I changed my device for a “new” one with openwrt. It’s a TPLink Acher C50 V1 OpenWrt 24.10.3.
Everything worked fine with the old one (Tenda Cosmo). Now, with the OpenWRT i cannot get a stable connection on the chromecasts (Google TV). It connects, but drops soon.Many time do not even connect.
So, i installed the Tenda Cosmo BEHIND the openWRT, and the chromecasts works fine. Looks like some problema on wifi. How can i track it? Logs did not helped me.
Wed Oct 22 01:41:43 2025 daemon.info hostapd: phy1-ap0: STA MAC ADDRESS WPA: pairwise key handshake completed (RSN)
Wed Oct 22 01:41:43 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED MAC ADDRESS
Wed Oct 22 01:41:44 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.20 MAC ADDRESS
Wed Oct 22 01:41:44 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.20 MAC ADDRESS android
Wed Oct 22 01:41:44 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.20 MAC ADDRESS
Wed Oct 22 01:41:44 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.20 MAC ADDRESS android
Wed Oct 22 01:41:47 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.20 MAC ADDRESS
Wed Oct 22 01:41:47 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.20 MAC ADDRESS android
Wed Oct 22 01:42:48 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.20 MAC ADDRESS
Wed Oct 22 01:42:48 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.20 MAC ADDRESS android
Wed Oct 22 01:42:48 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.20 MAC ADDRESS
Wed Oct 22 01:42:48 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.20 MAC ADDRESS android
Wed Oct 22 01:42:48 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.20 MAC ADDRESS
Wed Oct 22 01:42:48 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.20 MAC ADDRESS android
Wed Oct 22 01:42:48 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) MAC ADDRESS
Wed Oct 22 01:42:48 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.20 MAC ADDRESS
Wed Oct 22 01:42:49 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) MAC ADDRESS
Wed Oct 22 01:42:49 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.20 MAC ADDRESS
Wed Oct 22 01:42:49 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) MAC ADDRESS
Wed Oct 22 01:42:49 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.20 MAC ADDRESS
Wed Oct 22 01:42:49 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.20 MAC ADDRESS
Wed Oct 22 01:42:49 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.20 MAC ADDRESS android
Wed Oct 22 01:44:17 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED MAC ADDRESS
Wed Oct 22 01:44:17 2025 daemon.info hostapd: phy1-ap0: STA MAC ADDRESS IEEE 802.11: disassociated
Wed Oct 22 01:44:18 2025 daemon.info hostapd: phy1-ap0: STA MAC ADDRESS IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Oct 22 02:18:57 2025 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Let's take a look at your config to get more information:
Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button (red circle; this works best in the 'Markdown' composer view in the blue oval):

Remember to redact passwords, VPN keys, MAC addresses and any public IP addresses you may have:
ubus call system board
cat /etc/config/network
cat /etc/config/wireless
cat /etc/config/dhcp
cat /etc/config/firewall
1 Like
root@OpenWrt:~# ubus call system board
{
"kernel": "6.6.104",
"hostname": "OpenWrt",
"system": "MediaTek MT7620A ver:2 eco:6",
"model": "TP-Link Archer C50 v1",
"board_name": "tplink,archer-c50-v1",
"rootfs_type": "squashfs",
"release": {
"distribution": "OpenWrt",
"version": "24.10.3",
"revision": "r28872-daca7c049b",
"target": "ramips/mt7620",
"description": "OpenWrt 24.10.3 r28872-daca7c049b",
"builddate": "1758316778"
}
}
root@OpenWrt:~# cat /etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option packet_steering '1'
config device
option name 'br-lan'
option type 'bridge'
list ports 'eth0.1'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option ipaddr '192.168.1.1'
option netmask '255.255.255.0'
option delegate '0'
option ipv6 '0'
config device
option name 'eth0.2'
option macaddr 'xxxxxxxxxxxxxxxxxx'
config interface 'wan'
option device 'eth0.2'
option proto 'pppoe'
option username 'xxxxxxxxxxxxxx'
option password 'xxxxxxxxxxxxxx'
option ipv6 '0'
option peerdns '0'
list dns '8.8.8.8'
list dns '1.1.1.1'
config switch
option name 'switch0'
option reset '1'
option enable_vlan '1'
config switch_vlan
option device 'switch0'
option vlan '1'
option ports '1 2 3 4 6t'
config switch_vlan
option device 'switch0'
option vlan '2'
option ports '0 6t'
config device
option type 'bridge'
option name 'Br-guest'
option bridge_empty '1'
config device
option type 'bridge'
option name 'Br-IoT'
option bridge_empty '1'
config interface 'Guest'
option proto 'static'
option device 'Br-guest'
option ipaddr '192.168.3.1'
option netmask '255.255.255.0'
option gateway '192.168.1.1'
config interface 'IoT'
option proto 'static'
option device 'Br-IoT'
option ipaddr '192.168.2.1'
option netmask '255.255.255.0'
option gateway '192.168.1.1'
root@OpenWrt:~# cat /etc/config/wireless
config wifi-device 'radio0'
option type 'mac80211'
option path 'pci0000:00/0000:00:00.0/0000:01:00.0'
option band '5g'
option channel '36'
option htmode 'VHT80'
option disabled '1'
option cell_density '0'
config wifi-iface 'default_radio0'
option device 'radio0'
option network 'lan'
option mode 'ap'
option ssid 'XXXXXX'
option encryption 'psk2'
option key 'xxxxx'
option ieee80211r '1'
option ft_over_ds '0'
option ft_psk_generate_local '1'
option disabled '1'
config wifi-device 'radio1'
option type 'mac80211'
option path 'platform/10180000.wmac'
option band '2g'
