cancel
Showing results for 
Search instead for 
Did you mean: 

R600 no access to web interface every morning

alexander_brown
New Contributor II
I have a R600 running on firmware version 104.0.0.0.1347.  Every morning I have to power cycle the AP just to get access to the web interface or get a ping through to the device.  I have loaded the latest firmware (104.0.0.0.1347) and even changed the POE injector, to no avail.  Every morning the same thing again.  Can someone point me in a direction to look at?   I see some error in the log of the AP, but have no idea what they mean.  Posting some of it below.
Sep 19 08:00:57 WorOLCAP daemon.info hostapd: wlan0: DRIVER madwifi_set_sta_authorized: Failed to unauthorize STA 80:6a:b0:b3:1f:e3
Sep 19 08:00:57 WorOLCAP daemon.info hostapd: wlan0: DRIVER madwifi_set_sta_authstats: Failed to unauthorize STA authstats80:6a:b0:b3:1f:e3
Sep 19 08:00:57 WorOLCAP daemon.info hostapd: wlan0: STA 00:0a:00:5f:2c:35 WPA: pairwise key handshake completed (RSN)
Sep 19 08:00:58 WorOLCAP daemon.info dnsmasq[314]: DHCPREQUEST(br1) 192.168.40.173 00:0a:00:5f:2c:35 
Sep 19 08:00:58 WorOLCAP daemon.info dnsmasq[314]: DHCPACK(br1) 192.168.40.173 00:0a:00:5f:2c:35 android-855e86a21047b6f3
Sep 19 08:00:58 WorOLCAP daemon.info dnsmasq[314]: DHCPREQUEST(br1) 192.168.40.62 1c:cb:99:93:49:e5 
Sep 19 08:00:58 WorOLCAP daemon.info dnsmasq[314]: DHCPACK(br1) 192.168.40.62 1c:cb:99:93:49:e5 android-a8389fedfb888977
Sep 19 08:00:59 WorOLCAP daemon.info hostapd: wlan0: STA 1c:7b:23:b1:27:76 IEEE 802.11: associated
Sep 19 08:00:59 WorOLCAP daemon.info hostapd: wlan0: STA 1c:7b:23:b1:27:76 WPA: pairwise key handshake completed (RSN)
Sep 19 08:00:59 WorOLCAP daemon.info hostapd: wlan0: STA 74:5c:9f:8b:73:d8 IEEE 802.11: associated
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: STA 74:5c:9f:8b:73:d8 IEEE 802.11: disassociated
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: STA 74:5c:9f:8b:73:d8 IEEE 802.11:  reason code= 7
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: STA 74:5c:9f:8b:73:d8 IEEE 802.11: unknown reason code= 7
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: DRIVER madwifi_del_key: Failed to delete key (addr 74:5c:9f:8b:73:d8 key_idx 0)
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: DRIVER madwifi_del_key: Failed to delete key (addr 74:5c:9f:8b:73:d8 key_idx 0)
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: DRIVER madwifi_set_sta_authorized: Failed to unauthorize STA 74:5c:9f:8b:73:d8
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: DRIVER madwifi_set_sta_authstats: Failed to unauthorize STA authstats74:5c:9f:8b:73:d8
Sep 19 08:01:00 WorOLCAP daemon.info dnsmasq[314]: DHCPREQUEST(br1) 192.168.40.85 1c:7b:23:b1:27:76 
Sep 19 08:01:00 WorOLCAP daemon.info dnsmasq[314]: DHCPACK(br1) 192.168.40.85 1c:7b:23:b1:27:76 android-7a250b68aadfcd77
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: STA bc:20:10:6e:00:1e IEEE 802.11: associated
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: STA bc:20:10:6e:00:1e WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:00 WorOLCAP daemon.info dnsmasq[314]: DHCPREQUEST(br1) 192.168.40.40 bc:20:10:6e:00:1e 
Sep 19 08:01:00 WorOLCAP daemon.info dnsmasq[314]: DHCPACK(br1) 192.168.40.40 bc:20:10:6e:00:1e android-59c4a712696009ca
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: STA a4:51:6f:e4:11:b8 IEEE 802.11: associated
Sep 19 08:01:00 WorOLCAP daemon.info hostapd: wlan0: STA a4:51:6f:e4:11:b8 WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:00 WorOLCAP daemon.info dnsmasq[314]: DHCPREQUEST(br1) 192.168.40.45 a4:51:6f:e4:11:b8 
Sep 19 08:01:00 WorOLCAP daemon.info dnsmasq[314]: DHCPACK(br1) 192.168.40.45 a4:51:6f:e4:11:b8 Windows-Phone
