Wirelless enabled but AP does not shows up

Hello.
I'm using an router with openwrt for about a year and it was last updated about 2 months ago. I use it as an Access Point and it worked well for most of the time, in the last month or so it sometimes stopped showing up on my phone and i would restart the router and the connection would be back up for a good time. As of 2 days the same thing happened and after the reboot the wifi returned, but it got back down in about a day. And now it goes downs only a few minutes after restart, i tried restarting the access points via the wireless settings on luci but it did not come back, and now the 2 ssid's appear as disabled. All of these times the wireless connections worked flawlessly. I accept any help, thanks.
The router is a TP-Link Archer C6 v3, with Firmware version: OpenWrt 23.05.2 r23630-842932a63d / LuCI openwrt-23.05 branch git-23.306.39416-c86c256.
These are the log messages when restarting the 2ghz channel:


Sun Jan 14 04:04:41 2024 daemon.notice hostapd: Set new config for phy phy0:
Sun Jan 14 04:04:41 2024 daemon.notice wpa_supplicant[1296]: Set new config for phy phy0
Sun Jan 14 04:04:41 2024 daemon.notice netifd: Wireless device 'radio0' is now down
Sun Jan 14 04:04:41 2024 daemon.notice netifd: radio0 (14184): WARNING: Variable 'data' does not exist or is not an array/object
Sun Jan 14 04:04:42 2024 daemon.notice hostapd: Set new config for phy phy0:
Sun Jan 14 04:04:42 2024 daemon.notice wpa_supplicant[1296]: Set new config for phy phy0
Sun Jan 14 04:04:42 2024 daemon.notice wpa_supplicant[1296]: Set new config for phy phy0
Sun Jan 14 04:04:43 2024 daemon.notice hostapd: Set new config for phy phy0: /var/run/hostapd-phy0.conf
Sun Jan 14 04:04:43 2024 daemon.notice hostapd: Restart interface for phy phy0
Sun Jan 14 04:04:43 2024 daemon.notice hostapd: Configuration file: data: driver=nl80211 logger_syslog=127 logger_syslog_level=2 logger_stdout=127 logger_stdout_level=2 country_code=BR ieee80211d=1 hw_mode=g beacon_int=100 chanlist=1 noscan=1 #num_global_macaddr=1 ieee80211n=1 ht_coex=0 ht_capab=[SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1] channel=1  interface=phy0-ap0 bssid=28:ee:52:73:0b:cd ctrl_interface=/var/run/hostapd ap_isolate=1 bss_load_update_period=60 chan_util_avg_period=600 disassoc_low_ack=0 skip_inactivity_poll=1 preamble=1 wmm_enabled=1 ignore_broadcast_ssid=0 uapsd_advertisement_enabled=1 utf8_ssid=1 multi_ap=0 wpa_passphrase=REDACTED wpa_psk_file=/var/run/hostapd-phy0-ap0.psk eapol_version=1 auth_algs=1 wpa=3 wpa_pairwise=CCMP ssid=REDACTED bridge=br-guest wds_bridge= snoop_iface=br-guest ft_iface=br-guest mobility_domain=562D ft_psk_generate_local=1 ft_over_ds=0 reassociation_deadline=1000 wpa_disable_eapol_key_retries=0 wpa_key_mgmt=WPA-PSK FT-PSK okc=0 disable_pmksa_caching=1 dynamic_vlan
Sun Jan 14 04:04:46 2024 kern.err kernel: [22490.897955] mt7603e 0000:01:00.0: MCU message 08 (seq 9) timed out
Sun Jan 14 04:04:46 2024 kern.info kernel: [22490.914523] br-guest: port 1(phy0-ap0) entered blocking state
Sun Jan 14 04:04:46 2024 kern.info kernel: [22490.920431] br-guest: port 1(phy0-ap0) entered disabled state
Sun Jan 14 04:04:46 2024 kern.info kernel: [22490.926617] device phy0-ap0 entered promiscuous mode
Sun Jan 14 04:04:46 2024 daemon.notice hostapd: phy0-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Sun Jan 14 04:04:46 2024 kern.info kernel: [22490.937462] device phy0-ap0 left promiscuous mode
Sun Jan 14 04:04:46 2024 kern.info kernel: [22490.942634] br-guest: port 1(phy0-ap0) entered disabled state
Sun Jan 14 04:04:46 2024 daemon.notice netifd: Interface 'guest' is now down
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using nameserver 192.168.1.5#53
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using nameserver 192.168.1.5#53
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for home.arpa
