Bananian

Banana Pro AP

20 8320
CMDann  
I am trying to create an access point which will allow wireless clients to access the internet. I have this working fine, I am running hostapd and isc-dhcp-server but I am running into an issue. I am obviously using the internal wifi adapter which uses the nl80211 driver. This is causing me an issue though, so far I am able to have 4 clients connect to the device however my DHCP settings have allowed for a lot more.

Here is my hostapd conf
  1. interface=wlan0
  2. driver=nl80211
  3. ssid=FREE_WIFI_NOT_SCAM
  4. hw_mode=g
  5. channel=6
  6. macaddr_acl=0
  7. auth_algs=1
  8. ignore_broadcast_ssid=0
Copy the Code
Here is my dhcp subnet conf
  1. subnet 192.168.42.0 netmask 255.255.255.0 {
  2.         range 192.168.42.10 192.168.42.200;
  3.         option broadcast-address 192.168.42.255;
  4.         option routers 192.168.42.1;
  5.         default-lease-time 600;
  6.         max-lease-time 7200;
  7.         option domain-name "local";
  8.         option domain-name-servers 8.8.8.8, 8.8.4.4;
  9. }
Copy the Code
I have done the whole shebang with modprobe and enabling the hardware. It even works fine, but is limited to 4 clients right now. Any thoughts?
hnsncxy  
Hi,
Could you provide more information about the hostapd when you try to use the client associate the AP ?  and the -dd options can help you . Meanwhile, please attach the log of the dhcpd.

CMDann  
Edited by CMDann at Wed Apr 22, 2015 20:13

Thanks for the reply. You can see my hostapd config files in my first post. Here is the output of the -dd option on hostapd.
  1. root@bananapi ~ # hostapd -dd -B /etc/hostapd/hostapd.conf
  2. random: Trying to read entropy from /dev/random
  3. Configuration file: /etc/hostapd/hostapd.conf
  4. nl80211: interface wlan0 in phy phy0
  5. rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
  6. rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
  7. nl80211: Using driver-based off-channel TX
  8. nl80211: Add own interface ifindex 4
  9. nl80211: Set mode ifindex 4 iftype 3 (AP)
  10. nl80211: Create interface iftype 6 (MONITOR)
  11. nl80211: New interface mon.wlan0 created: ifindex=7
  12. nl80211: Add own interface ifindex 7
  13. BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
  14. nl80211: Regulatory information - country=00
  15. nl80211: 2402-2472 @ 40 MHz
  16. nl80211: 2457-2482 @ 40 MHz
  17. nl80211: 2474-2494 @ 20 MHz
  18. nl80211: 5170-5250 @ 40 MHz
  19. nl80211: 5735-5835 @ 40 MHz
  20. nl80211: Added 802.11b mode based on 802.11g information
  21. Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
  22. Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
  23. Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
  24. Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
  25. Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
  26. Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
  27. Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
  28. Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
  29. Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
  30. Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
  31. Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
  32. Allowed channel: mode=1 chan=12 freq=2467 MHz max_tx_power=20 dBm
  33. Allowed channel: mode=1 chan=13 freq=2472 MHz max_tx_power=20 dBm
  34. Allowed channel: mode=1 chan=14 freq=2484 MHz max_tx_power=20 dBm
  35. Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
  36. Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
  37. Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
  38. Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
  39. Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
  40. Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
  41. Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
  42. Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
  43. Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
  44. Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
  45. Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
  46. Allowed channel: mode=0 chan=12 freq=2467 MHz max_tx_power=20 dBm
  47. Allowed channel: mode=0 chan=13 freq=2472 MHz max_tx_power=20 dBm
  48. Allowed channel: mode=0 chan=14 freq=2484 MHz max_tx_power=20 dBm
  49. Completing interface initialization
  50. Mode: IEEE 802.11g  Channel: 6  Frequency: 2437 MHz
  51. nl80211: Set freq 2437 (ht_enabled=0 sec_channel_offset=0)
  52. RATE[0] rate=10 flags=0x1
  53. RATE[1] rate=20 flags=0x1
  54. RATE[2] rate=55 flags=0x1
  55. RATE[3] rate=110 flags=0x1
  56. RATE[4] rate=60 flags=0x0
  57. RATE[5] rate=90 flags=0x0
  58. RATE[6] rate=120 flags=0x0
  59. RATE[7] rate=180 flags=0x0
  60. RATE[8] rate=240 flags=0x0
  61. RATE[9] rate=360 flags=0x0
  62. RATE[10] rate=480 flags=0x0
  63. RATE[11] rate=540 flags=0x0
  64. Flushing old station entries
  65. Deauthenticate all stations
  66. wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  67. wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  68. wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  69. wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  70. Using interface wlan0 with hwaddr 02:1a:11:f5:b9:22 and ssid 'ap6210_ap_test'
  71. VLAN: vlan_set_name_type(name_type=2)
  72. nl80211: Set beacon (beacon_set=0)
  73. wpa_driver_nl80211_set_operstate: operstate 0->1 (UP)
  74. netlink: Operstate: linkmode=-1, operstate=6
  75. Failed to set TX queue parameters for queue 0.
  76. Failed to set TX queue parameters for queue 1.
  77. Failed to set TX queue parameters for queue 2.
  78. Failed to set TX queue parameters for queue 3.
  79. wlan0: Setup of interface done.
Copy the Code
One thing I forgot to post was my /etc/network/interfaces file.
  1. # interfaces(5) file used by ifup(8) and ifdown(8)
  2. auto lo
  3. iface lo inet loopback

  4. auto eth0

  5. # dhcp configuration
  6. iface eth0 inet dhcp

  7. allow-hotplug wlan0
  8. iface wlan0 inet static
  9.   address 192.168.42.1
  10.   netmask 255.255.255.0

  11. # static ip configuration
  12. #iface eth0 inet static
  13. #       address 192.168.6.241
  14. #       netmask 255.255.255.0
  15. #       gateway 192.168.6.1

