EA4500 frequent disconnection

System
Hostname	            Cisco
Model	                 Linksys EA4500 (Viper)
Architecture	         Feroceon 88FR131 rev 1 (v5l)
Target Platform	          kirkwood/generic
Firmware Version	      OpenWrt 22.03.2 r19803-9a599fee93 / LuCI openwrt-22.03 branch git-22.288.45147-96ec0cd
Kernel Version	        5.10.146




Sat Jul  5 12:10:12 2025 kern.notice kernel: [590779.712027] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:16 2025 kern.notice kernel: [590783.198517] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:16 2025 kern.notice kernel: [590783.210178] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:27 2025 kern.debug kernel: [590794.306460] ieee80211 phy0: Deleted BA stream index 0
Sat Jul  5 12:10:27 2025 kern.debug kernel: [590794.324691] ieee80211 phy0: Deleted BA stream index 0
Sat Jul  5 12:10:27 2025 kern.debug kernel: [590794.329906] ieee80211 phy0: Remove stream for c6:69:99:jj:kl:mn 0
Sat Jul  5 12:10:27 2025 kern.debug kernel: [590794.337788] ieee80211 phy0: Added a new stream for c6:69:99:jj:kl:mn 0
Sat Jul  5 12:10:27 2025 kern.debug kernel: [590794.344448] ieee80211 phy0: Started stream for c6:69:99:jj:kl:mn 0
Sat Jul  5 12:10:27 2025 kern.debug kernel: [590794.356582] ieee80211 phy0: Deleted BA stream index 1
Sat Jul  5 12:10:27 2025 kern.notice kernel: [590794.420624] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:27 2025 kern.err kernel: [590794.425056] ieee80211 phy0: Command BASTREAM error 0x1
Sat Jul  5 12:10:28 2025 kern.err kernel: [590795.467418] ieee80211 phy0: Command BASTREAM error 0x1
Sat Jul  5 12:10:29 2025 kern.err kernel: [590796.507434] ieee80211 phy0: Command BASTREAM error 0x1
Sat Jul  5 12:10:30 2025 kern.notice kernel: [590797.547568] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:30 2025 kern.debug kernel: [590797.552032] ieee80211 phy0: Deleted BA stream index 1
Sat Jul  5 12:10:30 2025 kern.debug kernel: [590797.557202] ieee80211 phy0: Remove stream for 84:ef:18:1f:7d:c2 0
Sat Jul  5 12:10:30 2025 kern.debug kernel: [590797.569317] ieee80211 phy0: Created a BA stream for c6:69:99:jj:kl:mn : tid 0
Sat Jul  5 12:10:37 2025 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED 84:ef:18:1f:7d:c2
Sat Jul  5 12:10:37 2025 kern.notice kernel: [590804.272408] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:37 2025 daemon.info hostapd: wlan0-1: STA 84:ef:18:1f:7d:c2 IEEE 802.11: authenticated
Sat Jul  5 12:10:37 2025 daemon.info hostapd: wlan0-1: STA 84:ef:18:1f:7d:c2 IEEE 802.11: associated (aid 5)
Sat Jul  5 12:10:37 2025 kern.notice kernel: [590804.303630] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:37 2025 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED 84:ef:18:1f:7d:c2
Sat Jul  5 12:10:37 2025 daemon.info hostapd: wlan0-1: STA 84:ef:18:1f:7d:c2 WPA: pairwise key handshake completed (RSN)
Sat Jul  5 12:10:37 2025 daemon.notice hostapd: wlan0-1: EAPOL-4WAY-HS-COMPLETED 84:ef:18:1f:7d:c2
Sat Jul  5 12:10:39 2025 kern.debug kernel: [590806.486776] ieee80211 phy0: Added a new stream for 84:ef:18:f1:d8:3z 0
Sat Jul  5 12:10:39 2025 kern.debug kernel: [590806.493491] ieee80211 phy0: Started stream for 84:ef:18:f1:d8:3z 0
Sat Jul  5 12:10:39 2025 kern.notice kernel: [590806.526169] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:39 2025 kern.notice kernel: [590806.557448] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:39 2025 kern.debug kernel: [590806.570736] ieee80211 phy0: Created a BA stream for 84:ef:18:f1:d8:3z : tid 0
Sat Jul  5 12:10:43 2025 kern.notice kernel: [590809.986308] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:43 2025 kern.notice kernel: [590810.045053] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:43 2025 user.info : luci: accepted login on / for root from 192.168.29.185
Sat Jul  5 12:10:44 2025 kern.debug kernel: [590810.814817] ieee80211 phy0: Added a new stream for 84:ef:18:f1:d8:3z 4
Sat Jul  5 12:10:44 2025 kern.debug kernel: [590810.821533] ieee80211 phy0: Started stream for 84:ef:18:f1:d8:3z 4
Sat Jul  5 12:10:44 2025 kern.notice kernel: [590810.832247] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:44 2025 kern.debug kernel: [590810.852786] ieee80211 phy0: Created a BA stream for 84:ef:18:f1:d8:3z : tid 4
Sat Jul  5 12:10:50 2025 kern.notice kernel: [590817.068058] ieee80211 phy0: tx rings drained
Sat Jul  5 12:10:50 2025 kern.debug kernel: [590817.072839] ieee80211 phy0: Deleted BA stream index 2
Sat Jul  5 12:10:50 2025 kern.debug kernel: [590817.078046] ieee80211 phy0: Remove stream for 84:ef:18:f1:d8:3z 4

wifi droping frequntly ? any help?

