OpenWrt slow Wifi connect on TOTOLINK X5000R

Hi,

just got a TOTOLINK X5000R and before flashing OpenWRT I did a small test for the Wifi connection speed. A simple D1-mini / esp8266 would connect to Wifi, send an MQTT message and go to sleep for 30 seconds an start all over. With the original firmware this would take about 500 ms, with OpenWrt (version 24.10 and 22.03) this takes 4 times as long, about 2000 ms.

By connection speed, I refer to the time it takes to connect to Wifi, not the Wifi transmission speed.

What’s going on, and what can I do to improve this?

RP

Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button (red circle; this works best in the 'Markdown' composer view in the blue oval):

Screenshot 2025-10-20 at 8.14.14 PM

Remember to redact passwords, VPN keys, MAC addresses and any public IP addresses you may have:

ubus call system board
cat /etc/config/network
cat /etc/config/wireless
cat /etc/config/firewall

What are you talking about? arduino SDK polls wifi connection every 500ms, there is no "about"
Please show

logread -e hostap

while esp is connecting slowly

Here is the output from those commands:

root@OpenWrt:~# ubus call system board
{
        "kernel": "5.10.221",
        "hostname": "OpenWrt",
        "system": "MediaTek MT7621 ver:1 eco:3",
        "model": "TOTOLINK X5000R",
        "board_name": "totolink,x5000r",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "22.03.7",
                "revision": "r20341-591b7e93d3",
                "target": "ramips/mt7621",
                "description": "OpenWrt 22.03.7 r20341-591b7e93d3"
        }
}


------------------------------------------------------------------------------------------------------


root@OpenWrt:~# cat /etc/config/network

config interface 'loopback'
        option device 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option packet_steering '1'
        option ula_prefix 'fdb0:60ee:4cc1::/48'

config device
        option name 'br-lan'
        option type 'bridge'
        list ports 'lan1'
        list ports 'lan2'
        list ports 'lan3'
        list ports 'lan4'

config interface 'lan'
        option device 'br-lan'
        option proto 'static'
        option netmask '255.255.255.0'
        option ip6assign '60'
        option ipaddr '192.168.8.1'

config interface 'wan'
        option device 'wan'
        option proto 'dhcp'

config interface 'wan6'
        option device 'wan'
        option proto 'dhcpv6'

------------------------------------------------------------------------------------------------------


root@OpenWrt:~# cat /etc/config/wireless

config wifi-device 'radio0'
        option type 'mac80211'
        option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0'
        option channel '1'
        option band '2g'
        option htmode 'HE20'
        option cell_density '0'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option network 'lan'
        option mode 'ap'
        option ssid '***'
        option encryption 'psk2'
        option key '***'

config wifi-device 'radio1'
        option type 'mac80211'
        option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0+1'
        option channel '36'
        option band '5g'
        option htmode 'HE80'
        option disabled '1'

config wifi-iface 'default_radio1'
        option device 'radio1'
        option network 'lan'
        option mode 'ap'
        option ssid 'OpenWrt'
        option encryption 'none'


------------------------------------------------------------------------------------------------------

root@OpenWrt:~# cat /etc/config/firewall
config defaults
        option syn_flood        1
        option input            ACCEPT
        option output           ACCEPT
        option forward          REJECT
# Uncomment this line to disable ipv6 rules
#       option disable_ipv6     1

config zone
        option name             lan
        list   network          'lan'
        option input            ACCEPT
        option output           ACCEPT
        option forward          ACCEPT

config zone
        option name             wan
        list   network          'wan'
        list   network          'wan6'
        option input            REJECT
        option output           ACCEPT
        option forward          REJECT
        option masq             1
        option mtu_fix          1

config forwarding
        option src              lan
        option dest             wan

# We need to accept udp packets on port 68,
# see https://dev.openwrt.org/ticket/4108
config rule
        option name             Allow-DHCP-Renew
        option src              wan
        option proto            udp
        option dest_port        68
        option target           ACCEPT
        option family           ipv4

# Allow IPv4 ping
config rule
        option name             Allow-Ping
        option src              wan
        option proto            icmp
        option icmp_type        echo-request
        option family           ipv4
        option target           ACCEPT

config rule
        option name             Allow-IGMP
        option src              wan
        option proto            igmp
        option family           ipv4
        option target           ACCEPT

# Allow DHCPv6 replies
# see https://github.com/openwrt/openwrt/issues/5066
config rule
        option name             Allow-DHCPv6
        option src              wan
        option proto            udp
        option dest_port        546
        option family           ipv6
        option target           ACCEPT

config rule
        option name             Allow-MLD
        option src              wan
        option proto            icmp
        option src_ip           fe80::/10
        list icmp_type          '130/0'
        list icmp_type          '131/0'
        list icmp_type          '132/0'
        list icmp_type          '143/0'
        option family           ipv6
        option target           ACCEPT

# Allow essential incoming IPv6 ICMP traffic
config rule
        option name             Allow-ICMPv6-Input
        option src              wan
        option proto    icmp
        list icmp_type          echo-request
        list icmp_type          echo-reply
        list icmp_type          destination-unreachable
        list icmp_type          packet-too-big
        list icmp_type          time-exceeded
        list icmp_type          bad-header
        list icmp_type          unknown-header-type
        list icmp_type          router-solicitation
        list icmp_type          neighbour-solicitation
        list icmp_type          router-advertisement
        list icmp_type          neighbour-advertisement
        option limit            1000/sec
        option family           ipv6
        option target           ACCEPT

# Allow essential forwarded IPv6 ICMP traffic
config rule
        option name             Allow-ICMPv6-Forward
        option src              wan
        option dest             *
        option proto            icmp
        list icmp_type          echo-request
        list icmp_type          echo-reply
        list icmp_type          destination-unreachable
        list icmp_type          packet-too-big
        list icmp_type          time-exceeded
        list icmp_type          bad-header
        list icmp_type          unknown-header-type
        option limit            1000/sec
        option family           ipv6
        option target           ACCEPT

config rule
        option name             Allow-IPSec-ESP
        option src              wan
        option dest             lan
        option proto            esp
        option target           ACCEPT

config rule
        option name             Allow-ISAKMP
        option src              wan
        option dest             lan
        option dest_port        500
        option proto            udp
        option target           ACCEPT


### EXAMPLE CONFIG SECTIONS
# do not allow a specific ip to access wan
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option dest             wan
#       option proto    tcp
#       option target   REJECT

