华硕网络产品技术交流平台

 找回密码
 立即注册

QQ登录

只需一步,快速开始

手机号码,快捷登录

楼主: yangren13

[求助] RT-AX68U频繁断流

[复制链接]

3

主题

299

回帖

2022

积分

金牌会员

Rank: 6Rank: 6

积分
2022
发表于 2021-12-2 13:16:04 | 显示全部楼层
May  5 01:05:05 dnsmasq-dhcp[787]: DHCP, IP range 192.168.102.2 -- 192.168.102.254, lease time 1d
May  5 01:05:05 dnsmasq-dhcp[787]: DHCP, IP range 192.168.101.2 -- 192.168.101.254, lease time 1d
May  5 01:05:05 dnsmasq-dhcp[787]: DHCP, IP range 192.168.50.2 -- 192.168.50.254, lease time 1d
分错IP了吧

631

主题

6204

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
16920

RT-AC88URT-AX68U

发表于 2021-12-2 16:54:15 | 显示全部楼层
yangren13 发表于 2021-12-2 12:58
今天试了有线客户端,跟无线客户端一样有出网问题。

提供一版测试版固件给你用一下,看看有没有改善。
链接: https://pan.baidu.com/s/1yJ5jNwuWN3BA73gTVG9TRA 提取码: r1tx

7

主题

36

回帖

284

积分

中级会员

Rank: 3Rank: 3

积分
284
 楼主| 发表于 2021-12-4 12:31:16 | 显示全部楼层
Master 发表于 2021-12-2 16:54
提供一版测试版固件给你用一下,看看有没有改善。
链接: https://pan.baidu.com/s/1yJ5jNwuWN3BA73gTVG9T ...

收到。我装这个固件试用一下,看看效果。感谢。

0

主题

2

回帖

15

积分

新手上路

Rank: 1

积分
15
发表于 2022-3-1 15:58:41 | 显示全部楼层
楼主, 我也是一样5G WiFi断流,只能手动重启路由器解决。你用了哪个测试版固件,解决了吗?

631

主题

6204

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
16920

RT-AC88URT-AX68U

发表于 2022-3-2 15:59:37 | 显示全部楼层
xiaoluyi 发表于 2022-3-1 15:58
楼主, 我也是一样5G WiFi断流,只能手动重启路由器解决。你用了哪个测试版固件,解决了吗? ...

现在官网上RT-AX68U的固件,对5G断流的问题,应该是稍有改善了。

更新后,复位重新设置。

0

主题

1

回帖

10

积分

新手上路

Rank: 1

积分
10
发表于 2022-4-18 09:29:16 | 显示全部楼层
yangren13 发表于 2021-12-1 10:17
设备都连在5G上,所有设备都和路由器断开了。改连2.4G的wifi就好了。

我跟你的状况完全一样。。。

631

主题

6204

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
16920

RT-AC88URT-AX68U

发表于 2022-4-19 09:14:20 | 显示全部楼层
野兽2008 发表于 2022-4-18 09:29
我跟你的状况完全一样。。。

用这个测试版固件。
链接: https://pan.baidu.com/s/1yJ5jNwuWN3BA73gTVG9TRA 提取码: r1tx

0

主题

6

回帖

22

积分

新手上路

Rank: 1

积分
22
发表于 2022-5-31 01:20:28 | 显示全部楼层
我的只有WiFi掉线(基本都用5G),有线没问题,1-2天WiFi就无法链接,需要重启路由器或手动更换频道才能恢复正常,频道设置自动也不会自动更换?那自动啥了?

631

主题

6204

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
16920

RT-AC88URT-AX68U

发表于 2022-5-31 10:48:40 | 显示全部楼层
包租公 发表于 2022-5-31 01:20
我的只有WiFi掉线(基本都用5G),有线没问题,1-2天WiFi就无法链接,需要重启路由器或手动更换频道才能恢复 ...

系统日志里面,有没有类似“ACSD”字串,有的话,证明你的路由器在进行频道的自动侦测和选择,只是侦测选择的结果还是原来的那个频道而已。

0

主题

6

回帖

22

积分

新手上路

Rank: 1

积分
22
发表于 2022-6-1 01:28:40 | 显示全部楼层
Master 发表于 2022-5-31 10:48
系统日志里面,有没有类似“ACSD”字串,有的话,证明你的路由器在进行频道的自动侦测和选择,只是侦测选 ...