Sep 19 08:01:01 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:7996 k->rsc[1]:7998
Sep 19 08:01:01 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:7999 k->rsc[1]:8000
Sep 19 08:01:01 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8014 k->rsc[1]:8015
Sep 19 08:01:02 WorOLCAP daemon.info hostapd: wlan0: STA e4:f8:ef:2b:36:15 IEEE 802.11: associated
Sep 19 08:01:02 WorOLCAP daemon.info hostapd: wlan0: STA e4:f8:ef:2b:36:15 WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:02 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8029 k->rsc[1]:8030
Sep 19 08:01:02 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8056 k->rsc[1]:8057
Sep 19 08:01:02 WorOLCAP daemon.info hostapd: wlan0: STA 1c:7b:23:2b:97:e6 IEEE 802.11: associated
Sep 19 08:01:02 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8065 k->rsc[1]:8068
Sep 19 08:01:02 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8066 k->rsc[1]:8068
Sep 19 08:01:02 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8067 k->rsc[1]:8068
Sep 19 08:01:02 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8062 k->rsc[1]:8068
Sep 19 08:01:02 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8063 k->rsc[1]:8068
Sep 19 08:01:02 WorOLCAP daemon.info hostapd: wlan0: STA a0:4c:5b:64:e0:62 IEEE 802.11: disassociated
Sep 19 08:01:02 WorOLCAP daemon.info hostapd: wlan0: STA a0:4c:5b:64:e0:62 IEEE 802.11:  reason code= 4
Sep 19 08:01:02 WorOLCAP daemon.info hostapd: wlan0: DRIVER madwifi_del_key: Failed to delete key (addr a0:4c:5b:64:e0:62 key_idx 0)
Sep 19 08:01:02 WorOLCAP daemon.info hostapd: wlan0: DRIVER madwifi_del_key: Failed to delete key (addr a0:4c:5b:64:e0:62 key_idx 0)
Sep 19 08:01:02 WorOLCAP daemon.info hostapd: wlan0: DRIVER madwifi_set_sta_authorized: Failed to unauthorize STA a0:4c:5b:64:e0:62
Sep 19 08:01:02 WorOLCAP daemon.info hostapd: wlan0: DRIVER madwifi_set_sta_authstats: Failed to unauthorize STA authstatsa0:4c:5b:64:e0:62
Sep 19 08:01:02 WorOLCAP daemon.info dnsmasq[314]: DHCPREQUEST(br1) 192.168.40.70 e4:f8:ef:2b:36:15 
Sep 19 08:01:02 WorOLCAP daemon.info dnsmasq[314]: DHCPACK(br1) 192.168.40.70 e4:f8:ef:2b:36:15 android-a4e622485f047565
Sep 19 08:01:03 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=106 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=dc:cf:96:8a:74:d4) (pkt-rsc:4853 k->rsc[1]:4869
Sep 19 08:01:03 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=106 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=dc:cf:96:8a:74:d4) (pkt-rsc:4854 k->rsc[1]:4869
Sep 19 08:01:03 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=106 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=dc:cf:96:8a:74:d4) (pkt-rsc:4855 k->rsc[1]:4869
Sep 19 08:01:03 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=106 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=dc:cf:96:8a:74:d4) (pkt-rsc:4856 k->rsc[1]:4869
Sep 19 08:01:03 WorOLCAP daemon.info hostapd: wlan0: STA 1c:7b:23:2b:97:e6 WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:03 WorOLCAP daemon.info hostapd: wlan0: STA 94:d8:59:9a:12:d8 IEEE 802.11: associated
Sep 19 08:01:04 WorOLCAP daemon.info hostapd: wlan0: STA b0:a2:e7:4b:6a:73 IEEE 802.11: associated
Sep 19 08:01:04 WorOLCAP user.warn kernel: NF Channel 2442 Chain 0  measured latest ctl:-113 ext:-50  capped median ctl:-113 ext:-55
Sep 19 08:01:04 WorOLCAP user.warn kernel: NF Channel 2442 Chain 1  measured latest ctl:-113 ext:-50  capped median ctl:-113 ext:-55
Sep 19 08:01:04 WorOLCAP user.warn kernel: NF Channel 2442 Chain 2  measured latest ctl:-109 ext:-50  capped median ctl:-109 ext:-55
Sep 19 08:01:04 WorOLCAP user.warn kernel: wifi0: 32599 : stuck beacon (missed 3) scanning 0, syncbeacon 0, sc_beacons 1,sc_isCaldone: 1