# block a specific mac on wan
#config rule
#       option dest             wan
#       option src_mac  00:11:22:33:44:66
#       option target   REJECT

# block incoming ICMP traffic on a zone
#config rule
#       option src              lan
#       option proto    ICMP
#       option target   DROP

# port redirect port coming in on wan to lan
#config redirect
#       option src                      wan
#       option src_dport        80
#       option dest                     lan
#       option dest_ip          192.168.16.235
#       option dest_port        80
#       option proto            tcp

# port redirect of remapped ssh port (22001) on wan
#config redirect
#       option src              wan
#       option src_dport        22001
#       option dest             lan
#       option dest_port        22
#       option proto            tcp

### FULL CONFIG SECTIONS
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port 80
#       option dest             wan
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp
#       option target   REJECT

#config redirect
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port         1024
#       option src_dport        80
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp

that's very f-ing old, you shouldn't even be considering this, upgrade, two years ago.

then repost.

@brada4
I am simply measuring the time from WiFi.begin() and WiFi.status() == WL_CONNECTED.

Here some of that output:

Tue Nov 18 10:51:16 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 10:51:16 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 10:51:16 2025 daemon.notice hostapd: wlan0: AP-STA-CONNECTED ***:2f
Tue Nov 18 10:51:16 2025 daemon.info hostapd: wlan0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 10:51:16 2025 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 10:51:18 2025 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 10:51:18 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 10:51:19 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Nov 18 10:51:47 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 10:51:47 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 10:51:47 2025 daemon.notice hostapd: wlan0: AP-STA-CONNECTED ***:2f
Tue Nov 18 10:51:47 2025 daemon.info hostapd: wlan0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 10:51:47 2025 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 10:51:49 2025 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 10:51:49 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 10:51:50 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Nov 18 10:52:17 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 10:52:17 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 10:52:17 2025 daemon.notice hostapd: wlan0: AP-STA-CONNECTED ***:2f
Tue Nov 18 10:52:17 2025 daemon.info hostapd: wlan0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 10:52:17 2025 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 10:52:19 2025 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 10:52:19 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 10:52:20 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Nov 18 10:52:48 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 10:52:48 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 10:52:48 2025 daemon.notice hostapd: wlan0: AP-STA-CONNECTED ***:2f
Tue Nov 18 10:52:48 2025 daemon.info hostapd: wlan0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 10:52:48 2025 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 10:52:50 2025 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 10:52:50 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 10:52:51 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

It was the same with 24.10. I just downgraded, hoping it might make a difference.

I guess I could go back to 24.10 and repost...

Install luci-app-attendedsysupgrade and in advanced mode upgrade to 23.05.6 then to24.10.4
then check the log.
you can try

  • setting wifi country code
  • forcing aes encryption
  • setting wifi mode to N (wifi4)
    (one at a time)

No way, log should be different in v24.
So 2s are spent after wifi is authenticated which is dhcp, then probably dns to mqtt

I used the sysupgrade file for x5000r, which is 24.10.2 and kept the settings. The milliseconds refer to Wifi connect only not any mqtt stuff.

root@OpenWrt:~# ubus call system board
{
        "kernel": "6.6.93",
        "hostname": "OpenWrt",
        "system": "MediaTek MT7621 ver:1 eco:3",
        "model": "TOTOLINK X5000R",
        "board_name": "totolink,x5000r",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "24.10.2",
                "revision": "r28739-d9340319c6",
                "target": "ramips/mt7621",
                "description": "OpenWrt 24.10.2 r28739-d9340319c6",
                "builddate": "1750711236"
        }
}


---------------------------------------------------------------------------------------------


root@OpenWrt:~# cat /etc/config/network

config interface 'loopback'
        option device 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option packet_steering '1'
        option ula_prefix 'fdb0:60ee:4cc1::/48'

config device
        option name 'br-lan'
        option type 'bridge'
        list ports 'lan1'
        list ports 'lan2'
        list ports 'lan3'
        list ports 'lan4'

config interface 'lan'
        option device 'br-lan'
        option proto 'static'
        option netmask '255.255.255.0'
        option ip6assign '60'
        option ipaddr '192.168.8.1'

config interface 'wan'
        option device 'wan'
        option proto 'dhcp'

config interface 'wan6'
        option device 'wan'
        option proto 'dhcpv6'


-------------------------------------------------------------------------------------------

root@OpenWrt:~# cat /etc/config/wireless

config wifi-device 'radio0'
        option type 'mac80211'
        option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0'
        option channel '9'
        option band '2g'
        option htmode 'HT20'
        option cell_density '0'
        option country 'DE'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option network 'lan'
        option mode 'ap'
        option ssid '***'
        option encryption 'psk2+ccmp'
        option key '***'

config wifi-device 'radio1'
        option type 'mac80211'
        option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0+1'
        option channel '36'
        option band '5g'
        option htmode 'HE80'
        option disabled '1'

config wifi-iface 'default_radio1'
        option device 'radio1'
        option network 'lan'
        option mode 'ap'
        option ssid 'OpenWrt'
        option encryption 'none'



---------------------------------------------------------------------------------------------


root@OpenWrt:~# cat /etc/config/firewall
config defaults
        option syn_flood        1
        option input            ACCEPT
        option output           ACCEPT
        option forward          REJECT
# Uncomment this line to disable ipv6 rules
#       option disable_ipv6     1

config zone
        option name             lan
        list   network          'lan'
        option input            ACCEPT
        option output           ACCEPT
        option forward          ACCEPT

config zone
        option name             wan
        list   network          'wan'
        list   network          'wan6'
        option input            REJECT
        option output           ACCEPT
        option forward          REJECT
        option masq             1
        option mtu_fix          1

config forwarding
        option src              lan
        option dest             wan

# We need to accept udp packets on port 68,
# see https://dev.openwrt.org/ticket/4108
config rule
        option name             Allow-DHCP-Renew
        option src              wan
        option proto            udp
        option dest_port        68
        option target           ACCEPT
        option family           ipv4

# Allow IPv4 ping
config rule
        option name             Allow-Ping
        option src              wan
        option proto            icmp
        option icmp_type        echo-request
        option family           ipv4
        option target           ACCEPT

config rule
        option name             Allow-IGMP
        option src              wan
        option proto            igmp
        option family           ipv4
        option target           ACCEPT

