Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

WiFi devices not getting IP, WiFi Interface "unplugged", vxlan interfaces missing

We updated WiFi AP Firmware 3 days ago. on one location with some AP55c clients connecting to a WiFi will not get IP addresses. I cannot even see the DHCP requests with packet capture.

I noticed the WiFi interface is shown as unplugged. When I noticed the issue, the Interface did not even have a MAC address (00:00:00:00:00:00).

So I edited, disabled, enabled the SSID and the interface. It remains in unplugged status. No luck, at least it got MAC address again by those changes.

Unplugged and no MAC Address:

After changing and re-applying settings back to original values:


XXX_Guests Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA
          inet addr:172.xxx.xxx.1  Bcast:172.xxx.252.255  Mask:255.255.255.0
          inet6 addr: fe80::a86d:xxxxxxxxxxxxxx:1bb1/64 Scope:Link
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:6326211 errors:0 dropped:0 overruns:0 frame:0
          TX packets:6022720 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:5041929744 (4.6 GiB)  TX bytes:4307225067 (4.0 GiB)

any help on this please?

update 7.7.2021: noticed missing vxlan adapters on the HA nodes that came up after reboot of the nodes. See comments below.



This thread was automatically locked due to age.
Parents
  • The wireless is actually connected to a AP or does no Access Point broadcast this wireless? Can you redo the link between SSID and AP. 

  • we've some APs broadcasting this.

    I deleted this WiFi in particular and recreated it. Stays in status unplugged. Tried an other name, stays unplugged.

    After recreateion, I created an other dummy WiFi network and it comes as new interface also unplugged.

    The initial problem we have, is that clients are not getting IP address from DHCP on XG. I did a packet capture on the WiFi interface during client connects but no packets have been captured.

    Is it even possible to capture packet of those special WiFi interfaces?

  • OK, I see it is possible to dump. We have an other WiFi SSID where the Hotsport page does no longer work after FW Upgrade of APs...

  • FormerMember
    0 FormerMember in reply to LHerzog

    Request to share output of below commands:

    Login to SSH > 5. Device Management > 3. Advanced Shell

    # ethtool <SSID>

    eg. # ethtool XXX_Guests

    ==> Run below command to check whether end machine connects to this SSID and gets an IP addres or not.

    # tail -f /log/wc_remote.log | grep "end machine MAC address"

    eg. # tail -f /log/wc_remote.log | grep "dc:32:23:63:23:93"

    What's the current pattern version of AP firmware?

  • I assume, this is based of a issue with the wireless module. Its not connecting the VXLAN to the Network. Check the wireless related Logs, if you see anything related to this? 

    BTW: I personally do not recommend to use separate zone, as it is a solution for smaller customers in the first place, which cannot use VLAN. If you have the option to use VLAN, move to Bridge to VLAN for more performance and a better implementation into the network. 

  • AP Firmware
    11.0.015
    -
    07:27:51, Jul 03 2021
    Success

    XG430_WP02_SFOS 18.0.5 MR-5-Build586# ethtool XXX_Guests
    Settings for XXX_Guests:
            Link detected: yes

    This is one connection for one user and endpoint:

    <30>Jul  6 14:41:28 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 14:41:28 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 14:41:28 A4004CED54CC31F awelogger[2337]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="XXXXXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 14:41:28 A4004CED54CC31F awelogger[2337]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 14:41:28 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60549736-00000002
    <30>Jul  6 14:41:28 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 14:41:28 A4004CED54CC31F awelogger[2337]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 14:42:05 A4004CED54CC31F awelogger[2337]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 14:42:08 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 14:42:08 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 14:42:09 A4004CED54CC31F awelogger[2337]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 14:42:09 A4004CED54CC31F awelogger[2337]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 14:42:09 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60549736-00000003
    <30>Jul  6 14:42:09 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 14:42:09 A4004CED54CC31F awelogger[2337]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 14:42:45 A4004CED54CC31F awelogger[2337]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 14:42:49 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 14:42:49 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 14:42:49 A4004CED54CC31F awelogger[2337]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 14:42:49 A4004CED54CC31F awelogger[2337]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 14:42:49 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60549736-00000004
    <30>Jul  6 14:42:49 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 14:42:49 A4004CED54CC31F awelogger[2337]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 14:43:01 A4004CED54CC31F awelogger[2337]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 14:43:36 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 14:43:36 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 14:43:36 A4004CED54CC31F awelogger[2337]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 14:43:36 A4004CED54CC31F awelogger[2337]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 14:43:36 A4004CED54CC31F awelogger[2337]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 14:43:36 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60549736-00000005
    <30>Jul  6 14:43:36 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 14:44:11 A4004CED54CC31F awelogger[2337]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 14:44:15 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 14:44:15 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 14:44:15 A4004CED54CC31F awelogger[2337]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 14:44:15 A4004CED54CC31F awelogger[2337]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 14:44:15 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60549736-00000006
    <30>Jul  6 14:44:15 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 14:44:15 A4004CED54CC31F awelogger[2337]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 14:44:51 A4004CED54CC31F awelogger[2337]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 14:44:55 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 14:44:55 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 14:44:55 A4004CED54CC31F awelogger[2337]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 14:44:55 A4004CED54CC31F awelogger[2337]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 14:44:56 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60549736-00000007
    <30>Jul  6 14:44:56 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 14:44:56 A4004CED54CC31F awelogger[2337]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 14:45:32 A4004CED54CC31F awelogger[2337]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 14:45:36 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 14:45:36 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 14:45:36 A4004CED54CC31F awelogger[2337]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 14:45:36 A4004CED54CC31F awelogger[2337]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 14:45:36 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60549736-00000008
    <30>Jul  6 14:45:36 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 14:45:36 A4004CED54CC31F awelogger[2337]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 14:46:11 A4004CED54CC31F awelogger[2337]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 14:46:16 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 14:46:16 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 14:46:16 A4004CED54CC31F awelogger[2337]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 14:46:16 A4004CED54CC31F awelogger[2337]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 14:46:17 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60549736-00000009
    <30>Jul  6 14:46:17 A4004CED54CC31F hostapd: wlan10: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 14:46:17 A4004CED54CC31F awelogger[2337]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 14:46:53 A4004CED54CC31F awelogger[2337]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="XXX-Guests" ssid_id="WLAN9.1" bssid="00:1a:8c:c6:89:82" sta="84:cf:bf:91:f5:45"
    