It is typical clients roam between bands, or if they leave the range AP resources pertaining them are cleaned. One may say it is too verbose in the logs when everything is ok?

Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button:
grafik
Remember to redact passwords, MAC addresses and any public IP addresses you may have:

ubus call system board
cat /etc/config/network
cat /etc/config/wireless
cat /etc/config/dhcp
cat /etc/config/firewall
C:\Users\xxy>ssh root@192.168.XX.Y
root@192.168.XX.Y's password:


BusyBox v1.35.0 (2022-10-14 22:44:41 UTC) built-in shell (ash)

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 OpenWrt 22.03.2, r19803-9a599fee93
 -----------------------------------------------------
root@Cisco:~# ubus call system board
{
        "kernel": "5.10.146",
        "hostname": "Cisco",
        "system": "Feroceon 88FR131 rev 1 (v5l)",
        "model": "Linksys EA4500 (Viper)",
        "board_name": "linksys,ea4500",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "22.03.2",
                "revision": "r19803-9a599fee93",
                "target": "kirkwood/generic",
                "description": "OpenWrt 22.03.2 r19803-9a599fee93"
        }
}
root@Cisco:~# cat /etc/config/network

config interface 'loopback'
        option device 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fd54:047c:d4dc::/48'

config device
        option name 'br-lan'
        option type 'bridge'
        list ports 'ethernet1'
        list ports 'ethernet2'
        list ports 'ethernet3'
        list ports 'ethernet4'

config interface 'lan'
        option device 'br-lan'
        option proto 'dhcp'

config device
        option name 'internet'
        option macaddr '48:f8:b3:??:??:??'

root@Cisco:~# cat /etc/config/wireless

config wifi-device 'radio0'
        option type 'mac80211'
        option path 'mbus@f1000000/mbus@f1000000:pcie@82000000/pci0000:00/0000:00:01.0/0000:01:00.0'
        option band '2g'
        option country 'AU'
        option htmode 'HT40'
        option channel 'auto'
        option txpower '36'
        option cell_density '3'

config wifi-device 'radio1'
        option type 'mac80211'
        option path 'mbus@f1000000/mbus@f1000000:pcie@82000000/pci0000:00/0000:00:02.0/0000:02:00.0'
        option channel '36'
        option band '5g'
        option htmode 'HT20'
        option cell_density '0'
        option country 'AU'
        option disabled '1'

config wifi-iface 'wifinet1'
        option device 'radio1'
        option mode 'ap'
        option ssid 'Mi-Fi'
        option network 'lan'
        option key 'MYpassword?'
        option encryption 'psk-mixed'
        option disabled '1'

config wifi-iface 'wifinet2'
        option device 'radio0'
        option mode 'ap'
        option ssid 'mi-fi'
        option network 'lan'
        option key 'MYpassword?'
        option encryption 'psk-mixed'

config wifi-iface 'wifinet3'
        option device 'radio0'
        option mode 'ap'
        option ssid 'GF'
        option key 'GFpassword?'
        option network 'lan'
        option encryption 'psk-mixed'

root@Cisco:~# cat /etc/config/dhcp

config dnsmasq
        option domainneeded '1'
        option boguspriv '1'
        option filterwin2k '0'
        option localise_queries '1'
        option rebind_protection '1'
        option rebind_localhost '1'
        option local '/lan/'
        option domain 'lan'
        option expandhosts '1'
        option nonegcache '0'
        option authoritative '1'
        option readethers '1'
        option leasefile '/tmp/dhcp.leases'
        option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
        option nonwildcard '1'
        option localservice '1'
        option ednspacket_max '1232'

config dhcp 'lan'
        option interface 'lan'
        option start '100'
        option limit '150'
        option leasetime '12h'
        option dhcpv4 'server'
        option ignore '1'

config odhcpd 'odhcpd'
        option maindhcp '0'
        option leasefile '/tmp/hosts/odhcpd'
        option leasetrigger '/usr/sbin/odhcpd-update'
        option loglevel '4'

root@Cisco:~# cat /etc/config/firewall

config defaults
        option syn_flood '1'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'

config zone
        option name 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'
        list network 'lan'

config zone
        option name 'wan'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'

config forwarding
        option src 'lan'
        option dest 'wan'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-IGMP'
        option src 'wan'
        option proto 'igmp'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-MLD'
        option src 'wan'
        option proto 'icmp'
        option src_ip 'fe80::/10'
        list icmp_type '130/0'
        list icmp_type '131/0'
        list icmp_type '132/0'
        list icmp_type '143/0'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-IPSec-ESP'
        option src 'wan'
        option dest 'lan'
        option proto 'esp'
        option target 'ACCEPT'

config rule
        option name 'Allow-ISAKMP'
        option src 'wan'
        option dest 'lan'
        option dest_port '500'
        option proto 'udp'
        option target 'ACCEPT'

Use WPA2 and AES, wpa1 and tkip were necessary like 20 years ago.

You are running years of upgrades behind. You can use luci-app-attendedsysupgrade to first upgrade to 22.03.7
download upgrade image !!!
back up configuration !!!
Then switch upgrade application to advanced mode and upgrade to 23.05.5 and 24.10.2 (no config migration in 2 versions)

!!! If something goes foul sysupgrade to old version and restore configuration

1 Like

read up on this model for v24
not an easy update

1 Like


updating brick my router, won't going to update, I dont have usb ttl [3v tx rx gnd] now

1 Like

looks like worked

You can set optional management frame protection to get 1mm closer to WPA3.

1 Like

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.