Initial setup problems

My cables are run as you said. I don't have access to the router until tomorrow, but when I get back I'll run the tcpdump.

issues

  • I hit two different issues today using the router configuration, both solved by restarting the interfaces. See below for the issues and the corresponding tcpdumps etc.

(First issue) LAN down, WAN up

  • Can ping urls from router and 1.1.1.1, not from host
  • ping still fails from host, but works from router

TCDUMP while pinging from router

root@OpenWrt:~# tcpdump -i any -vvn icmp and host 1.1.1.1
tcpdump: listening on any, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
16:55:08.634496 ethertype IPv4, IP (tos 0x0, ttl 64, id 4209, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 27337, seq 1, length 64
16:55:08.634496 IP (tos 0x0, ttl 64, id 4209, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 27337, seq 1, length 64
16:55:08.634496 IP (tos 0x0, ttl 64, id 4209, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 27337, seq 1, length 64
16:55:08.634649 IP (tos 0x0, ttl 63, id 4209, offset 0, flags [DF], proto ICMP (1), length 84)
    108.31.94.148 > 1.1.1.1: ICMP echo request, id 27337, seq 1, length 64
16:55:08.647570 IP (tos 0xc0, ttl 255, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
    1.1.1.1 > 108.31.94.148: ICMP echo reply, id 27337, seq 1, length 64
16:55:09.659114 ethertype IPv4, IP (tos 0x0, ttl 64, id 4448, offset 0, flags [DF], proto ICMP (1), length 84)

TCDUMP while pinging from host

    192.168.1.8 > 1.1.1.1: ICMP echo request, id 27441, seq 6, length 64
16:58:37.624039 IP (tos 0x0, ttl 64, id 21584, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 27441, seq 6, length 64
16:58:37.624052 IP (tos 0x0, ttl 64, id 21584, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 27441, seq 6, length 64
16:58:37.624117 IP (tos 0x0, ttl 63, id 21584, offset 0, flags [DF], proto ICMP (1), length 84)
    108.31.94.148 > 1.1.1.1: ICMP echo request, id 27441, seq 6, length 64
16:58:37.634847 IP (tos 0xc0, ttl 255, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
    1.1.1.1 > 108.31.94.148: ICMP echo reply, id 27441, seq 6, length 64
16:58:38.630304 ethertype IPv4, IP (tos 0x0, ttl 64, id 21744, offset 0, flags [DF], proto ICMP (1), length 84)

After WAN restart

  • both pings work

messages when I restarted WAN

	IP (tos 0x0, ttl 60, id 21945, offset 0, flags [DF], proto UDP (17), length 151)
    1.1.1.1.53 > 108.51.103.218.39761: [udp sum ok] 35798 NXDomain q: A? avs-alexa-4-na.amazon.com.home. 0/1/0 ns: . SOA a.root-servers.net. nstld.verisign-grs.com. 2019102200 1800 900 604800 86400 (123)

TCPDUMP after restart pinging from host

    192.168.1.8 > 1.1.1.1: ICMP echo request, id 27586, seq 3, length 64
17:01:10.309600 IP (tos 0x0, ttl 64, id 46362, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 27586, seq 3, length 64
17:01:10.309610 IP (tos 0x0, ttl 64, id 46362, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 27586, seq 3, length 64
17:01:10.309667 IP (tos 0x0, ttl 63, id 46362, offset 0, flags [DF], proto ICMP (1), length 84)
    108.51.103.218 > 1.1.1.1: ICMP echo request, id 27586, seq 3, length 64
17:01:10.317214 IP (tos 0x0, ttl 60, id 14360, offset 0, flags [none], proto ICMP (1), length 84)
    1.1.1.1 > 108.51.103.218: ICMP echo reply, id 27586, seq 3, length 64
17:01:10.317279 IP (tos 0x0, ttl 59, id 14360, offset 0, flags [none], proto ICMP (1), length 84)
    1.1.1.1 > 192.168.1.8: ICMP echo reply, id 27586, seq 3, length 64
17:01:10.317292 IP (tos 0x0, ttl 59, id 14360, offset 0, flags [none], proto ICMP (1), length 84)
    1.1.1.1 > 192.168.1.8: ICMP echo reply, id 27586, seq 3, length 64

(second issue) Normal Issue

  • can't ping google.com from host or router, can ping 1.1.1.1 from rounter, can't ping 1.1.1.1 from host

TCDUMP with ping from host

    192.168.1.8 > 1.1.1.1: ICMP echo request, id 32185, seq 7, length 64
18:47:56.173251 IP (tos 0x0, ttl 64, id 57753, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 32185, seq 7, length 64
18:47:56.173251 IP (tos 0x0, ttl 64, id 57753, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 32185, seq 7, length 64
18:47:56.173384 IP (tos 0x0, ttl 63, id 57753, offset 0, flags [DF], proto ICMP (1), length 84)
    108.51.103.218 > 1.1.1.1: ICMP echo request, id 32185, seq 7, length 64
18:47:56.201979 IP (tos 0xc0, ttl 255, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
    1.1.1.1 > 108.51.103.218: ICMP echo reply, id 32185, seq 7, length 64
18:47:57.172797 ethertype IPv4, IP (tos 0x0, ttl 64, id 57824, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 32185, seq 8, length 64
18:47:57.172797 IP (tos 0x0, ttl 64, id 57824, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 32185, seq 8, length 64
18:47:57.172797 IP (tos 0x0, ttl 64, id 57824, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 32185, seq 8, length 64
18:47:57.172894 IP (tos 0x0, ttl 63, id 57824, offset 0, flags [DF], proto ICMP (1), length 84)
    108.51.103.218 > 1.1.1.1: ICMP echo request, id 32185, seq 8, length 64
18:47:57.188369 IP (tos 0xc0, ttl 255, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
    1.1.1.1 > 108.51.103.218: ICMP echo reply, id 32185, seq 8, length 64
18:47:58.221623 ethertype IPv4, IP (tos 0x0, ttl 64, id 57866, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 32185, seq 9, length 64
18:47:58.221623 IP (tos 0x0, ttl 64, id 57866, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 32185, seq 9, length 64
18:47:58.221623 IP (tos 0x0, ttl 64, id 57866, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.1.8 > 1.1.1.1: ICMP echo request, id 32185, seq 9, length 64
18:47:58.221710 IP (tos 0x0, ttl 63, id 57866, offset 0, flags [DF], proto ICMP (1), length 84)
    108.51.103.218 > 1.1.1.1: ICMP echo request, id 32185, seq 9, length 64
18:47:58.230175 IP (tos 0xc0, ttl 255, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
    1.1.1.1 > 108.51.103.218: ICMP echo reply, id 32185, seq 9, length 64

