Network device 'wan' link is down on e8450

I try to install openwrt to my e8450
but the internet is not stable always.
I often can not open the website but after refresh it may be ok
when I checked the log of openwrt
I got these log
how can I solve it

Fri Mar 25 01:12:35 2022 daemon.notice netifd: Network device 'wan' link is down
Fri Mar 25 01:12:35 2022 daemon.notice netifd: Interface 'wan' has link connectivity loss
Fri Mar 25 01:12:35 2022 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Fri Mar 25 01:12:35 2022 kern.info kernel: [33067.261743] mt7530 mdio-bus:00 wan: Link is Down
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan6 (2165): Command failed: ubus call network.interface notify_proto { "action": 0, "link-up": false, "keep": false, "interface": "wan6" } (Permission denied)
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan (2171): udhcpc: received SIGTERM
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan (2171): udhcpc: unicasting a release of 192.168.1.2 to 192.168.1.1
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan (2171): udhcpc: sending release
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan (2171): udhcpc: entering released state
Fri Mar 25 01:12:35 2022 daemon.notice netifd: wan (2171): Command failed: ubus call network.interface notify_proto { "action": 0, "link-up": false, "keep": false, "interface": "wan" } (Permission denied)
Fri Mar 25 01:12:35 2022 daemon.notice netifd: Interface 'wan' is now down
Fri Mar 25 01:12:35 2022 daemon.warn dnsmasq[1]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
Fri Mar 25 01:12:35 2022 daemon.notice netifd: Interface 'wan6' is now down
Fri Mar 25 01:17:21 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 52:d7:8b:9d:34:48
Fri Mar 25 01:17:21 2022 daemon.info hostapd: wlan1: STA 52:d7:8b:9d:34:48 IEEE 802.11: disassociated
Fri Mar 25 01:17:22 2022 daemon.info hostapd: wlan1: STA 52:d7:8b:9d:34:48 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 25 01:25:42 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 01:25:50 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 01:26:00 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 01:32:31 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 1c:91:80:eb:69:53
Fri Mar 25 01:32:31 2022 daemon.info hostapd: wlan1: STA 1c:91:80:eb:69:53 IEEE 802.11: disassociated due to inactivity
Fri Mar 25 01:32:32 2022 daemon.info hostapd: wlan1: STA 1c:91:80:eb:69:53 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 25 02:13:54 2022 daemon.info hostapd: wlan0: STA 42:19:07:a8:5f:7f IEEE 802.11: authenticated
Fri Mar 25 02:13:54 2022 daemon.info hostapd: wlan0: STA 42:19:07:a8:5f:7f IEEE 802.11: authenticated
Fri Mar 25 02:13:54 2022 daemon.info hostapd: wlan0: STA 42:19:07:a8:5f:7f IEEE 802.11: associated (aid 1)
Fri Mar 25 02:13:56 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 42:19:07:a8:5f:7f
Fri Mar 25 02:13:56 2022 daemon.info hostapd: wlan0: STA 42:19:07:a8:5f:7f WPA: pairwise key handshake completed (RSN)
Fri Mar 25 02:13:56 2022 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED 42:19:07:a8:5f:7f
Fri Mar 25 02:13:56 2022 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 42:19:07:a8:5f:7f
Fri Mar 25 02:13:56 2022 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.138 42:19:07:a8:5f:7f
Fri Mar 25 02:13:57 2022 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.138 42:19:07:a8:5f:7f
Fri Mar 25 02:13:57 2022 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.138 42:19:07:a8:5f:7f
Fri Mar 25 02:14:01 2022 daemon.info hostapd: wlan1: STA 42:19:07:a8:5f:7f IEEE 802.11: authenticated
Fri Mar 25 02:14:01 2022 daemon.info hostapd: wlan1: STA 42:19:07:a8:5f:7f IEEE 802.11: associated (aid 1)
Fri Mar 25 02:14:01 2022 daemon.notice hostapd: wlan0: Prune association for 42:19:07:a8:5f:7f
Fri Mar 25 02:14:01 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 42:19:07:a8:5f:7f
Fri Mar 25 02:14:01 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 42:19:07:a8:5f:7f
Fri Mar 25 02:14:01 2022 daemon.info hostapd: wlan1: STA 42:19:07:a8:5f:7f WPA: pairwise key handshake completed (RSN)
Fri Mar 25 02:14:01 2022 daemon.notice hostapd: wlan1: EAPOL-4WAY-HS-COMPLETED 42:19:07:a8:5f:7f
Fri Mar 25 02:14:31 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 02:14:31 2022 daemon.info hostapd: wlan0: STA 42:19:07:a8:5f:7f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 25 02:14:37 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 02:14:44 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 02:14:50 2022 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Fri Mar 25 02:14:50 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 42:19:07:a8:5f:7f
