This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos AP55C RX Errors

Hello Community Members.

I've got an issue with an AP55C.

I buyed it in August 2016 and its configured on a Sophos UTM Home (9.407-3). I've also two AP30 Access points and i detected on the Switchport wheres the AP55C connected many RX Errors. The Switch is a Dlink DGS1100-16. On the Switchports of the AP30 Accesspoints are no RX or TX Errors. The Cable from patchpanel to the socket is measured and ok (cat7a). I switched and connected for one week an AP30 on the socket of the AP55C, resetted the RX Errors on the switchport and there were no more rx errors. So i thougt (because the Cable from patchpanel to socket, the patchkabels (used the same) on booth sides, and the used same POE Adapater (poe+) was ok) the issue is a hardwareproblem on the AP55c (REV1). I returned the AP55C to sophos and got a new replacement (in the time between the replacement i used an ap30 on this position and there were no RX problems).

So now i got the replacement and connected it again. after 3 Days usage the RX Errors occured again. Is it also corrupt? I have namely issues with my wirelessclients which are connected to this Accesspoint. Timeouts for 5-6 Seconds. Sometimes it works after seconds again, but sometimes i have to turn off and turn on wireless on the clients.

Any Ideas? We have many AP55 on our customers, but no AP55C, so i cant retrace the issue on a accesspoint of our customers

PS: i also changed the switchport. Same errors.



This thread was automatically locked due to age.
Parents
  • Hi,

    thanks for reporting this and the error isolation.

    AP30 and AP55C differ both in ethernet hardware as well as connection speed. AP30 runs with 100MBit/s while AP55C can to 1GBit/s and thereby is more affected by cable length or connection issues.

    Do I understand your setup correctly? switch -> cable -> Poe+ injector -> cable -> patch panel -> cable -> network socket -> cable -> AP ?

    Can you tell the appr. length of the ethernet cable ( <10m, <50m, <75m , <100m ) of each segment as well as the type of PoE+ adapter + switch model?

    Furthermore, can you please try whether limiting the speed to 100 MBit/s on your switch port mitigates the problem?

    It would be great if you can send me any AP logs - either as private message or over support. 

     

    Kind regards,

     

    Dirk Bolte

  • Hi Dirk,

    thanks for the fast reply.

    Do I understand your setup correctly? switch -> cable -> Poe+ injector -> cable -> patch panel -> cable -> network socket -> cable -> AP ?
    Yes absolute Correct

    Can you tell the appr. length of the ethernet cable ( <10m, <50m, <75m , <100m ) of each segment as well as the type of PoE+ adapter + switch model?
    Ethernet Cable Length from Patchpanel to Networksocket: 12m, every other Patchcable (from switch to poe adapter, from poe adapter to patchpanel, from networksocket to accesspoint). Switchmodel: DLINK DGS1100-16, POE-Adapter: PowerDsine 9001GR

    It would be great if you can send me any AP logs - either as private message or over support. 
    i added the logfile awed from today 22:40+ because i installed the latest firmware 9.408. on this moment i reseted the RX Counter on the Switch. In this 50minutes i got 2 RX errors on the switchport

