Belkin RT3200/Linksys E8450 WiFi AX discussion

Just ordered online for $60 :wink:

Thank you so much for the heads up tip. At 3PM I ordered online for pickup. Notified it was ready for pickup at 6PM. Home with it unboxed at 830PM.

Now I am up and running is stock firmware 1.0.01 build 101415 OCT 14, 2020.

Are there any reasons NOT to update to Belkin stock Firmware version: 1.1.01.272918
and then to Firmware version: 1.2.00.273012 knowing that my endgame is going to be Openwrt ?

Any gotcha's I should read up on B4 starting the transition to Openwrt ?

I have 4 Openwrt routers and so I am experienced with OpenWrt just not with this AX router.

You are going to replace the stock firmware, so why waste time updating it?

1 Like

/shrug
I still can only find it for 90USD. I was going to pickup another one at 60 for testing on stock firmware.

Edit: Nevermind, was only looking at E8450, Belkin version is available for 60USD.

Weird considering they are the exact same.

I plan on systematically:

  1. Use stock firmware for a limited time to confirm no hardware failures and if I do discover some suspected hardware problem the first thing everyone will say is to update firmware to latest.

  2. Update to non UBI and compare stability and performance compared to Stock Firmware. Keeping my go back option available.

  3. I need to read up some more but is Openwrt community still in snapshot mode? I might not have that right? 802.11AX seems to be somewhat of a high hurdle for the gifted guys. Slow going towards conqueroring many AX routers.

Read about if going forward to signed Belkin FW you can't go back. Then also the best way to flash UBI is from older original 2020 firmware. Kinda confused after that.

I got this router for AX6 and WPA3 access mostly. My network is controlled by WRT3200ACM's and WRT1900's.

I must say this belkin with its rusty Firmware is really snappy in WiFi6 and WPA3.

When I move to OpenWRT on this AX router will I still have the two independent partitions that I can freely go back and forth from using Advanced reboot?

I have a problem and it is that I realized that the drop in bandwidth and the problem with the wireless connection occurs is when I create another interface, I have created the guestwifi interface and another modem call to be able to access the modem subnet, but since I created the modem interface I have observed problems, I disabled the start and the guestwifi interface started giving me the following error: DEVICE_CLAIM_FAILED interface error
I decided to remove the modem interface and when rebooting, the guestwifi interface starts normal.

|Model|Linksys E8450 (UBI)|
|Firmware Version|OpenWrt 22.03.0-rc6 r19590-042d558536 / LuCI openwrt-22.03 branch git-22.213.35949-d09fbe0|

Here below is the event log since I don't really know what is the cause of this behavior.