  • Here an other location, an other SSID and an other AP 55c

    the user did not get DHCP there.

    <30>Jul  6 15:58:11 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 15:58:11 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 15:58:11 A400345514BD6D4 awelogger[3499]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 15:58:11 A400345514BD6D4 awelogger[3499]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 15:58:11 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60E32CC8-0000001F
    <30>Jul  6 15:58:11 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 15:58:11 A400345514BD6D4 awelogger[3499]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 15:58:48 A400345514BD6D4 awelogger[3499]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 15:58:51 A400345514BD6D4 hostapd: wlan1: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 15:58:51 A400345514BD6D4 hostapd: wlan1: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 15:58:51 A400345514BD6D4 awelogger[3259]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="xxxxxx-Guests" ssid_id="WLAN16.0" bssid="00:1a:8c:a1:9c:d1" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 15:58:51 A400345514BD6D4 awelogger[3259]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="xxxxxx-Guests" ssid_id="WLAN16.0" bssid="00:1a:8c:a1:9c:d1" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 15:58:51 A400345514BD6D4 hostapd: wlan1: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60E32CBD-00000004
    <30>Jul  6 15:58:51 A400345514BD6D4 hostapd: wlan1: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 15:58:51 A400345514BD6D4 awelogger[3259]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="xxxxxx-Guests" ssid_id="WLAN16.0" bssid="00:1a:8c:a1:9c:d1" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 15:59:12 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <13>Jul  6 15:59:12 A400345514BD6D4 awelogger[3499]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 15:59:12 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 15:59:12 A400345514BD6D4 awelogger[3499]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 15:59:12 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60E32CC8-00000020
    <30>Jul  6 15:59:12 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 15:59:12 A400345514BD6D4 awelogger[3499]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 15:59:28 A400345514BD6D4 awelogger[3499]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 15:59:31 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 15:59:31 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <13>Jul  6 15:59:31 A400345514BD6D4 awelogger[3499]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 15:59:31 A400345514BD6D4 awelogger[3499]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 15:59:32 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60E32CC8-00000021
    <30>Jul  6 15:59:32 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)

    shortly before, he received DHCP but hotspot portal was not working - the user said: he could see the Hotsport Portal page but after one second it disappeared.

    So it looks like sometimes DHCP works, most of the time not.

    here he got DHCP IP:

    <13>Jul  6 15:43:00 A400345514BD6D4 awelogger[3499]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 15:43:04 A40034FC854CB80 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 15:43:04 A40034FC854CB80 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <30>Jul  6 15:43:04 A40034FC854CB80 hostapd: wlan9: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60E01249-00000002
    <30>Jul  6 15:43:04 A40034FC854CB80 hostapd: wlan9: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 15:43:04 A40034FC854CB80 awelogger[2334]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:95" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 15:43:04 A40034FC854CB80 awelogger[2334]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:95" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 15:43:14 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <13>Jul  6 15:43:14 A400345514BD6D4 awelogger[3499]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45" status_code="0"
    <30>Jul  6 15:43:14 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <30>Jul  6 15:43:14 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60E32CC8-00000011
    <30>Jul  6 15:43:14 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 15:43:14 A400345514BD6D4 awelogger[3499]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 15:43:14 A400345514BD6D4 awelogger[3499]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 15:43:19 A400345514BD6D4 awelogger[3499]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45"
    <30>Jul  6 15:43:23 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: authenticated
    <30>Jul  6 15:43:23 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 IEEE 802.11: associated (aid 1)
    <30>Jul  6 15:43:23 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 RADIUS: starting accounting session 60E32CC8-00000012
    <30>Jul  6 15:43:23 A400345514BD6D4 hostapd: wlan9: STA 84:cf:bf:91:f5:45 WPA: pairwise key handshake completed (RSN)
    <13>Jul  6 15:43:23 A400345514BD6D4 awelogger[3499]: id="4103" severity="info" sys="System" sub="WiFi" name="STA authentication" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 15:43:23 A400345514BD6D4 awelogger[3499]: id="4104" severity="info" sys="System" sub="WiFi" name="STA association" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45" status_code="0"
    <13>Jul  6 15:43:23 A400345514BD6D4 awelogger[3499]: id="4101" severity="info" sys="System" sub="WiFi" name="STA connected" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45"
    <13>Jul  6 15:43:59 A400345514BD6D4 awelogger[3499]: id="4102" severity="info" sys="System" sub="WiFi" name="STA disconnected" ssid="xxxxxx-Guests" ssid_id="WLAN16.1" bssid="00:1a:8c:a1:9c:d9" sta="84:cf:bf:91:f5:45"

    and caused some packets:

    15:43:05.185436 xxxxxxx_Gue, IN: 84:cf:bf:91:f5:45 (oui Unknown) > Broadcast Null Unnumbered, xid, Flags [Response], length 6: 01 00
    15:43:05.235956 xxxxxxx_Gue, IN: EAPOL key (3) v1, len 117
    15:43:05.244101 xxxxxxx_Gue, IN: EAPOL key (3) v1, len 95
    15:43:05.375050 xxxxxxx_Gue, IN: IP6 :: > ff02::1:ffb9:d755: ICMP6, neighbor solicitation, who has fe80::93e1:1d0d:10b9:d755, length 24
    15:43:05.381084 xxxxxxx_Gue, IN: IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
    15:43:05.438663 xxxxxxx_Gue, IN: IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 84:cf:bf:91:f5:45 (oui Unknown), length 288
    15:43:05.438799 xxxxxxx_Gue, OUT: IP wifi.domain.de.bootps > 172.xxx.xxx.20.bootpc: BOOTP/DHCP, Reply, length 300
    15:43:05.455084 xxxxxxx_Gue, IN: IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 84:cf:bf:91:f5:45 (oui Unknown), length 300
    15:43:05.455175 xxxxxxx_Gue, OUT: IP wifi.domain.de.bootps > 172.xxx.xxx.20.bootpc: BOOTP/DHCP, Reply, length 300
    15:43:05.759877 xxxxxxx_Gue, IN: ARP, Request who-has wifi.domain.de tell 172.xxx.xxx.20, length 28
    15:43:05.759927 xxxxxxx_Gue, OUT: ARP, Reply wifi.domain.de is-at f2:a5:26:30:94:7b (oui Unknown), length 28
    15:43:05.761955 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46638 > wifi.domain.de.853: Flags [S], seq 1471103549, win 13140, options [mss 1460,sackOK,TS val 23244601 ecr 0,nop,wscale 9,tfo  cookiereq,nop,nop], length 0
    15:43:05.875815 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.9261 > wifi.domain.de.domain: 6673+ A? www.google.com. (32)
    15:43:05.875889 xxxxxxx_Gue, OUT: IP wifi.domain.de.domain > 172.xxx.xxx.20.9261: 6673 1/0/0 A 142.250.185.164 (48)
    15:43:05.877482 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.31475 > wifi.domain.de.domain: 21571+ A? connectivitycheck.gstatic.com. (47)
    15:43:05.877540 xxxxxxx_Gue, OUT: IP wifi.domain.de.domain > 172.xxx.xxx.20.31475: 21571 1/0/0 A 216.58.212.163 (63)
    15:43:05.893914 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46712 > wifi.domain.de.4502: Flags [S], seq 3578374196, win 13140, options [mss 1460,sackOK,TS val 23244615 ecr 0,nop,wscale 9], length 0
    15:43:05.893954 xxxxxxx_Gue, OUT: IP fra16s51-in-f4.1e100.net.https > 172.xxx.xxx.20.46712: Flags [S.], seq 2514083090, ack 3578374197, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
    15:43:05.896751 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46712 > wifi.domain.de.4502: Flags [.], ack 2514083091, win 26, length 0
    15:43:05.899556 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46712 > wifi.domain.de.4502: Flags [P.], seq 0:564, ack 1, win 26, length 564
    15:43:05.899569 xxxxxxx_Gue, OUT: IP fra16s51-in-f4.1e100.net.https > 172.xxx.xxx.20.46712: Flags [.], ack 565, win 237, length 0
    15:43:05.904902 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40232 > wifi.domain.de.4501: Flags [S], seq 3037401819, win 13140, options [mss 1460,sackOK,TS val 23244616 ecr 0,nop,wscale 9], length 0
    15:43:05.904938 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40232: Flags [S.], seq 1508967830, ack 3037401820, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
    15:43:05.907163 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40232 > wifi.domain.de.4501: Flags [.], ack 1508967831, win 26, length 0
    15:43:05.907703 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40232 > wifi.domain.de.4501: Flags [P.], seq 0:227, ack 1, win 26, length 227
    15:43:05.907714 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40232: Flags [.], ack 228, win 237, length 0
    15:43:05.908082 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40232: Flags [P.], seq 1:530, ack 228, win 237, length 529: HTTP: HTTP/1.1 302 Found
    15:43:05.908170 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40232: Flags [F.], seq 530, ack 228, win 237, length 0
    15:43:05.910040 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40232 > wifi.domain.de.4501: Flags [.], ack 530, win 26, length 0
    15:43:05.911145 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40232 > wifi.domain.de.4501: Flags [F.], seq 227, ack 531, win 26, length 0
    15:43:05.911153 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40232: Flags [.], ack 229, win 237, length 0
    15:43:05.913201 xxxxxxx_Gue, OUT: IP fra16s51-in-f4.1e100.net.https > 172.xxx.xxx.20.46712: Flags [.], seq 1:1461, ack 565, win 237, length 1460
    15:43:05.913209 xxxxxxx_Gue, OUT: IP fra16s51-in-f4.1e100.net.https > 172.xxx.xxx.20.46712: Flags [.], seq 1461:2921, ack 565, win 237, length 1460
    15:43:05.913214 xxxxxxx_Gue, OUT: IP fra16s51-in-f4.1e100.net.https > 172.xxx.xxx.20.46712: Flags [P.], seq 2921:3025, ack 565, win 237, length 104
    15:43:05.917657 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46712 > wifi.domain.de.4502: Flags [.], ack 1461, win 26, length 0
    15:43:05.917932 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46712 > wifi.domain.de.4502: Flags [.], ack 2921, win 26, length 0
    15:43:05.918268 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46712 > wifi.domain.de.4502: Flags [.], ack 3025, win 26, length 0
    15:43:05.926493 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46712 > wifi.domain.de.4502: Flags [P.], seq 564:571, ack 3025, win 26, length 7
    15:43:05.926553 xxxxxxx_Gue, OUT: IP fra16s51-in-f4.1e100.net.https > 172.xxx.xxx.20.46712: Flags [F.], seq 3025, ack 572, win 237, length 0
    15:43:05.930906 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46712 > wifi.domain.de.4502: Flags [R.], seq 571, ack 3026, win 26, length 0
    15:43:06.140776 xxxxxxx_Gue, IN: IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
    15:43:06.144647 xxxxxxx_Gue, IN: IP6 fe80::93e1:1d0d:10b9:d755 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
    15:43:06.144921 xxxxxxx_Gue, IN: IP6 fe80::93e1:1d0d:10b9:d755 > ff02::2: ICMP6, router solicitation, length 16
    15:43:06.411227 xxxxxxx_Gue, IN: IP6 fe80::93e1:1d0d:10b9:d755 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
    15:43:06.791519 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46638 > wifi.domain.de.853: Flags [S], seq 1471103549, win 13140, options [mss 1460,sackOK,TS val 23244704 ecr 0,nop,wscale 9], length 0
    15:43:08.789087 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46638 > wifi.domain.de.853: Flags [S], seq 1471103549, win 13140, options [mss 1460,sackOK,TS val 23244904 ecr 0,nop,wscale 9], length 0