Jan  1 00:00:02 kernel: ubi2: attaching mtd10
Jan  1 00:00:02 kernel: ubi2: scanning is finished
Jan  1 00:00:02 kernel: ubi2: attached mtd10 (name "misc1", size 8 MiB)
Jan  1 00:00:02 kernel: ubi2: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
Jan  1 00:00:02 kernel: ubi2: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
Jan  1 00:00:02 kernel: ubi2: VID header offset: 2048 (aligned 2048), data offset: 4096
Jan  1 00:00:02 kernel: ubi2: good PEBs: 64, bad PEBs: 0, corrupted PEBs: 0
Jan  1 00:00:02 kernel: ubi2: user volume: 1, internal volumes: 1, max. volumes count: 128
Jan  1 00:00:02 kernel: ubi2: max/mean erase counter: 29/11, WL threshold: 4096, image sequence number: 2099130947
Jan  1 00:00:02 kernel: ubi2: available PEBs: 0, total reserved PEBs: 64, PEBs reserved for bad PEB handling: 4
Jan  1 00:00:02 kernel: ubi2: background thread "ubi_bgt2d" started, PID 395
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): background thread "ubifs_bgt2_0" started, PID 410
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): UBIFS: mounted UBI device 2, volume 0, name "nvram"
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): FS size: 5840896 bytes (5 MiB, 46 LEBs), journal size 1396736 bytes (1 MiB, 11 LEBs)
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): reserved for root: 0 bytes (0 KiB)
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): media format: w4/r0 (latest is w4/r0), UUID EEC2680F-D67F-4D6C-BF0F-1260390EA30C, small LPT model
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): un-mount UBI device 2
Jan  1 00:00:03 kernel: UBIFS (ubi2:0): background thread "ubifs_bgt2_0" stops
Jan  1 00:00:03 kernel: ubi2: detaching mtd10
Jan  1 00:00:03 kernel: ubi2: mtd10 is detached
Jan  1 00:00:03 jffs2: getting the information of jffs2
Jan  1 00:00:03 modprobe: module jffs2 not found in modules.dep
Jan  1 00:00:03 jffs2: mounting jffs2
Jan  1 00:00:04 init: notice[jffs]: Loaded
Jan  1 00:00:05 jffs2: create jffs2 successfully
Jan  1 00:00:05 kernel: Loading HND Module
Jan  1 00:00:05 kernel: igs_module_init:867:         IGS 29 create network socket successful
Jan  1 00:00:05 kernel: cfg80211: Calling CRDA to update world regulatory domain
Jan  1 00:00:05 kernel: dpsta_init: 17.10.157.2802 (r794271) cf953dc Jan 12 2021 15:19:57 msglevel 0x1
Jan  1 00:00:07 kernel: osl_skb_audit: PASS
Jan  1 00:00:07 kernel: wl_module_init: passivemode set to 0x1
Jan  1 00:00:07 kernel: wl_module_init: txworkq set to 0x0
Jan  1 00:00:07 kernel: ^[[0;32mwl_pktfwd_sys_init:  ^[[1m^[[34mWL_PKTFWD[1.1.0]^[[0m Success^[[0m
Jan  1 00:00:07 kernel: wl 0000:01:00.0: enabling device (0000 -> 0002)
Jan  1 00:00:07 kernel: wl0: creating kthread wl0-kthrd
Jan  1 00:00:07 kernel: BME Service Initialization
Jan  1 00:00:07 kernel: BME: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M Service Initialization: M2M_DD_ENAB 0x00000003
Jan  1 00:00:07 kernel: M2M: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 0 alloc rings <ffffffc01e9dc000,ffffffc017ca2000>,ffffffc013ed5000 depth 256
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 1 alloc rings <ffffffc015918000,ffffffc0158f0000>,ffffffc013ed4000 depth 256
Jan  1 00:00:07 kernel: M2M: DMA 0 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 0 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: M2M: DMA 1 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 1 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: wl0: phy_radio_attach: RF Band Cap: 2G:1 5G:1
Jan  1 00:00:07 kernel: BME:register key<1010802> user RLM sel IDX set 1 mem 2 8 hi 0 0
Jan  1 00:00:07 kernel: wl0 taf_do_enable: TAF is enabled
Jan  1 00:00:07 kernel: CSIMON module registered
Jan  1 00:00:07 kernel: wfd0-thrd WL 0 FLowControl total<22877> lo<5719> hi<2287> favor prio<4>
Jan  1 00:00:07 kernel: ^[[0;31mwfd_bind: wfd0-thrd initialized pktlists: radio 0 nodes 1032 xfer wl_pktfwd_xfer_callback+0x0/0x3f0 [wl]
Jan  1 00:00:07 kernel: ^[[0m
Jan  1 00:00:07 kernel: Creating CPU ring for queue number 0 with 1024 packets descriptor=0xffffffbffc5c02c0
Jan  1 00:00:07 kernel:  Creating CPU ring for queue number 1 with 1024 packets descriptor=0xffffffbffc5c0300
Jan  1 00:00:07 kernel:  ^[[1m^[[34m wfd_bind: Dev eth%d wfd_idx 0 wl_radio_idx 0 Type skb:sll configured WFD thread wfd0-thrd minQId/maxQId (8/9), status (0) qmask 0x3^[[0m
Jan  1 00:00:07 kernel: Instantiating WFD 0 thread
Jan  1 00:00:07 kernel: ^[[0;32mwl_wfd_bind: wl0 wfd_idx 0 success^[[0m
Jan  1 00:00:07 kernel: wfd_registerdevice Successfully registered dev eth5 ifidx 0 wfd_idx 0
Jan  1 00:00:07 kernel: eth5: Broadcom BCM6710 802.11 Wireless Controller 17.10.157.2803 (r795020)
Jan  1 00:00:07 kernel: wl 0001:01:00.0: enabling device (0000 -> 0002)
Jan  1 00:00:07 kernel: wl1: creating kthread wl1-kthrd
Jan  1 00:00:07 kernel: BME Service Initialization
Jan  1 00:00:07 kernel: BME: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M Service Initialization: M2M_DD_ENAB 0x00000003
Jan  1 00:00:07 kernel: M2M: M2M Core id 0x844 rev 129
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 0 alloc rings <ffffffc0159d4000,ffffffc01587a000>,ffffffc013e85000 depth 256
Jan  1 00:00:07 kernel: M2M: SUCCESS eng 1 alloc rings <ffffffc0158a8000,ffffffc01589c000>,ffffffc013e72000 depth 256
Jan  1 00:00:07 kernel: M2M: DMA 0 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 0 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: M2M: DMA 1 IntRcvLazy 01000000
Jan  1 00:00:07 kernel: M2M: DMA 1 RcvCtrl XmtCtrl enabled
Jan  1 00:00:07 kernel: wl1: phy_radio_attach: RF Band Cap: 2G:1 5G:1
Jan  1 00:00:07 kernel: BME:register key<1010802> user RLM sel IDX set 1 mem 2 8 hi 0 0
Jan  1 00:00:07 kernel: wl1 taf_do_enable: TAF is enabled
Jan  1 00:00:07 kernel: CSIMON module registered
Jan  1 00:00:07 kernel: wfd1-thrd WL 1 FLowControl total<22877> lo<5719> hi<2287> favor prio<4>
Jan  1 00:00:07 kernel: ^[[0;31mwfd_bind: wfd1-thrd initialized pktlists: radio 1 nodes 1032 xfer wl_pktfwd_xfer_callback+0x0/0x3f0 [wl]
Jan  1 00:00:07 kernel: ^[[0m
Jan  1 00:00:07 kernel: Creating CPU ring for queue number 2 with 1024 packets descriptor=0xffffffbffc5c0340
Jan  1 00:00:07 kernel:  Creating CPU ring for queue number 3 with 1024 packets descriptor=0xffffffbffc5c0380
Jan  1 00:00:07 kernel:  ^[[1m^[[34m wfd_bind: Dev eth%d wfd_idx 1 wl_radio_idx 1 Type skb:sll configured WFD thread wfd1-thrd minQId/maxQId (10/11), status (0) qmask 0xc^[[0m
Jan  1 00:00:07 kernel: Instantiating WFD 1 thread
Jan  1 00:00:07 kernel: ^[[0;32mwl_wfd_bind: wl1 wfd_idx 1 success^[[0m
Jan  1 00:00:07 kernel: wfd_registerdevice Successfully registered dev eth6 ifidx 0 wfd_idx 1
Jan  1 00:00:07 kernel: eth6: Broadcom BCM6710 802.11 Wireless Controller 17.10.157.2803 (r795020)
Jan  1 00:00:07 modprobe: module nf_conntrack_proto_gre not found in modules.dep
Jan  1 00:00:07 modprobe: module nf_nat_proto_gre not found in modules.dep
Jan  1 00:00:07 modprobe: module nf_conntrack_pptp not found in modules.dep
Jan  1 00:00:07 modprobe: module nf_nat_pptp not found in modules.dep
May  5 05:05:01 kernel: random: init urandom read with 30 bits of entropy available
May  5 05:05:01 kernel: proc_dostring_crashlogsave:  crash log filename is /jffs/crashlog.log
May  5 05:05:01 kernel: crashFileSet: log signature invalid !
May  5 05:05:01 kernel: ret 0 retlen 65536 buff <6>usbcore: registered new interface driver usbfs
May  5 05:05:01 kernel: usbcore: registered new interface driver hub
May  5 05:05:01 kernel: usbcore: registered new device driver usb
May  5 05:05:01 kernel: ++++ Powering up USB blocks
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: xHCI Host Controller
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: new USB bus registered, assigned bus number 1
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: hcc params 0x0250f17c hci version 0x100 quirks 0x00014010
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: irq 25, io mem 0x8000d000
May  5 05:05:01 kernel: hub 1-0:1.0: USB hub found
May  5 05:05:01 kernel: hub 1-0:1.0: config failed, hub doesn't have any ports! (err -19)
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: xHCI Host Controller
May  5 05:05:01 kernel: xhci-hcd xhci-hcd.0: new USB bus registered, assigned bus number 2
May  5 05:05:01 kernel: hub 2-0:1.0: USB hub found
May  5 05:05:01 kernel: hub 2-0:1.0: 2 ports detected
May  5 05:05:01 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
