华硕网络产品技术交流平台

 找回密码
 立即注册

QQ登录

只需一步,快速开始

手机号码,快捷登录

查看: 16465|回复: 1

[求助] RT-AC68U间歇性联机中断

[复制链接]

1

主题

0

回帖

13

积分

新手上路

Rank: 1

积分
13
发表于 2021-1-4 20:00:35 | 显示全部楼层 |阅读模式
买了个二手的路由器,一直出现间歇性联机中断,请大佬能够指导一下。本人不折腾,就想能够超级稳定的使用就好,先谢谢各位大佬
自己处理的经历如下:

买回来后按路由器后面的重置键重置了一下,然后打电话给电信改成桥接,成功拨号上网了,然后就发现打游戏时要断网,而且隔一会儿聚会断网一次,虽然每次断网只持续不到半分钟就会重新连上,但是很影响使用

断线的时候立刻打开路由器设置界面,现实的就是联机中断,重新连接之后IP会发生变化(申请了公网IP)

然后自己在路由器的设置页面点“更新”按钮更新了官方固件,问题依旧

网上查了一下,有大佬说到是PPP ECHO的问题,看了一下自己的路由器的PPP ECHO是关闭的,所以就打开了,然后把检测的“时间间隔”、“失败次数”都调高了,掉线次数似乎少了一些,但是依然会经常断线

然后网上搜索了很久,也有人说是光猫离路由器太近了,我也试过把光猫拿远一点,问题依旧

今天给华硕客服打电话,说更新固件后要重置,所以我又重置了一下路由器,问题依旧

这是路由器设置WAN的设置:



这是部分系统日志:
  1. Jan  4 17:40:38 syslog: wlceventd Start...
  2. Jan  4 17:40:41 acsd: selected channel spec: 0x100b (11)
  3. Jan  4 17:40:41 acsd: Adjusted channel spec: 0x100b (11)
  4. Jan  4 17:40:41 acsd: selected DFS-exit channel spec: 0x100b (11)
  5. Jan  4 17:40:41 acsd: selected channel spec: 0x100b (11)
  6. Jan  4 17:40:41 acsd: Adjusted channel spec: 0x100b (11)
  7. Jan  4 17:40:41 acsd: selected channel spec: 0x100b (11)
  8. Jan  4 17:40:41 acsd: acs_set_chspec: 0x100b (11) for reason APCS_INIT
  9. Jan  4 17:40:42 acsd: selected channel spec: 0xe09b (149/80)
  10. Jan  4 17:40:42 acsd: Adjusted channel spec: 0xe09b (149/80)
  11. Jan  4 17:40:42 acsd: selected DFS-exit channel spec: 0xe09b (149/80)
  12. Jan  4 17:40:42 acsd: selected channel spec: 0xe09b (149/80)
  13. Jan  4 17:40:42 acsd: Adjusted channel spec: 0xe09b (149/80)
  14. Jan  4 17:40:42 acsd: selected channel spec: 0xe09b (149/80)
  15. Jan  4 17:40:42 acsd: acs_set_chspec: 0xe09b (149/80) for reason APCS_INIT
  16. Jan  4 17:40:53 roamast: ROAMING Start...
  17. Jan  4 17:40:56 syslog:  event: wl_chanspec_changed_action
  18. Jan  4 17:40:56 syslog: skip event due no re
  19. Jan  4 09:41:35 ahs: [read_json]Update ahs JSON file.
  20. Jan  4 17:41:40 syslog: wlceventd_proc_event(510): eth1: Auth 4E:D3:A3:86:0F:FD, status: Successful (0)
  21. Jan  4 17:41:40 syslog: wlceventd_proc_event(539): eth1: Assoc 4E:D3:A3:86:0F:FD, status: Successful (0)
  22. Jan  4 17:41:45 WATCHDOG: [FAUPGRADE][auto_firmware_check:(7012)]periodic_check AM 2:53
  23. Jan  4 17:41:49 WATCHDOG: [FAUPGRADE][auto_firmware_check:(7042)]retrieve firmware information
  24. Jan  4 17:41:49 WATCHDOG: [FAUPGRADE][auto_firmware_check:(7045)]user in use
  25. Jan  4 17:42:19 WATCHDOG: [FAUPGRADE][auto_firmware_check:(7042)]retrieve firmware information
  26. Jan  4 17:42:19 WATCHDOG: [FAUPGRADE][auto_firmware_check:(7045)]user in use
  27. Jan  4 17:42:49 WATCHDOG: [FAUPGRADE][auto_firmware_check:(7042)]retrieve firmware information
  28. Jan  4 17:42:49 WATCHDOG: [FAUPGRADE][auto_firmware_check:(7045)]user in use
  29. Jan  4 17:49:34 rc_service: httpd 207:notify_rc restart_net_and_phy
  30. Jan  4 17:49:36 iTunes: daemon is stoped
  31. Jan  4 17:49:36 FTP Server: daemon is stoped
  32. Jan  4 17:49:36 Samba Server: smb daemon is stoped
  33. Jan  4 17:49:36 kernel: gro disabled
  34. Jan  4 17:49:36 miniupnpd[4113]: shutting down MiniUPnPd
  35. Jan  4 09:49:38 pppd[4003]: Connection terminated.
  36. Jan  4 17:49:44 kernel: et0: et_mvlan_netdev_event: event 9 for vlan1 mvlan_en 0
  37. Jan  4 17:49:44 kernel: et0: et_mvlan_netdev_event: event 2 for vlan1 mvlan_en 0
  38. Jan  4 17:49:44 kernel: et0: et_mvlan_netdev_event: event 13 for vlan1 mvlan_en 0
  39. Jan  4 17:49:44 kernel: et0: et_mvlan_netdev_event: event 1 for vlan1 mvlan_en 0
  40. Jan  4 17:49:44 kernel: et0: et_mvlan_netdev_event: event 4 for vlan1 mvlan_en 0
  41. Jan  4 17:49:45 kernel: et0: et_mvlan_netdev_event: event 4 for vlan1 mvlan_en 0
  42. Jan  4 17:49:45 dnsmasq[6865]: ignoring nameserver 192.168.1.1 - local interface
  43. Jan  4 17:49:45 avahi-daemon[6873]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
  44. Jan  4 17:49:45 pppd[6875]: pppd 2.4.7 started by qw852654, uid 0