System Log Linksys E8450

Sat Sep 3 08:31:26 2022 daemon.notice netifd: Interface 'wan' is enabled
Sat Sep 3 08:31:26 2022 daemon.notice netifd: Interface 'MODEM' is enabled
Sat Sep 3 08:31:26 2022 daemon.notice netifd: Interface 'MODEM' is setting up now
Sat Sep 3 08:31:26 2022 daemon.notice netifd: Interface 'MODEM' is now up
Sat Sep 3 08:31:26 2022 daemon.err collectd[2291]: configfile: stat (/etc/collectd/conf.d/*.conf) failed: No such file or directory
Sat Sep 3 08:31:26 2022 daemon.err collectd[2291]: plugin_load: plugin "cpu" successfully loaded.
Sat Sep 3 08:31:26 2022 daemon.err collectd[2291]: plugin_load: plugin "load" successfully loaded.
Sat Sep 3 08:31:26 2022 daemon.err collectd[2291]: plugin_load: plugin "rrdtool" successfully loaded.
Sat Sep 3 08:31:26 2022 daemon.err collectd[2291]: rrdtool plugin: RRASingle = true: creating only AVERAGE RRAs
Sat Sep 3 08:31:26 2022 daemon.err collectd[2291]: plugin_load: plugin "thermal" successfully loaded.
Sat Sep 3 08:31:26 2022 daemon.err collectd[2291]: Initialization complete, entering read-loop.
Sat Sep 3 08:31:26 2022 daemon.notice pppd[2371]: pppd 2.4.9 started by root, uid 0
Sat Sep 3 08:31:26 2022 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
Sat Sep 3 08:31:26 2022 daemon.info pppd[2371]: PPP session is 357
Sat Sep 3 08:31:26 2022 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Sat Sep 3 08:31:26 2022 daemon.warn pppd[2371]: Connected to c8:e7: via interface wan
Sat Sep 3 08:31:26 2022 kern.info kernel: [ 13.862979] pppoe-wan: renamed from ppp0
Sat Sep 3 08:31:26 2022 daemon.info pppd[2371]: Renamed interface ppp0 to pppoe-wan
Sat Sep 3 08:31:26 2022 daemon.info pppd[2371]: Using interface pppoe-wan
Sat Sep 3 08:31:26 2022 daemon.notice pppd[2371]: Connect: pppoe-wan <--> wan
Sat Sep 3 08:31:26 2022 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Sat Sep 3 08:31:27 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
Sat Sep 3 08:31:27 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
Sat Sep 3 08:31:27 2022 daemon.err odhcpd[2031]: Failed to send to ff02::1%lan@br-lan (Address not available)
Sat Sep 3 08:31:27 2022 daemon.err collectd[2291]: rrdtool plugin: rrd_update_r failed: /tmp/rrd/OpenWrt/load/load.rrd: Not enough arguments
Sat Sep 3 08:31:27 2022 daemon.info procd: - init complete -
Sat Sep 3 08:31:28 2022 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) --> new PHY
Sat Sep 3 08:31:28 2022 kern.info kernel: [ 15.217819] br-lan: port 5(wlan0) entered blocking state
Sat Sep 3 08:31:28 2022 kern.info kernel: [ 15.238955] br-lan: port 5(wlan0) entered forwarding state
Sat Sep 3 08:31:28 2022 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Sat Sep 3 08:31:28 2022 kern.info kernel: [ 15.245174] br-lan: port 5(wlan0) entered disabled state
Sat Sep 3 08:31:28 2022 daemon.notice hostapd: ACS: Automatic channel selection started, this may take a bit
Sat Sep 3 08:31:28 2022 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->ACS
Sat Sep 3 08:31:28 2022 daemon.notice hostapd: wlan0: ACS-STARTED
Sat Sep 3 08:31:29 2022 daemon.notice netifd: Wireless device 'radio0' is now up
Sat Sep 3 08:31:30 2022 daemon.info pppd[2371]: CHAP authentication failed: User not found.
Sat Sep 3 08:31:30 2022 daemon.err pppd[2371]: CHAP authentication failed
Sat Sep 3 08:31:30 2022 daemon.notice pppd[2371]: Modem hangup
Sat Sep 3 08:31:30 2022 daemon.notice pppd[2371]: Connection terminated.
Sat Sep 3 08:31:30 2022 daemon.info pppd[2371]: Exit.
Sat Sep 3 08:31:30 2022 daemon.notice netifd: Interface 'wan' is now down
Sat Sep 3 08:31:30 2022 daemon.notice netifd: Interface 'wan' is setting up now
Sat Sep 3 08:31:30 2022 daemon.err insmod: module is already loaded - slhc
Sat Sep 3 08:31:30 2022 daemon.err insmod: module is already loaded - ppp_generic
Sat Sep 3 08:31:30 2022 daemon.err insmod: module is already loaded - pppox
Sat Sep 3 08:31:30 2022 daemon.err insmod: module is already loaded - pppoe
Sat Sep 3 08:31:30 2022 daemon.info pppd[3237]: Plugin pppoe.so loaded.
Sat Sep 3 08:31:30 2022 daemon.info pppd[3237]: PPPoE plugin from pppd 2.4.9
Sat Sep 3 08:31:30 2022 daemon.notice pppd[3237]: pppd 2.4.9 started by root, uid 0
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: started, version 2.86 cachesize 150
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: DNS service limited to local subnets
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.3.100 -- 192.168.3.249, lease time 12h
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: using nameserver 127.0.0.53#53
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: using nameserver 127.0.0.53#53
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Sep 3 08:31:31 2022 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Sat Sep 3 08:31:31 2022 daemon.err odhcpd[2031]: Failed to send to ff02::1%lan@br-lan (Address not available)