Fri Mar 25 02:14:50 2022 daemon.info hostapd: wlan1: STA 42:19:07:a8:5f:7f IEEE 802.11: disassociated
Fri Mar 25 02:14:51 2022 daemon.info hostapd: wlan1: STA 42:19:07:a8:5f:7f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 25 13:08:38 2022 daemon.info hostapd: wlan1: STA 1c:91:80:eb:69:53 IEEE 802.11: authenticated
Fri Mar 25 13:08:38 2022 daemon.info hostapd: wlan1: STA 1c:91:80:eb:69:53 IEEE 802.11: associated (aid 1)
Fri Mar 25 13:08:38 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 1c:91:80:eb:69:53
Fri Mar 25 13:08:38 2022 daemon.info hostapd: wlan1: STA 1c:91:80:eb:69:53 WPA: pairwise key handshake completed (RSN)
Fri Mar 25 13:08:38 2022 daemon.notice hostapd: wlan1: EAPOL-4WAY-HS-COMPLETED 1c:91:80:eb:69:53
Fri Mar 25 13:08:42 2022 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 1c:91:80:eb:69:53
Fri Mar 25 13:08:42 2022 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.204 1c:91:80:eb:69:53
Fri Mar 25 13:08:42 2022 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 1c:91:80:eb:69:53
Fri Mar 25 13:08:42 2022 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.204 1c:91:80:eb:69:53
Fri Mar 25 13:08:43 2022 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.204 1c:91:80:eb:69:53
Fri Mar 25 13:08:43 2022 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.204 1c:91:80:eb:69:53 freewolfsM1Air
Fri Mar 25 13:10:23 2022 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.204 1c:91:80:eb:69:53
Fri Mar 25 13:10:23 2022 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.204 1c:91:80:eb:69:53 freewolfsM1Air
Fri Mar 25 13:12:15 2022 daemon.notice netifd: Network device 'wan' link is up
Fri Mar 25 13:12:15 2022 daemon.notice netifd: Interface 'wan' has link connectivity
Fri Mar 25 13:12:15 2022 daemon.notice netifd: Interface 'wan' is setting up now
Fri Mar 25 13:12:15 2022 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Mar 25 13:12:15 2022 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Mar 25 13:12:15 2022 kern.info kernel: [76247.250648] mt7530 mdio-bus:00 wan: Link is Up - 1Gbps/Full - flow control off
Fri Mar 25 13:12:15 2022 daemon.notice netifd: wan (11026): udhcpc: started, v1.35.0
Fri Mar 25 13:12:15 2022 daemon.notice netifd: wan (11026): udhcpc: broadcasting discover
Fri Mar 25 13:12:18 2022 daemon.notice netifd: wan (11026): udhcpc: broadcasting discover
Fri Mar 25 13:12:19 2022 daemon.notice netifd: Interface 'wan6' is now up
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using nameserver fe80::1%wan#53
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for test
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for local
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Fri Mar 25 13:12:19 2022 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Fri Mar 25 13:12:19 2022 user.notice firewall: Reloading firewall due to ifup of wan6 (wan)
Fri Mar 25 13:12:20 2022 daemon.notice netifd: wan (11026): udhcpc: broadcasting select for 192.168.1.2, server 192.168.1.1
Fri Mar 25 13:12:20 2022 daemon.notice netifd: wan (11026): udhcpc: lease of 192.168.1.2 obtained from 192.168.1.1, lease time 86400
Fri Mar 25 13:12:20 2022 daemon.notice netifd: Interface 'wan' is now up
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Fri Mar 25 13:12:20 2022 daemon.warn dnsmasq[1]: ignoring nameserver 192.168.1.1 - local interface
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using nameserver fe80::1%wan#53
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for test
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for local
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Fri Mar 25 13:12:20 2022 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Fri Mar 25 13:12:20 2022 user.notice firewall: Reloading firewall due to ifup of wan (wan)
Fri Mar 25 13:13:56 2022 user.info : luci: accepted login on / for root from 192.168.1.204
Fri Mar 25 13:14:42 2022 authpriv.info dropbear[11331]: Child connection from 192.168.1.204:49499
Fri Mar 25 13:14:45 2022 authpriv.warn dropbear[11331]: Bad password attempt for 'root' from 192.168.1.204:49499
Fri Mar 25 13:14:52 2022 authpriv.notice dropbear[11331]: Password auth succeeded for 'root' from 192.168.1.204:49499
Fri Mar 25 13:33:34 2022 authpriv.info dropbear[11331]: Exit (root) from <192.168.1.204:49499>: Disconnect received
Fri Mar 25 13:42:09 2022 authpriv.info dropbear[11469]: Child connection from 192.168.1.204:59669
Fri Mar 25 13:42:13 2022 authpriv.notice dropbear[11469]: Password auth succeeded for 'root' from 192.168.1.204:59669