  45. Jan  4 17:49:45 pppd[6875]: Connected to 4c:09:b4:fb:fe:30 via interface eth0
  46. Jan  4 17:49:45 pppd[6875]: Connect: ppp0 <--> eth0
  47. Jan  4 17:49:45 pppd[6875]: PAP authentication succeeded
  48. Jan  4 17:49:45 pppd[6875]: peer from calling number 4C:09:B4:FB:FE:30 authorized
  49. Jan  4 17:49:45 pppd[6875]: local  IP address 222.210.58.2
  50. Jan  4 17:49:45 pppd[6875]: remote IP address 222.210.58.1
  51. Jan  4 17:49:45 pppd[6875]: primary   DNS address 61.139.2.69
  52. Jan  4 17:49:45 pppd[6875]: secondary DNS address 218.6.200.139
  53. Jan  4 17:49:45 syslog: wlceventd Start...
  54. Jan  4 17:49:46 avahi-daemon[6873]: Alias name "RT-AC68U" successfully established.
  55. Jan  4 17:49:46 wan: finish adding multi routes
  56. Jan  4 17:49:46 miniupnpd[6958]: version 1.9 started
  57. Jan  4 17:49:46 miniupnpd[6958]: HTTP listening on port 40673
  58. Jan  4 17:49:46 miniupnpd[6958]: Listening for NAT-PMP/PCP traffic on port 5351
  59. Jan  4 17:49:48 acsd: selected channel spec: 0x100b (11)
  60. Jan  4 17:49:48 acsd: Adjusted channel spec: 0x100b (11)
  61. Jan  4 17:49:48 acsd: selected DFS-exit channel spec: 0x100b (11)
  62. Jan  4 17:49:48 acsd: selected channel spec: 0x100b (11)
  63. Jan  4 17:49:48 acsd: Adjusted channel spec: 0x100b (11)
  64. Jan  4 17:49:48 acsd: selected channel spec: 0x100b (11)
  65. Jan  4 17:49:48 acsd: acs_set_chspec: 0x100b (11) for reason APCS_INIT
  66. Jan  4 17:49:50 acsd: selected channel spec: 0xe09b (149/80)
  67. Jan  4 17:49:50 acsd: Adjusted channel spec: 0xe09b (149/80)
  68. Jan  4 17:49:50 acsd: selected DFS-exit channel spec: 0xe09b (149/80)
  69. Jan  4 17:49:50 acsd: selected channel spec: 0xe09b (149/80)
  70. Jan  4 17:49:50 acsd: Adjusted channel spec: 0xe09b (149/80)
  71. Jan  4 17:49:50 acsd: selected channel spec: 0xe09b (149/80)
  72. Jan  4 17:49:50 acsd: acs_set_chspec: 0xe09b (149/80) for reason APCS_INIT
  73. Jan  4 17:49:50 RT-AC68U: start httpd:80
  74. Jan  4 17:49:50 miniupnpd[7034]: MiniUPnPd is already running. EXITING
  75. Jan  4 17:49:50 syslog: wlceventd_proc_event(474): eth1: Deauth_ind 4E:D3:A3:86:0F:FD, status: 0, reason: Class 3 frame received from nonassociated station (7)
  76. Jan  4 17:49:50 httpd: Save SSL certificate...80
  77. Jan  4 17:49:50 rc_service: watchdog 216:notify_rc start_cfgsync
  78. Jan  4 17:49:50 rc_service: waitting "restart_net_and_phy" via  ...
  79. Jan  4 17:49:50 httpd: mssl_cert_key_match : PASS
  80. Jan  4 17:49:50 httpd: Succeed to init SSL certificate...80
  81. Jan  4 17:49:51 WAN Connection: WAN was restored.
  82. Jan  4 17:49:56 syslog: wlceventd_proc_event(510): eth1: Auth 4E:D3:A3:86:0F:FD, status: Successful (0)
  83. Jan  4 17:49:56 syslog: wlceventd_proc_event(520): eth1: ReAssoc 4E:D3:A3:86:0F:FD, status: Successful (0)
  84. Jan  4 17:51:20 syslog: wlceventd_proc_event(491): eth1: Disassoc 4E:D3:A3:86:0F:FD, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8)
  85. Jan  4 17:51:21 syslog: wlceventd_proc_event(510): eth1: Auth 4E:D3:A3:86:0F:FD, status: Successful (0)
  86. Jan  4 17:51:21 syslog: wlceventd_proc_event(539): eth1: Assoc 4E:D3:A3:86:0F:FD, status: Successful (0)
  87. Jan  4 17:52:18 rc_service: httpd 7033:notify_rc restart_net_and_phy