Sat Sep 3 08:31:34 2022 daemon.notice hostapd: wlan0: ACS-COMPLETED freq=2437 channel=6
Sat Sep 3 08:31:34 2022 kern.info kernel: [ 21.912460] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Sat Sep 3 08:31:34 2022 kern.info kernel: [ 21.918945] br-lan: port 5(wlan0) entered blocking state
Sat Sep 3 08:31:34 2022 kern.info kernel: [ 21.924334] br-lan: port 5(wlan0) entered forwarding state
Sat Sep 3 08:31:34 2022 daemon.notice netifd: Network device 'wlan0' link is up
ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Sat Sep 3 08:31:34 2022 daemon.notice netifd: bridge 'br-lan' link is up
Sat Sep 3 08:31:34 2022 daemon.notice netifd: Interface 'lan' has link connectivity
Sat Sep 3 08:31:35 2022 daemon.notice netifd: Network device 'wlan0-1' link is up
Sat Sep 3 08:31:35 2022 daemon.notice netifd: Interface 'GuestWifi' has link connectivity
Sat Sep 3 08:31:35 2022 kern.info kernel: [ 22.002988] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-1: link becomes ready
Sat Sep 3 08:31:35 2022 daemon.notice hostapd: wlan0: interface state ACS->ENABLED
Sat Sep 3 08:31:35 2022 daemon.notice hostapd: wlan0: AP-ENABLED
Sat Sep 3 08:31:35 2022 daemon.err odhcpd[2031]: Failed to send to ff02::1%lan@br-lan (Address not available)
Sat Sep 3 08:31:36 2022 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Sat Sep 3 08:31:36 2022 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Sep 3 08:31:36 2022 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Sat Sep 3 08:31:39 2022 daemon.info hostapd: wlan0-1: STA cc: IEEE 802.11: authenticated
Sat Sep 3 08:31:39 2022 daemon.info hostapd: wlan0-1: STA cc: IEEE 802.11: associated (aid 1)
Sat Sep 3 08:31:40 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED cc:50:e3:1b:af:1d
Sat Sep 3 08:31:40 2022 daemon.info hostapd: wlan0-1: STA cc:50 RADIUS: starting accounting session 10A64000DBF7E906
Sat Sep 3 08:31:40 2022 daemon.info hostapd: wlan0-1: STA cc:50 WPA: pairwise key handshake completed (RSN)
Sat Sep 3 08:31:40 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED cc:50:
Sat Sep 3 08:31:40 2022 daemon.info pppd[3237]: PPP session is 2119
Sat Sep 3 08:31:40 2022 daemon.warn pppd[3237]: Connected to c8:e7: via interface wan
Sat Sep 3 08:31:40 2022 kern.info kernel: [ 27.372710] pppoe-wan: renamed from ppp0
Sat Sep 3 08:31:40 2022 daemon.info pppd[3237]: Renamed interface ppp0 to pppoe-wan
Sat Sep 3 08:31:40 2022 daemon.info pppd[3237]: Using interface pppoe-wan
Sat Sep 3 08:31:40 2022 daemon.notice pppd[3237]: Connect: pppoe-wan <--> wan
Sat Sep 3 08:31:40 2022 daemon.info pppd[3237]: CHAP authentication failed: User not found.
Sat Sep 3 08:31:40 2022 daemon.err pppd[3237]: CHAP authentication failed
Sat Sep 3 08:31:40 2022 daemon.notice pppd[3237]: Modem hangup
Sat Sep 3 08:31:40 2022 daemon.notice pppd[3237]: Connection terminated.
Sat Sep 3 08:31:40 2022 daemon.info pppd[3237]: Exit.
Sat Sep 3 08:31:40 2022 daemon.notice netifd: Interface 'wan' is now down
Sat Sep 3 08:31:40 2022 daemon.notice netifd: Interface 'wan' is setting up now
Sat Sep 3 08:31:40 2022 daemon.err insmod: module is already loaded - slhc
Sat Sep 3 08:31:40 2022 daemon.err insmod: module is already loaded - ppp_generic
Sat Sep 3 08:31:40 2022 daemon.err insmod: module is already loaded - pppox
Sat Sep 3 08:31:40 2022 daemon.err insmod: module is already loaded - pppoe
Sat Sep 3 08:31:40 2022 daemon.info pppd[3662]: Plugin pppoe.so loaded.
Sat Sep 3 08:31:40 2022 daemon.info pppd[3662]: PPPoE plugin from pppd 2.4.9
Sat Sep 3 08:31:40 2022 daemon.notice pppd[3662]: pppd 2.4.9 started by root, uid 0
Sat Sep 3 08:31:41 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:31:45 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:31:50 2022 daemon.info hostapd: wlan0-1: STA 9c:4f IEEE 802.11: authenticated
Sat Sep 3 08:31:50 2022 daemon.info hostapd: wlan0-1: STA 9c:4f IEEE 802.11: associated (aid 2)
Sat Sep 3 08:31:50 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED 9c:4f
Sat Sep 3 08:31:50 2022 daemon.info hostapd: wlan0-1: STA 9c:4f RADIUS: starting accounting session B5524755D15C03B4
Sat Sep 3 08:31:50 2022 daemon.info hostapd: wlan0-1: STA 9c:4f WPA: pairwise key handshake completed (RSN)
Sat Sep 3 08:31:50 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED 9c:4f
Sat Sep 3 08:31:53 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:31:55 2022 daemon.warn pppd[3662]: Timeout waiting for PADO packets
Sat Sep 3 08:31:55 2022 daemon.err pppd[3662]: Unable to complete PPPoE Discovery
Sat Sep 3 08:31:55 2022 daemon.info pppd[3662]: Exit.
Sat Sep 3 08:31:55 2022 daemon.notice netifd: Interface 'wan' is now down
Sat Sep 3 08:31:55 2022 daemon.notice netifd: Interface 'wan' is setting up now
Sat Sep 3 08:31:55 2022 daemon.err insmod: module is already loaded - slhc
Sat Sep 3 08:31:55 2022 daemon.err insmod: module is already loaded - ppp_generic
