hi
I'm new here and already get helps and fix 3 problems so thsnk you
just wondering why 5ghz dbm doesn't show any thing and can't accessible
try n and ac what should I change ?
hi
I'm new here and already get helps and fix 3 problems so thsnk you
just wondering why 5ghz dbm doesn't show any thing and can't accessible
try n and ac what should I change ?
That status is what you'd expect to see with the AP up but no station connected.
Being a CLI user I would read the logs for any wifi-related errors and run iw dev to see if the APs exist.
sorry I'm new to all of this
2.4ghz perfectly ok
but can't find 5ghz with any of my devices
I'm not familiar with ssh command
any thing I can do in luci to make it work ?
set channel 36, set mode ac, set width 80 and try again
In China, channels 36 to 68 are DFS. You will have to wait for the radar check to complete before the AP starts transmitting. Channels 149-161 are unrestricted and should start immediately.
The log can be viewed in Luci by clicking Status on the top bar then System Log.
test it doesn't work
ok try other channels seems not workin
Wed Sep 14 17:41:10 2022 daemon.info dnsmasq-dhcp[5615]: DHCPDISCOVER(br-lan) 80:4e:70:85:8e:50
Wed Sep 14 17:41:10 2022 daemon.info dnsmasq-dhcp[5615]: DHCPOFFER(br-lan) 192.168.2.209 80:4e:70:85:8e:50
Wed Sep 14 17:41:10 2022 daemon.info dnsmasq-dhcp[5615]: DHCPREQUEST(br-lan) 192.168.2.209 80:4e:70:85:8e:50
Wed Sep 14 17:41:10 2022 daemon.info dnsmasq-dhcp[5615]: DHCPACK(br-lan) 192.168.2.209 80:4e:70:85:8e:50 Galaxy-J7-Prime
Wed Sep 14 17:41:35 2022 daemon.info dnsmasq-dhcp[5615]: DHCPDISCOVER(br-lan) 192.168.2.235 c8:63:f1:05:68:92
Wed Sep 14 17:41:35 2022 daemon.info dnsmasq-dhcp[5615]: DHCPOFFER(br-lan) 192.168.2.235 c8:63:f1:05:68:92
Wed Sep 14 17:41:35 2022 daemon.info dnsmasq-dhcp[5615]: DHCPREQUEST(br-lan) 192.168.2.235 c8:63:f1:05:68:92
Wed Sep 14 17:41:35 2022 daemon.info dnsmasq-dhcp[5615]: DHCPACK(br-lan) 192.168.2.235 c8:63:f1:05:68:92
Wed Sep 14 17:42:04 2022 daemon.notice netifd: wan (3630): udhcpc: sending renew to server 192.168.0.1
Wed Sep 14 17:42:04 2022 daemon.notice netifd: wan (3630): udhcpc: lease of 192.168.0.207 obtained from 192.168.0.1, lease time 600
Wed Sep 14 17:47:04 2022 daemon.notice netifd: wan (3630): udhcpc: sending renew to server 192.168.0.1
Wed Sep 14 17:47:04 2022 daemon.notice netifd: wan (3630): udhcpc: lease of 192.168.0.207 obtained from 192.168.0.1, lease time 600
Wed Sep 14 17:52:05 2022 daemon.notice netifd: wan (3630): udhcpc: sending renew to server 192.168.0.1
Wed Sep 14 17:52:05 2022 daemon.notice netifd: wan (3630): udhcpc: lease of 192.168.0.207 obtained from 192.168.0.1, lease time 600
Wed Sep 14 17:57:05 2022 daemon.notice netifd: wan (3630): udhcpc: sending renew to server 192.168.0.1