# Allow DHCPv6 replies
# see https://github.com/openwrt/openwrt/issues/5066
config rule
        option name             Allow-DHCPv6
        option src              wan
        option proto            udp
        option dest_port        546
        option family           ipv6
        option target           ACCEPT

config rule
        option name             Allow-MLD
        option src              wan
        option proto            icmp
        option src_ip           fe80::/10
        list icmp_type          '130/0'
        list icmp_type          '131/0'
        list icmp_type          '132/0'
        list icmp_type          '143/0'
        option family           ipv6
        option target           ACCEPT

# Allow essential incoming IPv6 ICMP traffic
config rule
        option name             Allow-ICMPv6-Input
        option src              wan
        option proto    icmp
        list icmp_type          echo-request
        list icmp_type          echo-reply
        list icmp_type          destination-unreachable
        list icmp_type          packet-too-big
        list icmp_type          time-exceeded
        list icmp_type          bad-header
        list icmp_type          unknown-header-type
        list icmp_type          router-solicitation
        list icmp_type          neighbour-solicitation
        list icmp_type          router-advertisement
        list icmp_type          neighbour-advertisement
        option limit            1000/sec
        option family           ipv6
        option target           ACCEPT

# Allow essential forwarded IPv6 ICMP traffic
config rule
        option name             Allow-ICMPv6-Forward
        option src              wan
        option dest             *
        option proto            icmp
        list icmp_type          echo-request
        list icmp_type          echo-reply
        list icmp_type          destination-unreachable
        list icmp_type          packet-too-big
        list icmp_type          time-exceeded
        list icmp_type          bad-header
        list icmp_type          unknown-header-type
        option limit            1000/sec
        option family           ipv6
        option target           ACCEPT

config rule
        option name             Allow-IPSec-ESP
        option src              wan
        option dest             lan
        option proto            esp
        option target           ACCEPT

config rule
        option name             Allow-ISAKMP
        option src              wan
        option dest             lan
        option dest_port        500
        option proto            udp
        option target           ACCEPT


### EXAMPLE CONFIG SECTIONS
# do not allow a specific ip to access wan
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option dest             wan
#       option proto    tcp
#       option target   REJECT

# block a specific mac on wan
#config rule
#       option dest             wan
#       option src_mac  00:11:22:33:44:66
#       option target   REJECT

# block incoming ICMP traffic on a zone
#config rule
#       option src              lan
#       option proto    ICMP
#       option target   DROP

# port redirect port coming in on wan to lan
#config redirect
#       option src                      wan
#       option src_dport        80
#       option dest                     lan
#       option dest_ip          192.168.16.235
#       option dest_port        80
#       option proto            tcp

# port redirect of remapped ssh port (22001) on wan
#config redirect
#       option src              wan
#       option src_dport        22001
#       option dest             lan
#       option dest_port        22
#       option proto            tcp

### FULL CONFIG SECTIONS
#config rule
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port 80
#       option dest             wan
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp
#       option target   REJECT

#config redirect
#       option src              lan
#       option src_ip   192.168.45.2
#       option src_mac  00:11:22:33:44:55
#       option src_port         1024
#       option src_dport        80
#       option dest_ip  194.25.2.129
#       option dest_port        120
#       option proto    tcp


--------------------------------------------------------------------------------------------------------------------------

logread -e hosta

Tue Nov 18 11:10:33 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 11:10:33 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 11:10:33 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ***:2f auth_alg=open
Tue Nov 18 11:10:33 2025 daemon.info hostapd: phy0-ap0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 11:10:33 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 11:10:35 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 11:10:35 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 11:10:36 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Nov 18 11:11:04 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 11:11:04 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 11:11:04 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ***:2f auth_alg=open
Tue Nov 18 11:11:04 2025 daemon.info hostapd: phy0-ap0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 11:11:04 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 11:11:05 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 11:11:06 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 11:11:07 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Nov 18 11:11:34 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 11:11:34 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 11:11:34 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ***:2f auth_alg=open
Tue Nov 18 11:11:34 2025 daemon.info hostapd: phy0-ap0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 11:11:34 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 11:11:36 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 11:11:36 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 11:11:37 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)


now move on to .4, https://firmware-selector.openwrt.org/?version=24.10.4.

I tried those variations (aes, etc...) but no change.

I am now at 24.10.4, no change.

root@OpenWrt:~# ubus call system board
{
"kernel": "6.6.110",
"hostname": "OpenWrt",
"system": "MediaTek MT7621 ver:1 eco:3",
"model": "TOTOLINK X5000R",
"board_name": "totolink,x5000r",
"rootfs_type": "squashfs",
"release": {
"distribution": "OpenWrt",
"version": "24.10.4",
"revision": "r28959-29397011cc",
"target": "ramips/mt7621",
"description": "OpenWrt 24.10.4 r28959-29397011cc",
"builddate": "1760891865"
}
}

In the logs wifi negotiation is almost instant then in 2 seconds dhcp acquires IP addresss and iot communicates "clowd" or mqtt
Now run

logread -f -e aa:bb:cc:dd:ee:ff

ie MAC of your iot.

should be in quick succession (under 1s total unless you traverse 39m distance ,as much as relatively above average AP SoC is concerned)
(maybe DHCPDISCOVER+DHCPOFFER)
DHCPREQUEST+DHCPACK

.... next will be tcpdump and logging with DNS request from connected device and ?SSL? session with mqtt service ....

Did some additional tests:
currently I use a GL-SF1200 as an access point for all my IOTs and the Wifi connect time is at about 300ms. On a GL travel router (GL-AR300M), which s not very powerful and only has a 100mb ethernet, the Wifi connect also takes about 300ms (set up as a router, like the x5000r).

The GL devices use OpenWrt, the sf1200 version 18.06 and the GL-AR300M 22.03.

