Adding Support for Verizon CR1000A

I'm also testing using the mmcblk0p28 as overlay instead of the original mmcblk0p20 so we can install larger plugins and also using docker(It gives 3GB total usable space), it works great so far, is there a way I can set mmcblk0p28 as default overlay but still using mmcblk0p20 as firmware when building firmware?

Here is my steps:
1. Format mmcblk0p28 to ext4.
2. Mount mmcblk0p28 as /mnt/data.
3. cp -r /overlay/* /mnt/data
4. Add mmcblk0p28 as mount as overlay.
5. Reboot


there is extroot. https://openwrt.org/docs/guide-user/additional-software/extroot_configuration

I guess it's what you are looking for?

Perfect, that's what exactly I'm looking for thanks. What do you think of this approach? For the docker version release.

I think the default openwrt is to not use extroot.
But may be we could use that 3gb data partition right during install instead of regular one? @robimarko what's the recommended approach here for using extra available space on mmc?

I tried.and after I set up,I lost 5G sigal, and my book jump to 2.4G,here is the log:

Tue Nov 14 23:39:06 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Nov 14 23:39:14 2023 authpriv.info dropbear[11954]: Exit (root) from <192.168.2.114:51137>: Keepalive timeout
Tue Nov 14 23:39:29 2023 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:39:31 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:39:31 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 1)
Tue Nov 14 23:39:31 2023 daemon.notice hostapd: phy0-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:39:31 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:39:31 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:39:31 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 2 names
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Nov 14 23:39:31 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:39:42 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:39:42 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 3)
Tue Nov 14 23:39:42 2023 daemon.notice hostapd: phy0-ap0: Prune association for e8:f4:08:03:88:bf
Tue Nov 14 23:39:42 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:39:42 2023 daemon.notice hostapd: phy1-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:39:42 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:39:42 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:39:42 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:39:42 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:39:42 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:39:42 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:39:46 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:39:50 2023 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:39:52 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:39:52 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 1)
Tue Nov 14 23:39:52 2023 daemon.notice hostapd: phy0-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:39:52 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:39:52 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:39:52 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:39:52 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:39:52 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:39:52 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 3)
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy0-ap0: Prune association for e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:40:03 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: disconnected due to excessive missing ACKs
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 3)
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy0-ap0: Prune association for e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:40:04 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:06 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:40:06 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:40:08 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:12 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:14 2023 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:40:14 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:40:14 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 3)
Tue Nov 14 23:40:14 2023 daemon.notice hostapd: phy0-ap0: Prune association for e8:f4:08:03:88:bf
Tue Nov 14 23:40:14 2023 daemon.notice hostapd: phy1-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:40:14 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:40:14 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:40:14 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:40:15 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:15 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Nov 14 23:40:15 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Tue Nov 14 23:40:15 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 4 names
Tue Nov 14 23:40:15 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Nov 14 23:40:16 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:40:16 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:40:18 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!

The first question would be (as I can't find it in this thread easily)), how much space do you have at your disposal easily/ normally, without resorting to extroot?

If you have something like ~8 MB for the kernel and >=30 MB for rootfs+overlay, then why bother and complicate things, just leave it as untapped space for the user to play with (e.g. blockd and pure data partition)? extroot adds extra complexity and pain during upgrades, if there is no strong need for adding the space for a normal OpenWrt installation, it's better to defer it (there's always the option to add this later, either for those users who need it or in future OpenWrt patches/ versions, if and when the need arises). Not doing it now doesn't make this harder or impossible for the future, but it makes it easier to get your device support merged now.

Here is the list. We have 20mb and 150mb respectively

Based on your criteria we should not even bother, I guess.

That would be my advice, yes.

On my nbg6817 (ipq8065) with eMMC, I have 2*(4+64) MB (dual-firmware) - with 3.2 GB (ext4) untapped; not great, but not a reason to jump through hoops either.

1 Like

New rebased non-nss version:

The main difference is new BDF for 6G radio (courtesy of @Ansuel) with new default limit of 22dBm (used to be just 10dBm). This should improve the range. Feel free to test and report your findings

https://transfer.sh/OG3nqahLeI/openwrt-qualcommax-ipq807x-verizon_cr1000a-initramfs-uImage.itb

https://transfer.sh/UWtih5Jq6a/openwrt-qualcommax-ipq807x-verizon_cr1000a-squashfs-sysupgrade.bin

Wifi issue is observed too , but issue with intel ax wifi card only , when using iphone and realtek wifi card , everything ok

When using intel wifi cards , wifi become not stable, and keep disconnect and losing package

Need to checking

no such issue with non-nss firmware

Yes,my notebook is intel AX210,and anthoer is ax201.They work well with non-nss firmware.I didnt check my phones,put the foucus on notebooks.My phone is Huawei Mate50 and iPhone13,they work well with non-nss firmware too.