    15:43:09.100507 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40234 > wifi.domain.de.4501: Flags [S], seq 884981422, win 13140, options [mss 1460,sackOK,TS val 23244936 ecr 0,nop,wscale 9], length 0
    15:43:09.100563 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [S.], seq 3070053226, ack 884981423, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
    15:43:09.102418 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40234 > wifi.domain.de.4501: Flags [.], ack 3070053227, win 26, length 0
    15:43:09.103214 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40234 > wifi.domain.de.4501: Flags [P.], seq 0:585, ack 1, win 26, length 585
    15:43:09.103228 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [.], ack 586, win 238, length 0
    15:43:09.103626 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [P.], seq 1:567, ack 586, win 238, length 566: HTTP: HTTP/1.1 302 Found
    15:43:09.105013 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40234 > wifi.domain.de.4501: Flags [.], ack 567, win 26, length 0
    15:43:09.109496 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43832 > wifi.domain.de.4501: Flags [S], seq 1452287280, win 13140, options [mss 1460,sackOK,TS val 23244936 ecr 0,nop,wscale 9], length 0
    15:43:09.109567 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43832: Flags [S.], seq 1099639922, ack 1452287281, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
    15:43:09.112102 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43832 > wifi.domain.de.4501: Flags [.], ack 1, win 26, length 0
    15:43:09.112929 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43832 > wifi.domain.de.4501: Flags [P.], seq 1:571, ack 1, win 26, length 570
    15:43:09.112938 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43832: Flags [.], ack 571, win 238, length 0
    15:43:09.123960 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43832: Flags [.], seq 1:1461, ack 571, win 238, length 1460
    15:43:09.123983 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43832: Flags [P.], seq 1461:2560, ack 571, win 238, length 1099
    15:43:09.126415 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43832 > wifi.domain.de.4501: Flags [.], ack 1461, win 26, length 0
    15:43:09.126625 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43832 > wifi.domain.de.4501: Flags [.], ack 2560, win 26, length 0
    15:43:09.165047 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [S], seq 1244916761, win 13140, options [mss 1460,sackOK,TS val 23244942 ecr 0,nop,wscale 9], length 0
    15:43:09.165120 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [S.], seq 4073747541, ack 1244916762, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
    15:43:09.165948 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43832 > wifi.domain.de.4501: Flags [P.], seq 571:1047, ack 2560, win 26, length 476
    15:43:09.166422 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43832: Flags [P.], seq 2560:3986, ack 1047, win 246, length 1426
    15:43:09.166954 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 1, win 26, length 0
    15:43:09.167522 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [P.], seq 1:522, ack 1, win 26, length 521
    15:43:09.167532 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], ack 522, win 237, length 0
    15:43:09.167920 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 1:1461, ack 522, win 237, length 1460
    15:43:09.167932 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 1461:2921, ack 522, win 237, length 1460
    15:43:09.167937 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 2921:4381, ack 522, win 237, length 1460
    15:43:09.167941 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 4381:5841, ack 522, win 237, length 1460
    15:43:09.167950 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 5841:7301, ack 522, win 237, length 1460
    15:43:09.167954 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 7301:8761, ack 522, win 237, length 1460
    15:43:09.167958 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 8761:10221, ack 522, win 237, length 1460
    15:43:09.167961 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [P.], seq 10221:11681, ack 522, win 237, length 1460
    15:43:09.168542 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43832 > wifi.domain.de.4501: Flags [.], ack 3986, win 26, length 0
    15:43:09.172893 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 1461, win 26, length 0
    15:43:09.172904 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 11681:13141, ack 522, win 237, length 1460
    15:43:09.172913 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 13141:13313, ack 522, win 237, length 172
    15:43:09.173207 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 2921, win 26, length 0
    15:43:09.176111 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 4381, win 26, length 0
    15:43:09.176121 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 13313:14773, ack 522, win 237, length 1460
    15:43:09.176129 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 14773:16233, ack 522, win 237, length 1460
    15:43:09.176133 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 16233:17693, ack 522, win 237, length 1460
    15:43:09.176538 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 5841, win 26, length 0
    15:43:09.176544 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [P.], seq 17693:19153, ack 522, win 237, length 1460
    15:43:09.176830 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 8761, win 26, length 0
    15:43:09.176922 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 11681, win 26, length 0
    15:43:09.176927 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 19153:20613, ack 522, win 237, length 1460
    15:43:09.176932 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 20613:22073, ack 522, win 237, length 1460
    15:43:09.176936 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 22073:23533, ack 522, win 237, length 1460
    15:43:09.176940 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 23533:24993, ack 522, win 237, length 1460
    15:43:09.177350 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 13313, win 26, length 0
    15:43:09.177356 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 24993:26453, ack 522, win 237, length 1460
    15:43:09.177361 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 26453:26625, ack 522, win 237, length 172
    15:43:09.179587 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 16233, win 26, length 0