    2016:11:13-22:39:04 astaro awed[4890]: [MASTER] access point firmware available: AP15C:axg9400_wifi-cb61259-4d51006 AP10:axg9400_wifi-745ce15-4d51006 AP55C:axg9400_wifi-cb61259-4d51006 RED15w:1 AP5:1 AP30:axg9400_wifi-745ce15-4d51006 AP100C:axg9400_wifi-cb61259-4d51006 AP100X:axg9400_wifi-cb61259-4d51006 AP50:axg9400_wifi-745ce15-4d51006 AP55:axg9400_wifi-cb61259-4d51006 AP15:axg9400_wifi-cb61259-4d51006 AP100:axg9400_wifi-cb61259-4d51006
    2016:11:13-22:39:04 astaro awed[4890]: [MASTER] access point firmware available: AP15C:axg9400_wifi-cb61259-4d51006 AP10:axg9400_wifi-745ce15-4d51006 AP55C:axg9400_wifi-cb61259-4d51006 RED15w:1 AP5:1 AP30:axg9400_wifi-745ce15-4d51006 AP100C:axg9400_wifi-cb61259-4d51006 AP100X:axg9400_wifi-cb61259-4d51006 AP50:axg9400_wifi-745ce15-4d51006 AP55:axg9400_wifi-cb61259-4d51006 AP15:axg9400_wifi-cb61259-4d51006 AP100:axg9400_wifi-cb61259-4d51006
    2016:11:13-22:39:04 astaro awed[4890]: [MASTER] access point firmware available: AP15C:axg9400_wifi-cb61259-4d51006 AP10:axg9400_wifi-745ce15-4d51006 AP55C:axg9400_wifi-cb61259-4d51006 RED15w:1 AP5:1 AP30:axg9400_wifi-745ce15-4d51006 AP100C:axg9400_wifi-cb61259-4d51006 AP100X:axg9400_wifi-cb61259-4d51006 AP50:axg9400_wifi-745ce15-4d51006 AP55:axg9400_wifi-cb61259-4d51006 AP15:axg9400_wifi-cb61259-4d51006 AP100:axg9400_wifi-cb61259-4d51006
    2016:11:13-22:40:28 192.168.39.177 awelogger[22259]: id="4105" severity="info" sys="System" sub="WiFi" name="STA WPA failure" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" reason_code="2"
    2016:11:13-22:40:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: authenticated
    2016:11:13-22:40:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: associated (aid 1)
    2016:11:13-22:40:28 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-22:40:28 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-22:40:29 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f WPA: pairwise key handshake completed (RSN)
    2016:11:13-22:40:29 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-22:40:43 A4003CA22CCE4D1 hostapd: wlan1: STA 24:05:0f:34:3e:d5 WPA: group key handshake completed (RSN)
    2016:11:13-22:40:43 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba WPA: group key handshake completed (RSN)
    2016:11:13-22:40:43 A4003CA22CCE4D1 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: group key handshake completed (RSN)
    2016:11:13-22:40:43 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a WPA: group key handshake completed (RSN)
    2016:11:13-22:40:44 A4003CA22CCE4D1 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: group key handshake completed (RSN)
    2016:11:13-22:40:44 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: group key handshake completed (RSN)
    2016:11:13-22:42:31 astaro awed[4890]: [MASTER] start processing configuration change
    2016:11:13-22:42:32 astaro awed[4890]: [MASTER] end processing configuration change
    2016:11:13-22:47:37 astaro awed[4915]: [MASTER] new connection from 192.168.39.177:53204<30>Nov 13 22:47:37 awed[6518]: [A40012A346B2CBF] AP30 from 192.168.39.177:53204 identified as A40012A346B2CBF
    2016:11:13-22:47:37 astaro awed[6518]: [A40012A346B2CBF] (Re-)loaded identity and/or configuration
    2016:11:13-22:47:37 192.168.39.177 aweclient[715]: Cloudclient not found on ubus.
    2016:11:13-22:47:39 A4003CA22CCE4D1 aweclient[1037]: aweclient.c (2367) Max connection fail reached (20), rebooting
    2016:11:13-22:47:39 A4003CA22CCE4D1 procd: - shutdown -
    2016:11:13-22:47:39 A4003CA22CCE4D1 procd: 
    2016:11:13-22:47:39 A4003CA22CCE4D1 procd: 
    2016:11:13-22:47:39 A4003CA22CCE4D1 procd: Command failed: Not found
    2016:11:13-22:47:42 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 IEEE 802.11: authenticated
    2016:11:13-22:47:42 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 IEEE 802.11: associated (aid 1)
    2016:11:13-22:47:42 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: pairwise key handshake completed (RSN)
    2016:11:13-22:47:42 192.168.39.177 awelogger[22263]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1-Secure" ssid_id="WLAN2.0" bssid="00:1a:8c:2e:6d:c2" sta="00:7e:56:0b:cd:d8" status_code="0"
    2016:11:13-22:47:42 192.168.39.177 awelogger[22263]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1-Secure" ssid_id="WLAN2.0" bssid="00:1a:8c:2e:6d:c2" sta="00:7e:56:0b:cd:d8" status_code="0"
    2016:11:13-22:47:42 192.168.39.177 awelogger[22263]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1-Secure" ssid_id="WLAN2.0" bssid="00:1a:8c:2e:6d:c2" sta="00:7e:56:0b:cd:d8"
    2016:11:13-22:47:43 192.168.39.177 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 IEEE 802.11: authenticated
    2016:11:13-22:47:43 192.168.39.177 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 IEEE 802.11: associated (aid 2)
    2016:11:13-22:47:43 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="8c:bf:a6:70:d8:b7" status_code="0"
    2016:11:13-22:47:43 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="8c:bf:a6:70:d8:b7" status_code="0"
    2016:11:13-22:47:44 192.168.39.177 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: pairwise key handshake completed (RSN)
    2016:11:13-22:47:44 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="8c:bf:a6:70:d8:b7"
    2016:11:13-22:47:52 192.168.39.177 aweclient[715]: aweclient.c (2048) No reply get from last message, close socket.
    2016:11:13-22:47:52 astaro awed[4915]: [MASTER] new connection from 192.168.39.177:53205
    2016:11:13-22:47:52 astaro awed[6518]: [A40012A346B2CBF] ll_read: short read or connection error: 
    2016:11:13-22:47:52 astaro awed[6518]: [A40012A346B2CBF] disconnected. Close socket and kill process.
    2016:11:13-22:47:53 astaro awed[6610]: [A40012A346B2CBF] AP30 from 192.168.39.177:53205 identified as A40012A346B2CBF
    2016:11:13-22:47:53 astaro awed[6610]: [A40012A346B2CBF] (Re-)loaded identity and/or configuration
    2016:11:13-22:47:52 192.168.39.177 aweclient[715]: aweclient.c (2458) Exit from main loop with no error. Get new configuration.
    2016:11:13-22:47:53 192.168.39.177 aweclient[715]: Cloudclient not found on ubus.
    2016:11:13-22:49:44 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a IEEE 802.11: authenticated
    2016:11:13-22:49:44 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a IEEE 802.11: associated (aid 3)
    2016:11:13-22:49:44 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: pairwise key handshake completed (RSN)
    2016:11:13-22:49:44 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="f8:a9:d0:63:f9:3a" status_code="0"
    2016:11:13-22:49:44 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="f8:a9:d0:63:f9:3a" status_code="0"
    2016:11:13-22:49:44 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="f8:a9:d0:63:f9:3a"
    2016:11:13-22:50:24 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: group key handshake completed (RSN)
    2016:11:13-22:50:24 192.168.39.177 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: group key handshake completed (RSN)
    2016:11:13-22:50:24 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: group key handshake completed (RSN)
    2016:11:13-22:50:27 192.168.39.177 awelogger[22259]: id="4105" severity="info" sys="System" sub="WiFi" name="STA WPA failure" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" reason_code="2"