Troubleshoot why your WAN is going down:

  1. Check WAN cable

(I'm sure others may think of more.)

You need to move you LAN to an IP range different from the WAN interface. From the logs I gather that at this point, both LAN and WAN are on 192.168.1.0/24. While for the WAN side you may not have the choice to make changes, just change the LAN address to 192.168.x.1 where x is a number between 2 and 254.

1 Like

it is ok on my e6500


It is default setting

[    7.160254] mt7530 mdio-bus:00 lan1: Link is Down
[    7.169527] procd: - early -
[    7.172489] procd: - watchdog -
[    7.717881] procd: - watchdog -
[    7.760189] procd: - ubus -
[    7.793310] random: ubusd: uninitialized urandom read (4 bytes read)
[    7.812967] random: ubusd: uninitialized urandom read (4 bytes read)
[    7.819527] random: ubusd: uninitialized urandom read (4 bytes read)
[    7.826798] procd: - init -
[    8.072260] urngd: v1.0.2 started.
[    8.101287] random: crng init done
[    8.104700] random: 6 urandom warning(s) missed due to ratelimiting
[    8.134775] kmodloader: loading kernel modules from /etc/modules.d/*
[    8.183820] Loading modules backported from Linux version v5.15.8-0-g43e577d7a2cb
[    8.191351] Backport generated by backports.git v5.15.8-1-0-g83f664bb
[    8.262728] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
[    8.274256] mt7915e 0000:01:00.0: assign IRQ: got 148
[    8.279441] pci 0000:00:00.0: enabling bus mastering
[    8.284426] mt7915e 0000:01:00.0: enabling device (0000 -> 0002)
[    8.290567] mt7915e 0000:01:00.0: enabling bus mastering
[    8.363500] mt7915e 0000:01:00.0: HW/SW Version: 0x8a108a10, Build Time: 20201105222230a
[    8.363500] 
[    8.396798] mt7622-wmac 18000000.wmac: HW/SW Version: 0x8a108a10, Build Time: 20190801210006a
[    8.396798] 
[    8.484865] mt7622-wmac 18000000.wmac: N9 Firmware Version: 2.0, Build Time: 20200131180931
[    8.576267] mt7915e 0000:01:00.0: WM Firmware Version: ____000000, Build Time: 20201105222304
[    8.644251] mt7915e 0000:01:00.0: WA Firmware Version: DEV_000000, Build Time: 20201105222323
[    8.783793] PPP generic driver version 2.4.2
[    8.789832] NET: Registered protocol family 24
[    8.798406] kmodloader: done loading kernel modules from /etc/modules.d/*
[   15.776318] mtk_soc_eth 1b100000.ethernet eth0: Link is Down
[   15.785743] mtk_soc_eth 1b100000.ethernet eth0: configuring for fixed/2500base-x link mode
[   15.794228] mtk_soc_eth 1b100000.ethernet eth0: Link is Up - 2.5Gbps/Full - flow control rx/tx