Here some logread output from the x5000r and the GL-AR300M:



x5000r 24.10.4

Tue Nov 18 14:33:40 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 14:33:40 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 14:33:40 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ***:2f auth_alg=open
Tue Nov 18 14:33:40 2025 daemon.info hostapd: phy0-ap0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 14:33:40 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 14:33:42 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) ***:2f
Tue Nov 18 14:33:42 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.8.165 ***:2f
Tue Nov 18 14:33:42 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.8.165 ***:2f
Tue Nov 18 14:33:42 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.8.165 ***:2f ESP-CCA62F
Tue Nov 18 14:33:42 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 14:33:42 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 14:33:43 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Tue Nov 18 14:34:10 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 14:34:10 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 14:34:11 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ***:2f auth_alg=open
Tue Nov 18 14:34:11 2025 daemon.info hostapd: phy0-ap0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 14:34:11 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 14:34:12 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) ***:2f
Tue Nov 18 14:34:12 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.8.165 ***:2f
Tue Nov 18 14:34:12 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.8.165 ***:2f
Tue Nov 18 14:34:12 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.8.165 ***:2f ESP-CCA62F
Tue Nov 18 14:34:12 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 14:34:12 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 14:34:13 2025 daemon.info hostapd: phy0-ap0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)



GL-AR300M 22.03.04

{
        "kernel": "5.10.176",
        "hostname": "GL-AR300M",
        "system": "Qualcomm Atheros QCA9533 ver 2 rev 0",
        "model": "GL.iNet GL-AR300M (NOR)",
        "board_name": "glinet,gl-ar300m-nor",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "22.03.4",
                "revision": "r20123-38ccc47687",
                "target": "ath79/nand",
                "description": "OpenWrt 22.03.4 r20123-38ccc47687"
        }
}


Tue Nov 18 18:54:31 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 18:54:31 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 18:54:31 2025 daemon.notice hostapd: wlan0: AP-STA-CONNECTED ***:2f
Tue Nov 18 18:54:31 2025 daemon.info hostapd: wlan0: STA ***:2f RADIUS: starting accounting session BA6D888B202C8B15
Tue Nov 18 18:54:31 2025 daemon.info hostapd: wlan0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 18:54:31 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) ***:2f
Tue Nov 18 18:54:31 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.8.165 ***:2f
Tue Nov 18 18:54:31 2025 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 18:54:31 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.8.165 ***:2f
Tue Nov 18 18:54:31 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.8.165 ***:2f ESP-CCA62F
Tue Nov 18 18:54:31 2025 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 18:54:31 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 18:54:32 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Tue Nov 18 18:55:00 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: authenticated
Tue Nov 18 18:55:00 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: associated (aid 1)
Tue Nov 18 18:55:00 2025 daemon.notice hostapd: wlan0: AP-STA-CONNECTED ***:2f
Tue Nov 18 18:55:00 2025 daemon.info hostapd: wlan0: STA ***:2f RADIUS: starting accounting session 64DE100C02A54DFD
Tue Nov 18 18:55:00 2025 daemon.info hostapd: wlan0: STA ***:2f WPA: pairwise key handshake completed (RSN)
Tue Nov 18 18:55:00 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) ***:2f
Tue Nov 18 18:55:00 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.8.165 ***:2f
Tue Nov 18 18:55:00 2025 daemon.notice hostapd: wlan0: EAPOL-4WAY-HS-COMPLETED ***:2f
Tue Nov 18 18:55:00 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.8.165 ***:2f
Tue Nov 18 18:55:00 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.8.165 ***:2f ESP-CCA62F
Tue Nov 18 18:55:00 2025 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED ***:2f
Tue Nov 18 18:55:00 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 18:55:00 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 18:55:00 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 18:55:00 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 18:55:00 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: disassociated
Tue Nov 18 18:55:01 2025 daemon.info hostapd: wlan0: STA ***:2f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

This is the delay slot (I suppose you noticed it too)

tcpdump -p -n -i phyX-apY ether host es:pm:ac:ad:dr:es
... br-lan ....

compare the DHCP packet timestamps -> 1st dhcp packet (discover) is delayed on wifi side or in the bridge or mysteriously between wifi device and wifi AP. (you can -w something.pcap captures then open on a computer in wireshark)

if it falls on the wifi side you will need to run wireshark somewhere between two on a wifi enabled laptop and see if packets go fast or slow.

nice ...
:+1:

here the output from both routers:



x5000r

root@OpenWrt:~# tcpdump -p -n -i phy0-ap0 ether host 18:fe:34:cc:a6:2f
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on phy0-ap0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
13:26:05.737146 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
13:26:06.777152 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
13:26:28.588515 18:fe:34:cc:a6:2f > ff:ff:ff:ff:ff:ff Null Unnumbered, xid, Flags [Response], length 6: 01 00
13:26:28.588717 18:fe:34:cc:a6:2f > ff:ff:ff:ff:ff:ff Null Unnumbered, xid, Flags [Response], length 6: 01 00
13:26:30.206913 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
13:26:30.207030 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
13:26:30.208637 IP 192.168.8.1.67 > 192.168.8.165.68: BOOTP/DHCP, Reply, length 300
13:26:30.214827 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
13:26:30.214913 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
13:26:30.216768 IP 192.168.8.1.67 > 192.168.8.165.68: BOOTP/DHCP, Reply, length 300
13:26:30.218914 ARP, Request who-has 192.168.8.165 tell 192.168.8.165, length 28
13:26:30.218999 ARP, Request who-has 192.168.8.165 tell 192.168.8.165, length 28
13:26:30.229627 ARP, Request who-has 192.168.8.1 tell 192.168.8.165, length 28
13:26:30.229708 ARP, Request who-has 192.168.8.1 tell 192.168.8.165, length 28
13:26:30.229851 ARP, Reply 192.168.8.1 is-at 1c:56:8e:2c:62:18, length 28
13:26:30.232407 IP 192.168.8.165.49384 > 192.168.1.1.123: NTPv4, Client, length 48
13:26:30.234276 IP 192.168.1.1.123 > 192.168.8.165.49384: NTPv4, Server, length 48
13:26:30.246283 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [S], seq 6509, win 2144, options [mss 536,nop,nop,sackOK], length 0
13:26:30.247634 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [S.], seq 4084295373, ack 6510, win 64240, options [mss 1460,nop,nop,sackOK], length 0
13:26:30.249908 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [.], ack 1, win 2144, length 0
13:26:30.256214 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [P.], seq 1:24, ack 1, win 2144, length 23
13:26:30.256621 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [.], ack 24, win 64217, length 0
13:26:30.256750 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [P.], seq 1:5, ack 24, win 64217, length 4
13:26:30.269672 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [P.], seq 24:137, ack 5, win 2140, length 113
13:26:30.270125 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [.], ack 137, win 64104, length 0
13:26:30.313490 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [P.], seq 137:139, ack 5, win 2140, length 2
13:26:30.313961 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [.], ack 139, win 64102, length 0
13:26:30.314120 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [F.], seq 5, ack 139, win 64102, length 0
13:26:30.315948 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [R.], seq 139, ack 6, win 24584, length 0
13:26:35.257134 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
13:26:36.297145 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
13:26:37.337150 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28