May  5 05:05:01 kernel: ehci-platform: EHCI generic platform driver
May  5 05:05:01 kernel: ehci-platform ehci-platform.0: EHCI Host Controller
May  5 05:05:01 kernel: ehci-platform ehci-platform.0: new USB bus registered, assigned bus number 3
May  5 05:05:01 kernel: ehci-platform ehci-platform.0: irq 27, io mem 0x8000c300
May  5 05:05:01 kernel: ehci-platform ehci-platform.0: USB 2.0 started, EHCI 1.00
May  5 05:05:01 kernel: hub 3-0:1.0: USB hub found
May  5 05:05:01 kernel: hub 3-0:1.0: 2 ports detected
May  5 05:05:01 kernel: ehci-pci: EHCI PCI platform driver
May  5 05:05:01 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
May  5 05:05:01 kernel: ohci-platform: OHCI generic platform driver
May  5 05:05:01 kernel: ohci-platform ohci-platform.0: Generic Platform OHCI controller
May  5 05:05:01 kernel: ohci-platform ohci-platform.0: new USB bus registered, assigned bus number 4
May  5 05:05:01 kernel: ohci-platform ohci-platform.0: irq 26, io mem 0x8000c400
May  5 05:05:01 kernel: hub 4-0:1.0: USB hub found
May  5 05:05:01 kernel: hub 4-0:1.0: 2 ports detected
May  5 05:05:01 kernel: ohci-pci: OHCI PCI platform driver
May  5 05:05:01 kernel: usbcore: registered new interface driver cdc_acm
May  5 05:05:01 kernel: cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
May  5 05:05:01 kernel: usbcore: registered new interface driver asix
May  5 05:05:01 kernel: usbcore: registered new interface driver ax88179_178a
May  5 05:05:01 kernel: usbcore: registered new interface driver cdc_ether
May  5 05:05:01 kernel: usbcore: registered new interface driver rndis_host
May  5 05:05:01 kernel: usbcore: registered new interface driver cdc_ncm
May  5 05:05:01 kernel: usbcore: registered new interface driver cdc_wdm
May  5 05:05:01 kernel: usbcore: registered new interface driver qmi_wwan
May  5 05:05:01 kernel: usbcore: registered new interface driver cdc_mbim
May  5 05:05:01 kernel: ^[[0;33;41m[ERROR pktrunner] runnerUcast_inet6addr_event,148: Could not rdpa_system_ipv6_host_address_table_find ret=-5^[[0m
May  5 05:05:01 kernel: device eth4 entered promiscuous mode
May  5 05:05:01 kernel: device eth3 entered promiscuous mode
May  5 05:05:01 kernel: device eth2 entered promiscuous mode
May  5 05:05:01 kernel: device eth1 entered promiscuous mode
May  5 05:05:01 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:01 kernel: CFG80211-ERROR) wl_allocate_wowl_config : Wowl not supported (-23)
May  5 05:05:01 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:01 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:02 kernel: device eth5 entered promiscuous mode
May  5 05:05:02 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:02 kernel: CFG80211-ERROR) wl_allocate_wowl_config : Wowl not supported (-23)
May  5 05:05:02 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:02 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:02 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 05:05:02 kernel: device eth6 entered promiscuous mode
May  5 05:05:02 kernel: br0: port 6(eth6) entered listening state
May  5 05:05:02 kernel: br0: port 6(eth6) entered listening state
May  5 05:05:02 kernel: br0: port 5(eth5) entered listening state
May  5 05:05:02 kernel: br0: port 5(eth5) entered listening state
May  5 05:05:02 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:02 kernel: CSIMON: M2M usr already registered ...
May  5 05:05:02 kernel: CSIMON:  CSIMON[1.1.0] Initialization
May  5 05:05:02 kernel: CSIMON: M2M usr already registered ...
May  5 13:05:03 wlceventd: main(961): wlceventd Start...
May  5 13:05:03 acsd: eth5: Selecting 2g band ACS policy
May  5 13:05:03 dnsmasq[971]: started, version 2.84 cachesize 1500
May  5 13:05:03 dnsmasq[971]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID no-loop-detect no-inotify no-dumpfile
May  5 13:05:03 dnsmasq[971]: warning: interface br2 does not currently exist
May  5 13:05:03 dnsmasq[971]: warning: interface br1 does not currently exist
May  5 13:05:03 dnsmasq[971]: warning: interface pptp* does not currently exist
May  5 13:05:03 dnsmasq[971]: asynchronous logging enabled, queue limit is 5 messages
May  5 13:05:03 dnsmasq-dhcp[971]: DHCP, IP range 192.168.102.2 -- 192.168.102.254, lease time 1d
May  5 13:05:03 dnsmasq-dhcp[971]: DHCP, IP range 192.168.101.2 -- 192.168.101.254, lease time 1d
May  5 13:05:03 dnsmasq-dhcp[971]: DHCP, IP range 192.168.50.2 -- 192.168.50.254, lease time 1d
May  5 13:05:03 dnsmasq[971]: read /etc/hosts - 6 addresses
May  5 13:05:03 crond[986]: crond (busybox 1.24.1) started, log level 8
May  5 13:05:03 RT-AX68U: start httpd:80
May  5 13:05:03 httpd: Save SSL certificate...80
May  5 13:05:03 avahi-daemon[1013]: Found user 'lqcabcd' (UID 0) and group 'root' (GID 0).
May  5 13:05:03 avahi-daemon[1013]: Successfully dropped root privileges.
May  5 13:05:03 avahi-daemon[1013]: avahi-daemon 0.7 starting up.
May  5 13:05:03 avahi-daemon[1013]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
May  5 13:05:03 avahi-daemon[1013]: Loading service file /tmp/avahi/services/alexa.service.
May  5 13:05:03 avahi-daemon[1013]: Loading new alias name RT-AX68U.
May  5 13:05:03 avahi-daemon[1013]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.50.1.
May  5 13:05:03 avahi-daemon[1013]: New relevant interface br0.IPv4 for mDNS.
May  5 13:05:03 avahi-daemon[1013]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1.
May  5 13:05:03 avahi-daemon[1013]: New relevant interface lo.IPv4 for mDNS.
May  5 13:05:03 avahi-daemon[1013]: Network interface enumeration completed.
May  5 13:05:03 avahi-daemon[1013]: Registering new address record for 192.168.50.1 on br0.IPv4.
May  5 13:05:03 avahi-daemon[1013]: Registering new address record for 127.0.1.1 on lo.IPv4.
May  5 13:05:03 httpd: mssl_cert_key_match : PASS
May  5 13:05:03 avahi-daemon[1013]: Registering new address record for 127.0.0.1 on lo.IPv4.
May  5 13:05:03 disk monitor: be idle
May  5 13:05:04 hour monitor: daemon is starting
May  5 13:05:04 hour monitor: daemon terminates
May  5 13:05:04 jffs2: valid logs(1)
May  5 13:05:04 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
May  5 13:05:04 miniupnpd[1086]: HTTP listening on port 57378
May  5 13:05:04 ERP: The model isn't under support list!
May  5 05:05:04 kernel: br0: port 6(eth6) entered learning state
May  5 05:05:04 kernel: br0: port 5(eth5) entered learning state
May  5 13:05:04 miniupnpd[1086]: Listening for NAT-PMP/PCP traffic on port 5351
May  5 13:05:04 lldpd[1116]: could not open either /etc/os-release or /usr/lib/os-release
May  5 13:05:04 lldpd[1116]: lsb_release information not available
May  5 13:05:04 lldpd[1122]: created chroot directory /var/run/lldpd
May  5 13:05:04 lldpd[1122]: /etc/localtime copied to chroot
May  5 13:05:04 lldpd[1122]: protocol LLDP enabled
May  5 13:05:04 lldpd[1122]: protocol CDPv1 disabled
May  5 13:05:04 lldpd[1122]: protocol CDPv2 disabled
May  5 13:05:04 lldpd[1122]: protocol SONMP disabled
May  5 13:05:04 lldpd[1122]: protocol EDP disabled
May  5 13:05:04 lldpd[1122]: protocol FDP disabled
May  5 13:05:04 lldpd[1122]: libevent 2.0.21-stable initialized with epoll method
May  5 13:05:04 lldpd[1122]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
May  5 13:05:04 lldpcli[1119]: lldpd should resume operations
May  5 13:05:04 avahi-daemon[1013]: Server startup complete. Host name is RT-AX68U.local. Local service cookie is 3241213008.
May  5 13:05:04 avahi-daemon[1013]: Alias name RT-AX68U: avahi_server_add_cname failure: The requested operation is invalid because redundant
May  5 05:05:05 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 13:05:05 avahi-daemon[1013]: Service "RT-AX68U" (/tmp/avahi/services/alexa.service) successfully established.
May  5 05:05:06 kernel: br0: topology change detected, propagating
May  5 05:05:06 kernel: br0: port 6(eth6) entered forwarding state
May  5 05:05:06 kernel: br0: topology change detected, propagating
May  5 05:05:06 kernel: br0: port 5(eth5) entered forwarding state
May  5 13:05:07 acsd: eth5: selected channel spec: 0x1009 (9)
May  5 13:05:07 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May  5 13:05:07 acsd: eth5: selected channel spec: 0x1009 (9)
May  5 13:05:07 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_INIT
May  5 13:05:07 acsd: eth6: Selecting 5g band ACS policy
May  5 13:05:07 WAN Connection: WAN(0) link down.
May  5 13:05:07 reboot scheduler: [timecheck] NTP sync error