TCDUMP with ping from router

18:48:58.563183 IP (tos 0x0, ttl 64, id 47933, offset 0, flags [DF], proto ICMP (1), length 84)
    108.51.103.218 > 1.1.1.1: ICMP echo request, id 3159, seq 0, length 64
18:48:58.587976 IP (tos 0xc0, ttl 255, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
    1.1.1.1 > 108.51.103.218: ICMP echo reply, id 3159, seq 0, length 64
18:48:59.564095 IP (tos 0x0, ttl 64, id 48014, offset 0, flags [DF], proto ICMP (1), length 84)
    108.51.103.218 > 1.1.1.1: ICMP echo request, id 3159, seq 1, length 64
18:48:59.572483 IP (tos 0xc0, ttl 255, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
    1.1.1.1 > 108.51.103.218: ICMP echo reply, id 3159, seq 1, length 64
18:49:00.564985 IP (tos 0x0, ttl 64, id 48044, offset 0, flags [DF], proto ICMP (1), length 84)
    108.51.103.218 > 1.1.1.1: ICMP echo request, id 3159, seq 2, length 64
18:49:00.576189 IP (tos 0xc0, ttl 255, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
    1.1.1.1 > 108.51.103.218: ICMP echo reply, id 3159, seq 2, length 64
18:49:01.565267 IP (tos 0x0, ttl 64, id 48051, offset 0, flags [DF], proto ICMP (1), length 84)
    108.51.103.218 > 1.1.1.1: ICMP echo request, id 3159, seq 3, length 64
18:49:01.570715 IP (tos 0xc0, ttl 255, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
    1.1.1.1 > 108.51.103.218: ICMP echo reply, id 3159, seq 3, length 64
18:49:02.565484 IP (tos 0x0, ttl 64, id 48082, offset 0, flags [DF], proto ICMP (1), length 84)
    108.51.103.218 > 1.1.1.1: ICMP echo request, id 3159, seq 4, length 64
18:49:02.575318 IP (tos 0xc0, ttl 255, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
    1.1.1.1 > 108.51.103.218: ICMP echo reply, id 3159, seq 4, length 64