  16. up iptables-restore < /etc/iptables.ipv4.nat
Copy the Code
I am able to connect to the Banana Pro as an access point using the onboard WiFi. I did set the module as AP mode in the modules folder. The BPro accepts 5 clients, but then refuses more. When I run arp -i wlan0 I get the following output (I currently have 3 computers connected, 2 fell asleep):
  1. Address                  HWtype  HWaddress           Flags Mask            Iface
  2. 192.168.42.14            ether   28:cf:e9:00:c9:c1   C                     wlan0
  3. 192.168.42.11            ether   2c:8a:72:b4:4f:43   C                     wlan0
  4. 192.168.42.12            ether   0c:d2:92:01:f0:63   C                     wlan0
Copy the Code
Also the output of ifconfig:
  1. eth0      Link encap:Ethernet  HWaddr 02:92:05:02:5c:36
  2.           inet addr:192.168.1.45  Bcast:192.168.1.255  Mask:255.255.255.0
  3.           inet6 addr: fe80::92:5ff:fe02:5c36/64 Scope:Link
  4.           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
  5.           RX packets:83589 errors:0 dropped:0 overruns:0 frame:0
  6.           TX packets:57563 errors:0 dropped:0 overruns:0 carrier:0
  7.           collisions:0 txqueuelen:1000
  8.           RX bytes:83146511 (79.2 MiB)  TX bytes:11526677 (10.9 MiB)
  9.           Interrupt:117 Base address:0xc000

  10. lo        Link encap:Local Loopback
  11.           inet addr:127.0.0.1  Mask:255.0.0.0
  12.           inet6 addr: ::1/128 Scope:Host
  13.           UP LOOPBACK RUNNING  MTU:16436  Metric:1
  14.           RX packets:0 errors:0 dropped:0 overruns:0 frame:0
  15.           TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
  16.           collisions:0 txqueuelen:0
  17.           RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

  18. mon.wlan0 Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
  19.           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
  20.           RX packets:0 errors:0 dropped:0 overruns:0 frame:0
  21.           TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
  22.           collisions:0 txqueuelen:1000
  23.           RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

  24. wlan0     Link encap:Ethernet  HWaddr 02:1a:11:fd:e0:de
  25.           inet addr:192.168.42.1  Bcast:192.168.42.255  Mask:255.255.255.0
  26.           inet6 addr: fe80::1a:11ff:fefd:e0de/64 Scope:Link
  27.           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
  28.           RX packets:57643 errors:0 dropped:0 overruns:0 frame:0
  29.           TX packets:81686 errors:0 dropped:0 overruns:0 carrier:0
  30.           collisions:0 txqueuelen:1000
  31.           RX bytes:10614937 (10.1 MiB)  TX bytes:82952127 (79.1 MiB)
Copy the Code

hawhill  
Can you sniff on mon.wlan0 for what exactly happens when the 6th client comes and tries to connect?

CMDann  
Edited by CMDann at Thu Apr 23, 2015 06:41
hawhill replied at Thu Apr 23, 2015 03:33
Can you sniff on mon.wlan0 for what exactly happens when the 6th client comes and tries to connect?


Yes to be honest I am not entirely sure the best way to do that. I will update my post once I figure this out haha.