May  5 13:05:07 dnsmasq[971]: read /etc/hosts - 6 addresses
May  5 05:05:07 kernel: SCSI subsystem initialized
May  5 13:05:07 modprobe: module scsi_wait_scan not found in modules.dep
May  5 05:05:07 kernel: usbcore: registered new interface driver usb-storage
May  5 05:05:07 kernel: usbcore: registered new interface driver uas
May  5 13:05:07 modprobe: module mbcache not found in modules.dep
May  5 13:05:07 modprobe: module jbd not found in modules.dep
May  5 13:05:07 modprobe: module ext3 not found in modules.dep
May  5 13:05:07 modprobe: module ext4 not found in modules.dep
May  5 13:05:07 modprobe: module ext2 not found in modules.dep
May  5 05:05:07 kernel: tfat: loading out-of-tree module taints kernel.
May  5 05:05:07 kernel: Tuxera FAT 12/16/32 driver version 3017.7.24.32_1 [Flags: R/W MODULE].
May  5 05:05:07 kernel: Built against headers 4.1.52 #41 SMP PREEMPT Wed Apr 7 16:46:34 CST 2021 arm64
May  5 05:05:07 kernel: Running on kernel 4.1.52 #2 SMP PREEMPT Thu Dec 30 19:02:51 CST 2021 aarch64
May  5 05:05:07 kernel: Tuxera NTFS driver 3018.6.5.3_1 [Flags: R/W MODULE].
May  5 05:05:07 kernel: Built against headers 4.1.52 #41 SMP PREEMPT Wed Apr 7 16:46:34 CST 2021 arm64
May  5 05:05:07 kernel: Running on kernel 4.1.52 #2 SMP PREEMPT Thu Dec 30 19:02:51 CST 2021 aarch64
May  5 05:05:07 kernel: Tuxera HFS+ driver 3017.6.20
May  5 05:05:07 kernel: Built against headers 4.1.52 #41 SMP PREEMPT Wed Apr 7 16:46:34 CST 2021 arm64
May  5 05:05:07 kernel: Running on kernel 4.1.52 #2 SMP PREEMPT Thu Dec 30 19:02:51 CST 2021 aarch64
May  5 13:05:07 modprobe: module btusbdrv not found in modules.dep
May  5 13:05:07 init: fwver: 3.0.0.4_386_46055-g2c347bc (snCICIA001326 /ha:24:4B:FE:6FC:28 )
May  5 13:05:08 ahs: [read_json]Update ahs JSON file.
May  5 13:05:08 Mastiff: init
May  5 05:05:08 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 13:05:08 acsd: eth6: selected channel spec: 0xe09b (149/80)
May  5 13:05:08 acsd: eth6: Adjusted channel spec: 0xe09b (149/80)
May  5 13:05:08 acsd: eth6: selected channel spec: 0xe09b (149/80)
May  5 13:05:08 acsd: acs_set_chspec: 0xe09b (149/80) for reason APCS_INIT
May  5 05:05:11 kernel: <=== Deactivate Deep Green Mode
May  5 05:05:11 kernel: bcmswlpbk0 (Ext switch port: 8) (Logical Port: 8) Virtual link UP
May  5 05:05:11 kernel: eth0 (Int switch port: 3) (Logical Port: 3) (phyId: c) Link Up at 1000 mbps full duplex
May  5 05:05:11 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 13:05:13 httpd: Succeed to init SSL certificate...80
May  5 13:05:13 BONDING: option disabled
May  5 13:05:14 roamast: ROAMING Start...
May  5 13:05:14 cfg_server:  event: wl_chanspec_changed_action
May  5 13:05:14 cfg_server: skip event due no re
May  5 05:05:14 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 13:05:16 dnsmasq[971]: read /etc/hosts - 6 addresses
May  5 13:05:16 dnsmasq[971]: using nameserver 192.168.1.1#53
May  5 13:05:16 wan: finish adding multi routes
May  5 13:05:17 miniupnpd[1086]: shutting down MiniUPnPd
May  5 13:05:17 miniupnpd: it is advised to use network interface name instead of 192.168.50.1/255.255.255.0
May  5 13:05:17 miniupnpd[1756]: HTTP listening on port 39809
May  5 13:05:17 miniupnpd[1756]: Listening for NAT-PMP/PCP traffic on port 5351
May  5 13:05:17 WAN Connection: WAN was restored.
May  5 13:05:17 dnsmasq[971]: read /etc/hosts - 6 addresses
May  5 13:05:17 dnsmasq[971]: using nameserver 192.168.1.1#53
May  5 05:05:17 kernel: cfg80211: Calling CRDA to update world regulatory domain
May  5 13:05:19 ntp: start NTP update
May 31 05:01:31 rc_service: ntp 1735:notify_rc restart_diskmon
May 31 05:01:32 disk_monitor: Finish
May 31 05:01:32 disk monitor: be idle
May 31 05:01:32 dhcp client: bound 192.168.1.5/255.255.255.0 via 192.168.1.1 for 259200 seconds.
May 30 21:01:33 kernel: tun: Universal TUN/TAP device driver, 1.6
May 30 21:01:33 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
May 30 21:01:33 kernel: cfg80211: Calling CRDA to update world regulatory domain
May 31 05:01:34 wlceventd: wlceventd_proc_event(527): eth6: Auth 16:272:FF:17:EF, status: Successful (0), rssi:0
May 31 05:01:34 wlceventd: wlceventd_proc_event(556): eth6: Assoc 16:272:FF:17:EF, status: Successful (0), rssi:-56
May 31 05:01:34 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: associated
May 31 05:01:34 hostapd: eth6: STA 16:27:d2:ff:17:ef RADIUS: starting accounting session E698E25B2402432B
May 31 05:01:34 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: pairwise key handshake completed (RSN)
May 31 05:01:34 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 05:01:34 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 05:01:35 dnsmasq-script[971]: json_object_from_file: error opening file /jffs/nmp_vc_json.js: No such file or directory
May 30 21:01:36 kernel: cfg80211: Calling CRDA to update world regulatory domain
May 30 21:01:40 kernel: cfg80211: Calling CRDA to update world regulatory domain
May 30 21:01:43 kernel: cfg80211: Calling CRDA to update world regulatory domain
May 30 21:01:46 kernel: cfg80211: Exceeded CRDA call max attempts. Not calling CRDA
May 31 05:02:13 crond[986]: time disparity of 2140797 minutes detected
May 31 05:02:50 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 05:02:50 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 05:02:50 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-69
May 31 05:02:50 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session 01BED26FE66455EF
May 31 05:02:50 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 05:02:50 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 05:02:50 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 05:03:16 WATCHDOG: [FAUPGRADE][auto_firmware_check7419)]periodic_check AM 4:41
May 31 05:03:16 WATCHDOG: [FAUPGRADE][auto_firmware_check7458)]do webs_update
May 31 05:03:56 wlceventd: wlceventd_proc_event(527): eth6: Auth DE:73:03:05:B8:A3, status: Successful (0), rssi:0
May 31 05:03:56 hostapd: eth6: STA de:73:03:05:b8:a3 IEEE 802.11: associated
May 31 05:03:56 wlceventd: wlceventd_proc_event(556): eth6: Assoc DE:73:03:05:B8:A3, status: Successful (0), rssi:-51
May 31 05:03:56 hostapd: eth6: STA de:73:03:05:b8:a3 RADIUS: starting accounting session 6530D97743025CC5
May 31 05:03:56 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: pairwise key handshake completed (RSN)
May 31 05:03:56 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.151 de:73:03:05:b8:a3
May 31 05:03:56 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.151 de:73:03:05:b8:a3
May 31 05:04:14 WATCHDOG: [FAUPGRADE][auto_firmware_check7529)]could not retrieve firmware information: webs_state_update = 1, webs_state_error = 1, webs_state_dl_error = 0, webs_state_info.len = 0
May 31 05:04:44 WATCHDOG: [FAUPGRADE][auto_firmware_check7458)]do webs_update
May 31 05:05:36 WATCHDOG: [FAUPGRADE][auto_firmware_check7529)]could not retrieve firmware information: webs_state_update = 1, webs_state_error = 1, webs_state_dl_error = 0, webs_state_info.len = 0
May 31 05:06:06 WATCHDOG: [FAUPGRADE][auto_firmware_check7458)]do webs_update
May 31 05:07:04 WATCHDOG: [FAUPGRADE][auto_firmware_check7529)]could not retrieve firmware information: webs_state_update = 1, webs_state_error = 1, webs_state_dl_error = 0, webs_state_info.len = 0
May 31 05:10:35 wlceventd: wlceventd_proc_event(527): eth6: Auth B0:73:5D:BA:9B:2C, status: Successful (0), rssi:0
May 31 05:10:35 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: associated
May 31 05:10:35 wlceventd: wlceventd_proc_event(556): eth6: Assoc B0:73:5D:BA:9B:2C, status: Successful (0), rssi:-81
May 31 05:10:35 hostapd: eth6: STA b0:73:5d:ba:9b:2c RADIUS: starting accounting session 28EC9606A234EB37
May 31 05:10:35 hostapd: eth6: STA b0:73:5d:ba:9b:2c WPA: pairwise key handshake completed (RSN)
May 31 05:10:36 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.218 b0:73:5d:ba:9b:2c
May 31 05:10:36 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.218 b0:73:5d:ba:9b:2c nova_5i-215fd1e7271cf27e
May 31 05:11:02 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:374:92:87:09, status: Successful (0), rssi:0
May 31 05:11:02 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: associated
May 31 05:11:02 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:374:92:87:09, status: Successful (0), rssi:-68
May 31 05:11:02 hostapd: eth6: STA a2:37:d4:92:87:09 RADIUS: starting accounting session F58F7ED2FF95E2E4
