Bienvenido a la Comunidad UBNT

Enlaces se quedan ciclados

Buen dia tengo un problema que ultimamente me ha dado falla, los enlaces se quedan ciclados y me dejan de transmitir, tengo un enlace ptp con una pbe5acgen2 y una pbe5ac620 con la cual estoy transmitiendo internet y tambien estoy recibiendo videos de un dvr entonces eh notado que el cliente me comenta que se dejan de ver las camaras.

les adjunto el log que tengo de la antena, les comento que me pasa como 5 veces al dia.


Feb  3 05:56:11 syslogd started: BusyBox v1.19.4
Feb  3 05:56:24 zcip: init br0
Feb  3 05:56:25 system: Start
Feb  3 05:56:25 syslogd exiting
Feb  3 05:56:26 syslogd started: BusyBox v1.19.4
Feb  3 05:56:26 FileSystem: Start check...
Feb  3 05:56:26 init: Run: /bin/dropbear -F -d /etc/persistent/dropbear_dss_host_key -r /etc/persistent/dropbear_rsa_host_key -p 22
Feb  3 05:56:26 init: starting pid 710, tty '/dev/null': '/bin/dropbear -F -d /etc/persistent/dropbear_dss_host_key -r /etc/persistent/dropbear_rsa
Feb  3 05:56:26 init: Run: /bin/lighttpd -D -f /etc/lighttpd.conf
Feb  3 05:56:26 init: starting pid 711, tty '/dev/null': '/bin/lighttpd -D -f /etc/lighttpd.conf'
Feb  3 05:56:27 dropbear[710]: Not backgrounding
Feb  3 05:56:27 init: Run: /bin/ubntspecd -w -t -a -i wifi1 -j airview1 -m 4 -f 20 -s 200
Feb  3 05:56:27 init: starting pid 712, tty '/dev/null': '/bin/ubntspecd -w -t -a -i wifi1 -j airview1 -m 4 -f 20 -s 200'
Feb  3 05:56:27 init: Run: /bin/udapi-bridge -w -g -C /usr/etc/ssl/cert.pem -p 61780
Feb  3 05:56:27 init: starting pid 713, tty '/dev/null': '/bin/udapi-bridge -w -g -C /usr/etc/ssl/cert.pem -p 61780'
Feb  3 05:56:28 init: Run: /bin/udapi-server -g
Feb  3 05:56:28 init: starting pid 725, tty '/dev/null': '/bin/udapi-server -g'
Feb  3 05:56:29 wireless: ath0     Set Mode:Managed
Feb  3 05:56:29 init: Run: /bin/ulogger
Feb  3 05:56:29 init: starting pid 726, tty '/dev/null': '/bin/ulogger'
Feb  3 05:56:29 init: Run: /bin/ustatsd -d
Feb  3 05:56:29 init: starting pid 727, tty '/dev/null': '/bin/ustatsd -d'
Feb  3 05:56:29 init: Run: /bin/infctld
Feb  3 05:56:29 init: starting pid 728, tty '/dev/null': '/bin/infctld'
Feb  3 05:56:29 init: Run: /sbin/getty -L ttyS0 115200 vt100
Feb  3 05:56:29 lighttpd[711]: (log.c.194) server started 
Feb  3 05:56:29 udapi-server[725]: udapi-server airmax-ac/v8.7.0
Feb  3 05:56:29 udapi-server[725]: UDAPI version v1.0
Feb  3 05:56:33 wireless: ath0     Scan request completed
Feb  3 05:56:33 wireless: ath0     Set Mode:Managed
Feb  3 05:56:33 wireless: ath0     Set Frequency:5.3 GHz (Channel 60)
Feb  3 05:56:33 wireless: ath0     Sending auth to 18:e8:29:76:24:9a. Status: Successful (0).
Feb  3 05:56:33 wireless: ath0     Received auth from 18:e8:29:76:24:9a. Status: Successful (0).
Feb  3 05:56:33 wireless: ath0     Sending assoc_req to 18:e8:29:76:24:9a.
Feb  3 05:56:33 wireless: ath0     Received assoc_resp from 18:e8:29:76:24:9a. Status: Successful (0).
Feb  3 05:56:33 wireless: ath0     New Access Point/Cell address:18:E8:29:76:24:9A
Feb  3 05:56:40 FileSystem: End check.