Sep 19 08:01:04 WorOLCAP daemon.info hostapd: wlan0: STA 94:d8:59:9a:12:d8 WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:04 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8136 k->rsc[1]:8137
Sep 19 08:01:05 WorOLCAP daemon.info dnsmasq[314]: DHCPREQUEST(br1) 192.168.40.145 94:d8:59:9a:12:d8 
Sep 19 08:01:05 WorOLCAP daemon.info dnsmasq[314]: DHCPACK(br1) 192.168.40.145 94:d8:59:9a:12:d8 android-58608438c279330
Sep 19 08:01:06 WorOLCAP daemon.info hostapd: wlan0: STA b0:a2:e7:13:d7:e7 IEEE 802.11: associated
Sep 19 08:01:06 WorOLCAP daemon.info hostapd: wlan0: STA b0:a2:e7:13:d7:e7 WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:06 WorOLCAP daemon.info hostapd: wlan0: STA 50:68:0a:43:bb:bd IEEE 802.11: associated
Sep 19 08:01:06 WorOLCAP daemon.info dnsmasq[314]: DHCPDISCOVER(br1) b0:a2:e7:13:d7:e7 
Sep 19 08:01:06 WorOLCAP daemon.info dnsmasq[314]: DHCPOFFER(br1) 192.168.40.87 b0:a2:e7:13:d7:e7 
Sep 19 08:01:06 WorOLCAP daemon.info dnsmasq[314]: DHCPREQUEST(br1) 192.168.40.87 b0:a2:e7:13:d7:e7 
Sep 19 08:01:06 WorOLCAP daemon.info dnsmasq[314]: DHCPACK(br1) 192.168.40.87 b0:a2:e7:13:d7:e7 android-1b1d8285e4bf480c
Sep 19 08:01:06 WorOLCAP daemon.info hostapd: wlan0: STA 50:68:0a:43:bb:bd WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:07 WorOLCAP daemon.info hostapd: wlan0: STA b0:a2:e7:4b:6a:73 WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:07 WorOLCAP daemon.info dnsmasq[314]: DHCPREQUEST(br1) 192.168.40.211 50:68:0a:43:bb:bd 
Sep 19 08:01:07 WorOLCAP daemon.info dnsmasq[314]: DHCPACK(br1) 192.168.40.211 50:68:0a:43:bb:bd HUAWEI_P8_lite
Sep 19 08:01:07 WorOLCAP daemon.info hostapd: wlan0: STA a8:a1:98:6f:7c:3b IEEE 802.11: associated
Sep 19 08:01:08 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8294 k->rsc[1]:8295
Sep 19 08:01:08 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8299 k->rsc[1]:8300
Sep 19 08:01:08 WorOLCAP daemon.info dnsmasq[314]: DHCPDISCOVER(br1) 1c:7b:23:2b:97:e6 
Sep 19 08:01:08 WorOLCAP daemon.info dnsmasq[314]: DHCPOFFER(br1) 192.168.40.46 1c:7b:23:2b:97:e6 
Sep 19 08:01:09 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8319 k->rsc[1]:8320
Sep 19 08:01:09 WorOLCAP daemon.info dnsmasq[314]: DHCPREQUEST(br1) 192.168.40.46 1c:7b:23:2b:97:e6 
Sep 19 08:01:09 WorOLCAP daemon.info dnsmasq[314]: DHCPACK(br1) 192.168.40.46 1c:7b:23:2b:97:e6 android-9119cad7ed926548
Sep 19 08:01:10 WorOLCAP daemon.info hostapd: wlan0: STA 30:0d:43:04:28:78 IEEE 802.11: associated
Sep 19 08:01:10 WorOLCAP daemon.info hostapd: wlan0: STA 30:0d:43:04:28:78 WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:11 WorOLCAP daemon.info hostapd: wlan0: STA 80:6a:b0:b3:1f:e3 IEEE 802.11: associated
Sep 19 08:01:11 WorOLCAP daemon.info hostapd: wlan0: STA 80:6a:b0:b3:1f:e3 WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:11 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8415 k->rsc[1]:8418
Sep 19 08:01:11 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8416 k->rsc[1]:8418
Sep 19 08:01:11 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8417 k->rsc[1]:8418
Sep 19 08:01:11 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8422 k->rsc[1]:8424
Sep 19 08:01:11 WorOLCAP daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=69 unicast RA:addr=f0:3e:90:3a:78:28 TA:addr=f0:c8:50:6d:c3:26) (pkt-rsc:8423 k->rsc[1]:8424
Sep 19 08:01:12 WorOLCAP daemon.info hostapd: wlan0: STA b0:a2:e7:fd:ef:a4 IEEE 802.11: associated
Sep 19 08:01:12 WorOLCAP daemon.info hostapd: wlan0: STA b0:a2:e7:fd:ef:a4 WPA: pairwise key handshake completed (RSN)
Sep 19 08:01:13 WorOLCAP daemon.info hostapd: wlan0: STA b0:a2:e7:b7:b2:2b IEEE 802.11: associated
4 REPLIES 4