May 31 05:11:02 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: pairwise key handshake completed (RSN)
May 31 05:11:02 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 05:11:02 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 05:20:32 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 31 05:20:32 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind B0:73:5D:BA:9B:2C, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-78
May 31 05:20:32 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind B0:73:5D:BA:9B:2C, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-78
May 31 05:20:32 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 30 21:20:33 kernel: wl1: random key value: E5A8D7336D0335705BFB016CB79C064FF31F1238A78A010FF0CF8C4284A6E816
May 31 05:20:33 wlceventd: wlceventd_proc_event(508): eth6: Disassoc B0:73:5D:BA:9B:2C, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 05:20:33 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 31 06:01:15 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 06:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 06:01:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 06:01:19 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake failed (RSN) after 4 tries
May 31 06:01:22 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:374:92:87:09, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-84
May 31 06:01:22 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: disassociated
May 31 06:01:22 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:374:92:87:09, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-84
May 31 06:01:22 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: disassociated
May 31 06:01:22 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:374:92:87:09, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-84
May 31 06:01:22 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: disassociated
May 30 22:01:23 kernel: wl1: random key value: E9BCF1C4284D4E74315F008F15D038952CB562E1EC7D084C32ABA8B7C037EEBB
May 31 06:01:23 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:374:92:87:09, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 06:01:23 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: disassociated
May 31 06:31:40 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER
May 31 06:31:40 acsd: eth5: selected_chspec is 0x1004 (4)
May 31 06:31:40 acsd: eth5: Adjusted channel spec: 0x1004 (4)
May 31 06:31:40 acsd: eth5: selected channel spec: 0x1004 (4)
May 31 06:31:40 acsd: eth5 Performing CSA on chspec 0x1004
May 31 07:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 07:01:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 07:01:17 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 07:05:06 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 07:05:06 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 07:05:06 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 07:05:06 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 07:05:06 acsd: eth5 Performing CSA on chspec 0x1009
May 31 08:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 08:01:17 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 08:01:17 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 08:01:57 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 08:01:57 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-84
May 31 08:01:57 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-84
May 31 08:01:57 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 00:01:58 kernel: wl1: random key value: 2E65F2F37E044A77280E03D269E2FBCF98CFC8D1D1300147E435FC2E4EBDF5EF
May 31 08:01:58 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 08:01:58 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 08:06:44 wlceventd: wlceventd_proc_event(527): eth6: Auth B0:73:5D:BA:9B:2C, status: Successful (0), rssi:0
May 31 08:06:44 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: associated
May 31 08:06:44 wlceventd: wlceventd_proc_event(556): eth6: Assoc B0:73:5D:BA:9B:2C, status: Successful (0), rssi:-72
May 31 08:06:44 hostapd: eth6: STA b0:73:5d:ba:9b:2c RADIUS: starting accounting session 2DBEC454B5E6B69A
May 31 08:06:44 hostapd: eth6: STA b0:73:5d:ba:9b:2c WPA: pairwise key handshake completed (RSN)
May 31 08:06:44 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.218 b0:73:5d:ba:9b:2c
May 31 08:06:44 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.218 b0:73:5d:ba:9b:2c nova_5i-215fd1e7271cf27e
May 31 08:06:45 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.218 b0:73:5d:ba:9b:2c
May 31 08:06:45 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.218 b0:73:5d:ba:9b:2c nova_5i-215fd1e7271cf27e
May 31 08:09:52 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 31 08:09:52 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 31 08:09:52 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind B0:73:5D:BA:9B:2C, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-85
May 31 08:09:52 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind B0:73:5D:BA:9B:2C, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-85
May 31 00:09:53 kernel: wl1: random key value: D6F0D08FFADC9EA26CFD03974827A572A3CD2B57B052035A8598199AFCD2E82B
May 31 08:09:53 wlceventd: wlceventd_proc_event(508): eth6: Disassoc B0:73:5D:BA:9B:2C, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 08:09:53 hostapd: eth6: STA b0:73:5d:ba:9b:2c IEEE 802.11: disassociated
May 31 08:16:29 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:374:92:87:09, status: Successful (0), rssi:0
May 31 08:16:29 hostapd: eth6: STA a2:37:d4:92:87:09 IEEE 802.11: associated
May 31 08:16:29 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:37:D4:92:87:09, status: Successful (0), rssi:-60
May 31 08:16:29 hostapd: eth6: STA a2:37:d4:92:87:09 RADIUS: starting accounting session 61F49E26B478FD92
May 31 08:16:29 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: pairwise key handshake completed (RSN)
May 31 08:16:29 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 08:16:29 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 08:35:25 acsd: acs_set_chspec: 0x1008 (8) for reason APCS_CSTIMER
May 31 08:35:25 acsd: eth5: selected_chspec is 0x1008 (8)
May 31 08:35:25 acsd: eth5: Adjusted channel spec: 0x1008 (8)
May 31 08:35:25 acsd: eth5: selected channel spec: 0x1008 (8)
May 31 08:35:25 acsd: eth5 Performing CSA on chspec 0x1008
May 31 00:47:44 kernel: wl1: random key value: 36D7C224044AB0BF31FB0254AACEE125681A55EE478705E6AA1A171D4138BFA0
May 31 08:47:44 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:27:D2:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 08:47:44 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:27:D2:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 08:47:44 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
May 31 08:47:44 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
May 31 08:55:16 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 08:55:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 08:55:16 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-73
May 31 08:55:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session 5EC888F880E01BA5
May 31 08:55:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 08:55:17 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 08:55:17 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 09:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 09:01:15 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 09:01:15 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 09:08:52 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 09:08:52 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 09:08:52 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 09:08:52 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 09:08:52 acsd: eth5 Performing CSA on chspec 0x1009
May 31 09:47:20 wlceventd: wlceventd_proc_event(527): eth6: Auth AC:BD:70:7C:65:BA, status: Successful (0), rssi:0
May 31 09:47:20 hostapd: eth6: STA ac:bd:70:7c:65:ba IEEE 802.11: associated
May 31 09:47:20 wlceventd: wlceventd_proc_event(556): eth6: Assoc AC:BD:70:7C:65:BA, status: Successful (0), rssi:-82
May 31 09:47:20 hostapd: eth6: STA ac:bd:70:7c:65:ba RADIUS: starting accounting session 5C3C6E9522D7D8FD
May 31 09:47:20 hostapd: eth6: STA ac:bd:70:7c:65:ba WPA: pairwise key handshake completed (RSN)
May 31 09:47:20 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.73 ac:bd:70:7c:65:ba