    15:43:09.179600 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 26625:28085, ack 522, win 237, length 1460
    15:43:09.179608 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 28085:29545, ack 522, win 237, length 1460
    15:43:09.179932 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 19153, win 26, length 0
    15:43:09.179939 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [P.], seq 29545:30833, ack 522, win 237, length 1288
    15:43:09.180041 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 22073, win 26, length 0
    15:43:09.180047 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 30833:32293, ack 522, win 237, length 1460
    15:43:09.180052 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 32293:33753, ack 522, win 237, length 1460
    15:43:09.180057 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 33753:35213, ack 522, win 237, length 1460
    15:43:09.180061 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 35213:35385, ack 522, win 237, length 172
    15:43:09.180453 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 24993, win 26, length 0
    15:43:09.180459 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 35385:36673, ack 522, win 237, length 1288
    15:43:09.182386 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 26625, win 26, length 0
    15:43:09.182397 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 36673:38133, ack 522, win 237, length 1460
    15:43:09.182405 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 38133:39593, ack 522, win 237, length 1460
    15:43:09.182410 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 39593:39937, ack 522, win 237, length 344
    15:43:09.182753 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 29545, win 26, length 0
    15:43:09.182759 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 39937:41397, ack 522, win 237, length 1460
    15:43:09.182764 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [P.], seq 41397:42513, ack 522, win 237, length 1116
    15:43:09.183029 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 30833, win 26, length 0
    15:43:09.183199 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 33753, win 26, length 0
    15:43:09.183206 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 42513:43973, ack 522, win 237, length 1460
    15:43:09.183211 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 43973:45433, ack 522, win 237, length 1460
    15:43:09.183215 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 45433:46893, ack 522, win 237, length 1460
    15:43:09.183219 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 46893:47065, ack 522, win 237, length 172
    15:43:09.188801 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 35385, win 26, length 0
    15:43:09.188854 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 47065:48353, ack 522, win 237, length 1288
    15:43:09.189092 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 36673, win 26, length 0
    15:43:09.189207 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 39593, win 26, length 0
    15:43:09.189216 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 48353:49813, ack 522, win 237, length 1460
    15:43:09.189224 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 49813:51273, ack 522, win 237, length 1460
    15:43:09.189229 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 51273:52733, ack 522, win 237, length 1460
    15:43:09.189234 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 52733:52905, ack 522, win 237, length 172
    15:43:09.189630 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 41397, win 26, length 0
    15:43:09.189638 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [P.], seq 52905:54193, ack 522, win 237, length 1288
    15:43:09.189904 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 42513, win 26, length 0
    15:43:09.189913 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 54193:55653, ack 522, win 237, length 1460
    15:43:09.189921 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 55653:55825, ack 522, win 237, length 172
    15:43:09.190214 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 45433, win 26, length 0
    15:43:09.191572 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 47065, win 26, length 0
    15:43:09.191583 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 55825:57285, ack 522, win 237, length 1460
    15:43:09.191592 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 57285:58745, ack 522, win 237, length 1460
    15:43:09.191597 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 58745:60033, ack 522, win 237, length 1288
    15:43:09.192250 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 48353, win 26, length 0
    15:43:09.192523 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 51273, win 26, length 0
    15:43:09.192529 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 60033:61493, ack 522, win 237, length 1460
    15:43:09.192534 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 61493:62953, ack 522, win 237, length 1460
    15:43:09.192539 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 62953:64413, ack 522, win 237, length 1460
    15:43:09.192542 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 64413:64585, ack 522, win 237, length 172
    15:43:09.192932 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 52905, win 26, length 0
    15:43:09.192942 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [P.], seq 64585:65873, ack 522, win 237, length 1288
    15:43:09.193948 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 54193, win 26, length 0
    15:43:09.193960 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [.], seq 65873:67333, ack 522, win 237, length 1460
    15:43:09.193968 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [P.], seq 67333:67469, ack 522, win 237, length 136
    15:43:09.195353 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 55825, win 26, length 0
    15:43:09.195641 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 58745, win 26, length 0
    15:43:09.195836 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 60033, win 26, length 0
    15:43:09.197702 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 62953, win 26, length 0
    15:43:09.197980 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 64585, win 26, length 0
    15:43:09.198272 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 67333, win 26, length 0
    15:43:09.198506 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 67469, win 26, length 0