Comentarios

  • este es la otra parte
    Feb  3 05:56:09 syslogd started: BusyBox v1.19.4
    Feb  3 05:56:17 zcip: init br0
    Feb  3 05:56:18 system: Start
    Feb  3 05:56:18 syslogd exiting
    Feb  3 05:56:18 syslogd started: BusyBox v1.19.4
    Feb  3 05:56:18 FileSystem: Start check...
    Feb  3 05:56:18 init: Run: /bin/dropbear -F -d /etc/persistent/dropbear_dss_host_key -r /etc/persistent/dropbear_rsa_host_key -p 22
    Feb  3 05:56:18 init: starting pid 482, tty '/dev/null': '/bin/dropbear -F -d /etc/persistent/dropbear_dss_host_key -r /etc/persistent/dropbear_rsa
    Feb  3 05:56:19 init: Run: /bin/lighttpd -D -f /etc/lighttpd.conf
    Feb  3 05:56:19 init: starting pid 483, tty '/dev/null': '/bin/lighttpd -D -f /etc/lighttpd.conf'
    Feb  3 05:56:19 wireless: ath0     Set Mode:Master
    Feb  3 05:56:19 dropbear[482]: Not backgrounding
    Feb  3 05:56:19 init: Run: /bin/ubntspecd -w -t -a -i wifi1 -j airview1 -m 4 -f 20 -s 200
    Feb  3 05:56:19 init: starting pid 486, tty '/dev/null': '/bin/ubntspecd -w -t -a -i wifi1 -j airview1 -m 4 -f 20 -s 200'
    Feb  3 05:56:19 wireless: ath1     Set Frequency=5.52 GHz (Channel 104)
    Feb  3 05:56:20 init: Run: /bin/udapi-bridge -w -g -C /usr/etc/ssl/cert.pem -p 61780
    Feb  3 05:56:20 init: starting pid 490, tty '/dev/null': '/bin/udapi-bridge -w -g -C /usr/etc/ssl/cert.pem -p 61780'
    Feb  3 05:56:20 init: Run: /bin/udapi-server -g
    Feb  3 05:56:20 init: starting pid 496, tty '/dev/null': '/bin/udapi-server -g'
    Feb  3 05:56:20 init: Run: /bin/ulogger
    Feb  3 05:56:20 init: starting pid 497, tty '/dev/null': '/bin/ulogger'
    Feb  3 05:56:21 init: Run: /bin/ustatsd -d
    Feb  3 05:56:21 init: starting pid 498, tty '/dev/null': '/bin/ustatsd -d'
    Feb  3 05:56:21 init: Run: /bin/infctld
    Feb  3 05:56:21 init: starting pid 499, tty '/dev/null': '/bin/infctld'
    Feb  3 05:56:21 init: Run: /sbin/getty -L ttyS0 115200 vt100
    Feb  3 05:56:21 udapi-server[496]: udapi-server airmax-ac/v8.7.0
    Feb  3 05:56:21 udapi-server[496]: UDAPI version v1.0
    Feb  3 05:56:22 ulogger[497]: interface=eth0 link=UP speed=100Mbps duplex=FULL
    Feb  3 05:56:22 lighttpd[483]: (log.c.194) server started 
    Feb  3 05:56:24 wireless: ath1     Set Frequency=5.5 GHz (Channel 100)
    Feb  3 05:56:28 FileSystem: End check.
    Feb  3 05:56:40 wireless: ath0     Received reassoc_req from 18:e8:29:84:60:ec.
    Feb  3 05:57:01 wireless: ath0     Received auth from 18:e8:29:84:60:ec. Status: Successful (0).
    Feb  3 05:57:01 wireless: ath0     Authenticated Station 18:e8:29:84:60:ec (Successful)
    Feb  3 05:57:01 wireless: ath0     Sending auth to 18:e8:29:84:60:ec. Status: Successful (0).
    Feb  3 05:57:01 wireless: ath0     Received assoc_req from 18:e8:29:84:60:ec.
    Feb  3 05:57:01 wireless: ath0     Sending assoc_resp to 18:e8:29:84:60:ec. Status: Successful (0).
    Feb  3 05:57:01 hostapd: ath0: STA 18:e8:29:84:60:ec IEEE 802.11: associated