    2016:11:13-22:50:27 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-22:50:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: authenticated
    2016:11:13-22:50:27 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-22:50:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: associated (aid 1)
    2016:11:13-22:50:27 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-22:50:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f WPA: pairwise key handshake completed (RSN)
    2016:11:13-22:50:28 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-22:53:46 astaro awed[4915]: [MASTER] new connection from 192.168.39.167:39822
    2016:11:13-22:53:46 astaro awed[8549]: [A4003CA22CCE4D1] AP55C from 192.168.39.167:39822 identified as A4003CA22CCE4D1
    2016:11:13-22:53:46 astaro awed[8549]: [A4003CA22CCE4D1] (Re-)loaded identity and/or configuration
    2017:09:20-09:04:05 A4003CA22CCE4D1 netifd: Interface 'vxlan' is enabled
    2017:09:20-09:04:05 A4003CA22CCE4D1 netifd: VLAN 'vxlan.101' link is up
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.480000] device vxlan.101 entered promiscuous mode
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.490000] device vxlan entered promiscuous mode
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.510000] br-vxlan101: port 1(vxlan.101) entered forwarding state
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.510000] br-vxlan101: port 1(vxlan.101) entered forwarding state
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan101' is enabled
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: VLAN 'vxlan.102' link is up
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.540000] device vxlan.102 entered promiscuous mode
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.570000] br-vxlan102: port 1(vxlan.102) entered forwarding state
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.570000] br-vxlan102: port 1(vxlan.102) entered forwarding state
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan102' is enabled
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Bridge 'br-vxlan101' link is up
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan101' has link connectivity 
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan101' is setting up now
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan101' is now up
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Bridge 'br-vxlan102' link is up
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan102' has link connectivity 
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan102' is setting up now
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan102' is now up
    2017:09:20-09:04:06 A4003CA22CCE4D1 aweclient[1036]: aweclient.c (1817) A signal received during select.
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): Configuration file: /var/run/hostapd-phy2.conf
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): eapol_version=1
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Supported cipher 00-0f-ac:1
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Supported cipher 00-0f-ac:5
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Supported cipher 00-0f-ac:2
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Supported cipher 00-0f-ac:4
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Supported cipher 00-0f-ac:6
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Using driver-based off-channel TX
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: interface wlan8 in phy phy2
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Set mode ifindex 11 iftype 3 (AP)
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Setup AP(wlan8) - device_ap_sme=0 use_monitor=0
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Subscribe to mgmt frames with AP handle 0xb2a2d8
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 kernel: [   47.120000] ath10k_pci 0000:00:00.0: otp stream is empty, using board.bin contents
    2017:09:20-09:04:08 A4003CA22CCE4D1 kernel: [   47.510000] br-vxlan101: port 1(vxlan.101) entered forwarding state
    2017:09:20-09:04:08 A4003CA22CCE4D1 kernel: [   47.570000] br-vxlan102: port 1(vxlan.102) entered forwarding state
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Add own interface ifindex 7
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: if_indices[16]: 7
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Add own interface ifindex 11
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: if_indices[16]: 7 11
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Adding interface wlan8 into bridge br-vxlan101
    2017:09:20-09:04:08 A4003CA22CCE4D1 kernel: [   48.220000] device wlan8 entered promiscuous mode
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): phy: phy2
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): wlan8: interface state UNINITIALIZED->COUNTRY_UPDATE
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Previous country code AT, new country code AT 
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Regulatory information - country=AT (DFS-ETSI)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: 2402-2482 @ 40 MHz 20 mBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: 5170-5250 @ 80 MHz 20 mBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: 57000-66000 @ 2160 MHz 40 mBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=20 dBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=20 dBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=20 dBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=20 dBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=52 freq=5260 MHz max_tx_power=20 dBm (DFS state = usable)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=56 freq=5280 MHz max_tx_power=20 dBm (DFS state = usable)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=60 freq=5300 MHz max_tx_power=20 dBm (DFS state = usable)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=64 freq=5320 MHz max_tx_power=20 dBm (DFS state = usable)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=100 freq=5500 MHz max_tx_power=27 dBm (DFS state = usable)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=104 freq=5520 MHz max_tx_power=27 dBm (DFS state = usable)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Configuration file: /var/run/hostapd-phy3.conf
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): eapol_version=1
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): eapol_version=1
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): eapol_version=1
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: TDLS supported
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: TDLS external setup
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Supported cipher 00-0f-ac:1
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Supported cipher 00-0f-ac:5
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Supported cipher 00-0f-ac:2
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Supported cipher 00-0f-ac:4
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Supported cipher 00-0f-ac:6
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Using driver-based off-channel TX
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Use separate P2P group interface (driver advertised support)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: interface wlan0 in phy phy3