    15:43:09.221642 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [P.], seq 522:1038, ack 67469, win 26, length 516
    15:43:09.222090 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [P.], seq 67469:67983, ack 1038, win 245, length 514
    15:43:09.260364 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43834 > wifi.domain.de.4501: Flags [.], ack 67983, win 26, length 0
    15:43:10.162016 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40240 > wifi.domain.de.4501: Flags [S], seq 3467772858, win 13140, options [mss 1460,sackOK,TS val 23245041 ecr 0,nop,wscale 9], length 0
    15:43:10.162061 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40240: Flags [S.], seq 3053681087, ack 3467772859, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
    15:43:10.164436 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40240 > wifi.domain.de.4501: Flags [.], ack 3053681088, win 26, length 0
    15:43:10.165285 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40240 > wifi.domain.de.4501: Flags [P.], seq 0:232, ack 1, win 26, length 232
    15:43:10.165327 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40240: Flags [.], ack 233, win 237, length 0
    15:43:10.165735 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40240: Flags [P.], seq 1:567, ack 233, win 237, length 566: HTTP: HTTP/1.1 302 Found
    15:43:10.168962 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40240 > wifi.domain.de.4501: Flags [.], ack 567, win 26, length 0
    15:43:10.169952 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40240 > wifi.domain.de.4501: Flags [F.], seq 232, ack 567, win 26, length 0
    15:43:10.169986 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40240: Flags [F.], seq 567, ack 234, win 237, length 0
    15:43:10.172443 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40240 > wifi.domain.de.4501: Flags [.], ack 568, win 26, length 0
    15:43:10.231854 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40242 > wifi.domain.de.4501: Flags [S], seq 2934057648, win 13140, options [mss 1460,sackOK,TS val 23245049 ecr 0,nop,wscale 9], length 0
    15:43:10.231903 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40242: Flags [S.], seq 1537026224, ack 2934057649, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
    15:43:10.234185 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40242 > wifi.domain.de.4501: Flags [.], ack 1537026225, win 26, length 0
    15:43:10.240856 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40242 > wifi.domain.de.4501: Flags [P.], seq 0:232, ack 1, win 26, length 232
    15:43:10.240874 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40242: Flags [.], ack 233, win 237, length 0
    15:43:10.241268 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40242: Flags [P.], seq 1:567, ack 233, win 237, length 566: HTTP: HTTP/1.1 302 Found
    15:43:10.243418 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40242 > wifi.domain.de.4501: Flags [.], ack 567, win 26, length 0
    15:43:10.244389 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40242 > wifi.domain.de.4501: Flags [F.], seq 232, ack 567, win 26, length 0
    15:43:10.244426 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40242: Flags [F.], seq 567, ack 234, win 237, length 0
    15:43:10.246844 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.40242 > wifi.domain.de.4501: Flags [.], ack 568, win 26, length 0
    15:43:10.541103 xxxxxxx_Gue, IN: IP6 fe80::93e1:1d0d:10b9:d755 > ff02::2: ICMP6, router solicitation, length 16
    15:43:12.790888 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.46638 > wifi.domain.de.853: Flags [S], seq 1471103549, win 13140, options [mss 1460,sackOK,TS val 23245304 ecr 0,nop,wscale 9], length 0
    15:43:14.069785 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [F.], seq 567, ack 586, win 238, length 0
    15:43:14.069809 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43832: Flags [F.], seq 3986, ack 1047, win 246, length 0
    15:43:14.148796 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [F.], seq 67983, ack 1038, win 245, length 0
    15:43:14.277772 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43832: Flags [F.], seq 3986, ack 1047, win 246, length 0
    15:43:14.277791 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [F.], seq 567, ack 586, win 238, length 0
    15:43:14.284210 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43832 > wifi.domain.de.4501: Flags [.], ack 3987, win 26, length 0
    15:43:14.318950 xxxxxxx_Gue, IN: IP 172.xxx.xxx.20.43832 > wifi.domain.de.4501: Flags [.], ack 3987, win 26, options [nop,nop,sack 1 {3986:3987}], length 0
    15:43:14.365770 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [F.], seq 67983, ack 1038, win 245, length 0
    15:43:14.485772 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [F.], seq 567, ack 586, win 238, length 0
    15:43:14.581771 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [F.], seq 67983, ack 1038, win 245, length 0
    15:43:14.913772 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [F.], seq 567, ack 586, win 238, length 0
    15:43:15.037774 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [F.], seq 67983, ack 1038, win 245, length 0
    15:43:15.741795 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [F.], seq 567, ack 586, win 238, length 0
    15:43:15.901772 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [F.], seq 67983, ack 1038, win 245, length 0
    15:43:17.405796 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [F.], seq 567, ack 586, win 238, length 0
    15:43:17.629771 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [F.], seq 67983, ack 1038, win 245, length 0
    15:43:20.925772 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [F.], seq 567, ack 586, win 238, length 0
    15:43:21.181774 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [F.], seq 67983, ack 1038, win 245, length 0
    15:43:27.585775 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [F.], seq 567, ack 586, win 238, length 0
    15:43:28.097777 xxxxxxx_Gue, OUT: IP wifi.domain.de.4501 > 172.xxx.xxx.20.43834: Flags [F.], seq 67983, ack 1038, win 245, length 0
    15:43:34.374457 xxxxxxx_Gue, IN: IP 0.0.0.0 > all-systems.mcast.net: igmp query v2
    15:43:35.046990 xxxxxxx_Gue, IN: IP 0.0.0.0 > all-systems.mcast.net: igmp query v2
    15:43:36.158723 xxxxxxx_Gue, IN: IP 0.0.0.0 > all-systems.mcast.net: igmp query v2
    15:43:40.893781 xxxxxxx_Gue, OUT: IP ams15s22-in-f163.1e100.net.www > 172.xxx.xxx.20.40234: Flags [F.], seq 567, ack 586, win 238, length 0
    