TCDUMP with regex filter

tcpdump -i any -vvn tcp | grep google.com

google in browser

18:58:12.926491 ethertype IPv6, IP6 (flowlabel 0x38cfb, hlim 64, next-header TCP (6) payload length: 71) fd00:cb4:be40:0:9113:1282:9334:1e2d.51868 > fd00:cb4:be40::1.53: Flags [P.], cksum 0xaada (correct), seq 1:40, ack 1, win 225, options [nop,nop,TS val 2601597026 ecr 1563237], length 39 1180+ AAAA? www.google.com.home. (37)
18:58:12.926491 IP6 (flowlabel 0x38cfb, hlim 64, next-header TCP (6) payload length: 71) fd00:cb4:be40:0:9113:1282:9334:1e2d.51868 > fd00:cb4:be40::1.53: Flags [P.], cksum 0xaada (correct), seq 1:40, ack 1, win 225, options [nop,nop,TS val 2601597026 ecr 1563237], length 39 1180+ AAAA? www.google.com.home. (37)
18:58:12.926491 IP6 (flowlabel 0x38cfb, hlim 64, next-header TCP (6) payload length: 71) fd00:cb4:be40:0:9113:1282:9334:1e2d.51868 > fd00:cb4:be40::1.53: Flags [P.], cksum 0xaada (correct), seq 1:40, ack 1, win 225, options [nop,nop,TS val 2601597026 ecr 1563237], length 39 1180+ AAAA? www.google.com.home. (37)
18:58:16.478354 ethertype IPv6, IP6 (flowlabel 0x14336, hlim 64, next-header TCP (6) payload length: 71) fd00:cb4:be40:0:9113:1282:9334:1e2d.51868 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x9cfb (correct), seq 1:40, ack 1, win 225, options [nop,nop,TS val 2601600577 ecr 1563237], length 39 1180+ AAAA? www.google.com.home. (37)
18:58:16.478354 IP6 (flowlabel 0x14336, hlim 64, next-header TCP (6) payload length: 71) fd00:cb4:be40:0:9113:1282:9334:1e2d.51868 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x9cfb (correct), seq 1:40, ack 1, win 225, options [nop,nop,TS val 2601600577 ecr 1563237], length 39 1180+ AAAA? www.google.com.home. (37)
18:58:16.478354 IP6 (flowlabel 0x14336, hlim 64, next-header TCP (6) payload length: 71) fd00:cb4:be40:0:9113:1282:9334:1e2d.51868 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x9cfb (correct), seq 1:40, ack 1, win 225, options [nop,nop,TS val 2601600577 ecr 1563237], length 39 1180+ AAAA? www.google.com.home. (37)
18:58:21.343784 ethertype IPv6, IP6 (flowlabel 0xb8dd5, hlim 64, next-header TCP (6) payload length: 71) fd00:cb4:be40:0:9113:1282:9334:1e2d.51822 > fd00:cb4:be40::1.53: Flags [FP.], cksum 0x7f88 (correct), seq 1:40, ack 1, win 225, options [nop,nop,TS val 2601605441 ecr 1561695], length 39 1180+ AAAA? www.google.com.home. (37)
18:58:21.343784 IP6 (flowlabel 0xb8dd5, hlim 64, next-header TCP (6) payload length: 71) fd00:cb4:be40:0:9113:1282:9334:1e2d.51822 > fd00:cb4:be40::1.53: Flags [FP.], cksum 0x7f88 (correct), seq 1:40, ack 1, win 225, options [nop,nop,TS val 2601605441 ecr 1561695], length 39 1180+ AAAA? www.google.com.home. (37)
18:58:21.343784 IP6 (flowlabel 0xb8dd5, hlim 64, next-header TCP (6) payload length: 71) fd00:cb4:be40:0:9113:1282:9334:1e2d.51822 > fd00:cb4:be40::1.53: Flags [FP.], cksum 0x7f88 (correct), seq 1:40, ack 1, win 225, options [nop,nop,TS val 2601605441 ecr 1561695], length 39 1180+ AAAA? www.google.com.home. (37)
18:58:24.840109 ethertype IPv6, IP6 (flowlabel 0x2331d, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x40bc (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601608940 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:24.840109 IP6 (flowlabel 0x2331d, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x40bc (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601608940 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:24.840109 IP6 (flowlabel 0x2331d, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x40bc (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601608940 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:25.053098 ethertype IPv6, IP6 (flowlabel 0x2331d, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3fe7 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601609153 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:25.053098 IP6 (flowlabel 0x2331d, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3fe7 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601609153 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:25.053098 IP6 (flowlabel 0x2331d, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3fe7 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601609153 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:25.269553 ethertype IPv6, IP6 (flowlabel 0xb5853, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3f0f (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601609369 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:25.269553 IP6 (flowlabel 0xb5853, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3f0f (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601609369 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:25.269553 IP6 (flowlabel 0xb5853, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3f0f (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601609369 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:25.725496 ethertype IPv6, IP6 (flowlabel 0x27065, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3d47 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601609825 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:25.725496 IP6 (flowlabel 0x27065, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3d47 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601609825 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:25.725496 IP6 (flowlabel 0x27065, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3d47 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601609825 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:26.590741 ethertype IPv6, IP6 (flowlabel 0xa5a17, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x39e7 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601610689 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:26.590741 IP6 (flowlabel 0xa5a17, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x39e7 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601610689 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:26.590741 IP6 (flowlabel 0xa5a17, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x39e7 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601610689 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:28.317698 ethertype IPv6, IP6 (flowlabel 0x7e297, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3327 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601612417 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:28.317698 IP6 (flowlabel 0x7e297, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3327 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601612417 ecr 1564770], length 34 14470+ A? www.google.com. (32)
18:58:28.317698 IP6 (flowlabel 0x7e297, hlim 64, next-header TCP (6) payload length: 66) fd00:cb4:be40:0:9113:1282:9334:1e2d.51906 > fd00:cb4:be40::1.53: Flags [P.], cksum 0x3327 (correct), seq 1:35, ack 1, win 225, options [nop,nop,TS val 2601612417 ecr 1564770], length 34 14470+ A? www.google.com. (32)

Ping from router

root@OpenWrt:~# tcpdump -i any -vvn tcp | grep google.com
tcpdump: listening on any, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
	POST /cgi-bin/luci/admin/network/diag_ping/google.com HTTP/1.1
	POST /cgi-bin/luci/admin/network/diag_ping/google.com HTTP/1.1
	POST /cgi-bin/luci/admin/network/diag_ping/google.com HTTP/1.1

NS lookup from router

oot@OpenWrt:~# tcpdump -i any -vvn tcp | grep google.com
tcpdump: listening on any, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
	POST /cgi-bin/luci/admin/network/diag_nslookup/google.com HTTP/1.1
	POST /cgi-bin/luci/admin/network/diag_nslookup/google.com HTTP/1.1
	POST /cgi-bin/luci/admin/network/diag_nslookup/google.com HTTP/1.1

This is rather weird, as I can see that when you ping 1.1.1.1 from a host the echo request goes out normally and the reply comes back to the router, but it is not forwarded to the host.
The only abnormal thing I can find its the following:

which I'd expect it to be

firewall.@zone[1].network='wan wan6'

Try to fix that, if it doesn't work, I suggest you take a backup, restore factory defaults and start from scratch. Default configuration works fine for you. Start slowly adding things back and at the same time test the ping for name and IP address till you hit the culprit.

1 Like

@trendy I'm dumb. I downloaded the firmware for the WNDR3800CH, but my router is a WNDR3800. I downloaded the CH one because the router's hostname was WNDR3800CH when I connected to it, however the sticker on the back says WNDR3800. Is there any way I can change this to WNDR3800 safely?