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Set mode ifindex 12 iftype 3 (AP)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Setup AP(wlan0) - device_ap_sme=0 use_monitor=0
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Subscribe to mgmt frames with AP handle 0x881530
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Add own interface ifindex 5
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: if_indices[16]: 5
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Add own interface ifindex 7
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: if_indices[16]: 5 7
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Add own interface ifindex 9
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: if_indices[16]: 5 7 9
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Add own interface ifindex 12
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: if_indices[16]: 5 7 9 12
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Adding interface wlan0 into bridge br-lan
    2017:09:20-09:04:09 A4003CA22CCE4D1 kernel: [   48.670000] device wlan0 entered promiscuous mode
    2017:09:20-09:04:09 A4003CA22CCE4D1 kernel: [   48.670000] br-lan: port 2(wlan0) entered forwarding state
    2017:09:20-09:04:09 A4003CA22CCE4D1 kernel: [   48.680000] br-lan: port 2(wlan0) entered forwarding state
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): phy: phy3
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): BSS count 3, BSSID mask 00:00:00:00:00:07 (2 bits)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Using existing control interface directory.
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Using existing control interface directory.
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Using existing control interface directory.
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Previous country code AT, new country code AT 
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Regulatory information - country=AT (DFS-ETSI)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: 2402-2482 @ 40 MHz 20 mBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=12 freq=2467 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=13 freq=2472 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Channel 14 (2484)is disabled!!
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=12 freq=2467 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=13 freq=2472 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Channel 14 (2484)is disabled!!
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): ACS: Automatic channel selection started, this may take a bit
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): ACS: skipping channel 14 (2484)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): ACS: Scanning 1 / 5
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): wlan0: nl80211: scan request
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2412 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2417 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2422 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2427 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2432 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2437 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2442 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2447 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2452 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2457 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2462 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2467 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2472 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Scan requested (ret=0) - scan timeout 10 seconds
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): wlan0: interface state COUNTRY_UPDATE->ACS
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): wlan0: ACS-STARTED 
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Interface initialization will be completed in a callback (ACS)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): ctrl_iface not configured!
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): command failed: No such device (-19)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): command failed: No such device (-19)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: lan (1082): Performing a DHCP renew
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: lan (1082): Sending renew...
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: lan (1082): Lease of 192.168.39.167 obtained, lease time 65049
    2017:09:20-09:04:09 A4003CA22CCE4D1 kernel: [   49.200000] br-lan: port 2(wlan0) entered disabled state
    2017:09:20-09:04:16 A4003CA22CCE4D1 kernel: [   56.330000] br-lan: port 2(wlan0) entered forwarding state
    2017:09:20-09:04:16 A4003CA22CCE4D1 kernel: [   56.340000] br-lan: port 2(wlan0) entered forwarding state
    2017:09:20-09:04:16 A4003CA22CCE4D1 netifd: Network device 'wlan0' link is up
    2017:09:20-09:04:16 A4003CA22CCE4D1 kernel: [   56.370000] device wlan1 entered promiscuous mode
    2017:09:20-09:04:16 A4003CA22CCE4D1 kernel: [   56.370000] br-vxlan101: port 3(wlan1) entered forwarding state
    2017:09:20-09:04:16 A4003CA22CCE4D1 kernel: [   56.380000] br-vxlan101: port 3(wlan1) entered forwarding state
    2017:09:20-09:04:17 A4003CA22CCE4D1 netifd: Network device 'wlan1' link is up
    2017:09:20-09:04:17 A4003CA22CCE4D1 kernel: [   56.730000] device wlan2 entered promiscuous mode
    2017:09:20-09:04:17 A4003CA22CCE4D1 kernel: [   56.730000] br-vxlan102: port 2(wlan2) entered forwarding state
    2017:09:20-09:04:17 A4003CA22CCE4D1 kernel: [   56.740000] br-vxlan102: port 2(wlan2) entered forwarding state
    2017:09:20-09:04:17 A4003CA22CCE4D1 netifd: Network device 'wlan2' link is up
    2017:09:20-09:04:17 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a IEEE 802.11: authenticated
    2017:09:20-09:04:17 A4003CA22CCE4D1 awelogger[1924]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:22:44:0a" status_code="0"
    2017:09:20-09:04:17 A4003CA22CCE4D1 awelogger[1924]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:22:44:0a" status_code="0"
    2017:09:20-09:04:17 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a IEEE 802.11: associated (aid 1)
    2017:09:20-09:04:18 A4003CA22CCE4D1 awelogger[1924]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:22:44:0a"
    2017:09:20-09:04:18 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a WPA: pairwise key handshake completed (RSN)
    2017:09:20-09:04:18 A4003CA22CCE4D1 kernel: [   57.920000] random: nonblocking pool is initialized
    2016:11:13-22:54:02 A4003CA22CCE4D1 kernel: [   58.340000] br-lan: port 2(wlan0) entered forwarding state
    2016:11:13-22:54:02 A4003CA22CCE4D1 kernel: [   58.380000] br-vxlan101: port 3(wlan1) entered forwarding state
    2016:11:13-22:54:02 A4003CA22CCE4D1 kernel: [   58.740000] br-vxlan102: port 2(wlan2) entered forwarding state
    2016:11:13-22:54:04 A4003CA22CCE4D1 netifd: Network device 'wlan8' link is up
    2016:11:13-22:54:04 A4003CA22CCE4D1 kernel: [   60.890000] br-vxlan101: port 2(wlan8) entered forwarding state
    2016:11:13-22:54:04 A4003CA22CCE4D1 kernel: [   60.900000] br-vxlan101: port 2(wlan8) entered forwarding state
    2016:11:13-22:54:05 A4003CA22CCE4D1 awelogger[1924]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="8c:bf:a6:70:d8:b7" status_code="0"