Wed Sep 14 17:57:05 2022 daemon.notice netifd: wan (3630): udhcpc: lease of 192.168.0.207 obtained from 192.168.0.1, lease time 600
Wed Sep 14 17:58:44 2022 daemon.info hostapd: wlan1: STA 90:4c:e5:b0:08:cd IEEE 802.11: authenticated
Wed Sep 14 17:58:44 2022 daemon.info hostapd: wlan1: STA 90:4c:e5:b0:08:cd IEEE 802.11: associated (aid 7)
Wed Sep 14 17:58:44 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 90:4c:e5:b0:08:cd
Wed Sep 14 17:58:44 2022 daemon.info hostapd: wlan1: STA 90:4c:e5:b0:08:cd RADIUS: starting accounting session ACE1734102B2668F
Wed Sep 14 17:58:44 2022 daemon.info hostapd: wlan1: STA 90:4c:e5:b0:08:cd WPA: pairwise key handshake completed (RSN)
Wed Sep 14 17:58:44 2022 daemon.notice hostapd: wlan1: EAPOL-4WAY-HS-COMPLETED 90:4c:e5:b0:08:cd
Wed Sep 14 17:58:47 2022 daemon.info dnsmasq-dhcp[5615]: DHCPDISCOVER(br-lan) 90:4c:e5:b0:08:cd
Wed Sep 14 17:58:47 2022 daemon.info dnsmasq-dhcp[5615]: DHCPOFFER(br-lan) 192.168.2.122 90:4c:e5:b0:08:cd
Wed Sep 14 17:58:47 2022 daemon.info dnsmasq-dhcp[5615]: DHCPREQUEST(br-lan) 192.168.2.122 90:4c:e5:b0:08:cd
Wed Sep 14 17:58:47 2022 daemon.info dnsmasq-dhcp[5615]: DHCPACK(br-lan) 192.168.2.122 90:4c:e5:b0:08:cd 1-PC
Wed Sep 14 17:58:53 2022 daemon.info dnsmasq[5615]: read /etc/hosts - 4 addresses
Wed Sep 14 17:58:53 2022 daemon.info dnsmasq[5615]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Wed Sep 14 17:58:53 2022 daemon.info dnsmasq[5615]: read /tmp/hosts/odhcpd - 1 addresses
Wed Sep 14 17:58:53 2022 daemon.info dnsmasq-dhcp[5615]: read /etc/ethers - 0 addresses
Wed Sep 14 17:58:55 2022 daemon.info dnsmasq-dhcp[5615]: DHCPINFORM(br-lan) 192.168.2.122 90:4c:e5:b0:08:cd
Wed Sep 14 17:58:55 2022 daemon.info dnsmasq-dhcp[5615]: DHCPACK(br-lan) 192.168.2.122 90:4c:e5:b0:08:cd 1-PC
Wed Sep 14 17:59:24 2022 daemon.err nginx[3399]: 2022/09/14 17:59:24 [error] 3446#0: *657 open() "/www/favicon.ico" failed (2: No such file or directory), client: 192.168.2.122, server: _redirect2ssl, request: "GET /favicon.ico HTTP/1.1", host: "192.168.2.1", referrer: "http://192.168.2.1/"
Wed Sep 14 17:59:24 2022 daemon.err uwsgi[3270]: *** has_emperor mode detected (fd: 7) ***
Wed Sep 14 17:59:24 2022 daemon.err uwsgi[3270]: [uWSGI] getting INI configuration from /etc/uwsgi/vassals/luci-webui.ini
Wed Sep 14 17:59:24 2022 daemon.err uwsgi[3270]: Wed Sep 14 17:59:24 2022 - [emperor] vassal /etc/uwsgi/vassals/luci-webui.ini has been spawned
Wed Sep 14 17:59:24 2022 daemon.info uwsgi-luci: spawned uWSGI master process (pid: 20326)
Wed Sep 14 17:59:24 2022 daemon.err uwsgi[3270]: Wed Sep 14 17:59:24 2022 - [emperor] vassal /etc/uwsgi/vassals/luci-webui.ini is ready to accept requests