GL-AR300M

root@GL-AR300M:~# tcpdump -p -n -i wlan0 ether host 18:fe:34:cc:a6:2f
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wlan0, link-type EN10MB (Ethernet), capture size 262144 bytes
14:37:03.846465 18:fe:34:cc:a6:2f > ff:ff:ff:ff:ff:ff Null Unnumbered, xid, Flags [Response], length 6: 01 00
14:37:03.846570 18:fe:34:cc:a6:2f > ff:ff:ff:ff:ff:ff Null Unnumbered, xid, Flags [Response], length 6: 01 00
14:37:03.850219 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
14:37:03.850391 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
14:37:03.855904 IP 192.168.8.1.67 > 192.168.8.165.68: BOOTP/DHCP, Reply, length 300
14:37:03.865519 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
14:37:03.865691 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
14:37:03.869819 IP 192.168.8.1.67 > 192.168.8.165.68: BOOTP/DHCP, Reply, length 300
14:37:03.877179 ARP, Request who-has 192.168.8.165 tell 192.168.8.165, length 28
14:37:03.877264 ARP, Request who-has 192.168.8.165 tell 192.168.8.165, length 28
14:37:03.885075 ARP, Request who-has 192.168.8.1 tell 192.168.8.165, length 28
14:37:03.885148 ARP, Request who-has 192.168.8.1 tell 192.168.8.165, length 28
14:37:03.885366 ARP, Reply 192.168.8.1 is-at 94:83:c4:33:c3:18, length 28
14:37:03.887623 IP 192.168.8.165.59521 > 192.168.1.1.123: NTPv4, Client, length 48
14:37:03.890290 IP 192.168.1.1.123 > 192.168.8.165.59521: NTPv4, Server, length 48
14:37:03.902989 IP 192.168.8.165.65103 > 192.168.1.32.1883: Flags [S], seq 6509, win 2144, options [mss 536,nop,nop,sackOK], length 0
14:37:03.904199 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [S.], seq 1228306853, ack 6510, win 64240, options [mss 1460,nop,nop,sackOK], length 0
14:37:03.915650 IP 192.168.8.165.65103 > 192.168.1.32.1883: Flags [.], ack 1, win 2144, length 0
14:37:03.917353 IP 192.168.8.165.65103 > 192.168.1.32.1883: Flags [P.], seq 1:24, ack 1, win 2144, length 23
14:37:03.925329 IP 192.168.8.165.65103 > 192.168.1.32.1883: Flags [P.], seq 24:134, ack 5, win 2140, length 110
14:37:03.973443 IP 192.168.8.165.65103 > 192.168.1.32.1883: Flags [P.], seq 134:136, ack 5, win 2140, length 2
14:37:03.974191 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:04.186130 IP 192.168.8.1 > 192.168.8.165: ICMP echo request, id 11874, seq 0, length 64
14:37:04.186967 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:04.402963 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:04.854966 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:05.188347 IP 192.168.8.1 > 192.168.8.165: ICMP echo request, id 11874, seq 1, length 64
14:37:05.719155 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:06.188730 IP 192.168.8.1 > 192.168.8.165: ICMP echo request, id 11874, seq 2, length 64
14:37:07.189125 IP 192.168.8.1 > 192.168.8.165: ICMP echo request, id 11874, seq 3, length 64
14:37:07.447127 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:08.189508 IP 192.168.8.1 > 192.168.8.165: ICMP echo request, id 11874, seq 4, length 64
14:37:08.904462 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
14:37:09.944472 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
14:37:10.551102 IP 192.168.1.32.1883 > 192.168.8.165.59341: Flags [F.], seq 2913025962, ack 6645, win 64105, length 0
14:37:10.984501 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
14:37:11.063131 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0

13:26:28.588515 18:fe:34:cc:a6:2f > ff:ff:ff:ff:ff:ff Null Unnumbered, xid, Flags [Response], length 6: 01 00
13:26:28.588717 18:fe:34:cc:a6:2f > ff:ff:ff:ff:ff:ff Null Unnumbered, xid, Flags [Response], length 6: 01 00

Please get these in wireshark. I got no recollection ever seeing such :frowning:

Here it is:


x5000r:

No. Time                        Source              Destination         Protocol    Length  Info                                                                    
1   2025-11-19 17:19:24.399507  Espressi_cc:a6:2f   Broadcast           XID         20      Basic Format; Type 1 LLC (Class I LLC); Window Size 0                   
2   2025-11-19 17:19:24.399729  Espressi_cc:a6:2f   Broadcast           XID         20      Basic Format; Type 1 LLC (Class I LLC); Window Size 0                   
3   2025-11-19 17:19:26.064417  0.0.0.0             255.255.255.255     DHCP        350     DHCP Discover - Transaction ID 0x18543d52                               
4   2025-11-19 17:19:26.064491  0.0.0.0             255.255.255.255     DHCP        350     DHCP Discover - Transaction ID 0x18543d52                               
5   2025-11-19 17:19:26.066152  192.168.8.1         192.168.8.165       DHCP        342     DHCP Offer    - Transaction ID 0x18543d52                               
6   2025-11-19 17:19:26.071878  0.0.0.0             255.255.255.255     DHCP        350     DHCP Request  - Transaction ID 0x18543d52                               
7   2025-11-19 17:19:26.071925  0.0.0.0             255.255.255.255     DHCP        350     DHCP Request  - Transaction ID 0x18543d52                               
8   2025-11-19 17:19:26.073782  192.168.8.1         192.168.8.165       DHCP        342     DHCP ACK      - Transaction ID 0x18543d52                               
9   2025-11-19 17:19:26.076702  Espressi_cc:a6:2f   Broadcast           ARP         42      ARP Announcement for 192.168.8.165                                      
10  2025-11-19 17:19:26.076751  Espressi_cc:a6:2f   Broadcast           ARP         42      ARP Announcement for 192.168.8.165                                      
11  2025-11-19 17:19:26.087183  Espressi_cc:a6:2f   Broadcast           ARP         42      Who has 192.168.8.1? Tell 192.168.8.165                                 
12  2025-11-19 17:19:26.087212  Espressi_cc:a6:2f   Broadcast           ARP         42      Who has 192.168.8.1? Tell 192.168.8.165                                 
13  2025-11-19 17:19:26.087313  ZioncomE_2c:62:18   Espressi_cc:a6:2f   ARP         42      192.168.8.1 is at 1c:56:8e:2c:62:18                                     
14  2025-11-19 17:19:26.089582  192.168.8.165       192.168.1.1         NTP         90      NTP Version 4, client                                                   
15  2025-11-19 17:19:26.092229  192.168.1.1         192.168.8.165       NTP         90      NTP Version 4, server                                                   
16  2025-11-19 17:19:26.102292  192.168.8.165       192.168.1.32        TCP         62      64927 → 1883 [SYN] Seq=0 Win=2144 Len=0 MSS=536 SACK_PERM               
17  2025-11-19 17:19:26.103678  192.168.1.32        192.168.8.165       TCP         62      1883 → 64927 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM  
18  2025-11-19 17:19:26.106153  192.168.8.165       192.168.1.32        TCP         54      64927 → 1883 [ACK] Seq=1 Ack=1 Win=2144 Len=0                           
19  2025-11-19 17:19:26.107747  192.168.8.165       192.168.1.32        MQTT        77      Connect Command                                                         
20  2025-11-19 17:19:26.108231  192.168.1.32        192.168.8.165       TCP         54      1883 → 64927 [ACK] Seq=1 Ack=24 Win=64217 Len=0                         
21  2025-11-19 17:19:26.108302  192.168.1.32        192.168.8.165       MQTT        58      Connect Ack                                                             
22  2025-11-19 17:19:26.121064  192.168.8.165       192.168.1.32        MQTT        167     Publish Message [espx/d1]                                               
23  2025-11-19 17:19:26.121611  192.168.1.32        192.168.8.165       TCP         54      1883 → 64927 [ACK] Seq=5 Ack=137 Win=64104 Len=0                        
24  2025-11-19 17:19:26.162380  192.168.8.165       192.168.1.32        MQTT        56      Disconnect Req                                                          
25  2025-11-19 17:19:26.162946  192.168.1.32        192.168.8.165       TCP         54      1883 → 64927 [ACK] Seq=5 Ack=139 Win=64102 Len=0                        
26  2025-11-19 17:19:26.163025  192.168.1.32        192.168.8.165       TCP         54      1883 → 64927 [FIN, ACK] Seq=5 Ack=139 Win=64102 Len=0                   
27  2025-11-19 17:19:26.164736  192.168.8.165       192.168.1.32        TCP         54      64927 → 1883 [RST, ACK] Seq=139 Ack=6 Win=24584 Len=0                   
28  2025-11-19 17:19:31.138167  ZioncomE_2c:62:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                 
29  2025-11-19 17:19:32.178169  ZioncomE_2c:62:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                 
30  2025-11-19 17:19:32.889157  192.168.1.32        192.168.8.165       TCP         54      1883 → 56266 [FIN, ACK] Seq=1 Ack=1 Win=64101 Len=0                     
31  2025-11-19 17:19:33.218161  ZioncomE_2c:62:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                 
32  2025-11-19 17:19:54.879542  Espressi_cc:a6:2f   Broadcast           XID         20      Basic Format; Type 1 LLC (Class I LLC); Window Size 0                   
33  2025-11-19 17:19:54.879698  Espressi_cc:a6:2f   Broadcast           XID         20      Basic Format; Type 1 LLC (Class I LLC); Window Size 0                   
34  2025-11-19 17:19:56.570914  0.0.0.0             255.255.255.255     DHCP        350     DHCP Discover - Transaction ID 0x77494da                                
35  2025-11-19 17:19:56.570986  0.0.0.0             255.255.255.255     DHCP        350     DHCP Discover - Transaction ID 0x77494da                                
36  2025-11-19 17:19:56.572626  192.168.8.1         192.168.8.165       DHCP        342     DHCP Offer    - Transaction ID 0x77494da                                
37  2025-11-19 17:19:56.577650  0.0.0.0             255.255.255.255     DHCP        350     DHCP Request  - Transaction ID 0x77494da                                
38  2025-11-19 17:19:56.577690  0.0.0.0             255.255.255.255     DHCP        350     DHCP Request  - Transaction ID 0x77494da                                
39  2025-11-19 17:19:56.579700  192.168.8.1         192.168.8.165       DHCP        342     DHCP ACK      - Transaction ID 0x77494da                                
40  2025-11-19 17:19:56.581925  Espressi_cc:a6:2f   Broadcast           ARP         42      ARP Announcement for 192.168.8.165                                      
41  2025-11-19 17:19:56.581973  Espressi_cc:a6:2f   Broadcast           ARP         42      ARP Announcement for 192.168.8.165                                      
42  2025-11-19 17:19:56.593648  Espressi_cc:a6:2f   Broadcast           ARP         42      Who has 192.168.8.1? Tell 192.168.8.165                                 
43  2025-11-19 17:19:56.593679  Espressi_cc:a6:2f   Broadcast           ARP         42      Who has 192.168.8.1? Tell 192.168.8.165                                 
44  2025-11-19 17:19:56.593783  ZioncomE_2c:62:18   Espressi_cc:a6:2f   ARP         42      192.168.8.1 is at 1c:56:8e:2c:62:18                                     
45  2025-11-19 17:19:56.595777  192.168.8.165       192.168.1.1         NTP         90      NTP Version 4, client                                                   
46  2025-11-19 17:19:56.598398  192.168.1.1         192.168.8.165       NTP         90      NTP Version 4, server                                                   
47  2025-11-19 17:19:56.609353  192.168.8.165       192.168.1.32        TCP         62      54305 → 1883 [SYN] Seq=0 Win=2144 Len=0 MSS=536 SACK_PERM               
48  2025-11-19 17:19:56.610596  192.168.1.32        192.168.8.165       TCP         62      1883 → 54305 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM  
49  2025-11-19 17:19:56.613668  192.168.8.165       192.168.1.32        TCP         54      54305 → 1883 [ACK] Seq=1 Ack=1 Win=2144 Len=0                           
50  2025-11-19 17:19:56.615579  192.168.8.165       192.168.1.32        MQTT        77      Connect Command                                                         
51  2025-11-19 17:19:56.616143  192.168.1.32        192.168.8.165       TCP         54      1883 → 54305 [ACK] Seq=1 Ack=24 Win=64217 Len=0                         
52  2025-11-19 17:19:56.616212  192.168.1.32        192.168.8.165       MQTT        58      Connect Ack                                                             
53  2025-11-19 17:19:56.621771  192.168.8.165       192.168.1.32        MQTT        167     Publish Message [espx/d1]                                               
54  2025-11-19 17:19:56.622463  192.168.1.32        192.168.8.165       TCP         54      1883 → 54305 [ACK] Seq=5 Ack=137 Win=64104 Len=0                        
55  2025-11-19 17:19:56.670924  192.168.8.165       192.168.1.32        MQTT        56      Disconnect Req                                                          
56  2025-11-19 17:19:56.671594  192.168.1.32        192.168.8.165       TCP         54      1883 → 54305 [ACK] Seq=5 Ack=139 Win=64102 Len=0                        
57  2025-11-19 17:19:56.671670  192.168.1.32        192.168.8.165       TCP         54      1883 → 54305 [FIN, ACK] Seq=5 Ack=139 Win=64102 Len=0                   
58  2025-11-19 17:19:56.673359  192.168.8.165       192.168.1.32        TCP         54      54305 → 1883 [RST, ACK] Seq=139 Ack=6 Win=24584 Len=0                   
59  2025-11-19 17:20:00.537118  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 56266 [FIN, ACK] Seq=1 Ack=1 Win=64101 Len=0
60  2025-11-19 17:20:01.618191  ZioncomE_2c:62:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                 
61  2025-11-19 17:20:02.658163  ZioncomE_2c:62:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                 