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Sun Jan 14 04:04:46 2024 daemon.err hostapd: l2_packet_init: ioctl[SIOCGIFINDEX]: No such device
Sun Jan 14 04:04:46 2024 daemon.err hostapd: Failed to open l2_packet interface
Sun Jan 14 04:04:46 2024 daemon.err hostapd: Interface initialization failed
Sun Jan 14 04:04:46 2024 daemon.notice hostapd: phy0-ap0: interface state COUNTRY_UPDATE->DISABLED
Sun Jan 14 04:04:46 2024 daemon.notice hostapd: phy0-ap0: AP-DISABLED
Sun Jan 14 04:04:46 2024 daemon.err hostapd: phy0-ap0: Unable to setup interface.
Sun Jan 14 04:04:46 2024 daemon.notice hostapd: nl80211: deinit ifname=phy0-ap0 disabled_11b_rates=0
Sun Jan 14 04:04:46 2024 daemon.notice netifd: Interface 'guest' is disabled
Sun Jan 14 04:04:46 2024 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Sun Jan 14 04:04:46 2024 daemon.notice hostapd: phy0-ap0: CTRL-EVENT-TERMINATING
Sun Jan 14 04:04:46 2024 daemon.err hostapd: hostapd_free_hapd_data: Interface phy0-ap0 wasn't started
Sun Jan 14 04:04:46 2024 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Sun Jan 14 04:04:46 2024 daemon.notice hostapd: phy0-ap1: CTRL-EVENT-TERMINATING
Sun Jan 14 04:04:46 2024 daemon.err hostapd: hostapd_free_hapd_data: Interface phy0-ap1 wasn't started
Sun Jan 14 04:04:46 2024 daemon.notice hostapd: hostapd.add_iface failed for phy phy0 ifname=phy0-ap0
Sun Jan 14 04:04:46 2024 kern.info kernel: [22491.225500] br-guest: port 1(phy0-ap0) entered blocking state
Sun Jan 14 04:04:46 2024 kern.info kernel: [22491.231594] br-guest: port 1(phy0-ap0) entered disabled state
Sun Jan 14 04:04:46 2024 kern.info kernel: [22491.237979] device phy0-ap0 entered promiscuous mode
Sun Jan 14 04:04:46 2024 daemon.notice netifd: Interface 'guest' is enabled
Sun Jan 14 04:04:46 2024 daemon.notice netifd: Interface 'guest' is setting up now
Sun Jan 14 04:04:46 2024 daemon.notice netifd: Interface 'guest' is now up
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using nameserver 192.168.1.5#53
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using nameserver 192.168.1.5#53
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using nameserver 192.168.1.5#53
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for home.arpa
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Sun Jan 14 04:04:46 2024 kern.info kernel: [22491.282307] device phy0-ap0 left promiscuous mode
Sun Jan 14 04:04:46 2024 kern.info kernel: [22491.287417] br-guest: port 1(phy0-ap0) entered disabled state
Sun Jan 14 04:04:46 2024 daemon.notice netifd: Interface 'guest' is now down
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using nameserver 192.168.1.5#53
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using nameserver 192.168.1.5#53
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for home.arpa
Sun Jan 14 04:04:46 2024 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Sun Jan 14 04:04:47 2024 daemon.notice netifd: Interface 'guest' is disabled
Sun Jan 14 04:04:47 2024 user.notice firewall: Reloading firewall due to ifup of guest (br-guest)
Sun Jan 14 04:04:47 2024 daemon.notice netifd: Wireless device 'radio0' is now up
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: started, version 2.89 cachesize 150
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: DNS service limited to local subnets
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for home.arpa
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using nameserver 192.168.1.5#53
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using nameserver 192.168.1.5#53
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for home.arpa
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 11 names
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 2 names
Sun Jan 14 04:04:49 2024 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses

Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button:
grafik
Remember to redact passwords, MAC addresses and any public IP addresses you may have:

ubus call system board
cat /etc/config/network
cat /etc/config/wireless
cat /etc/config/dhcp
cat /etc/config/firewall

ubus call system board

{
        "kernel": "5.15.137",
        "hostname": "OpenWrt",
        "system": "MediaTek MT7621 ver:1 eco:3",
        "model": "TP-Link Archer C6 v3",
        "board_name": "tplink,archer-c6-v3",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "23.05.2",
                "revision": "r23630-842932a63d",
                "target": "ramips/mt7621",
                "description": "OpenWrt 23.05.2 r23630-842932a63d"
        }

cat /etc/config/network

config interface 'loopback'
        option device 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option packet_steering '1'
        option ula_prefix 'REDACTED'

config device
        option name 'br-lan'
        option type 'bridge'
        list ports 'lan1'
        list ports 'lan2'
        list ports 'lan3'
        list ports 'lan4'

config interface 'lan'
        option device 'br-lan'
        option proto 'static'
        option ipaddr '192.168.1.1'
        option netmask '255.255.255.0'
        option ip6assign '60'
        list dns '192.168.1.5'

config interface 'wan'
        option device 'wan'
        option proto 'dhcp'
        option peerdns '0'
        list dns '192.168.1.5'

config interface 'wan6'
        option device 'wan'
        option proto 'dhcpv6'
        option auto '0'
        option reqaddress 'none'
        option reqprefix 'auto'

config device 'guest_dev'
        option type 'bridge'
        option name 'br-guest'

config interface 'guest'
        option device 'br-guest'
        option proto 'static'
        list dns '192.168.1.5'
        list ipaddr '192.168.10.1/24'

config route
        option interface 'lan'
        option target '192.168.1.0/24'
        option gateway '192.168.1.1'
        option type 'local'

cat /etc/config/wireless

config wifi-device 'radio0'
        option type 'mac80211'
        option path '1e140000.pcie/pci0000:00/0000:00:00.0/0000:01:00.0'
        option band '2g'
        option cell_density '0'
        option txpower '22'
        option noscan '1'
        option channel '1'
        option country 'BR'
        option htmode 'HT20'
        option legacy_rates '1'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option network 'guest'
        option mode 'ap'
        option key 'REDACTED'
        option ssid 'REDACTED'
        option disassoc_low_ack '0'
        option skip_inactivity_poll '1'
        option dtim_period '3'
        option ieee80211r '1'
        option mobility_domain '562D'
        option ft_over_ds '0'
        option ft_psk_generate_local '1'
        option isolate '1'
        option encryption 'psk-mixed'

config wifi-device 'radio1'
        option type 'mac80211'
        option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0'
        option band '5g'
        option cell_density '0'
        option txpower '20'
        option htmode 'VHT80'
        option channel '36'
        option country 'BR'

config wifi-iface 'wifinet3'
        option device 'radio1'
        option mode 'ap'
        option encryption 'sae-mixed'
        option key 'REDACTED'
        option network 'guest'
        option disassoc_low_ack '0'
        option skip_inactivity_poll '1'
        option ieee80211r '1'
        option ft_over_ds '0'
        option ft_psk_generate_local '1'
        option dtim_period '3'
        option mobility_domain '562D'
        option ssid 'REDACTED'

config wifi-iface 'interno'
        option device 'radio0'
        option mode 'ap'
        option network 'lan'
        option ssid 'REDACTED'
        option key 'REDACTED'
        option encryption 'psk-mixed'
        option isolate '1'

cat /etc/config/dhcp


config dnsmasq
        option domainneeded '1'
        option localise_queries '1'
        option rebind_protection '1'
        option rebind_localhost '1'
        option expandhosts '1'
        option authoritative '1'
        option readethers '1'
        option leasefile '/tmp/dhcp.leases'
        option confdir '/etc/dnsmasq.d'
        option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
        option localservice '1'
        option ednspacket_max '1232'
        option local '/lan/home.arpa/'
        option domain 'home.arpa'