option channel '1'
option htmode 'HT20'
option cell_density '0'
option country 'US'
option txpower '18'
config wifi-iface 'default_radio1'
option device 'radio1'
option network 'lan'
option mode 'ap'
option ssid 'XXXXXX'
option encryption 'psk2'
option key 'XXXXXX'
config wifi-iface 'wifinet2'
option device 'radio1'
option mode 'ap'
option ssid 'Guest'
option encryption 'psk2'
option key 'XXXXX'
option network 'Guest'
config wifi-iface 'wifinet3'
option device 'radio1'
option mode 'ap'
option ssid 'IoT'
option encryption 'psk2'
option key 'XXXXXX'
option network 'IoT'
root@OpenWrt:~# cat /etc/config/dhcp
config dnsmasq
option domainneeded '1'
option localise_queries '1'
option rebind_protection '1'
option rebind_localhost '1'
option local '/lan/'
option domain 'lan'
option expandhosts '1'
option cachesize '1000'
option authoritative '1'
option readethers '1'
option leasefile '/tmp/dhcp.leases'
option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
option localservice '1'
option ednspacket_max '1232'
config dhcp 'lan'
option interface 'lan'
option start '100'
option limit '150'
option leasetime '12h'
option dhcpv4 'server'
list ra_flags 'managed-config'
list ra_flags 'other-config'
config dhcp 'wan'
option interface 'wan'
option ignore '1'
config odhcpd 'odhcpd'
option maindhcp '0'
option leasefile '/tmp/hosts/odhcpd'
option leasetrigger '/usr/sbin/odhcpd-update'
option loglevel '4'
config dhcp 'Guest'
option interface 'Guest'
option start '100'
option limit '150'
option leasetime '12h'
config dhcp 'IoT'
option interface 'IoT'
option start '100'
option limit '150'
option leasetime '12h'
root@OpenWrt:~# cat /etc/config/firewall
config defaults
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option synflood_protect '1'
config zone
option name 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
list network 'lan'
config zone
option name 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
list network 'wan'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config zone
option name 'IoTZone'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
list network 'IoT'
config zone
option name 'GuestZone'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
list network 'Guest'
config forwarding
option src 'GuestZone'
option dest 'wan'
config forwarding
option src 'IoTZone'
option dest 'wan'
config rule
option src 'IoTZone'
option name 'IoT-DNS-DHCP'
option dest_port '53 67'
option target 'ACCEPT'
config rule
option src 'GuestZone'
option name 'Guest-DNS-DHCP'
option dest_port '53 67'
option target 'ACCEPT'
config forwarding
option src 'lan'
option dest 'GuestZone'
config forwarding
option src 'lan'
option dest 'IoTZone'
I had tried using google dns, removing IPv6, tried all 4 SSIDs, but chromecasts have the same behaviour. Cplete a handshake, make a discover againg, receive a offer, make a discover. offer, discover, offer, and a deauthenticated due to inactivity
Thu Oct 23 00:11:17 2025 daemon.info hostapd: phy1-ap0: STA MAC ADD IEEE 802.11: authenticated
Thu Oct 23 00:11:17 2025 daemon.info hostapd: phy1-ap0: STA MAC ADD IEEE 802.11: associated (aid 8)
Thu Oct 23 00:11:19 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED MAC ADD auth_alg=open
Thu Oct 23 00:11:19 2025 daemon.info hostapd: phy1-ap0: STA MAC ADD WPA: pairwise key handshake completed (RSN)
Thu Oct 23 00:11:19 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED MAC ADD
Thu Oct 23 00:11:21 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) MAC ADD
Thu Oct 23 00:11:21 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.20 MAC ADD
Thu Oct 23 00:11:25 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) MAC ADD
Thu Oct 23 00:11:25 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.20 MAC ADD
Thu Oct 23 00:11:25 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.20 MAC ADD
Thu Oct 23 00:11:25 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.20 MAC ADD CC-android
Thu Oct 23 00:13:28 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED MAC ADD
Thu Oct 23 00:13:28 2025 daemon.info hostapd: phy1-ap0: STA MAC ADD IEEE 802.11: authenticated
Thu Oct 23 00:16:17 2025 daemon.info hostapd: phy1-ap0: STA MAC ADD IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Which network are you using to connect the chromecast? lan, guest, or iot?
Remove the gateway lines from both of these (they're wrong and also unnecessary):
Restart and see if that changes anything.
Done. Same behavior.
I had tried all the networks. lan, guest, and iot. They do not differ. And I have no problems with all other devices at any networks. And when i connect the chromecast on the second router (cascated), it works fine. If i get a dumb AP or that i could at least disable DHCP i will try just the wifi function out of openwrt. Or another openwrt device. I have others on my farm.
I had a serious health problem at family and could do nothing.
This weekend o took an old raspberry pi and installed openwrt behind the "main" router (also openwrt, with problems). And the chromecast work fine with it's wifi.
OpenWrt 24.10.4. The main is OpenWrt 24.10.3.
I also notice that on of the chromecasts works fine with the router, other works most of time, and other almost never. And chromecast do not help de understand what happens. Sometimes it even complains about wrong password.
Is there a way to get more wifi logs on openwrt?
Well. I got my old TP-Link TL-WR841N/ND v8, OpenWrt 18.06.8.
Is soo old that I use this as a dumb AP. No DHCP, no DNS, and some others I don't remember, so, I could get a little space to install one or two packages.
But, Chromecast works fine with his wifi, and the Archer C50 as main router. So weird.