Ok so I am using tcpdump to monitor the network. Here is the output of my available interfaces on the Pro.
  1. root@bananapi ~ # tcpdump -D
  2. 1.eth0
  3. 2.wlan0
  4. 3.mon.wlan0
  5. 4.nflog (Linux netfilter log (NFLOG) interface)
  6. 5.usbmon1 (USB bus number 1)
  7. 6.usbmon2 (USB bus number 2)
  8. 7.usbmon3 (USB bus number 3)
  9. 8.usbmon4 (USB bus number 4)
  10. 9.any (Pseudo-device that captures on all interfaces)
  11. 10.lo
Copy the Code
I was connecting to the wlan0 interface, I am not sure what mon.wlan0 is but I will output the dump of each network. mon.wlan0 doesn't seem to do anything ever.
  1. root@bananapi ~ # tcpdump -i mon.wlan0
  2. tcpdump: WARNING: mon.wlan0: no IPv4 address assigned
  3. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  4. listening on mon.wlan0, link-type IEEE802_11_RADIO (802.11 plus radiotap header), capture size 65535 bytes
Copy the Code
wlan0 is much busier, especially since I have connected 5 devices already. Here is the output of the sniff.
  1. root@bananapi ~ # tcpdump -i wlan0
  2. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  3. listening on wlan0, link-type EN10MB (Ethernet), capture size 65535 bytes
  4. 12:42:24.806483 IP 192.168.42.15.netbios-ns > 192.168.42.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
  5. 12:42:25.405431 IP 192.168.42.12.bootpc > bananapi.bootps: BOOTP/DHCP, Request from 0c:d2:92:01:f0:63 (oui Unknown), length 300
  6. 12:42:25.411961 IP bananapi.bootps > 192.168.42.12.bootpc: BOOTP/DHCP, Reply, length 300
  7. 12:42:25.751985 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
  8. 12:42:26.428334 IP 192.168.42.12.51916 > 208.64.201.169.27021: UDP, length 84
  9. 12:42:26.746809 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
  10. 12:42:27.030192 IP 72.21.91.8.https > 192.168.42.11.43858: Flags [P.], seq 3056131319:3056131350, ack 2577646060, win 33, options [nop,nop,TS val 3812998995 ecr 3001929], length 31
  11. 12:42:27.030309 IP 72.21.91.8.https > 192.168.42.11.43858: Flags [F.], seq 31, ack 1, win 33, options [nop,nop,TS val 3812998995 ecr 3001929], length 0
  12. 12:42:27.186551 IP 192.168.42.11.43858 > 72.21.91.8.https: Flags [.], ack 32, win 1641, options [nop,nop,TS val 3004953 ecr 3812998995], length 0
  13. 12:42:27.746805 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
  14. 12:42:27.781416 IP 192.168.42.15.17500 > 255.255.255.255.17500: UDP, length 202
  15. 12:42:27.788982 IP 192.168.42.15.17500 > 255.255.255.255.17500: UDP, length 202
  16. 12:42:27.789632 IP 192.168.42.15.17500 > 255.255.255.255.17500: UDP, length 202
  17. 12:42:27.792177 IP 192.168.42.15.17500 > 192.168.42.255.17500: UDP, length 202
  18. 12:42:30.885961 IP 192.168.42.11.39626 > pc-in-f95.1e100.net.https: Flags [P.], seq 4163500662:4163500689, ack 807228214, win 1546, options [nop,nop,TS val 3005312 ecr 1769826955], length 27
  19. 12:42:31.514596 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [S], seq 2706161343, win 29200, options [mss 1460,sackOK,TS val 35970158 ecr 0,nop,wscale 7], length 0
  20. 12:42:31.583424 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [S.], seq 1273917094, ack 2706161344, win 42540, options [mss 1430,sackOK,TS val 2629004623 ecr 35970158,nop,wscale 7], length 0
  21. 12:42:31.585709 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [.], ack 1, win 229, options [nop,nop,TS val 35970176 ecr 2629004623], length 0
  22. 12:42:31.597581 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [P.], seq 1:214, ack 1, win 229, options [nop,nop,TS val 35970179 ecr 2629004623], length 213
  23. 12:42:31.658294 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [.], ack 214, win 341, options [nop,nop,TS val 2629004698 ecr 35970179], length 0
  24. 12:42:31.660812 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [.], seq 1:1419, ack 214, win 341, options [nop,nop,TS val 2629004700 ecr 35970179], length 1418
  25. 12:42:31.660923 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [.], seq 1419:2837, ack 214, win 341, options [nop,nop,TS val 2629004700 ecr 35970179], length 1418
  26. 12:42:31.661239 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [P.], seq 2837:3581, ack 214, win 341, options [nop,nop,TS val 2629004700 ecr 35970179], length 744
  27. 12:42:31.662678 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [.], ack 1419, win 251, options [nop,nop,TS val 35970195 ecr 2629004700], length 0
  28. 12:42:31.662882 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [.], ack 3581, win 285, options [nop,nop,TS val 35970195 ecr 2629004700], length 0
  29. 12:42:31.664684 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [P.], seq 214:364, ack 3581, win 285, options [nop,nop,TS val 35970196 ecr 2629004700], length 150
  30. 12:42:31.728336 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [P.], seq 3581:3835, ack 364, win 350, options [nop,nop,TS val 2629004767 ecr 35970196], length 254
  31. 12:42:31.730455 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [P.], seq 364:737, ack 3835, win 307, options [nop,nop,TS val 35970212 ecr 2629004767], length 373
  32. 12:42:31.834200 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [.], ack 737, win 358, options [nop,nop,TS val 2629004873 ecr 35970212], length 0
  33. 12:42:32.036799 ARP, Request who-has 192.168.42.11 tell bananapi, length 28
  34. 12:42:32.058411 ARP, Reply 192.168.42.11 is-at 2c:8a:72:b4:4f:43 (oui Unknown), length 28
  35. 12:42:32.190333 IP 192.168.42.11.40091 > 91.190.218.54.12350: Flags [P.], seq 4269765089:4269765094, ack 3720137309, win 1386, options [nop,nop,TS val 3005440 ecr 1060901877], length 5
  36. 12:42:32.193881 IP 192.168.42.11.38685 > 157.55.130.142.40012: Flags [P.], seq 2596942780:2596942788, ack 3219756916, win 1369, options [nop,nop,TS val 3005441 ecr 776758801], length 8
  37. 12:42:32.280968 IP 157.55.130.142.40012 > 192.168.42.11.38685: Flags [P.], seq 1:5, ack 8, win 34, options [nop,nop,TS val 776829377 ecr 3005441], length 4
  38. 12:42:32.299653 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [P.], seq 3835:4816, ack 737, win 358, options [nop,nop,TS val 2629005338 ecr 35970212], length 981
  39. 12:42:32.305051 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [F.], seq 737, ack 4816, win 329, options [nop,nop,TS val 35970356 ecr 2629005338], length 0
  40. 12:42:32.322055 IP 192.168.42.11.38685 > 157.55.130.142.40012: Flags [P.], seq 8:99, ack 5, win 1369, options [nop,nop,TS val 3005466 ecr 776829377], length 91
  41. 12:42:32.366394 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [F.], seq 4816, ack 738, win 358, options [nop,nop,TS val 2629005406 ecr 35970356], length 0
  42. 12:42:32.369429 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [.], ack 4817, win 329, options [nop,nop,TS val 35970372 ecr 2629005406], length 0
  43. 12:42:32.409304 IP 157.55.130.142.40012 > 192.168.42.11.38685: Flags [P.], seq 5:113, ack 99, win 34, options [nop,nop,TS val 776829409 ecr 3005466], length 108
  44. 12:42:32.457368 IP 192.168.42.11.40091 > 91.190.218.54.12350: Flags [P.], seq 0:5, ack 1, win 1386, options [nop,nop,TS val 3005479 ecr 1060901877], length 5
  45. 12:42:32.457598 IP 192.168.42.11.38685 > 157.55.130.142.40012: Flags [P.], seq 99:103, ack 113, win 1369, options [nop,nop,TS val 3005479 ecr 776829409], length 4
  46. 12:42:32.547211 IP 157.55.130.142.40012 > 192.168.42.11.38685: Flags [P.], seq 113:117, ack 103, win 34, options [nop,nop,TS val 776829444 ecr 3005479], length 4
  47. 12:42:32.636107 IP 192.168.42.11.38685 > 157.55.130.142.40012: Flags [.], ack 117, win 1369, options [nop,nop,TS val 3005497 ecr 776829444], length 0
  48. 12:42:33.108393 IP 192.168.42.15.netbios-ns > 192.168.42.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
  49. 12:42:33.109324 IP6 fe80::54d0:a94a:3d3c:ac39.56172 > ff02::1:3.hostmon: UDP, length 22
  50. 12:42:33.109757 IP 192.168.42.15.56172 > 224.0.0.252.hostmon: UDP, length 22
  51. 12:42:33.112110 IP6 fe80::54d0:a94a:3d3c:ac39.62838 > ff02::1:3.hostmon: UDP, length 22
  52. 12:42:33.112256 IP 192.168.42.15.62838 > 224.0.0.252.hostmon: UDP, length 22
  53. 12:42:33.255261 IP 192.168.42.11.40091 > 91.190.218.54.12350: Flags [P.], seq 0:5, ack 1, win 1386, options [nop,nop,TS val 3005557 ecr 1060901877], length 5
  54. 12:42:33.522931 IP6 fe80::54d0:a94a:3d3c:ac39.56172 > ff02::1:3.hostmon: UDP, length 22
  55. 12:42:33.523817 IP6 fe80::54d0:a94a:3d3c:ac39.62838 > ff02::1:3.hostmon: UDP, length 22
  56. 12:42:33.523892 IP 192.168.42.15.56172 > 224.0.0.252.hostmon: UDP, length 22
  57. 12:42:33.524079 IP 192.168.42.15.62838 > 224.0.0.252.hostmon: UDP, length 22
  58. 12:42:33.857859 IP 192.168.42.15.netbios-ns > 192.168.42.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
  59. 12:42:34.260469 IP pc-in-f189.1e100.net.https > 192.168.42.12.42508: Flags [P.], seq 1372870358:1372870419, ack 734197651, win 373, options [nop,nop,TS val 1744800534 ecr 35963504], length 61
  60. 12:42:34.261907 IP 192.168.42.12.42508 > pc-in-f189.1e100.net.https: Flags [.], ack 61, win 254, options [nop,nop,TS val 35970845 ecr 1744800534], length 0
  61. 12:42:34.287322 IP 192.168.42.12.47420 > s3-website-us-east-1.amazonaws.com.http: Flags [.], ack 1116211667, win 493, length 0
  62. 12:42:34.351066 IP s3-website-us-east-1.amazonaws.com.http > 192.168.42.12.47420: Flags [.], ack 1, win 127, length 0
  63. 12:42:34.617868 IP 192.168.42.15.netbios-ns > 192.168.42.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
  64. 12:42:34.663457 IP pa-in-f189.1e100.net.https > 192.168.42.12.55926: Flags [P.], seq 3778196599:3778196660, ack 2955587059, win 771, options [nop,nop,TS val 2624161896 ecr 35963504], length 61
  65. 12:42:34.664808 IP 192.168.42.12.55926 > pa-in-f189.1e100.net.https: Flags [.], ack 61, win 1159, options [nop,nop,TS val 35970946 ecr 2624161896], length 0
  66. 12:42:35.064503 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
  67. 12:42:35.138449 IP 192.168.42.15.50817 > pe-in-f189.1e100.net.https: UDP, length 24
  68. 12:42:35.232398 IP pe-in-f189.1e100.net.https > 192.168.42.15.50817: UDP, length 32
  69. 12:42:35.475088 IP 192.168.42.12.51916 > 208.64.201.169.27021: UDP, length 84
  70. 12:42:35.892994 IP 208.64.201.169.27021 > 192.168.42.12.51916: UDP, length 36
  71. 12:42:36.056813 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
  72. 12:42:37.056821 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
  73. ^C
  74. 69 packets captured
  75. 69 packets received by filter
  76. 0 packets dropped by kernel
Copy the Code
The devices I have connected are all very diverse.