Upload the correct image on the device and upgrade it without saving changes.
https://openwrt.org/docs/guide-user/installation/generic.sysupgrade#command-line_interface

I got

Image metadata not found
Invalid image, hardware ID mismatch, hw:33373031 image:64657669
Image check 'platform_check_image' failed

when trying to run sysupgrade with the default wndr3800 .img file. Does this mean my hardware is WNDR3800CH after all?

Seems so according to the description.

There is also a WNDR3800-1CHNAS which will not respond to the normal WNDR3800 images. Applying this patch does create a usable image.

Could this be the issue? WNDR3700 details, see the Switch Ports (for VLANs) section. Although those instructions are for the WNDR3700, in the WNDR3800 details they mention that those instructions are generally also valid for the WNDR3800.

At this point you don't have much choice, so if I were you I'd give it a try.

Seems to have worked

1 Like

That fixed the issue for about 10 hours as opposed to the normal 2 hour window I was getting, but it failed again overnight and the same solution fixed it.

kernal log

[75156.824145] br-lan: port 1(eth0.1) entered disabled state
[75156.862023] IPv6: ADDRCONF(NETDEV_UP): eth0.1: link is not ready
[75156.872471] eth0: link down
[75156.932843] ar71xx: pll_reg 0xb8050010: 0x11110000
[75156.932879] eth0: link up (1000Mbps/Full duplex)
[75156.961201] br-lan: port 1(eth0.1) entered blocking state
[75156.966596] br-lan: port 1(eth0.1) entered disabled state
[75156.972411] device eth0.1 entered promiscuous mode
[75156.977200] device eth0 entered promiscuous mode
[75157.029787] br-lan: port 1(eth0.1) entered blocking state
[75157.035185] br-lan: port 1(eth0.1) entered forwarding state
[76343.530927] br-lan: port 1(eth0.1) entered disabled state
[76343.567525] device eth0.1 left promiscuous mode
[76343.572108] device eth0 left promiscuous mode
[76343.576587] br-lan: port 1(eth0.1) entered disabled state
[76343.613624] IPv6: ADDRCONF(NETDEV_UP): eth0.1: link is not ready
[76343.624053] eth0: link down
[76343.676501] ar71xx: pll_reg 0xb8050010: 0x11110000
[76343.676537] eth0: link up (1000Mbps/Full duplex)
[76343.714319] br-lan: port 1(eth0.1) entered blocking state
[76343.719722] br-lan: port 1(eth0.1) entered disabled state
[76343.725532] device eth0.1 entered promiscuous mode
[76343.730316] device eth0 entered promiscuous mode
[76343.772931] br-lan: port 1(eth0.1) entered blocking state
[76343.778335] br-lan: port 1(eth0.1) entered forwarding state
[76376.841279] eth1: link down
[76376.852197] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
[76376.859365] ar71xx: pll_reg 0xb8050014: 0x11110000
[76376.859374] eth1: link up (1000Mbps/Full duplex)
[76376.881209] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
[76377.887882] br-lan: port 1(eth0.1) entered disabled state
[76377.923708] device eth0.1 left promiscuous mode
[76377.928244] device eth0 left promiscuous mode
[76377.932760] br-lan: port 1(eth0.1) entered disabled state
[76377.992554] IPv6: ADDRCONF(NETDEV_UP): eth0.1: link is not ready
[76378.009868] eth0: link down
[76378.075184] ar71xx: pll_reg 0xb8050010: 0x11110000
[76378.075221] eth0: link up (1000Mbps/Full duplex)
[76378.122539] br-lan: port 1(eth0.1) entered blocking state
[76378.127936] br-lan: port 1(eth0.1) entered disabled state
[76378.133724] device eth0.1 entered promiscuous mode
[76378.138506] device eth0 entered promiscuous mode
[76378.220203] br-lan: port 1(eth0.1) entered blocking state
[76378.225647] br-lan: port 1(eth0.1) entered forwarding state