May 31 09:47:20 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.73 ac:bd:70:7c:65:ba nova_5i-ef103e5a92fa8680
May 31 10:01:15 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 10:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 10:01:16 hostapd: eth6: STA ac:bd:70:7c:65:ba WPA: group key handshake completed (RSN)
May 31 10:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 10:10:46 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER
May 31 10:10:46 acsd: eth5: selected_chspec is 0x1004 (4)
May 31 10:10:46 acsd: eth5: Adjusted channel spec: 0x1004 (4)
May 31 10:10:46 acsd: eth5: selected channel spec: 0x1004 (4)
May 31 10:10:46 acsd: eth5 Performing CSA on chspec 0x1004
May 31 10:10:51 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 10:10:51 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 10:10:51 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 10:10:51 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 02:10:52 kernel: wl1: random key value: DF130EDDEBF5BF0E371101C93AE0B284720601E66602021F41E7A7B1C1698DD8
May 31 10:10:52 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 10:10:52 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 10:10:52 hostapd: eth6: STA ac:bd:70:7c:65:ba IEEE 802.11: disassociated
May 31 10:10:52 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind AC:BD:70:7C:65:BA, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 10:10:52 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind AC:BD:70:7C:65:BA, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 10:10:52 hostapd: eth6: STA ac:bd:70:7c:65:ba IEEE 802.11: disassociated
May 31 02:10:53 kernel: wl1: random key value: 02E93885295741A163D601D61231292EA0726EF139340C6AF17F82D9C055AF37
May 31 10:10:53 wlceventd: wlceventd_proc_event(508): eth6: Disassoc AC:BD:70:7C:65:BA, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 10:10:53 hostapd: eth6: STA ac:bd:70:7c:65:ba IEEE 802.11: disassociated
May 31 10:44:12 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 10:44:12 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 10:44:12 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 10:44:12 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 10:44:12 acsd: eth5 Performing CSA on chspec 0x1009
May 31 11:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 11:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 11:17:39 acsd: acs_set_chspec: 0x1005 (5) for reason APCS_CSTIMER
May 31 11:17:39 acsd: eth5: selected_chspec is 0x1005 (5)
May 31 11:17:39 acsd: eth5: Adjusted channel spec: 0x1005 (5)
May 31 11:17:39 acsd: eth5: selected channel spec: 0x1005 (5)
May 31 11:17:39 acsd: eth5 Performing CSA on chspec 0x1005
May 31 11:51:05 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 11:51:05 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 11:51:05 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 11:51:05 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 11:51:05 acsd: eth5 Performing CSA on chspec 0x1009
May 31 11:53:02 wlceventd: wlceventd_proc_event(527): eth6: Auth 16:27:D2:FF:17:EF, status: Successful (0), rssi:0
May 31 11:53:02 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: associated
May 31 11:53:02 wlceventd: wlceventd_proc_event(556): eth6: Assoc 16:27:D2:FF:17:EF, status: Successful (0), rssi:-80
May 31 11:53:02 hostapd: eth6: STA 16:27:d2:ff:17:ef RADIUS: starting accounting session 818D26FA2AA5BA2D
May 31 11:53:02 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: pairwise key handshake completed (RSN)
May 31 11:53:02 dnsmasq-dhcp[971]: DHCPDISCOVER(br0) 16:27:d2:ff:17:ef
May 31 11:53:02 dnsmasq-dhcp[971]: DHCPOFFER(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 11:53:03 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 11:53:03 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 12:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 12:01:16 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 12:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 12:24:32 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER
May 31 12:24:32 acsd: eth5: selected_chspec is 0x1004 (4)
May 31 12:24:32 acsd: eth5: Adjusted channel spec: 0x1004 (4)
May 31 12:24:32 acsd: eth5: selected channel spec: 0x1004 (4)
May 31 12:24:32 acsd: eth5 Performing CSA on chspec 0x1004
May 31 12:27:40 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 12:27:40 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 12:27:40 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-74
May 31 12:27:40 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session AD6A04FD83C1F979
May 31 12:27:40 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 12:27:40 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 12:27:40 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 12:57:59 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 12:57:59 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 12:57:59 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 12:57:59 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 12:57:59 acsd: eth5 Performing CSA on chspec 0x1009
May 31 13:01:15 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 13:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 13:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 13:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 05:11:05 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 05:11:05 kernel: br0: port 1(eth4) entered listening state
May 31 05:11:05 kernel: br0: port 1(eth4) entered listening state
May 31 05:11:07 kernel: br0: port 1(eth4) entered learning state
May 31 05:11:09 kernel: br0: topology change detected, propagating
May 31 05:11:09 kernel: br0: port 1(eth4) entered forwarding state
May 31 05:11:13 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 05:11:13 kernel: br0: port 1(eth4) entered disabled state
May 31 05:11:16 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 05:11:16 kernel: br0: port 1(eth4) entered listening state
May 31 05:11:16 kernel: br0: port 1(eth4) entered listening state
May 31 05:11:18 kernel: br0: port 1(eth4) entered learning state
May 31 05:11:20 kernel: br0: topology change detected, propagating
May 31 05:11:20 kernel: br0: port 1(eth4) entered forwarding state
May 31 13:11:21 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.253 04:d4:c4:57:73:88
May 31 13:11:21 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.253 04:d4:c4:57:73:88 DESKTOP-6KJNDUQ
May 31 05:50:20 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 05:50:20 kernel: br0: port 1(eth4) entered disabled state
May 31 05:50:22 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 10 mbps full duplex
May 31 05:50:22 kernel: br0: port 1(eth4) entered listening state
May 31 05:50:22 kernel: br0: port 1(eth4) entered listening state
May 31 05:50:24 kernel: br0: port 1(eth4) entered learning state
May 31 05:50:26 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 05:50:26 kernel: br0: port 1(eth4) entered disabled state
May 31 13:52:44 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
May 31 13:52:44 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 16:27:D2:FF:17:EF, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 13:52:44 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
May 31 13:52:44 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 16:27:D2:FF:17:EF, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 05:52:45 kernel: wl1: random key value: CF2751899EB4DC0B0DF800640D4D319D9E7C74F7E1A30A07BE2F5EF0C65C2328
May 31 13:52:45 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:27:D2:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 13:52:45 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
May 31 13:56:05 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 13:56:05 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 13:56:05 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 13:56:05 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 05:56:06 kernel: wl1: random key value: 593A3B28D224691D3B1E030315CDC1F7EE30EE3702DB0B6681FB459492093CD8
May 31 13:56:06 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 13:56:06 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 13:59:52 acsd: acs_set_chspec: 0x1002 (2) for reason APCS_CSTIMER
May 31 13:59:52 acsd: eth5: selected_chspec is 0x1002 (2)
May 31 13:59:52 acsd: eth5: Adjusted channel spec: 0x1002 (2)