  • iPad Mini 3
  • MSI GE70 laptop
  • Mac Mini
  • HP Chromebook
  • HTC ONE M8


The last device I am trying to connect is an Acer Switch. When one of the devices disconnects, I am able to connect the last device. Always maintaining a max of 5 clients.

CMDann  

More info

Edited by CMDann at Thu Apr 23, 2015 07:58

I guess the big question is, are the 5 users a limitation of the hardware or a software limitation?




I am supplying a range of IPs to my DHCP server from 192.168.42.10 to 192.168.42.200 which should be more than enough clients. I can't seem to find any configuration files which may indicate the number of clients that can connect. If I look in my /etc/modules config file:
  1. # /etc/modules: kernel modules to load at boot time.
  2. #
  3. # This file contains the names of kernel modules that should be loaded
  4. # at boot time, one per line. Lines beginning with "#" are ignored.
  5. # Parameters can be specified after the module name.

  6. # VLAN support for BPI-R1
  7. 8021q

  8. #ap6210
  9. ap6210 op_mode=2
Copy the Code
I have ap6210 running in mode 2, which from I read on the wiki: http://wiki.lemaker.org/WiFi#WiFi_AP_mode

I have been using isc-dhcp server like in the adafruit Raspberry Pi tutorials. This has been the only DHCP server I have been able to get working, maybe that is causing the issue? I was unsuccessful at getting udhcpd or dnsmasq working instead.

Needless to say this is frustrating haha




Edit:

I have since found a tcpdump command that only shows the connections to the access points from the computers requesting a connection.
  1. root@bananapi ~ # tcpdump -n -i wlan0 port bootps or port bootpc
  2. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  3. listening on wlan0, link-type EN10MB (Ethernet), capture size 65535 bytes
  4. 13:15:03.543453 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 6c:94:f8:9e:83:fa, length 300
  5. 13:15:03.544260 IP 192.168.42.1.67 > 255.255.255.255.68: BOOTP/DHCP, Reply, length 300
  6. 13:15:03.730611 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 6c:94:f8:9e:83:fa, length 300
  7. 13:15:03.737192 IP 192.168.42.1.67 > 192.168.42.10.68: BOOTP/DHCP, Reply, length 300
  8. 13:15:16.556951 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 2c:8a:72:b4:4f:43, length 314
  9. 13:15:16.563154 IP 192.168.42.1.67 > 192.168.42.11.68: BOOTP/DHCP, Reply, length 300
  10. 13:15:36.024050 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 28:cf:e9:00:c9:c1, length 300
  11. 13:15:36.024883 IP 192.168.42.1.67 > 255.255.255.255.68: BOOTP/DHCP, Reply, length 300
  12. 13:15:37.431454 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 28:cf:e9:00:c9:c1, length 300
  13. 13:15:37.437814 IP 192.168.42.1.67 > 192.168.42.14.68: BOOTP/DHCP, Reply, length 300
  14. 13:16:18.013431 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 0c:d2:92:01:f0:63, length 300
  15. 13:16:18.019425 IP 192.168.42.1.67 > 192.168.42.12.68: BOOTP/DHCP, Reply, length 300
  16. 13:16:38.392390 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from ec:0e:c4:4c:e3:b9, length 300
  17. 13:16:39.394820 IP 192.168.42.1.67 > 192.168.42.15.68: BOOTP/DHCP, Reply, length 300
  18. 13:16:39.402324 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from ec:0e:c4:4c:e3:b9, length 317
  19. 13:16:39.408446 IP 192.168.42.1.67 > 192.168.42.15.68: BOOTP/DHCP, Reply, length 300
  20. 13:18:59.175518 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from d0:e7:82:ec:3a:dd, length 300
  21. 13:19:00.177138 IP 192.168.42.1.67 > 192.168.42.13.68: BOOTP/DHCP, Reply, length 300
  22. 13:19:00.261235 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from d0:e7:82:ec:3a:dd, length 300
  23. 13:19:00.267310 IP 192.168.42.1.67 > 192.168.42.13.68: BOOTP/DHCP, Reply, length 300
  24. 13:20:05.064128 IP 192.168.42.11.68 > 192.168.42.1.67: BOOTP/DHCP, Request from 2c:8a:72:b4:4f:43, length 308
  25. 13:20:05.070286 IP 192.168.42.1.67 > 192.168.42.11.68: BOOTP/DHCP, Reply, length 300
  26. 13:21:15.181166 IP 192.168.42.12.68 > 192.168.42.1.67: BOOTP/DHCP, Request from 0c:d2:92:01:f0:63, length 300
  27. 13:21:15.187257 IP 192.168.42.1.67 > 192.168.42.12.68: BOOTP/DHCP, Reply, length 300
  28. ^C
  29. 24 packets captured
  30. 24 packets received by filter
  31. 0 packets dropped by kernel
Copy the Code
The only problem is it doesn't show when there is an error. However when I try another device I get:



I am unable to find a log file for isc-dhcp-server, I am checking out the man page to see if I need to enable one. The only log output I have gotten was in /var/log/syslog when I had the wrong configuration options set.




Even more edits. I am using dhcpdump to monitor the wlan0 interface while connections are happening. Here is the output for the first 5.
  1. root@bananapi ~ # dhcpdump -i wlan0
  2.   TIME: 2015-04-23 14:05:17.402
  3.     IP: 0.0.0.0 (ec:e:c4:4c:e3:b9) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  4.     OP: 1 (BOOTPREQUEST)
  5. HTYPE: 1 (Ethernet)
  6.   HLEN: 6
  7.   HOPS: 0
  8.    XID: a252bc67
  9.   SECS: 0
  10. FLAGS: 0
  11. CIADDR: 0.0.0.0
  12. YIADDR: 0.0.0.0
  13. SIADDR: 0.0.0.0
  14. GIADDR: 0.0.0.0
  15. CHADDR: ec:0e:c4:4c:e3:b9:00:00:00:00:00:00:00:00:00:00
  16. SNAME: .
  17. FNAME: .
  18. OPTION:  53 (  1) DHCP message type         1 (DHCPDISCOVER)
  19. OPTION:  61 (  7) Client-identifier         01:ec:0e:c4:4c:e3:b9
  20. OPTION:  12 ( 10) Host name                 AcerSwitch
  21. OPTION:  60 (  8) Vendor class identifier   MSFT 5.0
  22. OPTION:  55 ( 13) Parameter Request List      1 (Subnet mask)
  23.                                              15 (Domainname)
  24.                                               3 (Routers)
  25.                                               6 (DNS server)
  26.                                              44 (NetBIOS name server)
  27.                                              46 (NetBIOS node type)
  28.                                              47 (NetBIOS scope)
  29.                                              31 (Perform router discovery)
  30.                                              33 (Static route)
  31.                                             121 (Classless Static Route)
  32.                                             249 (MSFT - Classless route)
  33.                                             252 (MSFT - WinSock Proxy Auto Detect)
  34.                                              43 (Vendor specific info)

  35. ---------------------------------------------------------------------------

  36.   TIME: 2015-04-23 14:05:18.405
  37.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 192.168.42.15 (ec:e:c4:4c:e3:b9)
  38.     OP: 2 (BOOTPREPLY)
  39. HTYPE: 1 (Ethernet)
  40.   HLEN: 6
  41.   HOPS: 0
  42.    XID: a252bc67
  43.   SECS: 0
  44. FLAGS: 0
  45. CIADDR: 0.0.0.0
  46. YIADDR: 192.168.42.15
  47. SIADDR: 0.0.0.0
  48. GIADDR: 0.0.0.0
  49. CHADDR: ec:0e:c4:4c:e3:b9:00:00:00:00:00:00:00:00:00:00
  50. SNAME: .
  51. FNAME: .
  52. OPTION:  53 (  1) DHCP message type         2 (DHCPOFFER)
  53. OPTION:  54 (  4) Server identifier         192.168.42.1
  54. OPTION:  51 (  4) IP address leasetime      600 (10m)
  55. OPTION:   1 (  4) Subnet mask               255.255.255.0
  56. OPTION:  15 (  5) Domainname                local
  57. OPTION:   3 (  4) Routers                   192.168.42.1
  58. OPTION:   6 (  8) DNS server                8.8.8.8,8.8.4.4
  59. ---------------------------------------------------------------------------

  60.   TIME: 2015-04-23 14:05:18.411
  61.     IP: 0.0.0.0 (ec:e:c4:4c:e3:b9) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  62.     OP: 1 (BOOTPREQUEST)
  63. HTYPE: 1 (Ethernet)
  64.   HLEN: 6
  65.   HOPS: 0
  66.    XID: a252bc67
  67.   SECS: 0
  68. FLAGS: 0
  69. CIADDR: 0.0.0.0
  70. YIADDR: 0.0.0.0
  71. SIADDR: 0.0.0.0
  72. GIADDR: 0.0.0.0
  73. CHADDR: ec:0e:c4:4c:e3:b9:00:00:00:00:00:00:00:00:00:00
  74. SNAME: .
  75. FNAME: .
  76. OPTION:  53 (  1) DHCP message type         3 (DHCPREQUEST)
  77. OPTION:  61 (  7) Client-identifier         01:ec:0e:c4:4c:e3:b9
  78. OPTION:  50 (  4) Request IP address        192.168.42.15
  79. OPTION:  54 (  4) Server identifier         192.168.42.1
  80. OPTION:  12 ( 10) Host name                 AcerSwitch
  81. OPTION:  81 ( 13) Client FQDN               0-0-0 AcerSwitch
  82. OPTION:  60 (  8) Vendor class identifier   MSFT 5.0
  83. OPTION:  55 ( 13) Parameter Request List      1 (Subnet mask)
  84.                                              15 (Domainname)
  85.                                               3 (Routers)
  86.                                               6 (DNS server)
  87.                                              44 (NetBIOS name server)
  88.                                              46 (NetBIOS node type)
  89.                                              47 (NetBIOS scope)
  90.                                              31 (Perform router discovery)
  91.                                              33 (Static route)
  92.                                             121 (Classless Static Route)
  93.                                             249 (MSFT - Classless route)
  94.                                             252 (MSFT - WinSock Proxy Auto Detect)
  95.                                              43 (Vendor specific info)

