This secondary Archer is running in Wireless Bridge/Repeater mode. It works, but on the System/Router Access page, I get a red warning telling me
Code: Select all
Web Access
Web Admin Protocol: [http & https]
Local HTTP Port: [80]
Local HTTPS Port: [443]
---
CAUTION: You are about to lock yourself out!
Your access chain:
192.168.0.22 ➔ 192.168.0.34
---
Web Login Session Length: 15min
[ ] Disable password protection of web interface (Not Recommended!)
Another Problem seems to be related to the working mode. Repeater is working in 2,4GHz mode, but it seems I can't find a way to additionally activate the 5GHz AP. Regulatory domain is set to Germany, which enabled 5GHz on the main router.
I've got the ping watchdog running with the AP as destination and set to run the command "wifi" upon connection loss. Logfile of one such event:
Code: Select all
Thu Apr 6 18:43:09 2023 user.info usteer: Connecting to local node hostapd.wlan1-1
Thu Apr 6 18:43:11 2023 daemon.notice netifd: radio1 (19256): sh: out of range
Thu Apr 6 18:43:11 2023 daemon.err uhttpd[2825]: ping: sendto: Network unreachable
Thu Apr 6 18:43:11 2023 daemon.err uhttpd[2825]: sh: write error: Broken pipe
Thu Apr 6 18:43:13 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:43:16 2023 daemon.notice netifd: Wireless device 'radio0' is now down
Thu Apr 6 18:43:16 2023 daemon.notice netifd: Wireless device 'radio0' is now up
Thu Apr 6 18:43:21 2023 daemon.notice netifd: Wireless device 'radio1' is now down
Thu Apr 6 18:43:23 2023 daemon.notice netifd: radio1 (20211): RTNETLINK answers: Resource busy
Thu Apr 6 18:43:24 2023 daemon.notice netifd: radio1 (20211): sh: out of range
Thu Apr 6 18:43:24 2023 daemon.notice netifd: Wireless device 'radio1' is now up
Thu Apr 6 18:43:24 2023 daemon.notice netifd: Network device 'wlan1' link is up
Thu Apr 6 18:43:24 2023 daemon.notice netifd: Interface 'wwan' is enabled
Thu Apr 6 18:43:24 2023 daemon.notice netifd: Interface 'wwan' has link connectivity
Thu Apr 6 18:43:24 2023 daemon.notice netifd: Interface 'wwan' is setting up now
Thu Apr 6 18:43:24 2023 daemon.notice netifd: wwan (20338): udhcpc: started, v1.35.0
Thu Apr 6 18:43:24 2023 daemon.notice netifd: wwan (20338): udhcpc: broadcasting discover
Thu Apr 6 18:43:24 2023 daemon.notice netifd: wwan (20338): udhcpc: broadcasting select for 192.168.0.34, server 192.168.0.180
Thu Apr 6 18:43:24 2023 daemon.notice netifd: wwan (20338): udhcpc: lease of 192.168.0.34 obtained from 192.168.0.180, lease time 43200
Thu Apr 6 18:43:25 2023 daemon.notice netifd: Interface 'wwan' is now up
Thu Apr 6 18:43:38 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:43:48 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:44:01 2023 user.notice firewall: Reloading firewall due to ifup of wwan (wlan1)
Thu Apr 6 18:44:03 2023 user.notice relayd: Assigning 192.168.0.34 to bridge interface
Thu Apr 6 18:44:04 2023 user.notice relayd: Reloading relayd due to ifup of wwan (wlan1)
Thu Apr 6 18:44:13 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:44:23 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:44:26 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:44:26 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:44:27 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:45:13 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:46:13 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:47:13 2023 daemon.notice hostapd: handle_probe_req: send failed
Thu Apr 6 18:48:13 2023 daemon.notice hostapd: handle_probe_req: send failed
The first router (from previous post) is running now as production machine. I was able to copy over the DHCP and hostname settings by combining them into the new /etc/dhcp file using a spreadsheet. A couple Firewall settings have been copied over, too, and first blocked my internet access. Turns out they still work, but have to be set to "IP V4 only" or use the MAC address instead of the short IP.