Sat Sep 3 08:31:55 2022 daemon.err insmod: module is already loaded - pppox
Sat Sep 3 08:31:55 2022 daemon.err insmod: module is already loaded - pppoe
Sat Sep 3 08:31:55 2022 daemon.info pppd[3748]: Plugin pppoe.so loaded.
Sat Sep 3 08:31:55 2022 daemon.info pppd[3748]: PPPoE plugin from pppd 2.4.9
Sat Sep 3 08:31:56 2022 daemon.notice pppd[3748]: pppd 2.4.9 started by root, uid 0
Sat Sep 3 08:31:56 2022 daemon.info pppd[3748]: PPP session is 216
Sat Sep 3 08:31:56 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: authenticated
Sat Sep 3 08:31:56 2022 daemon.warn pppd[3748]: Connected to c8:e7 via interface wan
Sat Sep 3 08:31:56 2022 kern.info kernel: [ 43.182750] pppoe-wan: renamed from ppp0
Sat Sep 3 08:31:56 2022 daemon.info pppd[3748]: Renamed interface ppp0 to pppoe-wan
Sat Sep 3 08:31:56 2022 daemon.info pppd[3748]: Using interface pppoe-wan
Sat Sep 3 08:31:56 2022 daemon.notice pppd[3748]: Connect: pppoe-wan <--> wan
Sat Sep 3 08:31:56 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: associated (aid 3)
Sat Sep 3 08:31:56 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED 68:c6
Sat Sep 3 08:31:56 2022 daemon.info hostapd: wlan0-1: STA 68:c6: RADIUS: starting accounting session 3C53B997
Sat Sep 3 08:31:56 2022 daemon.info hostapd: wlan0-1: STA 68:c6 WPA: pairwise key handshake completed (RSN)
Sat Sep 3 08:31:56 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED 68:c6:
Sat Sep 3 08:31:56 2022 daemon.info pppd[3748]: CHAP authentication failed: User not found.
Sat Sep 3 08:31:56 2022 daemon.err pppd[3748]: CHAP authentication failed
Sat Sep 3 08:31:56 2022 daemon.notice pppd[3748]: Modem hangup
Sat Sep 3 08:31:56 2022 daemon.notice pppd[3748]: Connection terminated.
Sat Sep 3 08:31:56 2022 daemon.info pppd[3748]: Exit.
Sat Sep 3 08:31:56 2022 daemon.notice netifd: Interface 'wan' is now down
Sat Sep 3 08:31:56 2022 daemon.notice netifd: Interface 'wan' is setting up now
Sat Sep 3 08:31:56 2022 daemon.err insmod: module is already loaded - slhc
Sat Sep 3 08:31:56 2022 daemon.err insmod: module is already loaded - ppp_generic
Sat Sep 3 08:31:56 2022 daemon.err insmod: module is already loaded - pppox
Sat Sep 3 08:31:56 2022 daemon.err insmod: module is already loaded - pppoe
Sat Sep 3 08:31:56 2022 daemon.info pppd[3812]: Plugin pppoe.so loaded.
Sat Sep 3 08:31:56 2022 daemon.info pppd[3812]: PPPoE plugin from pppd 2.4.9
Sat Sep 3 08:31:56 2022 daemon.notice pppd[3812]: pppd 2.4.9 started by root, uid 0
Sat Sep 3 08:31:57 2022 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED cc:50:
Sat Sep 3 08:31:57 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: disassociated
Sat Sep 3 08:31:57 2022 daemon.err collectd[2291]: rrdtool plugin: rrd_update_r failed: /tmp/rrd/OpenWrt/cpu-0/percent-steal.rrd: opening '/tmp/rrd/OpenWrt/cpu-0/percent-steal.rrd': No such file or directory
Sat Sep 3 08:31:57 2022 daemon.err collectd[2291]: rrdtool plugin: rrd_update_r failed: /tmp/rrd/OpenWrt/cpu-1/percent-wait.rrd: opening '/tmp/rrd/OpenWrt/cpu-1/percent-wait.rrd': No such file or directory
Sat Sep 3 08:31:57 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:31:58 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Sep 3 08:32:00 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: authenticated
Sat Sep 3 08:32:00 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: associated (aid 1)
Sat Sep 3 08:32:01 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED cc:50
Sat Sep 3 08:32:01 2022 daemon.info hostapd: wlan0-1: STA cc:50: RADIUS: starting accounting session 57B07C4
Sat Sep 3 08:32:01 2022 daemon.info hostapd: wlan0-1: STA cc:50 WPA: pairwise key handshake completed (RSN)
Sat Sep 3 08:32:01 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED cc:50
Sat Sep 3 08:32:01 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:32:01 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:32:02 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:32:06 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:32:08 2022 daemon.info hostapd: wlan0: STA 8a:24 IEEE 802.11: authenticated
Sat Sep 3 08:32:08 2022 daemon.info hostapd: wlan0: STA 8a:24 IEEE 802.11: associated (aid 1)
Sat Sep 3 08:32:08 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 8a:24
Sat Sep 3 08:32:08 2022 daemon.info hostapd: wlan0: STA 8a:24 RADIUS: starting accounting session E42C6
Sat Sep 3 08:32:08 2022 daemon.info hostapd: wlan0: STA 8a:24 WPA: pairwise key handshake completed (RSN)
Sat Sep 3 08:32:08 2022 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED 8a:24
Sat Sep 3 08:32:08 2022 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.3.163 8a:24
Sat Sep 3 08:32:08 2022 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.3.163 8a:24
Sat Sep 3 08:32:09 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:32:11 2022 daemon.warn pppd[3812]: Timeout waiting for PADO packets