  96. ---------------------------------------------------------------------------

  97.   TIME: 2015-04-23 14:05:18.426
  98.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 192.168.42.15 (ec:e:c4:4c:e3:b9)
  99.     OP: 2 (BOOTPREPLY)
  100. HTYPE: 1 (Ethernet)
  101.   HLEN: 6
  102.   HOPS: 0
  103.    XID: a252bc67
  104.   SECS: 0
  105. FLAGS: 0
  106. CIADDR: 0.0.0.0
  107. YIADDR: 192.168.42.15
  108. SIADDR: 0.0.0.0
  109. GIADDR: 0.0.0.0
  110. CHADDR: ec:0e:c4:4c:e3:b9:00:00:00:00:00:00:00:00:00:00
  111. SNAME: .
  112. FNAME: .
  113. OPTION:  53 (  1) DHCP message type         5 (DHCPACK)
  114. OPTION:  54 (  4) Server identifier         192.168.42.1
  115. OPTION:  51 (  4) IP address leasetime      600 (10m)
  116. OPTION:   1 (  4) Subnet mask               255.255.255.0
  117. OPTION:  15 (  5) Domainname                local
  118. OPTION:   3 (  4) Routers                   192.168.42.1
  119. OPTION:   6 (  8) DNS server                8.8.8.8,8.8.4.4
  120. ---------------------------------------------------------------------------

  121.   TIME: 2015-04-23 14:06:00.963
  122.     IP: 0.0.0.0 (28:cf:e9:0:c9:c1) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  123.     OP: 1 (BOOTPREQUEST)
  124. HTYPE: 1 (Ethernet)
  125.   HLEN: 6
  126.   HOPS: 0
  127.    XID: bb5aa2f3
  128.   SECS: 0
  129. FLAGS: 0
  130. CIADDR: 0.0.0.0
  131. YIADDR: 0.0.0.0
  132. SIADDR: 0.0.0.0
  133. GIADDR: 0.0.0.0
  134. CHADDR: 28:cf:e9:00:c9:c1:00:00:00:00:00:00:00:00:00:00
  135. SNAME: .
  136. FNAME: .
  137. OPTION:  53 (  1) DHCP message type         3 (DHCPREQUEST)
  138. OPTION:  55 (  9) Parameter Request List      1 (Subnet mask)
  139.                                               3 (Routers)
  140.                                               6 (DNS server)
  141.                                              15 (Domainname)
  142.                                             119 (Domain Search)
  143.                                              95 (LDAP)
  144.                                             252 (MSFT - WinSock Proxy Auto Detect)
  145.                                              44 (NetBIOS name server)
  146.                                              46 (NetBIOS node type)

  147. OPTION:  57 (  2) Maximum DHCP message size 1500
  148. OPTION:  61 (  7) Client-identifier         01:28:cf:e9:00:c9:c1
  149. OPTION:  50 (  4) Request IP address        192.168.1.120
  150. OPTION:  51 (  4) IP address leasetime      7776000 (12w6d)
  151. OPTION:  12 (  9) Host name                 Macintosh
  152. ---------------------------------------------------------------------------

  153.   TIME: 2015-04-23 14:06:00.971
  154.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  155.     OP: 2 (BOOTPREPLY)
  156. HTYPE: 1 (Ethernet)
  157.   HLEN: 6
  158.   HOPS: 0
  159.    XID: bb5aa2f3
  160.   SECS: 0
  161. FLAGS: 7f80
  162. CIADDR: 0.0.0.0
  163. YIADDR: 0.0.0.0
  164. SIADDR: 192.168.42.1
  165. GIADDR: 0.0.0.0
  166. CHADDR: 28:cf:e9:00:c9:c1:00:00:00:00:00:00:00:00:00:00
  167. SNAME: .
  168. FNAME: .
  169. OPTION:  53 (  1) DHCP message type         6 (DHCPNAK)
  170. OPTION:  54 (  4) Server identifier         192.168.42.1
  171. OPTION:  56 ( 31) Message                   requested address not available
  172. ---------------------------------------------------------------------------

  173.   TIME: 2015-04-23 14:06:02.177
  174.     IP: 0.0.0.0 (28:cf:e9:0:c9:c1) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  175.     OP: 1 (BOOTPREQUEST)
  176. HTYPE: 1 (Ethernet)
  177.   HLEN: 6
  178.   HOPS: 0
  179.    XID: bb5aa2f4
  180.   SECS: 2
  181. FLAGS: 0
  182. CIADDR: 0.0.0.0
  183. YIADDR: 0.0.0.0
  184. SIADDR: 0.0.0.0
  185. GIADDR: 0.0.0.0
  186. CHADDR: 28:cf:e9:00:c9:c1:00:00:00:00:00:00:00:00:00:00
  187. SNAME: .
  188. FNAME: .
  189. OPTION:  53 (  1) DHCP message type         3 (DHCPREQUEST)
  190. OPTION:  55 (  9) Parameter Request List      1 (Subnet mask)
  191.                                               3 (Routers)
  192.                                               6 (DNS server)
  193.                                              15 (Domainname)
  194.                                             119 (Domain Search)
  195.                                              95 (LDAP)
  196.                                             252 (MSFT - WinSock Proxy Auto Detect)
  197.                                              44 (NetBIOS name server)
  198.                                              46 (NetBIOS node type)

  199. OPTION:  57 (  2) Maximum DHCP message size 1500
  200. OPTION:  61 (  7) Client-identifier         01:28:cf:e9:00:c9:c1
  201. OPTION:  50 (  4) Request IP address        192.168.42.14
  202. OPTION:  51 (  4) IP address leasetime      7776000 (12w6d)
  203. OPTION:  12 (  9) Host name                 Macintosh
  204. ---------------------------------------------------------------------------