[   15.797065] mt7530 mdio-bus:00 lan1: configuring for phy/gmii link mode
[   15.810792] 8021q: adding VLAN 0 to HW filter on device lan1
[   15.819630] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[   15.827934] br-lan: port 1(lan1) entered blocking state
[   15.833186] br-lan: port 1(lan1) entered disabled state
[   15.839632] device lan1 entered promiscuous mode
[   15.844248] device eth0 entered promiscuous mode
[   15.858145] mt7530 mdio-bus:00 lan2: configuring for phy/gmii link mode
[   15.865315] 8021q: adding VLAN 0 to HW filter on device lan2
[   15.873704] br-lan: port 2(lan2) entered blocking state
[   15.879098] br-lan: port 2(lan2) entered disabled state
[   15.885717] device lan2 entered promiscuous mode
[   15.895443] mt7530 mdio-bus:00 lan3: configuring for phy/gmii link mode
[   15.902882] 8021q: adding VLAN 0 to HW filter on device lan3
[   15.911102] br-lan: port 3(lan3) entered blocking state
[   15.916398] br-lan: port 3(lan3) entered disabled state
[   15.923074] device lan3 entered promiscuous mode
[   15.933061] mt7530 mdio-bus:00 lan4: configuring for phy/gmii link mode
[   15.940438] 8021q: adding VLAN 0 to HW filter on device lan4
[   15.948612] br-lan: port 4(lan4) entered blocking state
[   15.953843] br-lan: port 4(lan4) entered disabled state
[   15.960773] device lan4 entered promiscuous mode
[   15.972995] mt7530 mdio-bus:00 wan: configuring for phy/gmii link mode
[   15.980240] 8021q: adding VLAN 0 to HW filter on device wan
[   15.984531] mt7530 mdio-bus:00 wan: Link is Up - 1Gbps/Full - flow control off
[   15.994966] IPv6: ADDRCONF(NETDEV_CHANGE): wan: link becomes ready
[   18.814519] mt7530 mdio-bus:00 lan1: Link is Up - 100Mbps/Full - flow control rx/tx
[   18.822221] br-lan: port 1(lan1) entered blocking state
[   18.827454] br-lan: port 1(lan1) entered forwarding state
[   18.833887] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[  512.835558] br-lan: port 5(wlan1) entered blocking state
[  512.840958] br-lan: port 5(wlan1) entered disabled state
[  512.846478] device wlan1 entered promiscuous mode
[  512.851384] br-lan: port 5(wlan1) entered blocking state
[  512.856694] br-lan: port 5(wlan1) entered forwarding state
[  512.862941] br-lan: port 5(wlan1) entered disabled state
[  513.531480] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[  513.537980] br-lan: port 5(wlan1) entered blocking state
[  513.543324] br-lan: port 5(wlan1) entered forwarding state

I refresh it to the newest snapshot version
but the same

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.