    2016:11:13-22:54:05 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 IEEE 802.11: authenticated
    2016:11:13-22:54:05 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 IEEE 802.11: associated (aid 2)
    2016:11:13-22:54:05 A4003CA22CCE4D1 awelogger[1924]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="8c:bf:a6:70:d8:b7" status_code="0"
    2016:11:13-22:54:05 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: pairwise key handshake completed (RSN)
    2016:11:13-22:54:05 A4003CA22CCE4D1 awelogger[1924]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="8c:bf:a6:70:d8:b7"
    2016:11:13-22:54:07 astaro awed[4915]: [MASTER] updating confd object for AP A4003CA22CCE4D1 with new channels (6,36 -> 6)
    2016:11:13-22:54:06 A4003CA22CCE4D1 kernel: [   62.900000] br-vxlan101: port 2(wlan8) entered forwarding state
    2016:11:13-22:54:06 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba IEEE 802.11: authenticated
    2016:11:13-22:54:06 A4003CA22CCE4D1 awelogger[1924]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:28:47:ba" status_code="0"
    2016:11:13-22:54:06 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba IEEE 802.11: associated (aid 3)
    2016:11:13-22:54:06 A4003CA22CCE4D1 awelogger[1924]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:28:47:ba" status_code="0"
    2016:11:13-22:54:07 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba WPA: pairwise key handshake completed (RSN)
    2016:11:13-22:54:07 A4003CA22CCE4D1 awelogger[1924]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:28:47:ba"
    2016:11:13-22:54:08 astaro awed[4915]: [MASTER] start processing configuration change
    2016:11:13-22:54:10 astaro awed[4915]: [MASTER] end processing configuration change
    2016:11:13-22:54:17 astaro awed[4915]: [MASTER] updating confd object for AP A4003CA22CCE4D1 with new channels (6 -> 6,36)
    2016:11:13-22:54:19 astaro awed[4915]: [MASTER] start processing configuration change
    2016:11:13-22:54:19 astaro awed[4915]: [MASTER] end processing configuration change
    2016:11:13-22:55:01 192.168.39.177 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 IEEE 802.11: disconnected due to excessive missing ACKs
    2016:11:13-22:55:01 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="8c:bf:a6:70:d8:b7"
    2016:11:13-22:55:30 192.168.39.177 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
    2016:11:13-23:00:23 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: group key handshake completed (RSN)
    2016:11:13-23:00:24 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: group key handshake completed (RSN)
    2016:11:13-23:00:27 192.168.39.177 awelogger[22259]: id="4105" severity="info" sys="System" sub="WiFi" name="STA WPA failure" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" reason_code="2"
    2016:11:13-23:00:27 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:00:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: authenticated
    2016:11:13-23:00:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: associated (aid 1)
    2016:11:13-23:00:27 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:00:27 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:00:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f WPA: pairwise key handshake completed (RSN)
    2016:11:13-23:00:28 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:03:59 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba WPA: group key handshake completed (RSN)
    2016:11:13-23:03:59 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: group key handshake completed (RSN)
    2016:11:13-23:03:59 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a WPA: group key handshake completed (RSN)
    2016:11:13-23:10:24 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: group key handshake completed (RSN)
    2016:11:13-23:10:25 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: group key handshake completed (RSN)
    2016:11:13-23:10:27 192.168.39.177 awelogger[22259]: id="4105" severity="info" sys="System" sub="WiFi" name="STA WPA failure" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" reason_code="2"
    2016:11:13-23:10:27 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:10:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: authenticated
    2016:11:13-23:10:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: associated (aid 1)
    2016:11:13-23:10:27 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:10:27 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:10:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f WPA: pairwise key handshake completed (RSN)
    2016:11:13-23:10:28 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:14:00 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a WPA: group key handshake completed (RSN)
    2016:11:13-23:14:00 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: group key handshake completed (RSN)
    2016:11:13-23:14:00 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba WPA: group key handshake completed (RSN)
    2016:11:13-23:20:24 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: group key handshake completed (RSN)
    2016:11:13-23:20:24 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: group key handshake completed (RSN)
    2016:11:13-23:20:27 192.168.39.177 awelogger[22259]: id="4105" severity="info" sys="System" sub="WiFi" name="STA WPA failure" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" reason_code="2"
    2016:11:13-23:20:27 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:20:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: authenticated
    2016:11:13-23:20:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: associated (aid 1)
    2016:11:13-23:20:27 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:20:27 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:20:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f WPA: pairwise key handshake completed (RSN)
    2016:11:13-23:20:28 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:23:59 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a WPA: group key handshake completed (RSN)
    2016:11:13-23:24:00 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: group key handshake completed (RSN)
    2016:11:13-23:24:00 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba WPA: group key handshake completed (RSN)
    2016:11:13-23:30:23 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: group key handshake completed (RSN)
    2016:11:13-23:30:24 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: group key handshake completed (RSN)
    2016:11:13-23:30:28 192.168.39.177 awelogger[22259]: id="4105" severity="info" sys="System" sub="WiFi" name="STA WPA failure" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" reason_code="2"
    2016:11:13-23:30:28 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:30:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: authenticated
    2016:11:13-23:30:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: associated (aid 1)
    2016:11:13-23:30:28 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:30:28 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:30:29 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:30:29 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f WPA: pairwise key handshake completed (RSN)