  205.   TIME: 2015-04-23 14:06:02.184
  206.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 192.168.42.14 (28:cf:e9:0:c9:c1)
  207.     OP: 2 (BOOTPREPLY)
  208. HTYPE: 1 (Ethernet)
  209.   HLEN: 6
  210.   HOPS: 0
  211.    XID: bb5aa2f4
  212.   SECS: 2
  213. FLAGS: 0
  214. CIADDR: 0.0.0.0
  215. YIADDR: 192.168.42.14
  216. SIADDR: 0.0.0.0
  217. GIADDR: 0.0.0.0
  218. CHADDR: 28:cf:e9:00:c9:c1:00:00:00:00:00:00:00:00:00:00
  219. SNAME: .
  220. FNAME: .
  221. OPTION:  53 (  1) DHCP message type         5 (DHCPACK)
  222. OPTION:  54 (  4) Server identifier         192.168.42.1
  223. OPTION:  51 (  4) IP address leasetime      7200 (2h)
  224. OPTION:   1 (  4) Subnet mask               255.255.255.0
  225. OPTION:   3 (  4) Routers                   192.168.42.1
  226. OPTION:   6 (  8) DNS server                8.8.8.8,8.8.4.4
  227. OPTION:  15 (  5) Domainname                local
  228. ---------------------------------------------------------------------------

  229.   TIME: 2015-04-23 14:06:15.204
  230.     IP: 0.0.0.0 (2c:8a:72:b4:4f:43) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  231.     OP: 1 (BOOTPREQUEST)
  232. HTYPE: 1 (Ethernet)
  233.   HLEN: 6
  234.   HOPS: 0
  235.    XID: d99d7ab8
  236.   SECS: 0
  237. FLAGS: 0
  238. CIADDR: 0.0.0.0
  239. YIADDR: 0.0.0.0
  240. SIADDR: 0.0.0.0
  241. GIADDR: 0.0.0.0
  242. CHADDR: 2c:8a:72:b4:4f:43:00:00:00:00:00:00:00:00:00:00
  243. SNAME: .
  244. FNAME: .
  245. OPTION:  53 (  1) DHCP message type         1 (DHCPDISCOVER)
  246. OPTION:  61 (  7) Client-identifier         01:2c:8a:72:b4:4f:43
  247. OPTION:  57 (  2) Maximum DHCP message size 1500
  248. OPTION:  60 ( 12) Vendor class identifier   dhcpcd-5.5.6
  249. OPTION:  12 ( 24) Host name                 android-dae3283f730536b0
  250. OPTION:  55 (  9) Parameter Request List      1 (Subnet mask)
  251.                                              33 (Static route)
  252.                                               3 (Routers)
  253.                                               6 (DNS server)
  254.                                              15 (Domainname)
  255.                                              28 (Broadcast address)
  256.                                              51 (IP address leasetime)
  257.                                              58 (T1)
  258.                                              59 (T2)

  259. ---------------------------------------------------------------------------

  260.   TIME: 2015-04-23 14:06:16.207
  261.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 192.168.42.11 (2c:8a:72:b4:4f:43)
  262.     OP: 2 (BOOTPREPLY)
  263. HTYPE: 1 (Ethernet)
  264.   HLEN: 6
  265.   HOPS: 0
  266.    XID: d99d7ab8
  267.   SECS: 0
  268. FLAGS: 0
  269. CIADDR: 0.0.0.0
  270. YIADDR: 192.168.42.11
  271. SIADDR: 0.0.0.0
  272. GIADDR: 0.0.0.0
  273. CHADDR: 2c:8a:72:b4:4f:43:00:00:00:00:00:00:00:00:00:00
  274. SNAME: .
  275. FNAME: .
  276. OPTION:  53 (  1) DHCP message type         2 (DHCPOFFER)
  277. OPTION:  54 (  4) Server identifier         192.168.42.1
  278. OPTION:  51 (  4) IP address leasetime      600 (10m)
  279. OPTION:   1 (  4) Subnet mask               255.255.255.0
  280. OPTION:   3 (  4) Routers                   192.168.42.1
  281. OPTION:   6 (  8) DNS server                8.8.8.8,8.8.4.4
  282. OPTION:  15 (  5) Domainname                local
  283. OPTION:  28 (  4) Broadcast address         192.168.42.255
  284. ---------------------------------------------------------------------------

  285.   TIME: 2015-04-23 14:06:16.213
  286.     IP: 0.0.0.0 (2c:8a:72:b4:4f:43) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  287.     OP: 1 (BOOTPREQUEST)
  288. HTYPE: 1 (Ethernet)
  289.   HLEN: 6
  290.   HOPS: 0
  291.    XID: d99d7ab8
  292.   SECS: 1
  293. FLAGS: 0
  294. CIADDR: 0.0.0.0
  295. YIADDR: 0.0.0.0
  296. SIADDR: 0.0.0.0
  297. GIADDR: 0.0.0.0
  298. CHADDR: 2c:8a:72:b4:4f:43:00:00:00:00:00:00:00:00:00:00
  299. SNAME: .
  300. FNAME: .
  301. OPTION:  53 (  1) DHCP message type         3 (DHCPREQUEST)
  302. OPTION:  61 (  7) Client-identifier         01:2c:8a:72:b4:4f:43
  303. OPTION:  50 (  4) Request IP address        192.168.42.11
  304. OPTION:  54 (  4) Server identifier         192.168.42.1
  305. OPTION:  57 (  2) Maximum DHCP message size 1500
  306. OPTION:  60 ( 12) Vendor class identifier   dhcpcd-5.5.6
  307. OPTION:  12 ( 24) Host name                 android-dae3283f730536b0
  308. OPTION:  55 (  9) Parameter Request List      1 (Subnet mask)
  309.                                              33 (Static route)
  310.                                               3 (Routers)
  311.                                               6 (DNS server)
  312.                                              15 (Domainname)
  313.                                              28 (Broadcast address)
  314.                                              51 (IP address leasetime)
  315.                                              58 (T1)
  316.                                              59 (T2)

