Greetings all,
Firstly, thank you for such a wonderful community, I've learned a lot here browsing and reading.
I’m very new to this and am trying to set up a separate guest network that only has internet access and no access to my LAN. I followed this tutorial which seems pretty common among the ones I’ve seen.
The only difference is that I’ve selected ‘true’ on the force option on the DHCP Advanced TAB for the GuestNet interface, and have split up the DNS and DHCP Traffic rules for the GuestNet, neither seem to have made a difference to my problem. I’m using LuCi as I’m not much for CL atm.
The problem is I’m unable to get DHCP working consistently on my guest network. I am able to sometimes log onto the network and obtain a DHCP IP address and then access the internet. I can then watch the device get ‘kicked off’ and end up with an IP Address of 169.254.something and no internet access. I can do this with multiple devices, sometimes they will connect and get an IP address and sometimes not. I’ve done lots of searches and have been unable to solve this problem. My simple set up is a modem in bridge mode and this router going PPPOE through it for internet.
I’ve included below what I think is needed to look at my set up as well as the log files for the times in question when the above has happened.
Thanks for you help,
Greg
The following was cut and pasted into terminal as per what I've read here:
ubus call system board;
uci export network;
uci export wireless;
uci export dhcp; uci export firewall;
head -n -0 /etc/firewall.user;
iptables-save -c;
ip -4 addr ; ip -4 ro li tab all ; ip -4 ru;
ls -l /etc/resolv.* /tmp/resolv.* /tmp/resolv./ ; head -n -0 /etc/resolv.* /tmp/resolv.* /tmp/resolv./
RESULT:
ubus call system board; \
> uci export network;
{
"kernel": "5.15.137",
"hostname": "MF_House_Router",
"system": "MediaTek MT7621 ver:1 eco:3",
"model": "TP-Link Archer AX23 v1",
"board_name": "tplink,archer-ax23-v1",
"rootfs_type": "squashfs",
"release": {
"distribution": "OpenWrt",
"version": "23.05.2",
"revision": "r23630-842932a63d",
"target": "ramips/mt7621",
"description": "OpenWrt 23.05.2 r23630-842932a63d"
}
}
package network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fdc5:4844:079b::/48'
option packet_steering '1'
config device
option name 'br-lan'
option type 'bridge'
list ports 'lan1'
list ports 'lan2'
list ports 'lan3'
list ports 'lan4'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option ipaddr '192.168.5.1'
option netmask '255.255.255.0'
option ip6assign '60'
config interface 'wan'
option device 'wan'
option proto 'pppoe'
option username ‘xxxxxxxxxxxxxxxxx’
option password ‘xxxxxxxxxxxxxxxxx’
option ipv6 'auto'
config interface 'wan6'
option device 'wan'
option proto 'dhcpv6'
config interface 'GuestNet'
option proto 'static'
option ipaddr '10.10.10.10'
option netmask '255.255.255.0'
root@MF_House_Router:~# uci export wireless; \
> uci export dhcp; uci export firewall; \
> head -n -0 /etc/firewall.user; \
> iptables-save -c; \
> ip -4 addr ; ip -4 ro li tab all ; ip -4 ru; \
> ls -l /etc/resolv.* /tmp/resolv.* /tmp/resolv.*/* ; head -n -0 /etc/resolv.*
/tmp/resolv.* /tmp/resolv.*/*
package wireless
config wifi-device 'radio0'
option type 'mac80211'
option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0'
option channel '1'
option band '2g'
option htmode 'HE20'
option cell_density '0'
config wifi-iface 'default_radio0'
option device 'radio0'
option network 'lan'
option mode 'ap'
option ssid 'Searching...'
option encryption 'sae-mixed'
option key 'xxxxxxxxxxxxxxxxx'
config wifi-device 'radio1'
option type 'mac80211'
option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0+1'
option channel '36'
option band '5g'
option htmode 'HE80'
option cell_density '0'
config wifi-iface 'default_radio1'
option device 'radio1'
option network 'lan'
option mode 'ap'
option ssid 'Searching...'