    I try to set te portspeed on the switch to 100mbit and monitor the rx errors.
    write you back in two hours, because the errors comes about 2-3 times per hour.


    Sophos Platinum Partner 
    Sophos Certified Architect
    (Ceritfied UTM Architect / Certified XG Architect)

  • Fast Reply :(

    I've changed to 100mbit on the switchport. Plugged of the ap55c. Reset the counter of RX/TX errors. Plugged in the AP55C. It booted and in a time of 5minutes a got 109 RX Errors.

    Here is the awed.log from booting up and currently moment

    2016:11:13-22:53:46 astaro awed[4915]: [MASTER] new connection from 192.168.39.167:39822
    2016:11:13-22:53:46 astaro awed[8549]: [A4003CA22CCE4D1] AP55C from 192.168.39.167:39822 identified as A4003CA22CCE4D1
    2016:11:13-22:53:46 astaro awed[8549]: [A4003CA22CCE4D1] (Re-)loaded identity and/or configuration
    2017:09:20-09:04:05 A4003CA22CCE4D1 netifd: Interface 'vxlan' is enabled
    2017:09:20-09:04:05 A4003CA22CCE4D1 netifd: VLAN 'vxlan.101' link is up
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.480000] device vxlan.101 entered promiscuous mode
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.490000] device vxlan entered promiscuous mode
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.510000] br-vxlan101: port 1(vxlan.101) entered forwarding state
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.510000] br-vxlan101: port 1(vxlan.101) entered forwarding state
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan101' is enabled
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: VLAN 'vxlan.102' link is up
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.540000] device vxlan.102 entered promiscuous mode
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.570000] br-vxlan102: port 1(vxlan.102) entered forwarding state
    2017:09:20-09:04:06 A4003CA22CCE4D1 kernel: [   45.570000] br-vxlan102: port 1(vxlan.102) entered forwarding state
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan102' is enabled
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Bridge 'br-vxlan101' link is up
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan101' has link connectivity 
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan101' is setting up now
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan101' is now up
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Bridge 'br-vxlan102' link is up
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan102' has link connectivity 
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan102' is setting up now
    2017:09:20-09:04:06 A4003CA22CCE4D1 netifd: Interface 'vxlan102' is now up
    2017:09:20-09:04:06 A4003CA22CCE4D1 aweclient[1036]: aweclient.c (1817) A signal received during select.
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): Configuration file: /var/run/hostapd-phy2.conf
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): eapol_version=1
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Supported cipher 00-0f-ac:1
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Supported cipher 00-0f-ac:5
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Supported cipher 00-0f-ac:2
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Supported cipher 00-0f-ac:4
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Supported cipher 00-0f-ac:6
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Using driver-based off-channel TX
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: interface wlan8 in phy phy2
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Set mode ifindex 11 iftype 3 (AP)
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Setup AP(wlan8) - device_ap_sme=0 use_monitor=0
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Subscribe to mgmt frames with AP handle 0xb2a2d8
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0xb2a2d8 match=
    2017:09:20-09:04:07 A4003CA22CCE4D1 kernel: [   47.120000] ath10k_pci 0000:00:00.0: otp stream is empty, using board.bin contents
    2017:09:20-09:04:08 A4003CA22CCE4D1 kernel: [   47.510000] br-vxlan101: port 1(vxlan.101) entered forwarding state
    2017:09:20-09:04:08 A4003CA22CCE4D1 kernel: [   47.570000] br-vxlan102: port 1(vxlan.102) entered forwarding state
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Add own interface ifindex 7
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: if_indices[16]: 7
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Add own interface ifindex 11
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: if_indices[16]: 7 11
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Adding interface wlan8 into bridge br-vxlan101
    2017:09:20-09:04:08 A4003CA22CCE4D1 kernel: [   48.220000] device wlan8 entered promiscuous mode
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): phy: phy2
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): wlan8: interface state UNINITIALIZED->COUNTRY_UPDATE
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Previous country code AT, new country code AT 
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: Regulatory information - country=AT (DFS-ETSI)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: 2402-2482 @ 40 MHz 20 mBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: 5170-5250 @ 80 MHz 20 mBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): nl80211: 57000-66000 @ 2160 MHz 40 mBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=20 dBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=20 dBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=44 freq=5220 MHz max_tx_power=20 dBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=20 dBm
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=52 freq=5260 MHz max_tx_power=20 dBm (DFS state = usable)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=56 freq=5280 MHz max_tx_power=20 dBm (DFS state = usable)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=60 freq=5300 MHz max_tx_power=20 dBm (DFS state = usable)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=64 freq=5320 MHz max_tx_power=20 dBm (DFS state = usable)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=100 freq=5500 MHz max_tx_power=27 dBm (DFS state = usable)
    2017:09:20-09:04:08 A4003CA22CCE4D1 netifd: radio0 (1651): Allowed channel: mode=2 chan=104 freq=5520 MHz max_tx_power=27 dBm (DFS state = usable)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Configuration file: /var/run/hostapd-phy3.conf
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): eapol_version=1
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): eapol_version=1
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): eapol_version=1
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: TDLS supported
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: TDLS external setup
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Supported cipher 00-0f-ac:1
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Supported cipher 00-0f-ac:5
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Supported cipher 00-0f-ac:2
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Supported cipher 00-0f-ac:4
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Supported cipher 00-0f-ac:6
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Using driver-based off-channel TX
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Use separate P2P group interface (driver advertised support)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: interface wlan0 in phy phy3
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Set mode ifindex 12 iftype 3 (AP)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Setup AP(wlan0) - device_ap_sme=0 use_monitor=0
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Subscribe to mgmt frames with AP handle 0x881530
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x881530 match=
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Add own interface ifindex 5
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: if_indices[16]: 5
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Add own interface ifindex 7
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: if_indices[16]: 5 7
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Add own interface ifindex 9
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: if_indices[16]: 5 7 9
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Add own interface ifindex 12
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: if_indices[16]: 5 7 9 12
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Adding interface wlan0 into bridge br-lan
    2017:09:20-09:04:09 A4003CA22CCE4D1 kernel: [   48.670000] device wlan0 entered promiscuous mode
    2017:09:20-09:04:09 A4003CA22CCE4D1 kernel: [   48.670000] br-lan: port 2(wlan0) entered forwarding state
    2017:09:20-09:04:09 A4003CA22CCE4D1 kernel: [   48.680000] br-lan: port 2(wlan0) entered forwarding state
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): phy: phy3
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): BSS count 3, BSSID mask 00:00:00:00:00:07 (2 bits)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Using existing control interface directory.
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Using existing control interface directory.
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Using existing control interface directory.
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Previous country code AT, new country code AT 
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Regulatory information - country=AT (DFS-ETSI)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: 2402-2482 @ 40 MHz 20 mBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=12 freq=2467 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=1 chan=13 freq=2472 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Channel 14 (2484)is disabled!!
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=12 freq=2467 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Allowed channel: mode=0 chan=13 freq=2472 MHz max_tx_power=20 dBm
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Channel 14 (2484)is disabled!!
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): ACS: Automatic channel selection started, this may take a bit
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): ACS: skipping channel 14 (2484)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): ACS: Scanning 1 / 5
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): wlan0: nl80211: scan request
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2412 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2417 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2422 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2427 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2432 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2437 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2442 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2447 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2452 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2457 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2462 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2467 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): nl80211: Scan frequency 2472 MHz
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Scan requested (ret=0) - scan timeout 10 seconds