May 31 13:59:52 acsd: eth5: selected channel spec: 0x1002 (2)
May 31 13:59:52 acsd: eth5 Performing CSA on chspec 0x1002
May 31 14:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 14:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 14:08:23 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 14:08:23 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 14:08:23 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-56
May 31 14:08:23 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session 32622AC611A14EB3
May 31 14:08:23 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 14:08:23 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 14:08:23 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 14:33:18 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 14:33:18 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 14:33:18 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 14:33:18 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 14:33:18 acsd: eth5 Performing CSA on chspec 0x1009
May 31 15:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 15:01:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 15:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 15:19:42 miniupnpd[1756]: remove port mapping 36494 UDP because it has expired
May 31 15:56:14 miniupnpd[1756]: remove port mapping 32647 UDP because it has expired
May 31 16:01:16 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 16:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 16:01:17 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 16:32:05 acsd: acs_set_chspec: 0x1008 (8) for reason APCS_CSTIMER
May 31 16:32:05 acsd: eth5: selected_chspec is 0x1008 (8)
May 31 16:32:05 acsd: eth5: Adjusted channel spec: 0x1008 (8)
May 31 16:32:05 acsd: eth5: selected channel spec: 0x1008 (8)
May 31 16:32:05 acsd: eth5 Performing CSA on chspec 0x1008
May 31 16:54:27 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 16:54:27 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 16:54:27 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 16:54:27 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-86
May 31 08:54:28 kernel: wl1: random key value: 1D2BF8F2EB5D87D07CD400776B55223F83E2F50F22160436AE8C2C4A58D9894B
May 31 16:54:28 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 16:54:28 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 17:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 17:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 17:05:32 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER
May 31 17:05:32 acsd: eth5: selected_chspec is 0x1004 (4)
May 31 17:05:32 acsd: eth5: Adjusted channel spec: 0x1004 (4)
May 31 17:05:32 acsd: eth5: selected channel spec: 0x1004 (4)
May 31 17:05:32 acsd: eth5 Performing CSA on chspec 0x1004
May 31 17:06:39 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.151 de:73:03:05:b8:a3
May 31 17:06:39 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.151 de:73:03:05:b8:a3
May 31 17:18:47 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 17:18:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 17:18:47 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-43
May 31 17:18:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session FD76D2A44B24834C
May 31 17:18:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 17:18:47 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 17:18:47 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 17:38:58 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 17:38:58 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 17:38:58 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 17:38:58 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 17:38:58 acsd: eth5 Performing CSA on chspec 0x1009
May 31 09:58:21 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 10 mbps full duplex
May 31 09:58:21 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:21 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:22 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 09:58:22 kernel: br0: port 1(eth4) entered disabled state
May 31 09:58:28 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 09:58:28 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:28 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:30 kernel: br0: port 1(eth4) entered learning state
May 31 09:58:32 kernel: br0: topology change detected, propagating
May 31 09:58:32 kernel: br0: port 1(eth4) entered forwarding state
May 31 09:58:35 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 09:58:35 kernel: br0: port 1(eth4) entered disabled state
May 31 09:58:38 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 09:58:38 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:38 kernel: br0: port 1(eth4) entered listening state
May 31 09:58:40 kernel: br0: port 1(eth4) entered learning state
May 31 09:58:42 kernel: br0: topology change detected, propagating
May 31 09:58:42 kernel: br0: port 1(eth4) entered forwarding state
May 31 17:58:43 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.253 04:d4:c4:57:73:88
May 31 17:58:43 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.253 04:d4:c4:57:73:88 DESKTOP-6KJNDUQ
May 31 18:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 18:01:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 18:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 18:06:44 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 18:06:44 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-80
May 31 18:06:44 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind A2:53:C9:0F:C4:22, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-80
May 31 18:06:44 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 10:06:45 kernel: wl1: random key value: 7B657B82217A00323935030AD9D7B0DDAA4EDB2ECF6B00903012584CCC5C1AEA
May 31 18:06:45 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 18:06:45 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 18:10:03 wlceventd: wlceventd_proc_event(527): eth6: Auth 16:27:D2:FF:17:EF, status: Successful (0), rssi:0
May 31 18:10:03 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: associated
May 31 18:10:03 wlceventd: wlceventd_proc_event(556): eth6: Assoc 16:27:D2:FF:17:EF, status: Successful (0), rssi:-52
May 31 18:10:03 hostapd: eth6: STA 16:27:d2:ff:17:ef RADIUS: starting accounting session 61BECFF17C691A93
May 31 18:10:03 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: pairwise key handshake completed (RSN)
May 31 18:10:03 dnsmasq-dhcp[971]: DHCPDISCOVER(br0) 16:27:d2:ff:17:ef
May 31 18:10:03 dnsmasq-dhcp[971]: DHCPOFFER(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 18:10:04 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 18:10:04 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.121 16:27:d2:ff:17:ef
May 31 19:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 19:01:15 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 19:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 19:09:18 acsd: acs_set_chspec: 0x1004 (4) for reason APCS_CSTIMER
May 31 19:09:18 acsd: eth5: selected_chspec is 0x1004 (4)
May 31 19:09:18 acsd: eth5: Adjusted channel spec: 0x1004 (4)
May 31 19:09:18 acsd: eth5: selected channel spec: 0x1004 (4)
May 31 19:09:18 acsd: eth5 Performing CSA on chspec 0x1004
May 31 19:16:21 miniupnpd[1756]: recv (state0): Connection reset by peer
May 31 11:17:23 kernel: nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
May 31 19:33:32 miniupnpd[1756]: recv (state0): Connection reset by peer
May 31 19:42:45 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 19:42:45 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 19:42:45 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 19:42:45 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 19:42:45 acsd: eth5 Performing CSA on chspec 0x1009
May 31 20:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 20:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 20:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 20:16:30 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 20:16:30 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.202 a2:37:d4:92:87:09
May 31 20:36:47 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 20:36:47 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-74
May 31 20:36:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 20:36:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session D206B9B93EF864FE