Sat Sep 3 08:32:11 2022 daemon.err pppd[3812]: Unable to complete PPPoE Discovery
Sat Sep 3 08:32:11 2022 daemon.info pppd[3812]: Exit.
Sat Sep 3 08:32:11 2022 daemon.notice netifd: Interface 'wan' is now down
Sat Sep 3 08:32:11 2022 daemon.notice netifd: Interface 'wan' is setting up now
Sat Sep 3 08:32:11 2022 daemon.err insmod: module is already loaded - slhc
Sat Sep 3 08:32:11 2022 daemon.err insmod: module is already loaded - ppp_generic
Sat Sep 3 08:32:11 2022 daemon.err insmod: module is already loaded - pppox
Sat Sep 3 08:32:11 2022 daemon.err insmod: module is already loaded - pppoe
Sat Sep 3 08:32:11 2022 daemon.info pppd[3898]: Plugin pppoe.so loaded.
Sat Sep 3 08:32:11 2022 daemon.info pppd[3898]: PPPoE plugin from pppd 2.4.9
Sat Sep 3 08:32:11 2022 daemon.notice pppd[3898]: pppd 2.4.9 started by root, uid 0
Sat Sep 3 08:32:12 2022 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED 68:c6
Sat Sep 3 08:32:12 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: disassociated
Sat Sep 3 08:32:12 2022 daemon.info hostapd: wlan0: STA 02:b5 IEEE 802.11: authenticated
Sat Sep 3 08:32:12 2022 daemon.info hostapd: wlan0: STA 02:b5 IEEE 802.11: associated (aid 2)
Sat Sep 3 08:32:12 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 02:b5
Sat Sep 3 08:32:12 2022 daemon.info hostapd: wlan0: STA 02:b5 RADIUS: starting accounting session 455B2
Sat Sep 3 08:32:12 2022 daemon.info hostapd: wlan0: STA 02:b5 WPA: pairwise key handshake completed (RSN)
Sat Sep 3 08:32:12 2022 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED 02:b5
Sat Sep 3 08:32:13 2022 daemon.info hostapd: wlan0-1: STA 68:c6: IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Sep 3 08:32:13 2022 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.3.142 02:b5:
Sat Sep 3 08:32:13 2022 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.3.142 02:b5 DESKTOP-MBH
Sat Sep 3 08:32:14 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:32:14 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: authenticated
Sat Sep 3 08:32:14 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: associated (aid 3)
Sat Sep 3 08:32:14 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED 68:c6:
Sat Sep 3 08:32:14 2022 daemon.info hostapd: wlan0-1: STA 68:c6 RADIUS: starting accounting session 1B1A802
Sat Sep 3 08:32:14 2022 daemon.info hostapd: wlan0-1: STA 68: WPA: pairwise key handshake completed (RSN)
Sat Sep 3 08:32:14 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED 68:c6
Sat Sep 3 08:32:15 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 8a:24
Sat Sep 3 08:32:16 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:32:17 2022 user.info : luci: accepted login on / for root from 192.168.3.142
Sat Sep 3 08:32:18 2022 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED cc:50
Sat Sep 3 08:32:18 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: disassociated
Sat Sep 3 08:32:19 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Sep 3 08:32:20 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:32:21 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: authenticated
Sat Sep 3 08:32:21 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: associated (aid 1)
Sat Sep 3 08:32:22 2022 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Sat Sep 3 08:32:22 2022 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Sep 3 08:32:22 2022 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 0 addresses
Sat Sep 3 08:32:22 2022 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Sat Sep 3 08:32:22 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED cc:50
Sat Sep 3 08:32:22 2022 daemon.info hostapd: wlan0-1: STA cc:50 RADIUS: starting accounting session EEAE8
Sat Sep 3 08:32:22 2022 daemon.info hostapd: wlan0-1: STA cc:50 WPA: pairwise key handshake completed (RSN)
Sat Sep 3 08:32:22 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED cc:50
Sat Sep 3 08:32:22 2022 daemon.info dnsmasq[1]: read /etc/hosts - 4 addresses
Sat Sep 3 08:32:22 2022 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Sep 3 08:32:22 2022 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 1 addresses
Sat Sep 3 08:32:22 2022 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Sat Sep 3 08:32:23 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:32:23 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:23] [ERROR] Timeout while waiting for network connectivity
Sat Sep 3 08:32:23 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:23] [NOTICE] Now listening to 127.0.0.53:53 [UDP]
Sat Sep 3 08:32:23 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:23] [NOTICE] Now listening to 127.0.0.53:53 [TCP]
Sat Sep 3 08:32:23 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:23] [NOTICE] Source [public-resolvers] loaded
Sat Sep 3 08:32:23 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:23] [NOTICE] Source [relays] loaded