option encryption 'sae-mixed'
option key 'xxxxxxxxxxxxxxxxx'
config wifi-iface 'wifinet3'
option device 'radio0'
option mode 'ap'
option ssid 'Work'
option encryption 'sae-mixed'
option key 'xxxxxxxxxxxxxxxxx'
option network 'GuestNet'
config wifi-iface 'wifinet4'
option device 'radio1'
option mode 'ap'
option ssid 'Work'
option encryption 'sae-mixed'
option network 'GuestNet'
option key 'xxxxxxxxxxxxxxxxx'
package dhcp
config dnsmasq
option domainneeded '1'
option boguspriv '1'
option filterwin2k '0'
option localise_queries '1'
option rebind_protection '1'
option rebind_localhost '1'
option local '/lan/'
option domain 'lan'
option expandhosts '1'
option nonegcache '0'
option cachesize '1000'
option authoritative '1'
option readethers '1'
option leasefile '/tmp/dhcp.leases'
option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
option nonwildcard '1'
option localservice '1'
option ednspacket_max '1232'
option filter_aaaa '0'
option filter_a '0'
config dhcp 'lan'
option interface 'lan'
option start '100'
option limit '150'
option leasetime '12h'
option dhcpv4 'server'
option dhcpv6 'server'
option ra 'server'
list ra_flags 'managed-config'
list ra_flags 'other-config'
config dhcp 'wan'
option interface 'wan'
option ignore '1'
config odhcpd 'odhcpd'
option maindhcp '0'
option leasefile '/tmp/hosts/odhcpd'
option leasetrigger '/usr/sbin/odhcpd-update'
option loglevel '4'
config dhcp 'GuestNet'
option interface 'GuestNet'
option start '100'
option limit '150'
option leasetime '12h'
option force '1'
package firewall
config defaults
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option synflood_protect '1'
config zone
option name 'lan'
list network 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
config zone
option name 'wan'
list network 'wan'
list network 'wan6'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config zone
option name 'Guest'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
list network 'GuestNet'
config forwarding
option src 'Guest'
option dest 'wan'
config rule
option name 'Guest DNS (Work)'
option src 'Guest'
option dest_port '53'
option target 'ACCEPT'
config rule
option name 'Guest DHCP (WORK)'
list proto 'udp'
option src 'Guest'
option dest_port '67 68'
option target 'ACCEPT'
head: /etc/firewall.user: No such file or directory
-ash: iptables-save: not found
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
10: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
inet 192.168.5.1/24 brd 192.168.5.255 scope global br-lan
valid_lft forever preferred_lft forever
14: phy1-ap1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
inet 10.10.10.10/24 brd 10.10.10.255 scope global phy1-ap1
valid_lft forever preferred_lft forever
15: pppoe-wan: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1492 qdisc fq_codel state UNKNOWN qlen 3
inet xxxxxxx peer 10.20.23.6/32 scope global pppoe-wan
valid_lft forever preferred_lft forever
default via 10.20.23.6 dev pppoe-wan
10.10.10.0/24 dev phy1-ap1 scope link src 10.10.10.10
10.20.23.6 dev pppoe-wan scope link src xxxxxxx
192.168.5.0/24 dev br-lan scope link src 192.168.5.1
local 10.10.10.10 dev phy1-ap1 table local scope host src 10.10.10.10
broadcast 10.10.10.255 dev phy1-ap1 table local scope link src 10.10.10.10
local xxxxxxx dev pppoe-wan table local scope host src xxxxxxx
local 127.0.0.0/8 dev lo table local scope host src 127.0.0.1
local 127.0.0.1 dev lo table local scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local scope link src 127.0.0.1
local 192.168.5.1 dev br-lan table local scope host src 192.168.5.1
broadcast 192.168.5.255 dev br-lan table local scope link src 192.168.5.1
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
lrwxrwxrwx 1 root root 16 Nov 14 23:38 /etc/resolv.conf -> /tmp/resolv.conf
-rw-r--r-- 1 root root 47 Feb 14 11:27 /tmp/resolv.conf
-rw-r--r-- 1 root root 124 Feb 14 11:27 /tmp/resolv.conf.d/resolv.conf.auto
-rw-r--r-- 1 root root 50 Feb 14 11:27 /tmp/resolv.conf.ppp
/tmp/resolv.conf.d:
-rw-r--r-- 1 root root 124 Feb 14 11:27 resolv.conf.auto
==> /etc/resolv.conf <==
search lan
nameserver 127.0.0.1
nameserver ::1
==> /tmp/resolv.conf <==
search lan
nameserver 127.0.0.1
nameserver ::1
==> /tmp/resolv.conf.d <==
head: /tmp/resolv.conf.d: I/O error
==> /tmp/resolv.conf.ppp <==
nameserver xxxxxxx
nameserver xxxxxxx
==> /tmp/resolv.conf.d/resolv.conf.auto <==
# Interface wan
nameserver xxxxxxx
nameserver xxxxxxx
# Interface wan6
nameserver fe80::a691:b1ff:fe68:7bc0%wan
Here is a log file for some succesful log in and some unsuccessful ones. I've replaced external IPs and passwords with xxxxxx and MAC Addresses with MAC ADDRESS 'A' etc.