  88. Jan  4 17:52:20 iTunes: daemon is stoped
  89. Jan  4 17:52:20 FTP Server: daemon is stoped
  90. Jan  4 17:52:20 Samba Server: smb daemon is stoped
  91. Jan  4 17:52:20 kernel: gro disabled
  92. Jan  4 17:52:21 miniupnpd[6958]: shutting down MiniUPnPd
  93. Jan  4 17:52:21 watchdog: restart httpd
  94. Jan  4 17:52:21 rc_service: watchdog 216:notify_rc stop_httpd
  95. Jan  4 17:52:21 rc_service: waitting "restart_net_and_phy" via  ...
  96. Jan  4 17:52:22 pppd[6875]: Connection terminated.
  97. Jan  4 17:52:27 kernel: et0: et_mvlan_netdev_event: event 9 for vlan1 mvlan_en 0
  98. Jan  4 17:52:27 kernel: et0: et_mvlan_netdev_event: event 2 for vlan1 mvlan_en 0
  99. Jan  4 17:52:28 kernel: et0: et_mvlan_netdev_event: event 13 for vlan1 mvlan_en 0
  100. Jan  4 17:52:28 kernel: et0: et_mvlan_netdev_event: event 1 for vlan1 mvlan_en 0
  101. Jan  4 17:52:28 kernel: et0: et_mvlan_netdev_event: event 4 for vlan1 mvlan_en 0
  102. Jan  4 17:52:28 kernel: et0: et_mvlan_netdev_event: event 4 for vlan1 mvlan_en 0
  103. Jan  4 17:52:28 dnsmasq[7975]: ignoring nameserver 192.168.1.1 - local interface
  104. Jan  4 17:52:28 avahi-daemon[7983]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
  105. Jan  4 17:52:29 pppd[7985]: pppd 2.4.7 started by qw852654, uid 0
  106. Jan  4 17:52:29 pppd[7985]: Connected to 4c:09:b4:fb:fe:30 via interface eth0
  107. Jan  4 17:52:29 pppd[7985]: Connect: ppp0 <--> eth0
  108. Jan  4 17:52:29 pppd[7985]: PAP authentication succeeded
  109. Jan  4 17:52:29 pppd[7985]: peer from calling number 4C:09:B4:FB:FE:30 authorized
  110. Jan  4 17:52:29 pppd[7985]: local  IP address 222.210.58.2
  111. Jan  4 17:52:29 pppd[7985]: remote IP address 222.210.58.1
  112. Jan  4 17:52:29 pppd[7985]: primary   DNS address 61.139.2.69
  113. Jan  4 17:52:29 pppd[7985]: secondary DNS address 218.6.200.139
  114. Jan  4 17:52:29 syslog: wlceventd Start...
  115. Jan  4 17:52:29 avahi-daemon[7983]: Alias name "RT-AC68U" successfully established.
  116. Jan  4 17:52:30 wan: finish adding multi routes
  117. Jan  4 17:52:30 miniupnpd[8061]: version 1.9 started
  118. Jan  4 17:52:30 miniupnpd[8061]: HTTP listening on port 44867
  119. Jan  4 17:52:30 miniupnpd[8061]: Listening for NAT-PMP/PCP traffic on port 5351
  120. Jan  4 17:52:32 acsd: selected channel spec: 0x100b (11)
  121. Jan  4 17:52:32 acsd: Adjusted channel spec: 0x100b (11)
  122. Jan  4 17:52:32 acsd: selected DFS-exit channel spec: 0x100b (11)
  123. Jan  4 17:52:32 acsd: selected channel spec: 0x100b (11)
  124. Jan  4 17:52:32 acsd: Adjusted channel spec: 0x100b (11)
  125. Jan  4 17:52:32 acsd: selected channel spec: 0x100b (11)
  126. Jan  4 17:52:32 acsd: acs_set_chspec: 0x100b (11) for reason APCS_INIT
  127. Jan  4 17:52:33 acsd: selected channel spec: 0xe09b (149/80)
  128. Jan  4 17:52:33 acsd: Adjusted channel spec: 0xe09b (149/80)
  129. Jan  4 17:52:33 acsd: selected DFS-exit channel spec: 0xe09b (149/80)
  130. Jan  4 17:52:33 acsd: selected channel spec: 0xe09b (149/80)
  131. Jan  4 17:52:33 acsd: Adjusted channel spec: 0xe09b (149/80)
  132. Jan  4 17:52:33 acsd: selected channel spec: 0xe09b (149/80)
  133. Jan  4 17:52:33 acsd: acs_set_chspec: 0xe09b (149/80) for reason APCS_INIT
  134. Jan  4 17:52:34 RT-AC68U: start httpd:80