system log

Sat Oct 26 11:31:05 2019 daemon.notice netifd: Interface 'lan' is setting up now
Sat Oct 26 11:31:05 2019 daemon.warn dnsmasq[1330]: failed to create listening socket for 192.168.1.1: Address in use
Sat Oct 26 11:31:05 2019 daemon.notice netifd: Interface 'lan' is now up
Sat Oct 26 11:31:05 2019 daemon.notice netifd: bridge 'br-lan' link is up
Sat Oct 26 11:31:05 2019 daemon.notice netifd: Interface 'lan' has link connectivity
Sat Oct 26 11:31:05 2019 daemon.notice netifd: Network device 'eth0' link is up
Sat Oct 26 11:31:05 2019 daemon.notice netifd: VLAN 'eth0.1' link is up
Sat Oct 26 11:31:05 2019 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Sat Oct 26 11:31:06 2019 daemon.warn dnsmasq[1330]: failed to create listening socket for fd0e:ee9d:c6d9::1: Address in use
Sat Oct 26 11:31:06 2019 daemon.info dnsmasq[1330]: read /etc/hosts - 4 addresses
Sat Oct 26 11:31:06 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/odhcpd - 3 addresses
Sat Oct 26 11:31:06 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:31:06 2019 daemon.info dnsmasq-dhcp[1330]: read /etc/ethers - 0 addresses
Sat Oct 26 11:31:06 2019 daemon.notice netifd: wan (1358): udhcpc: received SIGTERM
Sat Oct 26 11:31:06 2019 daemon.notice netifd: Interface 'wan' is now down
Sat Oct 26 11:31:06 2019 daemon.notice netifd: Interface 'wan' is setting up now
Sat Oct 26 11:31:06 2019 daemon.warn dnsmasq[1330]: no servers found in /tmp/resolv.conf.auto, will retry
Sat Oct 26 11:31:06 2019 daemon.warn dnsmasq[1330]: failed to create listening socket for fe80::4494:fcff:fe63:9898%eth0: Address in use
Sat Oct 26 11:31:07 2019 daemon.notice netifd: wan (7265): udhcpc: started, v1.28.4
Sat Oct 26 11:31:07 2019 daemon.notice netifd: wan (7265): udhcpc: sending discover
Sat Oct 26 11:31:07 2019 daemon.notice netifd: Interface 'wan6' is now down
Sat Oct 26 11:31:07 2019 daemon.notice netifd: Interface 'wan6' is setting up now
Sat Oct 26 11:31:08 2019 daemon.info dnsmasq[1330]: read /etc/hosts - 4 addresses
Sat Oct 26 11:31:08 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/odhcpd - 3 addresses
Sat Oct 26 11:31:08 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:31:08 2019 daemon.info dnsmasq-dhcp[1330]: read /etc/ethers - 0 addresses
Sat Oct 26 11:31:10 2019 daemon.notice netifd: wan (7265): udhcpc: sending discover
Sat Oct 26 11:31:10 2019 daemon.notice netifd: wan (7265): udhcpc: sending select for 71.127.43.9
Sat Oct 26 11:31:11 2019 daemon.notice netifd: wan (7265): udhcpc: lease of 71.127.43.9 obtained, lease time 7200
Sat Oct 26 11:31:11 2019 daemon.notice netifd: Interface 'wan' is now up
Sat Oct 26 11:31:11 2019 daemon.info dnsmasq[1330]: reading /tmp/resolv.conf.auto
Sat Oct 26 11:31:11 2019 daemon.info dnsmasq[1330]: using local addresses only for domain test
Sat Oct 26 11:31:11 2019 daemon.info dnsmasq[1330]: using local addresses only for domain onion
Sat Oct 26 11:31:11 2019 daemon.info dnsmasq[1330]: using local addresses only for domain localhost
Sat Oct 26 11:31:11 2019 daemon.info dnsmasq[1330]: using local addresses only for domain local
Sat Oct 26 11:31:11 2019 daemon.info dnsmasq[1330]: using local addresses only for domain invalid
Sat Oct 26 11:31:11 2019 daemon.info dnsmasq[1330]: using local addresses only for domain bind
Sat Oct 26 11:31:11 2019 daemon.info dnsmasq[1330]: using local addresses only for domain lan
Sat Oct 26 11:31:11 2019 daemon.info dnsmasq[1330]: using nameserver 71.252.0.12#53
Sat Oct 26 11:31:11 2019 daemon.info dnsmasq[1330]: using nameserver 68.237.161.12#53
Sat Oct 26 11:31:11 2019 user.notice firewall: Reloading firewall due to ifup of wan (eth1)
Sat Oct 26 11:34:05 2019 daemon.info dnsmasq-dhcp[1330]: DHCPREQUEST(br-lan) 192.168.1.12 38:48:4c:e5:71:8c
Sat Oct 26 11:34:05 2019 daemon.info dnsmasq-dhcp[1330]: DHCPNAK(br-lan) 192.168.1.12 38:48:4c:e5:71:8c address not available
Sat Oct 26 11:34:08 2019 daemon.info dnsmasq-dhcp[1330]: DHCPDISCOVER(br-lan) 38:48:4c:e5:71:8c
Sat Oct 26 11:34:08 2019 daemon.info dnsmasq-dhcp[1330]: DHCPOFFER(br-lan) 192.168.1.242 38:48:4c:e5:71:8c
Sat Oct 26 11:34:08 2019 daemon.info dnsmasq-dhcp[1330]: DHCPDISCOVER(br-lan) 38:48:4c:e5:71:8c
Sat Oct 26 11:34:08 2019 daemon.info dnsmasq-dhcp[1330]: DHCPOFFER(br-lan) 192.168.1.242 38:48:4c:e5:71:8c
Sat Oct 26 11:34:09 2019 daemon.info dnsmasq-dhcp[1330]: DHCPREQUEST(br-lan) 192.168.1.242 38:48:4c:e5:71:8c
Sat Oct 26 11:34:09 2019 daemon.info dnsmasq-dhcp[1330]: DHCPACK(br-lan) 192.168.1.242 38:48:4c:e5:71:8c CaitlinistsiPad
Sat Oct 26 11:49:10 2019 daemon.info dnsmasq-dhcp[1330]: DHCPREQUEST(br-lan) 192.168.1.154 ac:2b:6e:cc:5a:8d
Sat Oct 26 11:49:10 2019 daemon.info dnsmasq-dhcp[1330]: DHCPACK(br-lan) 192.168.1.154 ac:2b:6e:cc:5a:8d michael-Lenovo-ideapad-510-15ISK
Sat Oct 26 11:49:12 2019 daemon.warn odhcpd[944]: DHCPV6 CONFIRM IA_NA from 0004ba34d9ef411c101e7baaed97628d276e on br-lan: not on-link fd0e:ee9d:c6d9::178/128
Sat Oct 26 11:49:13 2019 daemon.warn odhcpd[944]: DHCPV6 SOLICIT IA_NA from 0004ba34d9ef411c101e7baaed97628d276e on br-lan: ok fd0e:ee9d:c6d9::178/128
Sat Oct 26 11:49:13 2019 daemon.info dnsmasq[1330]: read /etc/hosts - 4 addresses
Sat Oct 26 11:49:13 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/odhcpd - 2 addresses