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): wlan0: interface state COUNTRY_UPDATE->ACS
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): wlan0: ACS-STARTED 
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): Interface initialization will be completed in a callback (ACS)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): ctrl_iface not configured!
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): command failed: No such device (-19)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: radio1 (1652): command failed: No such device (-19)
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: lan (1082): Performing a DHCP renew
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: lan (1082): Sending renew...
    2017:09:20-09:04:09 A4003CA22CCE4D1 netifd: lan (1082): Lease of 192.168.39.167 obtained, lease time 65049
    2017:09:20-09:04:09 A4003CA22CCE4D1 kernel: [   49.200000] br-lan: port 2(wlan0) entered disabled state
    2017:09:20-09:04:16 A4003CA22CCE4D1 kernel: [   56.330000] br-lan: port 2(wlan0) entered forwarding state
    2017:09:20-09:04:16 A4003CA22CCE4D1 kernel: [   56.340000] br-lan: port 2(wlan0) entered forwarding state
    2017:09:20-09:04:16 A4003CA22CCE4D1 netifd: Network device 'wlan0' link is up
    2017:09:20-09:04:16 A4003CA22CCE4D1 kernel: [   56.370000] device wlan1 entered promiscuous mode
    2017:09:20-09:04:16 A4003CA22CCE4D1 kernel: [   56.370000] br-vxlan101: port 3(wlan1) entered forwarding state
    2017:09:20-09:04:16 A4003CA22CCE4D1 kernel: [   56.380000] br-vxlan101: port 3(wlan1) entered forwarding state
    2017:09:20-09:04:17 A4003CA22CCE4D1 netifd: Network device 'wlan1' link is up
    2017:09:20-09:04:17 A4003CA22CCE4D1 kernel: [   56.730000] device wlan2 entered promiscuous mode
    2017:09:20-09:04:17 A4003CA22CCE4D1 kernel: [   56.730000] br-vxlan102: port 2(wlan2) entered forwarding state
    2017:09:20-09:04:17 A4003CA22CCE4D1 kernel: [   56.740000] br-vxlan102: port 2(wlan2) entered forwarding state
    2017:09:20-09:04:17 A4003CA22CCE4D1 netifd: Network device 'wlan2' link is up
    2017:09:20-09:04:17 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a IEEE 802.11: authenticated
    2017:09:20-09:04:17 A4003CA22CCE4D1 awelogger[1924]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:22:44:0a" status_code="0"
    2017:09:20-09:04:17 A4003CA22CCE4D1 awelogger[1924]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:22:44:0a" status_code="0"
    2017:09:20-09:04:17 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a IEEE 802.11: associated (aid 1)
    2017:09:20-09:04:18 A4003CA22CCE4D1 awelogger[1924]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:22:44:0a"
    2017:09:20-09:04:18 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a WPA: pairwise key handshake completed (RSN)
    2017:09:20-09:04:18 A4003CA22CCE4D1 kernel: [   57.920000] random: nonblocking pool is initialized
    2016:11:13-22:54:02 A4003CA22CCE4D1 kernel: [   58.340000] br-lan: port 2(wlan0) entered forwarding state
    2016:11:13-22:54:02 A4003CA22CCE4D1 kernel: [   58.380000] br-vxlan101: port 3(wlan1) entered forwarding state
    2016:11:13-22:54:02 A4003CA22CCE4D1 kernel: [   58.740000] br-vxlan102: port 2(wlan2) entered forwarding state
    2016:11:13-22:54:04 A4003CA22CCE4D1 netifd: Network device 'wlan8' link is up
    2016:11:13-22:54:04 A4003CA22CCE4D1 kernel: [   60.890000] br-vxlan101: port 2(wlan8) entered forwarding state
    2016:11:13-22:54:04 A4003CA22CCE4D1 kernel: [   60.900000] br-vxlan101: port 2(wlan8) entered forwarding state
    2016:11:13-22:54:05 A4003CA22CCE4D1 awelogger[1924]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="8c:bf:a6:70:d8:b7" status_code="0"
    2016:11:13-22:54:05 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 IEEE 802.11: authenticated
    2016:11:13-22:54:05 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 IEEE 802.11: associated (aid 2)
    2016:11:13-22:54:05 A4003CA22CCE4D1 awelogger[1924]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="8c:bf:a6:70:d8:b7" status_code="0"
    2016:11:13-22:54:05 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: pairwise key handshake completed (RSN)
    2016:11:13-22:54:05 A4003CA22CCE4D1 awelogger[1924]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="8c:bf:a6:70:d8:b7"
    2016:11:13-22:54:07 astaro awed[4915]: [MASTER] updating confd object for AP A4003CA22CCE4D1 with new channels (6,36 -> 6)
    2016:11:13-22:54:06 A4003CA22CCE4D1 kernel: [   62.900000] br-vxlan101: port 2(wlan8) entered forwarding state
    2016:11:13-22:54:06 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba IEEE 802.11: authenticated
    2016:11:13-22:54:06 A4003CA22CCE4D1 awelogger[1924]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:28:47:ba" status_code="0"
    2016:11:13-22:54:06 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba IEEE 802.11: associated (aid 3)
    2016:11:13-22:54:06 A4003CA22CCE4D1 awelogger[1924]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:28:47:ba" status_code="0"
    2016:11:13-22:54:07 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba WPA: pairwise key handshake completed (RSN)
    2016:11:13-22:54:07 A4003CA22CCE4D1 awelogger[1924]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:b5:2a:8b" sta="ac:cf:23:28:47:ba"
    2016:11:13-22:54:08 astaro awed[4915]: [MASTER] start processing configuration change
    2016:11:13-22:54:10 astaro awed[4915]: [MASTER] end processing configuration change
    2016:11:13-22:54:17 astaro awed[4915]: [MASTER] updating confd object for AP A4003CA22CCE4D1 with new channels (6 -> 6,36)
    2016:11:13-22:54:19 astaro awed[4915]: [MASTER] start processing configuration change
    2016:11:13-22:54:19 astaro awed[4915]: [MASTER] end processing configuration change
    2016:11:13-22:55:01 192.168.39.177 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 IEEE 802.11: disconnected due to excessive missing ACKs
    2016:11:13-22:55:01 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="8c:bf:a6:70:d8:b7"
    2016:11:13-22:55:30 192.168.39.177 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
    2016:11:13-23:00:23 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: group key handshake completed (RSN)
    2016:11:13-23:00:24 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: group key handshake completed (RSN)
    2016:11:13-23:00:27 192.168.39.177 awelogger[22259]: id="4105" severity="info" sys="System" sub="WiFi" name="STA WPA failure" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" reason_code="2"
    2016:11:13-23:00:27 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:00:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: authenticated
    2016:11:13-23:00:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: associated (aid 1)
    2016:11:13-23:00:27 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:00:27 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:00:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f WPA: pairwise key handshake completed (RSN)
    2016:11:13-23:00:28 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:03:59 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba WPA: group key handshake completed (RSN)
    2016:11:13-23:03:59 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: group key handshake completed (RSN)
    2016:11:13-23:03:59 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a WPA: group key handshake completed (RSN)
    2016:11:13-23:10:24 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: group key handshake completed (RSN)
    2016:11:13-23:10:25 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: group key handshake completed (RSN)
    2016:11:13-23:10:27 192.168.39.177 awelogger[22259]: id="4105" severity="info" sys="System" sub="WiFi" name="STA WPA failure" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" reason_code="2"
    2016:11:13-23:10:27 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:10:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: authenticated
    2016:11:13-23:10:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: associated (aid 1)
    2016:11:13-23:10:27 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:10:27 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:10:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f WPA: pairwise key handshake completed (RSN)
    2016:11:13-23:10:28 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:14:00 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a WPA: group key handshake completed (RSN)
    2016:11:13-23:14:00 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: group key handshake completed (RSN)
    2016:11:13-23:14:00 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba WPA: group key handshake completed (RSN)
    2016:11:13-23:20:24 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: group key handshake completed (RSN)
    2016:11:13-23:20:24 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: group key handshake completed (RSN)
    2016:11:13-23:20:27 192.168.39.177 awelogger[22259]: id="4105" severity="info" sys="System" sub="WiFi" name="STA WPA failure" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" reason_code="2"
    2016:11:13-23:20:27 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:20:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: authenticated
    2016:11:13-23:20:27 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: associated (aid 1)
    2016:11:13-23:20:27 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:20:27 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:20:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f WPA: pairwise key handshake completed (RSN)
    2016:11:13-23:20:28 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:23:59 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:22:44:0a WPA: group key handshake completed (RSN)
    2016:11:13-23:24:00 A4003CA22CCE4D1 hostapd: wlan0: STA 8c:bf:a6:70:d8:b7 WPA: group key handshake completed (RSN)
    2016:11:13-23:24:00 A4003CA22CCE4D1 hostapd: wlan0: STA ac:cf:23:28:47:ba WPA: group key handshake completed (RSN)
    2016:11:13-23:30:23 192.168.39.177 hostapd: wlan0: STA f8:a9:d0:63:f9:3a WPA: group key handshake completed (RSN)
    2016:11:13-23:30:24 192.168.39.177 hostapd: wlan2: STA 00:7e:56:0b:cd:d8 WPA: group key handshake completed (RSN)
    2016:11:13-23:30:28 192.168.39.177 awelogger[22259]: id="4105" severity="info" sys="System" sub="WiFi" name="STA WPA failure" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" reason_code="2"
    2016:11:13-23:30:28 192.168.39.177 awelogger[22259]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:30:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: authenticated
    2016:11:13-23:30:28 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f IEEE 802.11: associated (aid 1)
    2016:11:13-23:30:28 192.168.39.177 awelogger[22259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:30:28 192.168.39.177 awelogger[22259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f" status_code="0"
    2016:11:13-23:30:29 192.168.39.177 awelogger[22259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="MYSSID1" ssid_id="WLAN0.0" bssid="00:1a:8c:2e:6d:c0" sta="1c:c1:de:d4:85:8f"
    2016:11:13-23:30:29 192.168.39.177 hostapd: wlan0: STA 1c:c1:de:d4:85:8f WPA: pairwise key handshake completed (RSN)