  • found somewhere in the hotspot settings that there was some expired cert error. I do not expect this to be the cause of the DHCP issues.

    the wildcard cert it shows in red, has expired some months ago. looks like XG switched over to Appliance Cert automatically.

    I changed this to a commercial current cert and the red error disappeared.

  • from my experience, it's better to keep things simple with Sophos. So why not use the separate zone isolation function. Until Saturday it worked smoothly and required way less work on our infrastructure. For large WiFis we use VLAN bridge. For small locations Zone Isolation did a good job in the past.

    Hope Support will honor the "simple" Setup by quickly fixing it.

  • my boss noticed in the daily reports of the XG (HA Cluster) that there are some networks (SSID) and APs that are shown as managed on the secondary node.

    Maybe that is the reason - the traffic is pushed to the secondary by the APs... will need more time to analyse this.

    Primary node:

    Secondary node:

    Strange, today the WiFi interface shows as connected again, issue remains.

Reply
  • my boss noticed in the daily reports of the XG (HA Cluster) that there are some networks (SSID) and APs that are shown as managed on the secondary node.

    Maybe that is the reason - the traffic is pushed to the secondary by the APs... will need more time to analyse this.

    Primary node:

    Secondary node:

    Strange, today the WiFi interface shows as connected again, issue remains.

Children
  • I guess its a HA + Linux + VXLAN Issue. That seems not to be a simple setup? You have 30 Access points? I would rather move to VLAN anyway, if you have VLAN available. 

  • And i forget to mention: 

    You actually stressing the Linux "a lot". 

    Go to the advanced shell, do a ifconfig. 

    You should notice a VXLAN Interface per Access Point and per SSID: This means you have 30x8 Interfaces, resulting in 240 Interfaces on a system. This is quite a lot. (PS: UTM did the same). 

    Thats the reason to go VLAN, as VLAN will decrease this setup to 8 Interfaces (per SSID one VLAN). 

  • Thanks four your tips!

    I counted the managed and active APs that are shown in GUI: currently 37

    so there are some missing compared to the reports and I 'm quite sure, i will find those on the secondary node.

  • so, we have vxlans:

    vxlan19.116 is one of the interfaces, we have issues with. There the Hotspot portal isn't working.

    on the primary:

      new 1 (12 hits)
        Line 802: vxlan19   Link encap:Ethernet  HWaddr 0E:B5:F4:54:36:6B
        Line 810: vxlan19.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
        Line 818: vxlan29   Link encap:Ethernet  HWaddr 9A:6A:4D:3F:8E:7C
        Line 826: vxlan29.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
        Line 834: vxlan33   Link encap:Ethernet  HWaddr 3E:0A:FE:A6:99:5A
        Line 842: vxlan33.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
        Line 850: vxlan41   Link encap:Ethernet  HWaddr D2:B4:02:11:11:A8
        Line 858: vxlan41.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA
        Line 866: vxlan42   Link encap:Ethernet  HWaddr CE:D2:8B:BC:25:53
        Line 874: vxlan42.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA
        Line 882: vxlan43   Link encap:Ethernet  HWaddr 56:FB:A8:8B:85:54
        Line 890: vxlan43.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA

    on the secondary:

      new 3 (10 hits)
        Line 421: vxlan29   Link encap:Ethernet  HWaddr D6:24:0B:DB:71:B2
        Line 429: vxlan29.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
        Line 437: vxlan38   Link encap:Ethernet  HWaddr 32:46:E5:B2:E5:C1
        Line 445: vxlan38.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
        Line 453: vxlan41   Link encap:Ethernet  HWaddr 16:4E:F9:C1:13:2A
        Line 461: vxlan41.109 Link encap:Ethernet  HWaddr F2:39:FF:CE:62:08
        Line 469: vxlan42   Link encap:Ethernet  HWaddr 0A:10:CD:2F:8F:14
        Line 477: vxlan42.109 Link encap:Ethernet  HWaddr F2:39:FF:CE:62:08
        Line 485: vxlan43   Link encap:Ethernet  HWaddr C2:0A:03:DF:EC:2A
        Line 493: vxlan43.109 Link encap:Ethernet  HWaddr F2:39:FF:CE:62:08

    I wrote it somewhere above, that we use isolation only for small usage SSIDs. Our larger SSIDs with some dozend APs have bridge to VLAN settings.