Sat Sep 3 08:32:23 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:23] [NOTICE] Firefox workaround initialized
Sat Sep 3 08:32:23 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:23] [WARNING] [adguard-dns] uses a non-standard provider name ('2.dnscrypt.default.ns1.adguard.com.' doesn't start with '2.dnscrypt-cert.')
Sat Sep 3 08:32:24 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:24] [NOTICE] [adguard-dns] TIMEOUT
Sat Sep 3 08:32:24 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:24] [ERROR] Get "https://dns.google/dns-query?dns=yv4BAAM": dial tcp 8.8.8.8:443: connect: network is unreachable
Sat Sep 3 08:32:24 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:24] [NOTICE] dnscrypt-proxy is waiting for at least one server to be reachable
Sat Sep 3 08:32:26 2022 daemon.warn pppd[3898]: Timeout waiting for PADO packets
Sat Sep 3 08:32:26 2022 daemon.err pppd[3898]: Unable to complete PPPoE Discovery
Sat Sep 3 08:32:26 2022 daemon.info pppd[3898]: Exit.
Sat Sep 3 08:32:26 2022 daemon.notice netifd: Interface 'wan' is now down
Sat Sep 3 08:32:26 2022 daemon.notice netifd: Interface 'wan' is setting up now
Sat Sep 3 08:32:26 2022 daemon.err insmod: module is already loaded - slhc
Sat Sep 3 08:32:26 2022 daemon.err insmod: module is already loaded - ppp_generic
Sat Sep 3 08:32:26 2022 daemon.err insmod: module is already loaded - pppox
Sat Sep 3 08:32:26 2022 daemon.err insmod: module is already loaded - pppoe
Sat Sep 3 08:32:26 2022 daemon.info pppd[4158]: Plugin pppoe.so loaded.
Sat Sep 3 08:32:26 2022 daemon.info pppd[4158]: PPPoE plugin from pppd 2.4.9
Sat Sep 3 08:32:27 2022 daemon.notice pppd[4158]: pppd 2.4.9 started by root, uid 0
Sat Sep 3 08:32:27 2022 daemon.info pppd[4158]: PPP session is 758
Sat Sep 3 08:32:27 2022 daemon.warn pppd[4158]: Connected to c8:e7 via interface wan
Sat Sep 3 08:32:27 2022 kern.info kernel: [ 74.183064] pppoe-wan: renamed from ppp0
Sat Sep 3 08:32:27 2022 daemon.info pppd[4158]: Renamed interface ppp0 to pppoe-wan
Sat Sep 3 08:32:27 2022 daemon.info pppd[4158]: Using interface pppoe-wan
Sat Sep 3 08:32:27 2022 daemon.notice pppd[4158]: Connect: pppoe-wan <--> wan
Sat Sep 3 08:32:27 2022 daemon.info pppd[4158]: CHAP authentication succeeded: Access Accept
Sat Sep 3 08:32:27 2022 daemon.notice pppd[4158]: CHAP authentication succeeded
Sat Sep 3 08:32:27 2022 daemon.notice pppd[4158]: peer from calling number C8:E7 authorized
Sat Sep 3 08:32:27 2022 daemon.notice pppd[4158]: local IP address 100.99.99.99
Sat Sep 3 08:32:27 2022 daemon.notice pppd[4158]: remote IP address 110.99.99.99
Sat Sep 3 08:32:27 2022 daemon.notice pppd[4158]: primary DNS address 1.1.1.1
Sat Sep 3 08:32:27 2022 daemon.notice pppd[4158]: secondary DNS address 1.1.1.1
Sat Sep 3 08:32:27 2022 daemon.notice netifd: tunnel 'pppoe-wan' link is up
Sat Sep 3 08:32:27 2022 daemon.notice netifd: Interface 'wan' is now up
Sat Sep 3 08:32:27 2022 daemon.info qosify: start interface pppoe-wan
Sat Sep 3 08:32:27 2022 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
Sat Sep 3 08:32:31 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Sep 3 08:32:33 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: authenticated
Sat Sep 3 08:32:33 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: associated (aid 3)
Sat Sep 3 08:32:33 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED 68:c6
Sat Sep 3 08:32:33 2022 daemon.info hostapd: wlan0-1: STA 68:c6 RADIUS: starting accounting session 3BBEDD7
Sat Sep 3 08:32:33 2022 daemon.info hostapd: wlan0-1: STA 68:c6 WPA: pairwise key handshake completed (RSN)
Sat Sep 3 08:32:33 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED 68:c6
Sat Sep 3 08:32:34 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:34] [NOTICE] [cloudflare] OK (DoH) - rtt: 38ms
Sat Sep 3 08:32:34 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 13:32:34] [WARNING] [adguard-dns] uses a non-standard provider name ('2.dnscrypt.default.ns1.adguard.com.' doesn't start with '2.dnscrypt-cert.')
Sat Sep 3 08:32:35 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 08:32:35 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 11:40:14 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 11:40:14 2022 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED cc:50
Sat Sep 3 11:40:14 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: disassociated
Sat Sep 3 11:40:15 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 16:40:15] [NOTICE] [adguard-dns] OK (DNSCrypt) - rtt: 100ms
Sat Sep 3 11:40:15 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Sep 3 11:40:15 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 16:40:15] [NOTICE] [google] OK (DoH) - rtt: 93ms
Sat Sep 3 11:40:15 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 16:40:15] [NOTICE] Sorted latencies:
Sat Sep 3 11:40:15 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 16:40:15] [NOTICE] - 38ms cloudflare
Sat Sep 3 11:40:15 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 16:40:15] [NOTICE] - 93ms google
Sat Sep 3 11:40:15 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 16:40:15] [NOTICE] - 100ms adguard-dns
Sat Sep 3 11:40:15 2022 daemon.err dnscrypt-proxy[1494]: [2022-09-03 16:40:15] [NOTICE] Server with the lowest initial latency: cloudflare (rtt: 38ms)
Sat Sep 3 11:40:16 2022 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED 9c:4f
Sat Sep 3 11:40:18 2022 daemon.info hostapd: wlan0-1: STA 9c:4f IEEE 802.11: authenticated
Sat Sep 3 11:40:18 2022 daemon.info hostapd: wlan0-1: STA 9c:4f IEEE 802.11: associated (aid 1)
Sat Sep 3 11:40:18 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED 9c:4f
Sat Sep 3 11:40:18 2022 daemon.info hostapd: wlan0-1: STA 9c:4f RADIUS: starting accounting session 797FE1
Sat Sep 3 11:40:18 2022 daemon.info hostapd: wlan0-1: STA 9c:4f: WPA: pairwise key handshake completed (RSN)
Sat Sep 3 11:40:18 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED 9c:4f
Sat Sep 3 11:40:18 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: authenticated
Sat Sep 3 11:40:18 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: associated (aid 2)
Sat Sep 3 11:40:18 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED cc:50
Sat Sep 3 11:40:18 2022 daemon.info hostapd: wlan0-1: STA cc:50 RADIUS: starting accounting session 0E8F0A
Sat Sep 3 11:40:18 2022 daemon.info hostapd: wlan0-1: STA cc:50: WPA: pairwise key handshake completed (RSN)
Sat Sep 3 11:40:18 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED cc:50
Sat Sep 3 11:40:25 2022 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED 68:c6
Sat Sep 3 11:40:25 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: disassociated
Sat Sep 3 11:40:25 2022 daemon.warn dnsmasq-dhcp[1]: DHCP packet received on wlan0-1 which has no address
Sat Sep 3 11:40:26 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Sep 3 11:40:26 2022 daemon.info hostapd: wlan0: STA 8a:24 IEEE 802.11: authenticated
Sat Sep 3 11:40:26 2022 daemon.info hostapd: wlan0: STA 8a:24 IEEE 802.11: associated (aid 1)
Sat Sep 3 11:40:26 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 8a:24:
Sat Sep 3 11:40:26 2022 daemon.info hostapd: wlan0: STA 8a:24 RADIUS: starting accounting session FA7313
Sat Sep 3 11:40:26 2022 daemon.info hostapd: wlan0: STA 8a:24: WPA: pairwise key handshake completed (RSN)
Sat Sep 3 11:40:26 2022 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED 8a:24
Sat Sep 3 11:40:26 2022 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.3.163 8a:24
Sat Sep 3 11:40:26 2022 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.3.163 8a:24:
Sat Sep 3 11:40:27 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: authenticated
Sat Sep 3 11:40:27 2022 daemon.info hostapd: wlan0-1: STA 68:c6: IEEE 802.11: associated (aid 3)
Sat Sep 3 11:40:27 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED 68:c6
Sat Sep 3 11:40:27 2022 daemon.info hostapd: wlan0-1: STA 68:c6 RADIUS: starting accounting session 79B921D
Sat Sep 3 11:40:27 2022 daemon.info hostapd: wlan0-1: STA 68:c6: WPA: pairwise key handshake completed (RSN)
Sat Sep 3 11:40:32 2022 daemon.err collectd[2291]: Sleeping only 2s because the next interval is 11225.665 seconds in the past!
Sat Sep 3 11:40:35 2022 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED cc:50
Sat Sep 3 11:40:35 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: disassociated
Sat Sep 3 11:40:36 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Sep 3 11:40:39 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: authenticated
Sat Sep 3 11:40:39 2022 daemon.info hostapd: wlan0-1: STA cc:50 IEEE 802.11: associated (aid 2)
Sat Sep 3 11:40:39 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED cc:50
Sat Sep 3 11:40:39 2022 daemon.info hostapd: wlan0-1: STA cc:50:e3 RADIUS: starting accounting session C53C5E2
Sat Sep 3 11:40:39 2022 daemon.info hostapd: wlan0-1: STA cc:50:e3 WPA: pairwise key handshake completed (RSN)
Sat Sep 3 11:40:39 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED cc:50
Sat Sep 3 11:40:46 2022 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED 68:c6
Sat Sep 3 11:40:46 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: authenticated
Sat Sep 3 11:40:46 2022 daemon.info hostapd: wlan0-1: STA 68:c6 IEEE 802.11: associated (aid 3)
Sat Sep 3 11:40:46 2022 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED 68:c6:
Sat Sep 3 11:40:46 2022 daemon.info hostapd: wlan0-1: STA 68:c6 RADIUS: starting accounting session 5384D2
Sat Sep 3 11:40:46 2022 daemon.info hostapd: wlan0-1: STA 68:c6 WPA: pairwise key handshake completed (RSN)
Sat Sep 3 11:40:46 2022 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED 68:c6:

fewer LEDs. The Belkin one is white, which looks way more elegant.

1 Like

I like the LEDs too it is timeless

There's a wiki page at openwrt.org that talks about the Attended Sysupgrade package... https://openwrt.org/docs/guide-user/installation/attended.sysupgrade

And I just saw @efahl 's link to the OneMarcFifty video about it. https://www.youtube.com/watch?v=FFTPA6GkJjg&t=1034s Really nice description!

1 Like

Hi everyone,

I hope this messages finds you all well, I recently got a belkin rt3200 and I am interested in installing OpenWRT in order to install a vpn on it and also have the ability to surf without the VPN. The only problem I am having is that I have never done this and really don't know where to start. Any help is definitely appreciate it!

@Gr0d I would suggest following these steps:

  1. Download the *.itb files from the latest release at https://github.com/dangowrt/owrt-ubi-installer/releases .

  2. Follow step 1 to step 6 of https://github.com/dangowrt/owrt-ubi-installer#assuming-the-device-is-running-stock-firmware-version-10-and-is-brand-new-or-just-after-factory-reset

1. Connect any of the LAN ports of the device directly to the Ethernet port of your computer.
2. Set the IP address of your computer as 192.168.1.254 with netmask 255.255.255.0, no gateway, no DNS.
3. Power on the device, wait about a minute for it to be ready.
4. Open a web browser, navigate to http://192.168.1.1 and wait for the wizard to come up.
5. Click exactly inside the radio button to confirm the terms and conditions, then abort the wizard.
6. You should then be greeted by the login screen, the stock password is "admin".

  1. Note down which version of stock firmware your RT3200 is currently running.

  2. Follow step 7 and then at Step 8, instead of "recovery-installer.itb", follow https://github.com/dangowrt/owrt-ubi-installer#device-flash-complete-backup-procedure to load "initramfs-recovery.itb" and then follow the rst of the steps to save complete backup of stock firmware (in your RT3200) to your PC.

  3. Once you have saved the stock firmware backup images, power cycle the RT3200 (power off, wait 1 min, power on). Confirm that you are back in stock firmware and then continue to next step.

  4. Follow step 6 to step 12 of https://github.com/dangowrt/owrt-ubi-installer#assuming-the-device-is-running-stock-firmware-version-10-and-is-brand-new-or-just-after-factory-reset and flash the " initramfs-recovery-installer.itb" at step 8. Final step # 13 is optional.

  5. You should now have OpenWrt installed in your RT3200. If you want additional packages connect to your RT3200 using SSH and then use opkg to install additional packages.

@daniel Please let me know if the above order of steps are correct. Thank you for providing the UBI installer files.

1 Like

I wouldn't recommend to go through all the extra loops to take the full backup unless you want to be extra safe in terms of having the option to go back to stock firmware even under post-apocalyptic circumstances.

Having the boot chain backup'ed (the minimal backup which is done automatically by the installer) is absolutely sufficient as you can download the remaining content from Belkin/Linksys server, see https://github.com/dangowrt/owrt-ubi-installer#restoring-the-vendorofficial-firmware

4 Likes

@Gr0d regarding VPN you should setup WireGuard and once you have that setup then use VPN with netifd PBR which can be setup via LuCi - see here:

It's not so well documented but the above approach works very well and is easily configurable in LuCi. So you can redirect traffic from a specific device through wan rather than VPN for example.

Hi everybody,

I've installed OpenWrt (UBI) on my RT3200 using owrt-ubi-installer v0.6.5, which doesn't include the latest NAND bad block improvements yet. I've got no bad block issues so far, so should one upgrade the bootloader nevertheless? If that's the case, how?

Many thanks!

If your devices works fine with the version of ARM Trusted Firmware and U-Boot you are using at this point there is no need to update anything but OpenWrt itself. You shouldn't touch ARM Trusted Firmware or U-Boot unless there is a good reason for that (such as having a device with bad-blocks early in the flash like it happened here to @vasilii)

2 Likes

@daniel, many thanks for your feedback! Won't touch ATF and U-Boot then :grinning:

Apologies if this is a dumb question, but bad blocks will become more of an issue as these devices age, though, right? (unless FIP doesn’t matter after a successful conversion to UBI)

Is there no way to easily/safely update the bootloader - is that why it’s been discouraged multiple times?

Bad blocks become an issue mostly on blocks which are written frequently.
Having new bad block show up in flash regions where you are only reading from (like bl2 and fip) is very very unlikely -- and in that very unlikely case you will anyway always have to reflash the device using JTAG.

3 Likes

Does updating the installer thus increase the risk?

MTK wifi drivers for 22.03.0 https://mega.nz/folder/eYFzkCLZ#iVPXwKfTDVCv1HirtduzAg

1 Like