Wed Feb 14 11:30:50 2024 daemon.err uhttpd[1672]: [info] luci: accepted login on /admin/system/reboot for root from 192.168.5.159
Wed Feb 14 11:31:05 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED MAC 'A'
Wed Feb 14 11:31:05 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'A') IEEE 802.11: disassociated
Wed Feb 14 11:31:06 2024 daemon.info hostapd: phy1-ap1: STA (MAC ADDRESS 'B') IEEE 802.11: associated (aid 1)
Wed Feb 14 11:31:06 2024 daemon.notice hostapd: phy1-ap1: AP-STA-CONNECTED (MAC ADDRESS 'B') auth_alg=sae
Wed Feb 14 11:31:06 2024 daemon.info hostapd: phy1-ap1: STA (MAC ADDRESS 'B') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:31:06 2024 daemon.notice hostapd: phy1-ap1: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'B')
Wed Feb 14 11:31:07 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'A') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:31:09 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(phy1-ap1) (MAC ADDRESS 'B')
Wed Feb 14 11:31:09 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(phy1-ap1) 10.10.10.189 (MAC ADDRESS 'B')
Wed Feb 14 11:31:09 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(phy1-ap1) (MAC ADDRESS 'B')
Wed Feb 14 11:31:09 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(phy1-ap1) 10.10.10.189 (MAC ADDRESS 'B')
Wed Feb 14 11:31:11 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(phy1-ap1) 10.10.10.189 (MAC ADDRESS 'B')
Wed Feb 14 11:31:11 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(phy1-ap1) 10.10.10.189 (MAC ADDRESS 'B')
Wed Feb 14 11:31:21 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED (MAC ADDRESS 'C')
Wed Feb 14 11:31:21 2024 daemon.info hostapd: phy1-ap0: STA (MAC ADDRESS 'C') IEEE 802.11: disassociated
Wed Feb 14 11:31:21 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'C') IEEE 802.11: associated (aid 1)
Wed Feb 14 11:31:21 2024 daemon.notice hostapd: phy1-ap0: Prune association for (MAC ADDRESS 'C')
Wed Feb 14 11:31:22 2024 daemon.notice hostapd: phy0-ap1: AP-STA-CONNECTED (MAC ADDRESS 'C') auth_alg=sae
Wed Feb 14 11:31:22 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'C') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:31:22 2024 daemon.notice hostapd: phy0-ap1: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'C')
Wed Feb 14 11:31:27 2024 daemon.notice hostapd: phy0-ap1: STA (MAC ADDRESS 'B') IEEE 802.11: did not acknowledge authentication response
Wed Feb 14 11:31:35 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'B') IEEE 802.11: associated (aid 2)
Wed Feb 14 11:31:35 2024 daemon.notice hostapd: phy1-ap1: Prune association for (MAC ADDRESS 'B')
Wed Feb 14 11:31:35 2024 daemon.notice hostapd: phy1-ap1: AP-STA-DISCONNECTED (MAC ADDRESS 'B')
Wed Feb 14 11:31:37 2024 daemon.notice hostapd: phy0-ap1: AP-STA-CONNECTED (MAC ADDRESS 'B') auth_alg=sae
Wed Feb 14 11:31:37 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'B') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:31:37 2024 daemon.notice hostapd: phy0-ap1: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'B')
Wed Feb 14 11:31:47 2024 daemon.info hostapd: phy1-ap1: STA (MAC ADDRESS 'C') IEEE 802.11: associated (aid 2)
Wed Feb 14 11:31:47 2024 daemon.notice hostapd: phy0-ap1: Prune association for (MAC ADDRESS 'C')
Wed Feb 14 11:31:47 2024 daemon.notice hostapd: phy0-ap1: AP-STA-DISCONNECTED (MAC ADDRESS 'C')
Wed Feb 14 11:31:47 2024 daemon.notice hostapd: phy1-ap0: Prune association for (MAC ADDRESS 'C')
Wed Feb 14 11:31:49 2024 daemon.notice hostapd: phy1-ap1: AP-STA-CONNECTED (MAC ADDRESS 'C') auth_alg=sae
Wed Feb 14 11:31:49 2024 daemon.info hostapd: phy1-ap1: STA (MAC ADDRESS 'C') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:31:49 2024 daemon.notice hostapd: phy1-ap1: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'C')
Wed Feb 14 11:31:53 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(phy1-ap1) (MAC ADDRESS 'C')
Wed Feb 14 11:31:53 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(phy1-ap1) 10.10.10.159 (MAC ADDRESS 'C')
Wed Feb 14 11:31:53 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(phy1-ap1) (MAC ADDRESS 'C')