config dhcp 'lan'
        option interface 'lan'
        option start '100'
        option limit '150'
        option leasetime '12h'
        option dhcpv4 'server'
        option dhcpv6 'server'
        option ra 'server'
        list ra_flags 'managed-config'
        list ra_flags 'other-config'

config dhcp 'wan'
        option interface 'wan'
        option ignore '1'

config odhcpd 'odhcpd'
        option maindhcp '0'
        option leasefile '/tmp/hosts/odhcpd'
        option leasetrigger '/usr/sbin/odhcpd-update'
        option loglevel '4'

config dhcp 'guest'
        option interface 'guest'
        option start '10'
        option limit '150'
        option leasetime '1h'

cat /etc/config/firewall

config defaults
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option synflood_protect '1'

config zone
        option name 'wan'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'
        list network 'wan'
        list network 'wan6'

config zone
        option name 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'
        list network 'lan'

config forwarding
        option src 'lan'
        option dest 'wan'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'
        option enabled '0'

config rule
        option name 'Allow-IGMP'
        option src 'wan'
        option proto 'igmp'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-MLD'
        option src 'wan'
        option proto 'icmp'
        option src_ip 'fe80::/10'
        list icmp_type '130/0'
        list icmp_type '131/0'
        list icmp_type '132/0'
        list icmp_type '143/0'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-IPSec-ESP'
        option src 'wan'
        option dest 'lan'
        option proto 'esp'
        option target 'ACCEPT'

config rule
        option name 'Allow-ISAKMP'
        option src 'wan'
        option dest 'lan'
        option dest_port '500'
        option proto 'udp'
        option target 'ACCEPT'

config zone
        option name 'server'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'

config forwarding
        option src 'server'
        option dest 'wan'

config forwarding
        option src 'lan'
        option dest 'server'


config zone 'guest'
        option name 'guest'
        option network 'guest'
        option input 'REJECT'
        option forward 'REJECT'
        option output 'ACCEPT'

config forwarding 'guest_wan'
        option src 'guest'
        option dest 'wan'

config rule 'guest_dns'
        option name 'Allow-DNS-Guest'
        option src 'guest'
        option dest_port '53'
        option proto 'tcp udp'
        option target 'ACCEPT'

config rule 'guest_dhcp'
        option name 'Allow-DHCP-Guest'
        option src 'guest'
        option dest_port '67'
        option proto 'udp'
        option family 'ipv4'
        option target 'ACCEPT'



Remove legacy rates and noscan.

Remove all of the 802.11r and change to psk2 (wpa2). Do this for all ssids defined on your device.

Remove this - it does nothing.

Reboot and test again.

1 Like

This may be something else but I have seen exactly the same symptoms on numerous manufacturer's devices. In every case it was a slowly degrading/failing power supply.
The current pulses perhaps lasting a fraction of a millisecond caused when the wireless transmits become enough to lower the voltage below a threshold that causes problems. The first sign is often the ssid randomly dropping. As it gets really bad the whole device can crash or lock up.

If you have a suitable spare supply it might be worth trying it.

2 Likes

Removed and rebooted, unfortunately i have to keep the old encryption because of compatibility with some devices. I know it's a security risk but otherwise i would have to buy a new phone which i can't now.
The wifi is up again after a reboot, but i don't know how long it will stay up.

Will try it, the power supply is the provided with the router, probably a very cheap one. Will change it for a better one and see if it stops.

1 Like

After some hours it has gone down again, just changed the power supply and rebooted.

Fingers crossed. Is the replacement power supply at least the same rating?
It is possible, depending on design, for an electrolytic smoothing capacitor inside the case of the router to be failing and give the same results. I don't know what an Archer C6 v3 has inside, but electrolytic caps usually last for at least 5 years, but who knows... How old is the router?

1 Like

The same age as it's openwrt installation, about a year. I changed the power supply for a higher current one and it seens to be working, wifi did not stop until now. Do i mark the post as solved?

It helps a lot when threads are closed and the proper reply is marked as solving it.

it helps people looking through threads matching their search and, quickly, identify what has worked before.

1 Like

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.