Sat Oct 26 11:49:13 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:49:13 2019 daemon.info dnsmasq-dhcp[1330]: read /etc/ethers - 0 addresses
Sat Oct 26 11:49:14 2019 daemon.warn odhcpd[944]: DHCPV6 REQUEST IA_NA from 0004ba34d9ef411c101e7baaed97628d276e on br-lan: ok fd0e:ee9d:c6d9::178/128
Sat Oct 26 11:49:14 2019 daemon.info dnsmasq[1330]: read /etc/hosts - 4 addresses
Sat Oct 26 11:49:14 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/odhcpd - 3 addresses
Sat Oct 26 11:49:14 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:49:14 2019 daemon.info dnsmasq-dhcp[1330]: read /etc/ethers - 0 addresses
Sat Oct 26 11:50:27 2019 daemon.err uhttpd[999]: luci: accepted login on / for root from 192.168.1.154
Sat Oct 26 11:50:51 2019 daemon.notice netifd: Interface 'lan' is now down
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.530927] br-lan: port 1(eth0.1) entered disabled state
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.567525] device eth0.1 left promiscuous mode
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.572108] device eth0 left promiscuous mode
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.576587] br-lan: port 1(eth0.1) entered disabled state
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.613624] IPv6: ADDRCONF(NETDEV_UP): eth0.1: link is not ready
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.624053] eth0: link down
Sat Oct 26 11:50:51 2019 daemon.notice netifd: Interface 'lan' is disabled
Sat Oct 26 11:50:51 2019 daemon.err odhcpd[944]: setsockopt(IPV6_ADD_MEMBERSHIP): No such device
Sat Oct 26 11:50:51 2019 daemon.err odhcpd[944]: setsockopt(SO_BINDTODEVICE): No such device
Sat Oct 26 11:50:51 2019 daemon.notice netifd: VLAN 'eth0.1' link is down
Sat Oct 26 11:50:51 2019 daemon.notice netifd: bridge 'br-lan' link is down
Sat Oct 26 11:50:51 2019 daemon.notice netifd: Interface 'lan' has link connectivity loss
Sat Oct 26 11:50:51 2019 daemon.notice netifd: Network device 'eth0' link is down
Sat Oct 26 11:50:51 2019 kern.debug kernel: [76343.676501] ar71xx: pll_reg 0xb8050010: 0x11110000
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.676537] eth0: link up (1000Mbps/Full duplex)
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.714319] br-lan: port 1(eth0.1) entered blocking state
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.719722] br-lan: port 1(eth0.1) entered disabled state
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.725532] device eth0.1 entered promiscuous mode
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.730316] device eth0 entered promiscuous mode
Sat Oct 26 11:50:51 2019 daemon.info dnsmasq[1330]: read /etc/hosts - 4 addresses
Sat Oct 26 11:50:51 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/odhcpd - 0 addresses
Sat Oct 26 11:50:51 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:50:51 2019 daemon.info dnsmasq-dhcp[1330]: read /etc/ethers - 0 addresses
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.772931] br-lan: port 1(eth0.1) entered blocking state
Sat Oct 26 11:50:51 2019 kern.info kernel: [76343.778335] br-lan: port 1(eth0.1) entered forwarding state
Sat Oct 26 11:50:51 2019 daemon.notice netifd: Interface 'lan' is enabled
Sat Oct 26 11:50:51 2019 daemon.notice netifd: Interface 'lan' is setting up now
Sat Oct 26 11:50:51 2019 daemon.notice netifd: Interface 'lan' is now up
Sat Oct 26 11:50:51 2019 daemon.notice netifd: bridge 'br-lan' link is up
Sat Oct 26 11:50:51 2019 daemon.notice netifd: Interface 'lan' has link connectivity
Sat Oct 26 11:50:51 2019 daemon.notice netifd: Network device 'eth0' link is up
Sat Oct 26 11:50:51 2019 daemon.notice netifd: VLAN 'eth0.1' link is up
Sat Oct 26 11:50:52 2019 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Sat Oct 26 11:50:53 2019 daemon.info dnsmasq[1330]: read /etc/hosts - 4 addresses
Sat Oct 26 11:50:53 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/dhcp.cfg01411c.7726 - 0 addresses
Sat Oct 26 11:50:53 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/odhcpd - 3 addresses
Sat Oct 26 11:50:53 2019 daemon.info dnsmasq[1330]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:50:53 2019 daemon.info dnsmasq-dhcp[1330]: read /etc/ethers - 0 addresses
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[1330]: exiting on receipt of SIGTERM
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: started, version 2.80 cachesize 150
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: DNS service limited to local subnets
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq-dhcp[7802]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain test
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain onion
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain localhost
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain local
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain invalid
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain bind
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain lan
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: reading /tmp/resolv.conf.auto
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain test
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain onion
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain localhost
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain local