May 31 20:36:47 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 20:36:47 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 20:36:47 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 21:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 21:01:15 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 21:01:16 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 21:01:17 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 13:10:25 kernel: wl1: random key value: 46F9705D59106A6115D00223F926110436B4A178340E037CD4B92944E03BDFDC
May 31 21:10:25 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 21:10:25 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 21:10:25 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: disassociated
May 31 21:10:25 wlceventd: wlceventd_proc_event(508): eth6: Disassoc A2:53:C9:0F:C4:22, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
May 31 21:10:25 wlceventd: wlceventd_proc_event(527): eth6: Auth A2:53:C9:0F:C4:22, status: Successful (0), rssi:0
May 31 21:10:25 hostapd: eth6: STA a2:53:c9:0f:c4:22 IEEE 802.11: associated
May 31 21:10:25 wlceventd: wlceventd_proc_event(556): eth6: Assoc A2:53:C9:0F:C4:22, status: Successful (0), rssi:-52
May 31 21:10:25 hostapd: eth6: STA a2:53:c9:0f:c4:22 RADIUS: starting accounting session 8A61388CDFF4BAEE
May 31 21:10:25 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: pairwise key handshake completed (RSN)
May 31 21:10:25 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 21:10:25 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 21:22:00 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 21:22:00 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.113 a2:53:c9:0f:c4:22
May 31 13:23:20 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 13:23:20 kernel: br0: port 1(eth4) entered disabled state
May 31 13:23:22 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 10 mbps full duplex
May 31 13:23:22 kernel: br0: port 1(eth4) entered listening state
May 31 13:23:22 kernel: br0: port 1(eth4) entered listening state
May 31 13:23:24 kernel: br0: port 1(eth4) entered learning state
May 31 13:23:26 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 13:23:26 kernel: br0: topology change detected, propagating
May 31 13:23:26 kernel: br0: port 1(eth4) entered forwarding state
May 31 13:23:26 kernel: br0: port 1(eth4) entered disabled state
May 31 22:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 22:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 22:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 22:01:17 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 22:09:57 acsd: acs_set_chspec: 0x1003 (3) for reason APCS_CSTIMER
May 31 22:09:57 acsd: eth5: selected_chspec is 0x1003 (3)
May 31 22:09:57 acsd: eth5: Adjusted channel spec: 0x1003 (3)
May 31 22:09:57 acsd: eth5: selected channel spec: 0x1003 (3)
May 31 22:09:57 acsd: eth5 Performing CSA on chspec 0x1003
May 31 22:39:57 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 22:39:57 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 22:39:57 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 22:39:57 acsd: eth5 Performing CSA on chspec 0x1009
May 31 22:55:01 acsd: acs_set_chspec: 0x1008 (8) for reason APCS_CSTIMER
May 31 22:55:01 acsd: eth5: selected_chspec is 0x1008 (8)
May 31 22:55:01 acsd: eth5: Adjusted channel spec: 0x1008 (8)
May 31 22:55:01 acsd: eth5: selected channel spec: 0x1008 (8)
May 31 22:55:01 acsd: eth5 Performing CSA on chspec 0x1008
May 31 23:01:15 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
May 31 23:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
May 31 23:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 23:01:16 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
May 31 23:01:31 disk_monitor: Got SIGALRM...
May 31 23:28:31 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
May 31 23:28:31 acsd: eth5: selected_chspec is 0x1009 (9)
May 31 23:28:31 acsd: eth5: Adjusted channel spec: 0x1009 (9)
May 31 23:28:31 acsd: eth5: selected channel spec: 0x1009 (9)
May 31 23:28:31 acsd: eth5 Performing CSA on chspec 0x1009
May 31 15:52:06 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 15:52:06 kernel: br0: port 1(eth4) entered listening state
May 31 15:52:06 kernel: br0: port 1(eth4) entered listening state
May 31 15:52:08 kernel: br0: port 1(eth4) entered learning state
May 31 15:52:10 kernel: br0: topology change detected, propagating
May 31 15:52:10 kernel: br0: port 1(eth4) entered forwarding state
May 31 15:52:14 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link DOWN.
May 31 15:52:14 kernel: br0: port 1(eth4) entered disabled state
May 31 15:52:17 kernel: eth4 (Ext switch port: 3) (Logical Port: 11) (phyId: b) Link Up at 1000 mbps full duplex
May 31 15:52:17 kernel: br0: port 1(eth4) entered listening state
May 31 15:52:17 kernel: br0: port 1(eth4) entered listening state
May 31 15:52:19 kernel: br0: port 1(eth4) entered learning state
May 31 15:52:21 kernel: br0: topology change detected, propagating
May 31 15:52:21 kernel: br0: port 1(eth4) entered forwarding state
May 31 23:52:28 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.253 04:d4:c4:57:73:88
May 31 23:52:28 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.253 04:d4:c4:57:73:88 DESKTOP-6KJNDUQ
Jun  1 00:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
Jun  1 00:01:16 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
Jun  1 00:01:16 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
Jun  1 00:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
Jun  1 00:01:58 acsd: acs_set_chspec: 0x1003 (3) for reason APCS_CSTIMER
Jun  1 00:01:58 acsd: eth5: selected_chspec is 0x1003 (3)
Jun  1 00:01:58 acsd: eth5: Adjusted channel spec: 0x1003 (3)
Jun  1 00:01:58 acsd: eth5: selected channel spec: 0x1003 (3)
Jun  1 00:01:58 acsd: eth5 Performing CSA on chspec 0x1003
Jun  1 00:35:24 acsd: acs_set_chspec: 0x1009 (9) for reason APCS_CSTIMER
Jun  1 00:35:24 acsd: eth5: selected_chspec is 0x1009 (9)
Jun  1 00:35:24 acsd: eth5: Adjusted channel spec: 0x1009 (9)
Jun  1 00:35:24 acsd: eth5: selected channel spec: 0x1009 (9)
Jun  1 00:35:24 acsd: eth5 Performing CSA on chspec 0x1009
Jun  1 01:01:15 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: group key handshake completed (RSN)
Jun  1 01:01:15 hostapd: eth6: STA a2:53:c9:0f:c4:22 WPA: group key handshake completed (RSN)
Jun  1 01:01:15 hostapd: eth6: STA a2:37:d4:92:87:09 WPA: group key handshake completed (RSN)
Jun  1 01:01:16 hostapd: eth6: STA de:73:03:05:b8:a3 WPA: group key handshake completed (RSN)
May 31 17:04:11 kernel: wl1: random key value: F3C80C05D8E6536D1D7E035F6421EC134E3906FDE06802674276ED9896B4A572
Jun  1 01:04:11 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
Jun  1 01:04:11 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:27:D2:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jun  1 01:04:11 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 16:27:D2:FF:17:EF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jun  1 01:04:11 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: disassociated
Jun  1 01:04:11 wlceventd: wlceventd_proc_event(527): eth6: Auth 16:27:D2:FF:17:EF, status: Successful (0), rssi:0
Jun  1 01:04:11 hostapd: eth6: STA 16:27:d2:ff:17:ef IEEE 802.11: associated
Jun  1 01:04:11 wlceventd: wlceventd_proc_event(556): eth6: Assoc 16:27:D2:FF:17:EF, status: Successful (0), rssi:-48
Jun  1 01:04:11 hostapd: eth6: STA 16:27:d2:ff:17:ef RADIUS: starting accounting session 4DBD02240D8DC424
Jun  1 01:04:11 hostapd: eth6: STA 16:27:d2:ff:17:ef WPA: pairwise key handshake completed (RSN)
Jun  1 01:04:12 dnsmasq-dhcp[971]: DHCPREQUEST(br0) 192.168.50.121 16:27:d2:ff:17:ef
Jun  1 01:04:12 dnsmasq-dhcp[971]: DHCPACK(br0) 192.168.50.121 16:27:d2:ff:17:ef
Jun  1 01:08:51 acsd: acs_set_chspec: 0x1008 (8) for reason APCS_CSTIMER
Jun  1 01:08:51 acsd: eth5: selected_chspec is 0x1008 (8)
Jun  1 01:08:51 acsd: eth5: Adjusted channel spec: 0x1008 (8)
Jun  1 01:08:51 acsd: eth5: selected channel spec: 0x1008 (8)
Jun  1 01:08:51 acsd: eth5 Performing CSA on chspec 0x1008
May 31 17:24:05 kernel: httpd (987): drop_caches: 1


您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

快速回复 返回列表 搜索 官方QQ群
×

秒后自动关闭

小黑屋|手机版|Archiver|华硕网络产品技术交流平台 ( 苏ICP备16010857号-1 )苏公网安备 32050502000499号

GMT+8, 2024-5-29 04:24 , Processed in 0.055120 second(s), 28 queries .

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表