jack_cumerlato
New Contributor
Is standalone AP?

Yes, I have it setup as a standalone AP.  I flashed the AP with the standalone version of the Ruckus firmware.

michael_brado
Esteemed Contributor II
Hello Alexander,

   What sticks out in your log snips - Stuck Beacons, interference so intense that the

AP cannot read/send information. 

Sep 18 07:15:00 WorOLCAP user.warn kernel: NF Channel 2462 Chain 0  measured latest ctl:-113 ext:-50  capped median ctl:-113 ext:-55Sep 18 07:15:00 WorOLCAP user.warn kernel: NF Channel 2462 Chain 1  measured latest ctl:-112 ext:-50  capped median ctl:-112 ext:-55Sep 18 07:15:00 WorOLCAP user.warn kernel: NF Channel 2462 Chain 2  measured latest ctl:-110 ext:-50  capped median ctl:-110 ext:-55Sep 18 07:15:00 WorOLCAP user.warn kernel: wifi0: 1585329 : stuck beacon (missed 3) scanning 0, syncbeacon 0, sc_beacons 1,sc_isCaldone: 1
Sep 18 07:15:05 WorOLCAP user.warn kernel: NF Channel 2462 Chain 0  measured latest ctl:-113 ext:-50  capped median ctl:-113 ext:-55Sep 18 07:15:05 WorOLCAP user.warn kernel: NF Channel 2462 Chain 1  measured latest ctl:-112 ext:-50  capped median ctl:-112 ext:-55Sep 18 07:15:05 WorOLCAP user.warn kernel: NF Channel 2462 Chain 2  measured latest ctl:-110 ext:-50  capped median ctl:-110 ext:-55Sep 18 07:15:05 WorOLCAP user.warn kernel: wifi0: 1590482 : stuck beacon (missed 3) scanning 0, syncbeacon 0, sc_beacons 1,sc_isCaldone: 1
Sep 18 07:15:08 WorOLCAP user.warn kernel: NF Channel 2462 Chain 0  measured latest ctl:-112 ext:-50  capped median ctl:-113 ext:-55Sep 18 07:15:08 WorOLCAP user.warn kernel: NF Channel 2462 Chain 1  measured latest ctl:-112 ext:-50  capped median ctl:-112 ext:-55Sep 18 07:15:08 WorOLCAP user.warn kernel: NF Channel 2462 Chain 2  measured latest ctl:-110 ext:-50  capped median ctl:-110 ext:-55Sep 18 07:15:08 WorOLCAP user.warn kernel: wifi0: 1592665 : stuck beacon (missed 3) scanning 0, syncbeacon 0, sc_beacons 1,sc_isCaldone: 1
Sep 18 07:15:43 WorOLCAP user.warn kernel: NF Channel 2462 Chain 0  measured latest ctl:-113 ext:-50  capped median ctl:-113 ext:-55Sep 18 07:15:43 WorOLCAP user.warn kernel: NF Channel 2462 Chain 1  measured latest ctl:-113 ext:-50  capped median ctl:-112 ext:-55Sep 18 07:15:43 WorOLCAP user.warn kernel: NF Channel 2462 Chain 2  measured latest ctl:-110 ext:-50  capped median ctl:-110 ext:-55Sep 18 07:15:43 WorOLCAP user.warn kernel: wifi0: 1628129 : stuck beacon (missed 3) scanning 0, syncbeacon 0, sc_beacons 1,sc_isCaldone: 1Sep 18 07:15:45 WorOLCAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 11 to channel 9
   At least I see you employ ChannelFly over SmartSelect or static assigned channel,

but you seem to have your AP too near to some strong RF interferor, is my interpretation.








alexander_brown
New Contributor II
Now that you mention the RF interference it made me think.  On the next level of this building with this AP there is a Cisco AP from the university.  Could that be enough cause for this to happen?