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain invalid
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain bind
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using local addresses only for domain lan
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using nameserver 71.252.0.12#53
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: using nameserver 68.237.161.12#53
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: read /etc/hosts - 4 addresses
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: read /tmp/hosts/odhcpd - 3 addresses
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq-dhcp[7802]: read /etc/ethers - 0 addresses
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: read /etc/hosts - 4 addresses
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: read /tmp/hosts/odhcpd - 3 addresses
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq[7802]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:50:54 2019 daemon.info dnsmasq-dhcp[7802]: read /etc/ethers - 0 addresses
Sat Oct 26 11:51:06 2019 daemon.notice netifd: Interface 'wan6' is now down
Sat Oct 26 11:51:06 2019 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Sat Oct 26 11:51:06 2019 daemon.notice netifd: Interface 'wan6' has link connectivity
Sat Oct 26 11:51:24 2019 daemon.notice netifd: wan (7265): udhcpc: received SIGTERM
Sat Oct 26 11:51:24 2019 daemon.notice netifd: Interface 'wan' is now down
Sat Oct 26 11:51:24 2019 daemon.notice netifd: Interface 'wan' is disabled
Sat Oct 26 11:51:24 2019 daemon.notice netifd: Interface 'wan6' is disabled
Sat Oct 26 11:51:24 2019 kern.info kernel: [76376.841279] eth1: link down
Sat Oct 26 11:51:24 2019 kern.info kernel: [76376.852197] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
Sat Oct 26 11:51:24 2019 kern.debug kernel: [76376.859365] ar71xx: pll_reg 0xb8050014: 0x11110000
Sat Oct 26 11:51:24 2019 kern.info kernel: [76376.859374] eth1: link up (1000Mbps/Full duplex)
Sat Oct 26 11:51:24 2019 daemon.notice netifd: Interface 'wan' is enabled
Sat Oct 26 11:51:24 2019 daemon.notice netifd: Interface 'wan' is setting up now
Sat Oct 26 11:51:24 2019 daemon.notice netifd: Interface 'wan6' is enabled
Sat Oct 26 11:51:24 2019 daemon.warn dnsmasq[7802]: no servers found in /tmp/resolv.conf.auto, will retry
Sat Oct 26 11:51:24 2019 kern.info kernel: [76376.881209] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
Sat Oct 26 11:51:25 2019 daemon.notice netifd: wan (7932): udhcpc: started, v1.28.4
Sat Oct 26 11:51:25 2019 daemon.notice netifd: wan (7932): udhcpc: sending discover
Sat Oct 26 11:51:25 2019 daemon.notice netifd: Interface 'lan' is now down
Sat Oct 26 11:51:26 2019 kern.info kernel: [76377.887882] br-lan: port 1(eth0.1) entered disabled state
Sat Oct 26 11:51:26 2019 kern.info kernel: [76377.923708] device eth0.1 left promiscuous mode
Sat Oct 26 11:51:26 2019 kern.info kernel: [76377.928244] device eth0 left promiscuous mode
Sat Oct 26 11:51:26 2019 kern.info kernel: [76377.932760] br-lan: port 1(eth0.1) entered disabled state
Sat Oct 26 11:51:26 2019 kern.info kernel: [76377.992554] IPv6: ADDRCONF(NETDEV_UP): eth0.1: link is not ready
Sat Oct 26 11:51:26 2019 kern.info kernel: [76378.009868] eth0: link down
Sat Oct 26 11:51:26 2019 daemon.notice netifd: Interface 'lan' is disabled
Sat Oct 26 11:51:26 2019 daemon.err odhcpd[944]: setsockopt(IPV6_ADD_MEMBERSHIP): No such device
Sat Oct 26 11:51:26 2019 daemon.err odhcpd[944]: setsockopt(SO_BINDTODEVICE): No such device
Sat Oct 26 11:51:26 2019 daemon.notice netifd: VLAN 'eth0.1' link is down
Sat Oct 26 11:51:26 2019 daemon.notice netifd: bridge 'br-lan' link is down
Sat Oct 26 11:51:26 2019 daemon.notice netifd: Interface 'lan' has link connectivity loss
Sat Oct 26 11:51:26 2019 daemon.notice netifd: Network device 'eth0' link is down
Sat Oct 26 11:51:26 2019 kern.debug kernel: [76378.075184] ar71xx: pll_reg 0xb8050010: 0x11110000
Sat Oct 26 11:51:26 2019 kern.info kernel: [76378.075221] eth0: link up (1000Mbps/Full duplex)
Sat Oct 26 11:51:26 2019 kern.info kernel: [76378.122539] br-lan: port 1(eth0.1) entered blocking state
Sat Oct 26 11:51:26 2019 kern.info kernel: [76378.127936] br-lan: port 1(eth0.1) entered disabled state
Sat Oct 26 11:51:26 2019 kern.info kernel: [76378.133724] device eth0.1 entered promiscuous mode
Sat Oct 26 11:51:26 2019 kern.info kernel: [76378.138506] device eth0 entered promiscuous mode
Sat Oct 26 11:51:26 2019 daemon.info dnsmasq[7802]: read /etc/hosts - 4 addresses
Sat Oct 26 11:51:26 2019 daemon.info dnsmasq[7802]: read /tmp/hosts/odhcpd - 0 addresses
Sat Oct 26 11:51:26 2019 daemon.info dnsmasq[7802]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:51:26 2019 daemon.info dnsmasq-dhcp[7802]: read /etc/ethers - 0 addresses
Sat Oct 26 11:51:26 2019 kern.info kernel: [76378.220203] br-lan: port 1(eth0.1) entered blocking state
Sat Oct 26 11:51:26 2019 kern.info kernel: [76378.225647] br-lan: port 1(eth0.1) entered forwarding state
Sat Oct 26 11:51:26 2019 daemon.notice netifd: Interface 'lan' is enabled
Sat Oct 26 11:51:26 2019 daemon.notice netifd: Interface 'lan' is setting up now
Sat Oct 26 11:51:26 2019 daemon.notice netifd: Interface 'lan' is now up
Sat Oct 26 11:51:26 2019 daemon.notice netifd: bridge 'br-lan' link is up