I guess those nss questions are better be asked in an existing NSS firmware thread. Could be a common issue with a known solution...

Nice work! Going to update your code and compile another NSS firmware.

Try to switch off different parameters in Intel driver and see if it helps. From logs here I see only that it disconnects silently...

tried with different parameters, with wpa3 protocal/wpa2 aes/ unencrypted wifi, it finally not disconnecting, but it only works with download only , with very poor upload.

Tried reset wifi, as well as turning off ipv6, no hope

when test with iphone, it does have 700dl/ 500ul , still some issue with nss driver and intel wifi card

wifi disconnects again..
After I used it for half an hour.

Thu Nov 16 15:00:02 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 96:df:d9:10:8a:5c auth_alg=sae
Thu Nov 16 15:00:02 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c WPA: pairwise key handshake completed (RSN)
Thu Nov 16 15:00:02 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 96:df:d9:10:8a:5c
Thu Nov 16 15:00:02 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:00:07 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:00:09 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 96:df:d9:10:8a:5c
Thu Nov 16 15:00:09 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: disassociated
Thu Nov 16 15:00:10 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Nov 16 15:00:22 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: authenticated
Thu Nov 16 15:00:22 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: associated (aid 2)
Thu Nov 16 15:00:22 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 96:df:d9:10:8a:5c auth_alg=open
Thu Nov 16 15:00:22 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c WPA: pairwise key handshake completed (RSN)
Thu Nov 16 15:00:22 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 96:df:d9:10:8a:5c
Thu Nov 16 15:00:22 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:00:27 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:00:31 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 96:df:d9:10:8a:5c
Thu Nov 16 15:00:31 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: disassociated
Thu Nov 16 15:00:32 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Nov 16 15:01:16 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: authenticated
Thu Nov 16 15:01:16 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: associated (aid 2)
Thu Nov 16 15:01:16 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 96:df:d9:10:8a:5c auth_alg=open
Thu Nov 16 15:01:16 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c WPA: pairwise key handshake completed (RSN)
Thu Nov 16 15:01:16 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 96:df:d9:10:8a:5c
Thu Nov 16 15:01:16 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:01:16 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:01:21 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:01:25 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:03:36 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:07:54 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:12:13 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:19:33 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:24:50 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED d8:80:83:20:77:01
Thu Nov 16 15:24:50 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: disassociated
Thu Nov 16 15:24:50 2023 daemon.notice hostapd: phy0-ap0: STA-OPMODE-N_SS-CHANGED d8:80:83:20:77:01 1
Thu Nov 16 15:24:50 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: authenticated
Thu Nov 16 15:24:50 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: associated (aid 1)
Thu Nov 16 15:24:50 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED d8:80:83:20:77:01 auth_alg=open
Thu Nov 16 15:24:50 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 WPA: pairwise key handshake completed (RSN)
Thu Nov 16 15:24:50 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED d8:80:83:20:77:01
Thu Nov 16 15:24:50 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:24:54 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:24:58 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:25:45 2023 daemon.notice netifd: lan (9286): udhcpc: sending renew to server 192.168.100.1
Thu Nov 16 15:25:46 2023 daemon.notice netifd: lan (9286): udhcpc: lease of 192.168.100.4 obtained from 192.168.100.1, lease time 7200
Thu Nov 16 15:25:54 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED d8:80:83:20:77:01
Thu Nov 16 15:25:54 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: disassociated
Thu Nov 16 15:25:54 2023 daemon.notice hostapd: phy0-ap0: STA-OPMODE-N_SS-CHANGED d8:80:83:20:77:01 1
Thu Nov 16 15:25:54 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: authenticated
Thu Nov 16 15:25:54 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: associated (aid 1)
Thu Nov 16 15:25:54 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED d8:80:83:20:77:01 auth_alg=open
Thu Nov 16 15:25:54 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 WPA: pairwise key handshake completed (RSN)
Thu Nov 16 15:25:54 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED d8:80:83:20:77:01
Thu Nov 16 15:25:54 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:25:58 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:26:02 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:26:04 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!

Try disable software offloading under firewall and packet steering under the global network options.

I been using this NSS version for a week, overall it's been very stable and faster. I haven't test it under bridge mode yet.

@a_guy I have found that for NSS version you need disable software offloading and packet steering, otherwise you will get random ssl error. Everything else looks fine to me.

1 Like

How did you configure it? Could u share your config? I have a format error...

Configure what? After flashing its configuring openwrt as usual.

I mean use this way to open ssh: Adding Support for Verizon CR1000A - #262 by spol-eff