  • So if you already have VLAN, why even mix this? I mean, there is no real use case of using separate zone anymore. It only complicates things in your network. 

    It will not remove this issue, but it is something to fix in the future, as you can easily deploy both VLANs to the switch and use bridge to VLAN instead. 

  • after reboot of the secondary node it's still not working. Devices not getting IP or it takes 5-10 minutes until it gets an IP and then it will not get any answer to DNS requests because the XG cannot ARP the WiFi client.

    I found that after reboot of secondary node, this node has now 20 vxlan interfaces. before the reboot it was only 10.

    Maybe the issue is "resolved" by restarting also the primary node. But I will not do that during working hours.

    secondary node after reboot now with 20 interfaces:

    vxlan19   Link encap:Ethernet  HWaddr FA:4A:B6:9A:DA:83
    vxlan19.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan20   Link encap:Ethernet  HWaddr 02:56:86:E6:B2:64
    vxlan20.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan27   Link encap:Ethernet  HWaddr 66:9B:49:5C:4F:4F
    vxlan27.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan29   Link encap:Ethernet  HWaddr A2:9F:CF:95:60:18
    vxlan29.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan31   Link encap:Ethernet  HWaddr 32:95:A2:7F:46:BE
    vxlan31.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan33   Link encap:Ethernet  HWaddr E2:3B:F6:EC:6A:06
    vxlan33.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan38   Link encap:Ethernet  HWaddr 82:71:8C:FA:15:CB
    vxlan38.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan41   Link encap:Ethernet  HWaddr 66:85:8D:F7:DE:A5
    vxlan41.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA
    vxlan42   Link encap:Ethernet  HWaddr 42:38:AE:BB:93:BD
    vxlan42.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA
    vxlan43   Link encap:Ethernet  HWaddr AE:A9:62:7A:B3:20
    vxlan43.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA

    Btw: the other SSIDs broadcasted by the same APs are working. Only those with Hotspot and or Isolation enabled are causing trouble.

  • I counted: we have 10 APs that are broadcasting a WiFi with setting "Client traffic ->Separate Zone".

    So I guess we need and want 20 vxlan Interfaces on each Cluster HA node.

    Wonder why they started to disappear. Just an other XG weirdness.

  • Seems like the APX is still talking to the Aux instead switching to the primary. That should be investigated by support, what is going on. Personally i moved most customers to Central wireless and VLAN for different matters. 

  • I found a workaround for the issue without booting both HA appliances finally:

    remove it from the AP group, then add again. From CLI output below you can see that the missing 8 vxlan adapters were only added after this change. Same would have happened when rebooting the primary HA node.

    XG430_WP02_SFOS 18.0.5 MR-5-Build586# ifconfig | grep vxlan

    status before unassigning the SSID from the AP group:
    12 vxlan's

    vxlan19   Link encap:Ethernet  HWaddr 0E:B5:F4:54:36:6B
    vxlan19.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan29   Link encap:Ethernet  HWaddr 9A:6A:4D:3F:8E:7C
    vxlan29.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan33   Link encap:Ethernet  HWaddr 3E:0A:FE:A6:99:5A
    vxlan33.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan41   Link encap:Ethernet  HWaddr D2:B4:02:11:11:A8
    vxlan41.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA
    vxlan42   Link encap:Ethernet  HWaddr CE:D2:8B:BC:25:53
    vxlan42.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA
    vxlan43   Link encap:Ethernet  HWaddr 56:FB:A8:8B:85:54
    vxlan43.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA



    status after unassigning and reassigning the SSID to the AP group:
    20 vxlan's

    vxlan19   Link encap:Ethernet  HWaddr 5A:D6:26:B2:BC:9C
    vxlan19.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan20   Link encap:Ethernet  HWaddr DE:F9:EB:F6:D4:51
    vxlan20.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan27   Link encap:Ethernet  HWaddr 66:60:D8:1D:D1:35
    vxlan27.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan29   Link encap:Ethernet  HWaddr 6E:64:6F:92:8F:94
    vxlan29.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan31   Link encap:Ethernet  HWaddr AA:FD:60:52:79:99
    vxlan31.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan33   Link encap:Ethernet  HWaddr 56:48:90:FA:6A:36
    vxlan33.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan38   Link encap:Ethernet  HWaddr 9E:A5:10:1E:F5:88
    vxlan38.116 Link encap:Ethernet  HWaddr F2:A5:26:30:94:7B
    vxlan41   Link encap:Ethernet  HWaddr D2:B4:02:11:11:A8
    vxlan41.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA
    vxlan42   Link encap:Ethernet  HWaddr CE:D2:8B:BC:25:53
    vxlan42.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA
    vxlan43   Link encap:Ethernet  HWaddr 56:FB:A8:8B:85:54
    vxlan43.109 Link encap:Ethernet  HWaddr F2:EE:67:B9:E3:EA