Wed Sep 14 17:59:24 2022 daemon.err uwsgi[3270]: Wed Sep 14 17:59:24 2022 - [emperor] vassal /etc/uwsgi/vassals/luci-webui.ini is now loyal
Wed Sep 14 17:59:29 2022 user.info : luci: accepted login on /admin/dashboard for admin from 192.168.2.122
Wed Sep 14 18:02:05 2022 daemon.notice netifd: wan (3630): udhcpc: sending renew to server 192.168.0.1
Wed Sep 14 18:02:05 2022 daemon.notice netifd: wan (3630): udhcpc: lease of 192.168.0.207 obtained from 192.168.0.1, lease time 600
Wed Sep 14 18:06:13 2022 daemon.err uwsgi[3270]: Wed Sep 14 18:06:13 2022 - [emperor] bringing back instance /etc/uwsgi/vassals/luci-webui.ini to on-demand mode
Wed Sep 14 18:06:13 2022 daemon.info uwsgi-luci: Wed Sep 14 18:06:13 2022 - received message 0 from emperor
Wed Sep 14 18:06:13 2022 daemon.info uwsgi-luci: SIGINT/SIGTERM received...killing workers...
Wed Sep 14 18:06:13 2022 daemon.err uwsgi[3270]: Wed Sep 14 18:06:13 2022 - [emperor] curse the uwsgi instance /etc/uwsgi/vassals/luci-webui.ini (pid: 20326)
Wed Sep 14 18:06:15 2022 daemon.err uwsgi[3270]: [uwsgi-emperor] /etc/uwsgi/vassals/luci-webui.ini -> back to "on demand" mode, waiting for connections on socket "/var/run//luci-webui.socket" ...
Wed Sep 14 18:06:34 2022 daemon.err uwsgi[3270]: *** has_emperor mode detected (fd: 7) ***
Wed Sep 14 18:06:34 2022 daemon.err uwsgi[3270]: [uWSGI] getting INI configuration from /etc/uwsgi/vassals/luci-webui.ini
Wed Sep 14 18:06:34 2022 daemon.err uwsgi[3270]: Wed Sep 14 18:06:34 2022 - [emperor] vassal /etc/uwsgi/vassals/luci-webui.ini has been spawned
Wed Sep 14 18:06:34 2022 daemon.info uwsgi-luci: spawned uWSGI master process (pid: 24045)
Wed Sep 14 18:06:34 2022 daemon.err uwsgi[3270]: Wed Sep 14 18:06:34 2022 - [emperor] vassal /etc/uwsgi/vassals/luci-webui.ini is ready to accept requests
Wed Sep 14 18:06:34 2022 daemon.err uwsgi[3270]: Wed Sep 14 18:06:34 2022 - [emperor] vassal /etc/uwsgi/vassals/luci-webui.ini is now loyal
Wed Sep 14 18:06:35 2022 daemon.err uwsgi[3270]: *** has_emperor mode detected (fd: 8) ***
Wed Sep 14 18:06:35 2022 daemon.err uwsgi[3270]: [uWSGI] getting INI configuration from /etc/uwsgi/vassals/luci-cgi_io.ini
Wed Sep 14 18:06:35 2022 daemon.err uwsgi[3270]: Wed Sep 14 18:06:35 2022 - [emperor] vassal /etc/uwsgi/vassals/luci-cgi_io.ini has been spawned
Wed Sep 14 18:06:35 2022 daemon.err uwsgi[3270]: Wed Sep 14 18:06:35 2022 - [emperor] vassal /etc/uwsgi/vassals/luci-cgi_io.ini is ready to accept requests
You should go to the software section and look for updates. Install all updates and reboot the system than give a try. If this is not working try to change country code on wifi and restart the wifi. I set my to GY.
thank you for reply
turn off router for about hourand 5ghz work now
This is highly discouraged https://openwrt.org/meta/infobox/upgrade_packages_warning