GL-AR300M:

No. Time                        Source              Destination         Protocol    Length  Info                                                                                     
1   2025-11-19 17:32:37.594577  Espressi_cc:a6:2f   Broadcast           XID         20      Basic Format; Type 1 LLC (Class I LLC); Window Size 0                                    
2   2025-11-19 17:32:37.594676  Espressi_cc:a6:2f   Broadcast           XID         20      Basic Format; Type 1 LLC (Class I LLC); Window Size 0                                    
3   2025-11-19 17:32:37.598373  0.0.0.0             255.255.255.255     DHCP        350     DHCP Discover - Transaction ID 0x4e26b938                                                
4   2025-11-19 17:32:37.598528  0.0.0.0             255.255.255.255     DHCP        350     DHCP Discover - Transaction ID 0x4e26b938                                                
5   2025-11-19 17:32:37.600242  192.168.1.32        192.168.8.165       TCP         54      1883 → 65157 [FIN, ACK] Seq=1 Ack=1 Win=64105 Len=0                                      
6   2025-11-19 17:32:37.600367  192.168.1.32        192.168.8.165       TCP         54      1883 → 65336 [FIN, ACK] Seq=1 Ack=1 Win=64105 Len=0                                      
7   2025-11-19 17:32:37.602363  192.168.8.1         192.168.8.165       DHCP        342     DHCP Offer    - Transaction ID 0x4e26b938                                                
8   2025-11-19 17:32:37.610997  0.0.0.0             255.255.255.255     DHCP        350     DHCP Request  - Transaction ID 0x4e26b938                                                
9   2025-11-19 17:32:37.611153  0.0.0.0             255.255.255.255     DHCP        350     DHCP Request  - Transaction ID 0x4e26b938                                                
10  2025-11-19 17:32:37.614040  192.168.8.1         192.168.8.165       DHCP        342     DHCP ACK      - Transaction ID 0x4e26b938                                                
11  2025-11-19 17:32:37.619437  Espressi_cc:a6:2f   Broadcast           ARP         42      ARP Announcement for 192.168.8.165                                                       
12  2025-11-19 17:32:37.619498  Espressi_cc:a6:2f   Broadcast           ARP         42      ARP Announcement for 192.168.8.165                                                       
13  2025-11-19 17:32:37.630254  Espressi_cc:a6:2f   Broadcast           ARP         42      Who has 192.168.8.1? Tell 192.168.8.165                                                  
14  2025-11-19 17:32:37.630316  Espressi_cc:a6:2f   Broadcast           ARP         42      Who has 192.168.8.1? Tell 192.168.8.165                                                  
15  2025-11-19 17:32:37.630529  GLTechno_33:c3:18   Espressi_cc:a6:2f   ARP         42      192.168.8.1 is at 94:83:c4:33:c3:18                                                      
16  2025-11-19 17:32:37.632873  192.168.8.165       192.168.1.1         NTP         90      NTP Version 4, client                                                                    
17  2025-11-19 17:32:37.645019  192.168.8.165       192.168.1.32        TCP         62      53617 → 1883 [SYN] Seq=0 Win=2144 Len=0 MSS=536 SACK_PERM                                
18  2025-11-19 17:32:37.646160  192.168.1.32        192.168.8.165       TCP         62      1883 → 53617 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM                   
19  2025-11-19 17:32:37.648671  192.168.8.165       192.168.1.32        TCP         54      53617 → 1883 [ACK] Seq=1 Ack=1 Win=2144 Len=0                                            
20  2025-11-19 17:32:37.650260  192.168.8.165       192.168.1.32        MQTT        77      Connect Command                                                                          
21  2025-11-19 17:32:37.658241  192.168.8.165       192.168.1.32        MQTT        164     [TCP ACKed unseen segment] , Publish Message [espx/d1]                                   
22  2025-11-19 17:32:37.707765  192.168.8.165       192.168.1.32        MQTT        56      Disconnect Req                                                                           
23  2025-11-19 17:32:37.708350  192.168.1.32        192.168.8.165       TCP         54      [TCP Previous segment not captured] 1883 → 53617 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0
24  2025-11-19 17:32:37.837733  192.168.8.1         192.168.8.165       ICMP        98      Echo (ping) request  id=0x20b9, seq=0/0, ttl=64 (no response found!)                     
25  2025-11-19 17:32:37.913487  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 53617 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
26  2025-11-19 17:32:38.121434  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 53617 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
27  2025-11-19 17:32:38.549444  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 53617 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
28  2025-11-19 17:32:38.838101  192.168.8.1         192.168.8.165       ICMP        98      Echo (ping) request  id=0x20b9, seq=1/256, ttl=64 (no response found!)                   
29  2025-11-19 17:32:39.381457  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 53617 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
30  2025-11-19 17:32:39.838545  192.168.8.1         192.168.8.165       ICMP        98      Echo (ping) request  id=0x20b9, seq=2/512, ttl=64 (no response found!)                   
31  2025-11-19 17:32:40.838910  192.168.8.1         192.168.8.165       ICMP        98      Echo (ping) request  id=0x20b9, seq=3/768, ttl=64 (no response found!)                   
32  2025-11-19 17:32:41.045639  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 53617 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
33  2025-11-19 17:32:41.839269  192.168.8.1         192.168.8.165       ICMP        98      Echo (ping) request  id=0x20b9, seq=4/1024, ttl=64 (no response found!)                  
34  2025-11-19 17:32:42.651990  GLTechno_33:c3:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                                  
35  2025-11-19 17:32:43.691868  GLTechno_33:c3:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                                  
36  2025-11-19 17:32:44.437745  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 53617 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