Sat Oct 26 11:51:26 2019 daemon.notice netifd: Interface 'lan' has link connectivity
Sat Oct 26 11:51:26 2019 daemon.notice netifd: Network device 'eth0' link is up
Sat Oct 26 11:51:26 2019 daemon.notice netifd: VLAN 'eth0.1' link is up
Sat Oct 26 11:51:26 2019 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Sat Oct 26 11:51:27 2019 daemon.info dnsmasq[7802]: read /etc/hosts - 4 addresses
Sat Oct 26 11:51:27 2019 daemon.info dnsmasq[7802]: read /tmp/hosts/dhcp.cfg01411c.8126 - 0 addresses
Sat Oct 26 11:51:27 2019 daemon.info dnsmasq[7802]: read /tmp/hosts/odhcpd - 3 addresses
Sat Oct 26 11:51:27 2019 daemon.info dnsmasq[7802]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:51:27 2019 daemon.info dnsmasq-dhcp[7802]: read /etc/ethers - 0 addresses
Sat Oct 26 11:51:28 2019 daemon.notice netifd: wan (7932): udhcpc: sending discover
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[7802]: exiting on receipt of SIGTERM
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: started, version 2.80 cachesize 150
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: DNS service limited to local subnets
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq-dhcp[8202]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: using local addresses only for domain test
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: using local addresses only for domain onion
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: using local addresses only for domain localhost
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: using local addresses only for domain local
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: using local addresses only for domain invalid
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: using local addresses only for domain bind
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: using local addresses only for domain lan
Sat Oct 26 11:51:28 2019 daemon.warn dnsmasq[8202]: no servers found in /tmp/resolv.conf.auto, will retry
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: read /etc/hosts - 4 addresses
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: read /tmp/hosts/odhcpd - 3 addresses
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq-dhcp[8202]: read /etc/ethers - 0 addresses
Sat Oct 26 11:51:28 2019 daemon.notice netifd: wan (7932): udhcpc: sending select for 108.51.128.229
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: read /etc/hosts - 4 addresses
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: read /tmp/hosts/odhcpd - 3 addresses
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq[8202]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Oct 26 11:51:28 2019 daemon.info dnsmasq-dhcp[8202]: read /etc/ethers - 0 addresses
Sat Oct 26 11:51:28 2019 daemon.notice netifd: wan (7932): udhcpc: lease of 108.51.128.229 obtained, lease time 7200
Sat Oct 26 11:51:29 2019 daemon.notice netifd: Interface 'wan' is now up
Sat Oct 26 11:51:29 2019 daemon.info dnsmasq[8202]: reading /tmp/resolv.conf.auto
Sat Oct 26 11:51:29 2019 daemon.info dnsmasq[8202]: using local addresses only for domain test
Sat Oct 26 11:51:29 2019 daemon.info dnsmasq[8202]: using local addresses only for domain onion
Sat Oct 26 11:51:29 2019 daemon.info dnsmasq[8202]: using local addresses only for domain localhost
Sat Oct 26 11:51:29 2019 daemon.info dnsmasq[8202]: using local addresses only for domain local
Sat Oct 26 11:51:29 2019 daemon.info dnsmasq[8202]: using local addresses only for domain invalid
Sat Oct 26 11:51:29 2019 daemon.info dnsmasq[8202]: using local addresses only for domain bind
Sat Oct 26 11:51:29 2019 daemon.info dnsmasq[8202]: using local addresses only for domain lan
Sat Oct 26 11:51:29 2019 daemon.info dnsmasq[8202]: using nameserver 71.252.0.12#53
Sat Oct 26 11:51:29 2019 daemon.info dnsmasq[8202]: using nameserver 68.237.161.12#53
Sat Oct 26 11:51:29 2019 user.notice firewall: Reloading firewall due to ifup of wan (eth1)
Sat Oct 26 11:54:24 2019 daemon.info dnsmasq-dhcp[8202]: DHCPREQUEST(br-lan) 192.168.1.109 70:ef:00:b3:80:07
Sat Oct 26 11:54:24 2019 daemon.info dnsmasq-dhcp[8202]: DHCPACK(br-lan) 192.168.1.109 70:ef:00:b3:80:07 iPhone-2
Sat Oct 26 11:54:26 2019 daemon.warn odhcpd[944]: DHCPV6 SOLICIT IA_NA from 000100012188d29370ef00b38007 on br-lan: ok fd0e:ee9d:c6d9::65c/128
Sat Oct 26 11:54:27 2019 daemon.warn odhcpd[944]: DHCPV6 REQUEST IA_NA from 000100012188d29370ef00b38007 on br-lan: ok fd0e:ee9d:c6d9::65c/128
Sat Oct 26 12:07:19 2019 daemon.info dnsmasq-dhcp[8202]: DHCPDISCOVER(br-lan) 10:cd:b6:03:3c:45
Sat Oct 26 12:07:19 2019 daemon.info dnsmasq-dhcp[8202]: DHCPOFFER(br-lan) 192.168.1.235 10:cd:b6:03:3c:45
Sat Oct 26 12:07:19 2019 daemon.info dnsmasq-dhcp[8202]: DHCPREQUEST(br-lan) 192.168.1.235 10:cd:b6:03:3c:45
Sat Oct 26 12:07:19 2019 daemon.info dnsmasq-dhcp[8202]: DHCPACK(br-lan) 192.168.1.235 10:cd:b6:03:3c:45

Frankly speaking, other than this message (which I don't know what it means)

everything else looks fine and are routine messages. You have of course the "lan down" messages, but nothing else indicating the reason for that.
If this solution fixes the issue, I'd suggest writing a script that will run this every time the issue appears. I guess you can detect the issue by monitoring the logs or trying to ping.

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.