  135. Jan  4 17:52:34 miniupnpd[8135]: MiniUPnPd is already running. EXITING
  136. Jan  4 17:52:34 rc_service: skip the event: stop_httpd.
  137. Jan  4 17:52:34 httpd: Save SSL certificate...80
  138. Jan  4 17:52:34 rc_service: watchdog 216:notify_rc start_httpd
  139. Jan  4 17:52:34 rc_service: waitting "restart_net_and_phy" via  ...
  140. Jan  4 17:52:34 httpd: mssl_cert_key_match : PASS
  141. Jan  4 17:52:34 httpd: Succeed to init SSL certificate...80
  142. Jan  4 17:52:36 syslog: wlceventd_proc_event(474): eth1: Deauth_ind 4E:D3:A3:86:0F:FD, status: 0, reason: Class 3 frame received from nonassociated station (7)
  143. Jan  4 17:52:36 syslog: wlceventd_proc_event(474): eth1: Deauth_ind 4E:D3:A3:86:0F:FD, status: 0, reason: Class 3 frame received from nonassociated station (7)
  144. Jan  4 17:52:36 syslog: wlceventd_proc_event(474): eth1: Deauth_ind 4E:D3:A3:86:0F:FD, status: 0, reason: Class 3 frame received from nonassociated station (7)
  145. Jan  4 17:52:36 syslog: wlceventd_proc_event(474): eth1: Deauth_ind 4E:D3:A3:86:0F:FD, status: 0, reason: Class 3 frame received from nonassociated station (7)
  146. Jan  4 17:52:36 syslog: wlceventd_proc_event(510): eth1: Auth 4E:D3:A3:86:0F:FD, status: Successful (0)
  147. Jan  4 17:52:36 syslog: wlceventd_proc_event(520): eth1: ReAssoc 4E:D3:A3:86:0F:FD, status: Successful (0)
  148. Jan  4 17:52:37 RT-AC68U: start httpd:80
  149. Jan  4 17:52:39 httpd: Save SSL certificate...80
  150. Jan  4 17:52:39 httpd: mssl_cert_key_match : PASS
  151. Jan  4 17:52:39 httpd: Succeed to init SSL certificate...80
  152. Jan  4 17:52:49 WAN Connection: WAN was restored.
  153. Jan  4 17:54:13 syslog: wlceventd_proc_event(510): eth1: Auth 86:55:53:34:FE:1D, status: Successful (0)
  154. Jan  4 17:54:13 syslog: wlceventd_proc_event(539): eth1: Assoc 86:55:53:34:FE:1D, status: Successful (0)
  155. Jan  4 10:00:50 disk_monitor: Got SIGALRM...
  156. Jan  4 18:04:19 syslog: wlceventd_proc_event(474): eth1: Deauth_ind 4E:D3:A3:86:0F:FD, status: 0, reason: Disassociated due to inactivity (4)
  157. Jan  4 18:07:35 acsd: selected channel spec: 0xe09b (149/80)
  158. Jan  4 18:07:35 acsd: Adjusted channel spec: 0xe09b (149/80)
  159. Jan  4 18:07:35 acsd: selected channel spec: 0xe09b (149/80)
  160. Jan  4 18:07:35 acsd: acs_set_chspec: 0xe09b (149/80) for reason APCS_CSTIMER
  161. Jan  4 18:22:39 acsd: selected channel spec: 0xe29b (157/80)
  162. Jan  4 18:22:39 acsd: Adjusted channel spec: 0xe29b (157/80)
  163. Jan  4 18:22:39 acsd: selected channel spec: 0xe29b (157/80)
  164. Jan  4 18:22:39 acsd: acs_set_chspec: 0xe29b (157/80) for reason APCS_CSTIMER
  165. Jan  4 18:37:41 acsd: selected channel spec: 0xe09b (149/80)
  166. Jan  4 18:37:41 acsd: Adjusted channel spec: 0xe09b (149/80)
  167. Jan  4 18:37:41 acsd: selected channel spec: 0xe09b (149/80)
  168. Jan  4 18:37:41 acsd: acs_set_chspec: 0xe09b (149/80) for reason APCS_CSTIMER
  169. Jan  4 18:37:53 syslog: wlceventd_proc_event(510): eth1: Auth 70:48:F7:01:61:3E, status: Successful (0)
  170. Jan  4 18:37:53 syslog: wlceventd_proc_event(539): eth1: Assoc 70:48:F7:01:61:3E, status: Successful (0)
  171. Jan  4 18:38:41 syslog: wlceventd_proc_event(510): eth1: Auth 4E:D3:A3:86:0F:FD, status: Successful (0)