Wed Feb 14 11:31:53 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(phy1-ap1) 10.10.10.159 (MAC ADDRESS 'C')
Wed Feb 14 11:31:54 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(phy1-ap1) 10.10.10.159 (MAC ADDRESS 'C')
Wed Feb 14 11:31:54 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(phy1-ap1) 10.10.10.159 (MAC ADDRESS 'C') Wander-Air
Wed Feb 14 11:32:05 2024 daemon.info hostapd: phy1-ap1: STA (MAC ADDRESS 'B') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:32:17 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'C') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:32:17 2024 daemon.info hostapd: phy1-ap0: STA (MAC ADDRESS 'C') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:33:11 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'C') IEEE 802.11: authenticated
Wed Feb 14 11:33:11 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'C') IEEE 802.11: associated (aid 1)
Wed Feb 14 11:33:11 2024 daemon.notice hostapd: phy1-ap1: Prune association for (MAC ADDRESS 'C')
Wed Feb 14 11:33:11 2024 daemon.notice hostapd: phy1-ap1: AP-STA-DISCONNECTED (MAC ADDRESS 'C')
Wed Feb 14 11:33:11 2024 daemon.notice hostapd: phy0-ap1: AP-STA-CONNECTED (MAC ADDRESS 'C') auth_alg=open
Wed Feb 14 11:33:11 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'C') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:33:11 2024 daemon.notice hostapd: phy0-ap1: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'C')
Wed Feb 14 11:33:28 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'D') IEEE 802.11: authenticated
Wed Feb 14 11:33:28 2024 daemon.info hostapd: phy1-ap0: STA (MAC ADDRESS 'D') IEEE 802.11: authenticated
Wed Feb 14 11:33:31 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'D') IEEE 802.11: associated (aid 7)
Wed Feb 14 11:33:31 2024 daemon.notice hostapd: phy1-ap0: Prune association for (MAC ADDRESS 'D')
Wed Feb 14 11:33:31 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED (MAC ADDRESS 'D') auth_alg=sae
Wed Feb 14 11:33:31 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'D') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:33:31 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'D')
Wed Feb 14 11:33:33 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.5.124 (MAC ADDRESS 'D')
Wed Feb 14 11:33:33 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.5.124 (MAC ADDRESS 'D') MacBook
Wed Feb 14 11:33:36 2024 daemon.warn odhcpd[1558]: No default route present, overriding ra_lifetime!
Wed Feb 14 11:33:37 2024 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Wed Feb 14 11:33:37 2024 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Wed Feb 14 11:33:37 2024 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 0 names
Wed Feb 14 11:33:37 2024 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Wed Feb 14 11:33:41 2024 daemon.info hostapd: phy1-ap1: STA (MAC ADDRESS 'C') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:34:01 2024 daemon.info hostapd: phy1-ap0: STA (MAC ADDRESS 'D') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:35:28 2024 daemon.warn odhcpd[1558]: No default route present, overriding ra_lifetime!
Wed Feb 14 11:35:57 2024 daemon.notice hostapd: phy0-ap1: AP-STA-DISCONNECTED (MAC ADDRESS 'C')
Wed Feb 14 11:35:57 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'C') IEEE 802.11: disassociated
Wed Feb 14 11:35:58 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'C') IEEE 802.11: associated (aid 8)
Wed Feb 14 11:35:58 2024 daemon.notice hostapd: phy0-ap1: Prune association for (MAC ADDRESS 'C')
Wed Feb 14 11:35:58 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED (MAC ADDRESS 'C') auth_alg=sae
Wed Feb 14 11:35:58 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'C') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:35:58 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'C')
Wed Feb 14 11:35:58 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.5.159 (MAC ADDRESS 'C')
Wed Feb 14 11:35:58 2024 daemon.info dnsmasq-dhcp[1]: DHCPNAK(br-lan) 192.168.5.159 (MAC ADDRESS 'C') wrong address
Wed Feb 14 11:35:58 2024 daemon.warn odhcpd[1558]: No default route present, overriding ra_lifetime!
