22 2023 daemon.err wpa_supplicant[2479]: Line 11: failed to parse network block.
Thu Apr 6 06:56:22 2023 daemon.err wpa_supplicant[2479]: Failed to read or parse configuration ‘/var/run/wpa_supplicant-wlan-sta0.conf’.
Thu Apr 6 06:56:22 2023 daemon.notice netifd: radio0 (2390): Command failed: Invalid argument
Thu Apr 6 06:56:22 2023 daemon.notice netifd: radio0 (2390): Interface 1 setup failed: WPA_SUPPLICANT_FAILED
Thu Apr 6 06:56:22 2023 daemon.notice netifd: radio0 (2390): Failed to parse json data: unexpected end of data
Thu Apr 6 06:56:22 2023 daemon.notice netifd: radio0 (2390): WARNING (wireless_add_process): executable path /usr/sbin/wpad does not match process path (/proc/exe)
Thu Apr 6 06:56:22 2023 daemon.notice netifd: radio0 (2390): Command failed: Invalid argument
Thu Apr 6 06:56:22 2023 daemon.notice netifd: Wireless device ‘radio0’ is now up
Thu Apr 6 06:56:22 2023 daemon.notice netifd: Interface ‘wwan’ is enabled
Thu Apr 6 06:56:41 2023 daemon.info repeater: (/usr/sbin/repeater:321) : Set DFS CAC true
Thu Apr 6 06:56:41 2023 daemon.info repeater: (/usr/sbin/repeater:549) shutdown wlan-sta0
Thu Apr 6 06:56:41 2023 daemon.notice netifd: Interface ‘wwan’ is disabled
Thu Apr 6 06:56:41 2023 daemon.err repeater: (/usr/sbin/repeater:1107) connect fail
Thu Apr 6 06:56:41 2023 daemon.err repeater: (/usr/sbin/repeater:1110) reconnect in 30 seconds…
Thu Apr 6 06:56:41 2023 daemon.notice hostapd: Remove interface ‘wlan0-1’
Thu Apr 6 06:56:41 2023 daemon.notice hostapd: wlan0-1: interface state ENABLED->DISABLED
Thu Apr 6 06:56:41 2023 daemon.notice hostapd: wlan0-1: AP-DISABLED
Thu Apr 6 06:56:41 2023 daemon.notice hostapd: wlan0-1: CTRL-EVENT-TERMINATING
Thu Apr 6 06:56:41 2023 daemon.notice hostapd: nl80211: deinit ifname=wlan0-1 disabled_11b_rates=0
Thu Apr 6 06:56:41 2023 kern.info kernel: [307399.505111] device wlan0-1 left promiscuous mode
Thu Apr 6 06:56:41 2023 kern.info kernel: [307399.505181] br-lan: port 4(wlan0-1) entered disabled state
Thu Apr 6 06:56:41 2023 daemon.notice netifd: radio0 (3127): Command failed: Invalid argument
Thu Apr 6 06:56:41 2023 daemon.notice netifd: Wireless device ‘radio0’ is now down
Thu Apr 6 06:56:42 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) → new PHY
Thu Apr 6 06:56:42 2023 kern.info kernel: [307400.157592] device wlan0 entered promiscuous mode
Thu Apr 6 06:56:42 2023 kern.info kernel: [307400.157721] br-lan: port 4(wlan0) entered forwarding state
Thu Apr 6 06:56:42 2023 kern.info kernel: [307400.161391] br-lan: port 4(wlan0) entered forwarding state
Thu Apr 6 06:56:42 2023 kern.info kernel: [307400.167022] br-lan: port 4(wlan0) entered disabled state
Thu Apr 6 06:56:42 2023 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Apr 6 06:56:42 2023 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Thu Apr 6 06:56:42 2023 daemon.emerg hostapd: WDS: disable encap - /sys/kernel/debug/ieee80211/phy0/netdev:wlan0/disable_offload
Thu Apr 6 06:56:42 2023 kern.info kernel: [307400.528399] ath11k c000000.wifi: bss color param 0x81000000 set on vdev 1
Thu Apr 6 06:56:42 2023 kern.info kernel: [307400.528477] br-lan: port 4(wlan0) entered forwarding state
Thu Apr 6 06:56:42 2023 kern.info kernel: [307400.534225] br-lan: port 4(wlan0) entered forwarding state
Thu Apr 6 06:56:42 2023 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
Thu Apr 6 06:56:42 2023 daemon.notice hostapd: wlan0: AP-ENABLED
Thu Apr 6 06:56:43 2023 daemon.notice netifd: Wireless device ‘radio0’ is now up
Thu Apr 6 06:56:43 2023 daemon.notice netifd: Network device ‘wlan0’ link is up
Thu Apr 6 06:56:50 2023 kern.info kernel: [307408.548798] br-lan: port 4(wlan0) entered forwarding state
Thu Apr 6 06:57:11 2023 daemon.info repeater: (/usr/sbin/repeater:1302) new scan task…
Thu Apr 6 06:57:11 2023 daemon.info repeater: (/usr/sbin/repeater:1314) Scan starting…
Thu Apr 6 06:57:11 2023 daemon.info repeater: (/usr/sbin/repeater:792) Switching…
Thu Apr 6 06:57:11 2023 daemon.err repeater: (/usr/sbin/repeater:711) not found available network
Thu Apr 6 06:57:11 2023 daemon.err repeater: (/usr/sbin/repeater:712) reconnect in 30 seconds…
Thu Apr 6 06:57:12 2023 daemon.info repeater: (/usr/sbin/repeater:1441) .tmp.phy0.sta0: scan…
Thu Apr 6 06:57:20 2023 daemon.info repeater: (/usr/sbin/repeater:1472) .tmp.phy0.sta0: found 32 networks
Thu Apr 6 06:57:20 2023 daemon.info repeater: (/usr/sbin/repeater:1441) .tmp.phy1.sta0: scan…
Thu Apr 6 06:57:28 2023 daemon.info repeater: (/usr/sbin/repeater:1472) .tmp.phy1.sta0: found 22 networks
Thu Apr 6 06:57:28 2023 daemon.info repeater: (/usr/sbin/repeater:1357) scan finished
Thu Apr 6 06:57:41 2023 daemon.info repeater: (/usr/sbin/repeater:792) Switching…
Can you confirm the system was rebooted when this happened?
As the old log was gone and I cannot see the reason, I wonder if you can capture a more timely log if this happens again.
To send the complete log, export the log from the web panel->system->log and send to use via email.