    i monitored, if i surf on wlan clients, the Error counter goes higher and higher. i set the interface speed back to AUTO and its connected with 1000mbit fullduplex.

    Now iam debug the awed. Write you soon.


    Sophos Platinum Partner 
    Sophos Certified Architect
    (Ceritfied UTM Architect / Certified XG Architect)

  • Hi,

     

    thanks for the tests. Can you do one more iteration with having all power-savings on the switch off? 

    If this doesn't give any relieve, please open a support case so that we can track the investigation. 

     

    Kind regards,

     

    Dirk Bolte

  • Hi Dirk,

    Now iam debug the awed. There are no powersaving options on the switch, so i cant turn any off.

    i post you the debugged log in one hour.

     

    greetings from austria


    Sophos Platinum Partner 
    Sophos Certified Architect
    (Ceritfied UTM Architect / Certified XG Architect)

  • So now, for running debugging awed, i got 1 RX Error on Switch. So we have to find the Issue in this logfile

    awed1rxerror.txt


    Sophos Platinum Partner 
    Sophos Certified Architect
    (Ceritfied UTM Architect / Certified XG Architect)

  • Hi,

     

    we found an issue with the PLL data of our ethernet chips. So far for Gbit ethernet we only saw it causing issues with long cables. For 10/100MBit, the error rate got much higher on shorter cables and also varies with the switches being used. The pattern matches your experience.

    This will most likely not do it for the next maintenance release but very likely for the 2nd to next. 

     

    Kind regards,

     

    Dirk Bolte

Reply
  • Hi,

     

    we found an issue with the PLL data of our ethernet chips. So far for Gbit ethernet we only saw it causing issues with long cables. For 10/100MBit, the error rate got much higher on shorter cables and also varies with the switches being used. The pattern matches your experience.

    This will most likely not do it for the next maintenance release but very likely for the 2nd to next. 

     

    Kind regards,

     

    Dirk Bolte

Children
  • Hi Dirk, what does that mean for me? my cable (from patchpanel to AP) is about 15meters (not very long). If i use the 100mbit POE Adapter, the Errors will be lower. We found out that this errors also occur with the ap55 (not only the ap55). are i'm right? will be there a replacement? or will be there a softwarebugfix?


    Sophos Platinum Partner 
    Sophos Certified Architect
    (Ceritfied UTM Architect / Certified XG Architect)

  • Hi,

     

    the fix is definitely in our AP firmware, you will get it with a regular maintenance release. The ethernet hardware is all good, just the PLL pattern was not set to an optimal value, which is done in the ethernet driver. It affects multiple models and we're about to push this change to SG, XG as well as Sophos Wireless.

     

    The error we found is that the ethernet chip does not detect signals clearly, and thus does not receive packets clearly. We were able to provoke this error with extremely long cables as well with certain switches on lower speeds but it's not an error that is prominent or happens every time. There's a good probability that your observation matches the error we found. Once the maintenance release with this fix is out (which won't be the next one but most likely the second to next one), I will update the forum so that you can check whether your issue is addressed with this as well.

     

    Kind regards,

     

    Dirk Bolte

  • nice to hear, sounds good. will check it after your information


    Sophos Platinum Partner 
    Sophos Certified Architect
    (Ceritfied UTM Architect / Certified XG Architect)