Wed Feb 14 11:36:00 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.5.159 (MAC ADDRESS 'C')
Wed Feb 14 11:36:00 2024 daemon.info dnsmasq-dhcp[1]: DHCPNAK(br-lan) 192.168.5.159 (MAC ADDRESS 'C') wrong address
Wed Feb 14 11:36:03 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) (MAC ADDRESS 'C')
Wed Feb 14 11:36:03 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.5.159 (MAC ADDRESS 'C')
Wed Feb 14 11:36:03 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) (MAC ADDRESS 'C')
Wed Feb 14 11:36:03 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.5.159 (MAC ADDRESS 'C')
Wed Feb 14 11:36:04 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.5.159 (MAC ADDRESS 'C')
Wed Feb 14 11:36:04 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.5.159 (MAC ADDRESS 'C') Wander-Air
Wed Feb 14 11:36:28 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'C') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:36:30 2024 authpriv.info dropbear[4871]: Child connection from 192.168.5.159:50232
Wed Feb 14 11:36:37 2024 authpriv.notice dropbear[4871]: Password auth succeeded for 'root' from 192.168.5.159:50232
Wed Feb 14 11:37:15 2024 daemon.notice hostapd: phy0-ap1: AP-STA-DISCONNECTED (MAC ADDRESS 'B')
Wed Feb 14 11:37:15 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'B') IEEE 802.11: disassociated
Wed Feb 14 11:37:17 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'B') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:37:42 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'A') IEEE 802.11: associated (aid 9)
Wed Feb 14 11:37:42 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED (MAC ADDRESS 'A') auth_alg=sae
Wed Feb 14 11:37:42 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'A') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:37:42 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'A')
Wed Feb 14 11:37:44 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.5.206 (MAC ADDRESS 'A')
Wed Feb 14 11:37:44 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.5.206 (MAC ADDRESS 'A')
Wed Feb 14 11:37:47 2024 daemon.warn odhcpd[1558]: No default route present, overriding ra_lifetime!
Wed Feb 14 11:39:29 2024 daemon.info hostapd: phy1-ap0: STA (MAC ADDRESS 'C') IEEE 802.11: associated (aid 1)
Wed Feb 14 11:39:29 2024 daemon.notice hostapd: phy0-ap0: Prune association for (MAC ADDRESS 'C')
Wed Feb 14 11:39:29 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED (MAC ADDRESS 'C')
Wed Feb 14 11:39:31 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED (MAC ADDRESS 'C') auth_alg=sae
Wed Feb 14 11:39:31 2024 daemon.info hostapd: phy1-ap0: STA (MAC ADDRESS 'C') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:39:31 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'C')
Wed Feb 14 11:39:31 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.5.159 (MAC ADDRESS 'C')
Wed Feb 14 11:39:31 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.5.159 (MAC ADDRESS 'C') Wander-Air
Wed Feb 14 11:39:59 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'C') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:40:23 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED (MAC ADDRESS 'A')
Wed Feb 14 11:40:24 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'A') IEEE 802.11: disassociated
Wed Feb 14 11:40:24 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'B') IEEE 802.11: associated (aid 1)
Wed Feb 14 11:40:24 2024 daemon.notice hostapd: phy0-ap1: AP-STA-CONNECTED (MAC ADDRESS 'B') auth_alg=sae
Wed Feb 14 11:40:24 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'B') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:40:24 2024 daemon.notice hostapd: phy0-ap1: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'B')
Wed Feb 14 11:40:25 2024 daemon.info hostapd: phy0-ap0: STA (MAC ADDRESS 'A') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:40:51 2024 daemon.notice hostapd: phy0-ap1: AP-STA-DISCONNECTED (MAC ADDRESS 'B')
Wed Feb 14 11:40:51 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'B') IEEE 802.11: disassociated
Wed Feb 14 11:40:52 2024 daemon.info hostapd: phy0-ap1: STA (MAC ADDRESS 'B') IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Feb 14 11:40:52 2024 daemon.info hostapd: phy1-ap0: STA (MAC ADDRESS 'A') IEEE 802.11: associated (aid 2)
Wed Feb 14 11:40:52 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED (MAC ADDRESS 'A') auth_alg=sae
Wed Feb 14 11:40:52 2024 daemon.info hostapd: phy1-ap0: STA (MAC ADDRESS 'A') WPA: pairwise key handshake completed (RSN)
Wed Feb 14 11:40:52 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED (MAC ADDRESS 'A')
Wed Feb 14 11:40:53 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.5.206 (MAC ADDRESS 'A')
Wed Feb 14 11:40:53 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.5.206 (MAC ADDRESS 'A')
Wed Feb 14 11:40:53 2024 daemon.warn odhcpd[1558]: No default route present, overriding ra_lifetime!