    Feb  3 05:57:01 wireless: ath0     Registered node:18:E8:29:84:60:EC
    Feb  3 05:57:01 hostapd: ath0: STA 18:e8:29:84:60:ec WPA: pairwise key handshake completed (RSN)
    Feb  3 05:57:04 ustatsd[498]: Received remote stats for non-existing sta 18:E8:29:84:60:EC
    Feb  3 05:57:32 wireless: ath1     Set Frequency=5.52 GHz (Channel 104)
    Feb  3 05:58:40 wireless: ath1     Set Frequency=5.54 GHz (Channel 108)
    Feb  3 05:59:48 wireless: ath1     Set Frequency=5.56 GHz (Channel 112)
    Feb  3 06:00:56 wireless: ath1     Set Frequency=5.58 GHz (Channel 116)
    Feb  3 06:02:04 wireless: ath1     Set Frequency=5.59 GHz (Channel 118)
    Feb  3 06:03:12 wireless: ath1     Set Frequency=5.66 GHz (Channel 132)
    Feb  3 06:04:20 wireless: ath1     Set Frequency=5.68 GHz (Channel 136)
    Feb  3 06:05:28 wireless: ath1     Set Frequency=5.7 GHz (Channel 140)
    Feb  3 09:17:23 hostapd: ath0: STA 18:e8:29:84:60:ec IEEE 802.11: disassociated
    Feb  3 09:17:23 wireless: ath0     Expired node:18:E8:29:84:60:EC
    Feb  3 09:17:23 wireless: ath0     Deauthenticated Station 18:e8:29:84:60:ec (Tx consecutive failure)
    Feb  3 15:53:15 wireless: ath0     Received auth from 18:e8:29:84:60:ec. Status: Successful (0).
    Feb  3 15:53:15 wireless: ath0     Authenticated Station 18:e8:29:84:60:ec (Successful)
    Feb  3 15:53:15 wireless: ath0     Sending auth to 18:e8:29:84:60:ec. Status: Successful (0).
    Feb  3 15:53:15 hostapd: ath0: STA 18:e8:29:84:60:ec IEEE 802.11: associated
    Feb  3 15:53:15 wireless: ath0     Received assoc_req from 18:e8:29:84:60:ec.
    Feb  3 15:53:15 wireless: ath0     Sending assoc_resp to 18:e8:29:84:60:ec. Status: Successful (0).
    Feb  3 15:53:15 wireless: ath0     Registered node:18:E8:29:84:60:EC
    Feb  3 15:53:16 hostapd: ath0: STA 18:e8:29:84:60:ec WPA: pairwise key handshake completed (RSN)
    Feb  3 18:29:13 hostapd: ath0: STA 18:e8:29:84:60:ec IEEE 802.11: disassociated
    Feb  3 18:29:13 wireless: ath0     Expired node:18:E8:29:84:60:EC
    Feb  3 18:29:13 wireless: ath0     Deauthenticated Station 18:e8:29:84:60:ec (Tx consecutive failure)
    Feb  4 04:16:00 wireless: ath0     Received auth from 18:e8:29:84:60:ec. Status: Successful (0).
    Feb  4 04:16:00 wireless: ath0     Authenticated Station 18:e8:29:84:60:ec (Successful)
    Feb  4 04:16:00 wireless: ath0     Sending auth to 18:e8:29:84:60:ec. Status: Successful (0).
    Feb  4 04:16:00 hostapd: ath0: STA 18:e8:29:84:60:ec IEEE 802.11: associated
    Feb  4 04:16:00 wireless: ath0     Received assoc_req from 18:e8:29:84:60:ec.
    Feb  4 04:16:00 wireless: ath0     Sending assoc_resp to 18:e8:29:84:60:ec. Status: Successful (0).
    Feb  4 04:16:00 wireless: ath0     Registered node:18:E8:29:84:60:EC
    Feb  4 04:16:00 hostapd: ath0: STA 18:e8:29:84:60:ec WPA: pairwise key handshake completed (RSN)
    Feb  4 04:23:11 httpd[9409]: Password auth succeeded for 'pronto' from 192.168.1.11
Accede o Regístrate para comentar.