  172. Jan  4 18:38:41 syslog: wlceventd_proc_event(539): eth1: Assoc 4E:D3:A3:86:0F:FD, status: Successful (0)
  173. Jan  4 18:52:43 acsd: selected channel spec: 0xe29b (157/80)
  174. Jan  4 18:52:43 acsd: Adjusted channel spec: 0xe29b (157/80)
  175. Jan  4 18:52:43 acsd: selected channel spec: 0xe29b (157/80)
  176. Jan  4 18:52:43 acsd: acs_set_chspec: 0xe29b (157/80) for reason APCS_CSTIMER
  177. Jan  4 19:07:45 acsd: selected channel spec: 0xe29b (157/80)
  178. Jan  4 19:07:45 acsd: Adjusted channel spec: 0xe29b (157/80)
  179. Jan  4 19:07:45 acsd: selected channel spec: 0xe29b (157/80)
  180. Jan  4 19:07:45 acsd: acs_set_chspec: 0xe29b (157/80) for reason APCS_CSTIMER
  181. Jan  4 19:22:47 acsd: selected channel spec: 0xe29b (157/80)
  182. Jan  4 19:22:47 acsd: Adjusted channel spec: 0xe29b (157/80)
  183. Jan  4 19:22:47 acsd: selected channel spec: 0xe29b (157/80)
  184. Jan  4 19:22:47 acsd: acs_set_chspec: 0xe29b (157/80) for reason APCS_CSTIMER
  185. Jan  4 19:37:49 acsd: selected channel spec: 0xe19b (153/80)
  186. Jan  4 19:37:49 acsd: Adjusted channel spec: 0xe19b (153/80)
  187. Jan  4 19:37:49 acsd: selected channel spec: 0xe19b (153/80)
  188. Jan  4 19:37:49 acsd: acs_set_chspec: 0xe19b (153/80) for reason APCS_CSTIMER
  189. Jan  4 19:45:28 rc_service: httpd 8133:notify_rc restart_wan_if 0
  190. Jan  4 19:45:29 pppd[7985]: Connection terminated.
  191. Jan  4 19:45:32 pppd[8725]: pppd 2.4.7 started by qw852654, uid 0
  192. Jan  4 19:45:32 pppd[8725]: Connected to 4c:09:b4:fb:fe:30 via interface eth0
  193. Jan  4 19:45:32 pppd[8725]: Connect: ppp0 <--> eth0
  194. Jan  4 19:45:32 pppd[8725]: PAP authentication succeeded
  195. Jan  4 19:45:32 pppd[8725]: peer from calling number 4C:09:B4:FB:FE:30 authorized
  196. Jan  4 19:45:33 pppd[8725]: local  IP address 222.210.58.2
  197. Jan  4 19:45:33 pppd[8725]: remote IP address 222.210.58.1
  198. Jan  4 19:45:33 pppd[8725]: primary   DNS address 61.139.2.69
  199. Jan  4 19:45:33 pppd[8725]: secondary DNS address 218.6.200.139
  200. Jan  4 19:45:36 wan: finish adding multi routes
  201. Jan  4 19:45:36 miniupnpd[8061]: shutting down MiniUPnPd
  202. Jan  4 19:45:36 miniupnpd[8809]: version 1.9 started
  203. Jan  4 19:45:36 miniupnpd[8809]: HTTP listening on port 55822
  204. Jan  4 19:45:36 miniupnpd[8809]: Listening for NAT-PMP/PCP traffic on port 5351
  205. Jan  4 19:52:51 acsd: selected channel spec: 0xe29b (157/80)
  206. Jan  4 19:52:51 acsd: Adjusted channel spec: 0xe29b (157/80)
  207. Jan  4 19:52:51 acsd: selected channel spec: 0xe29b (157/80)
  208. Jan  4 19:52:51 acsd: acs_set_chspec: 0xe29b (157/80) for reason APCS_CSTIMER
复制代码

最后是完整的系统日志



微信扫一扫,阅读更方便^_^

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

x

255

主题

3666

回帖

9047

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
9047

RT-AX86U

发表于 2021-1-5 09:19:32 | 显示全部楼层
你开启了PPP echo并延长侦测的时间和频率有效,这就说明你的宽带确实存在偶尔会响应慢的问题,你可以试试直接电脑拨号会不会有此问题发生.来排除ISP的问题
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

快速回复 返回列表 搜索 官方QQ群
×

秒后自动关闭

小黑屋|手机版|Archiver|华硕网络产品技术交流平台 ( 苏ICP备16010857号-1 )苏公网安备 32050502000499号

GMT+8, 2024-5-17 12:43 , Processed in 0.038122 second(s), 33 queries .

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表