37  2025-11-19 17:32:44.731963  GLTechno_33:c3:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                                  
38  2025-11-19 17:33:06.686761  Espressi_cc:a6:2f   Broadcast           XID         20      Basic Format; Type 1 LLC (Class I LLC); Window Size 0                                    
39  2025-11-19 17:33:06.686862  Espressi_cc:a6:2f   Broadcast           XID         20      Basic Format; Type 1 LLC (Class I LLC); Window Size 0                                    
40  2025-11-19 17:33:06.690780  0.0.0.0             255.255.255.255     DHCP        350     DHCP Discover - Transaction ID 0xa2a85adf                                                
41  2025-11-19 17:33:06.690935  0.0.0.0             255.255.255.255     DHCP        350     DHCP Discover - Transaction ID 0xa2a85adf                                                
42  2025-11-19 17:33:06.694485  192.168.8.1         192.168.8.165       DHCP        342     DHCP Offer    - Transaction ID 0xa2a85adf                                                
43  2025-11-19 17:33:06.702590  0.0.0.0             255.255.255.255     DHCP        350     DHCP Request  - Transaction ID 0xa2a85adf                                                
44  2025-11-19 17:33:06.702744  0.0.0.0             255.255.255.255     DHCP        350     DHCP Request  - Transaction ID 0xa2a85adf                                                
45  2025-11-19 17:33:06.705540  192.168.8.1         192.168.8.165       DHCP        342     DHCP ACK      - Transaction ID 0xa2a85adf                                                
46  2025-11-19 17:33:06.712656  Espressi_cc:a6:2f   Broadcast           ARP         42      ARP Announcement for 192.168.8.165                                                       
47  2025-11-19 17:33:06.712720  Espressi_cc:a6:2f   Broadcast           ARP         42      ARP Announcement for 192.168.8.165                                                       
48  2025-11-19 17:33:06.728399  Espressi_cc:a6:2f   Broadcast           ARP         42      Who has 192.168.8.1? Tell 192.168.8.165                                                  
49  2025-11-19 17:33:06.728460  Espressi_cc:a6:2f   Broadcast           ARP         42      Who has 192.168.8.1? Tell 192.168.8.165                                                  
50  2025-11-19 17:33:06.728670  GLTechno_33:c3:18   Espressi_cc:a6:2f   ARP         42      192.168.8.1 is at 94:83:c4:33:c3:18                                                      
51  2025-11-19 17:33:06.731750  192.168.8.165       192.168.1.1         NTP         90      NTP Version 4, client                                                                    
52  2025-11-19 17:33:06.752514  192.168.8.165       192.168.1.32        TCP         62      58988 → 1883 [SYN] Seq=0 Win=2144 Len=0 MSS=536 SACK_PERM                                
53  2025-11-19 17:33:06.753610  192.168.1.32        192.168.8.165       TCP         62      1883 → 58988 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM                   
54  2025-11-19 17:33:06.763336  192.168.8.165       192.168.1.32        TCP         54      58988 → 1883 [ACK] Seq=1 Ack=1 Win=2144 Len=0                                            
55  2025-11-19 17:33:06.764833  192.168.8.165       192.168.1.32        MQTT        77      Connect Command                                                                          
56  2025-11-19 17:33:06.778990  192.168.8.165       192.168.1.32        MQTT        164     [TCP ACKed unseen segment] , Publish Message [espx/d1]                                   
57  2025-11-19 17:33:06.822705  192.168.8.165       192.168.1.32        MQTT        56      Disconnect Req                                                                           
58  2025-11-19 17:33:06.823289  192.168.1.32        192.168.8.165       TCP         54      [TCP Previous segment not captured] 1883 → 58988 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0
59  2025-11-19 17:33:06.892265  192.168.8.1         192.168.8.165       ICMP        98      Echo (ping) request  id=0x22e7, seq=0/0, ttl=64 (no response found!)                     
60  2025-11-19 17:33:07.037834  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 58988 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
61  2025-11-19 17:33:07.253836  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 58988 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
62  2025-11-19 17:33:07.701908  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 58988 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
63  2025-11-19 17:33:07.892632  192.168.8.1         192.168.8.165       ICMP        98      Echo (ping) request  id=0x22e7, seq=1/256, ttl=64 (no response found!)                   
64  2025-11-19 17:33:08.565866  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 58988 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
65  2025-11-19 17:33:08.892992  192.168.8.1         192.168.8.165       ICMP        98      Echo (ping) request  id=0x22e7, seq=2/512, ttl=64 (no response found!)                   
66  2025-11-19 17:33:09.893359  192.168.8.1         192.168.8.165       ICMP        98      Echo (ping) request  id=0x22e7, seq=3/768, ttl=64 (no response found!)                   
67  2025-11-19 17:33:10.294097  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 58988 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
68  2025-11-19 17:33:10.893724  192.168.8.1         192.168.8.165       ICMP        98      Echo (ping) request  id=0x22e7, seq=4/1024, ttl=64 (no response found!)                  
69  2025-11-19 17:33:11.061939  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 53617 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0               
70  2025-11-19 17:33:11.771955  GLTechno_33:c3:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                                  
71  2025-11-19 17:33:12.811872  GLTechno_33:c3:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                                  
72  2025-11-19 17:33:13.851949  GLTechno_33:c3:18   Espressi_cc:a6:2f   ARP         42      Who has 192.168.8.165? Tell 192.168.8.1                                                  
73  2025-11-19 17:33:13.878073  192.168.1.32        192.168.8.165       TCP         54      [TCP Retransmission] 1883 → 58988 [FIN, ACK] Seq=5 Ack=136 Win=64105 Len=0