  317. ---------------------------------------------------------------------------

  318.   TIME: 2015-04-23 14:06:16.220
  319.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 192.168.42.11 (2c:8a:72:b4:4f:43)
  320.     OP: 2 (BOOTPREPLY)
  321. HTYPE: 1 (Ethernet)
  322.   HLEN: 6
  323.   HOPS: 0
  324.    XID: d99d7ab8
  325.   SECS: 1
  326. FLAGS: 0
  327. CIADDR: 0.0.0.0
  328. YIADDR: 192.168.42.11
  329. SIADDR: 0.0.0.0
  330. GIADDR: 0.0.0.0
  331. CHADDR: 2c:8a:72:b4:4f:43:00:00:00:00:00:00:00:00:00:00
  332. SNAME: .
  333. FNAME: .
  334. OPTION:  53 (  1) DHCP message type         5 (DHCPACK)
  335. OPTION:  54 (  4) Server identifier         192.168.42.1
  336. OPTION:  51 (  4) IP address leasetime      600 (10m)
  337. OPTION:   1 (  4) Subnet mask               255.255.255.0
  338. OPTION:   3 (  4) Routers                   192.168.42.1
  339. OPTION:   6 (  8) DNS server                8.8.8.8,8.8.4.4
  340. OPTION:  15 (  5) Domainname                local
  341. OPTION:  28 (  4) Broadcast address         192.168.42.255
  342. ---------------------------------------------------------------------------

  343.   TIME: 2015-04-23 14:06:37.483
  344.     IP: 0.0.0.0 (c:d2:92:1:f0:63) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  345.     OP: 1 (BOOTPREQUEST)
  346. HTYPE: 1 (Ethernet)
  347.   HLEN: 6
  348.   HOPS: 0
  349.    XID: 82ac0032
  350.   SECS: 0
  351. FLAGS: 0
  352. CIADDR: 0.0.0.0
  353. YIADDR: 0.0.0.0
  354. SIADDR: 0.0.0.0
  355. GIADDR: 0.0.0.0
  356. CHADDR: 0c:d2:92:01:f0:63:00:00:00:00:00:00:00:00:00:00
  357. SNAME: .
  358. FNAME: .
  359. OPTION:  53 (  1) DHCP message type         1 (DHCPDISCOVER)
  360. OPTION:  50 (  4) Request IP address        192.168.42.12
  361. OPTION:  12 ( 15) Host name                 cmdann-GE70-0NC
  362. OPTION:  55 ( 18) Parameter Request List      1 (Subnet mask)
  363.                                              28 (Broadcast address)
  364.                                               2 (Time offset)
  365.                                               3 (Routers)
  366.                                              15 (Domainname)
  367.                                               6 (DNS server)
  368.                                             119 (Domain Search)
  369.                                              12 (Host name)
  370.                                              44 (NetBIOS name server)
  371.                                              47 (NetBIOS scope)
  372.                                              26 (Interface MTU)
  373.                                             121 (Classless Static Route)
  374.                                              42 (NTP servers)
  375.                                             121 (Classless Static Route)
  376.                                             249 (MSFT - Classless route)
  377.                                              33 (Static route)
  378.                                             252 (MSFT - WinSock Proxy Auto Detect)
  379.                                              42 (NTP servers)

  380. ---------------------------------------------------------------------------

  381.   TIME: 2015-04-23 14:06:38.486
  382.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 192.168.42.12 (c:d2:92:1:f0:63)
  383.     OP: 2 (BOOTPREPLY)
  384. HTYPE: 1 (Ethernet)
  385.   HLEN: 6
  386.   HOPS: 0
  387.    XID: 82ac0032
  388.   SECS: 0
  389. FLAGS: 0
  390. CIADDR: 0.0.0.0
  391. YIADDR: 192.168.42.12
  392. SIADDR: 0.0.0.0
  393. GIADDR: 0.0.0.0
  394. CHADDR: 0c:d2:92:01:f0:63:00:00:00:00:00:00:00:00:00:00
  395. SNAME: .
  396. FNAME: .
  397. OPTION:  53 (  1) DHCP message type         2 (DHCPOFFER)
  398. OPTION:  54 (  4) Server identifier         192.168.42.1
  399. OPTION:  51 (  4) IP address leasetime      600 (10m)
  400. OPTION:   1 (  4) Subnet mask               255.255.255.0
  401. OPTION:  28 (  4) Broadcast address         192.168.42.255
  402. OPTION:   3 (  4) Routers                   192.168.42.1
  403. OPTION:  15 (  5) Domainname                local
  404. OPTION:   6 (  8) DNS server                8.8.8.8,8.8.4.4
  405. ---------------------------------------------------------------------------

  406.   TIME: 2015-04-23 14:06:38.493
  407.     IP: 0.0.0.0 (c:d2:92:1:f0:63) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  408.     OP: 1 (BOOTPREQUEST)
  409. HTYPE: 1 (Ethernet)
  410.   HLEN: 6
  411.   HOPS: 0
  412.    XID: 82ac0032
  413.   SECS: 0
  414. FLAGS: 0
  415. CIADDR: 0.0.0.0
  416. YIADDR: 0.0.0.0
  417. SIADDR: 0.0.0.0
  418. GIADDR: 0.0.0.0
  419. CHADDR: 0c:d2:92:01:f0:63:00:00:00:00:00:00:00:00:00:00
  420. SNAME: .
  421. FNAME: .
  422. OPTION:  53 (  1) DHCP message type         3 (DHCPREQUEST)
  423. OPTION:  54 (  4) Server identifier         192.168.42.1
  424. OPTION:  50 (  4) Request IP address        192.168.42.12
  425. OPTION:  12 ( 15) Host name                 cmdann-GE70-0NC
  426. OPTION:  55 ( 18) Parameter Request List      1 (Subnet mask)
  427.                                              28 (Broadcast address)
  428.                                               2 (Time offset)
  429.                                               3 (Routers)
  430.                                              15 (Domainname)
  431.                                               6 (DNS server)
  432.                                             119 (Domain Search)
  433.                                              12 (Host name)
  434.                                              44 (NetBIOS name server)
  435.                                              47 (NetBIOS scope)
  436.                                              26 (Interface MTU)
  437.                                             121 (Classless Static Route)
  438.                                              42 (NTP servers)
  439.                                             121 (Classless Static Route)
  440.                                             249 (MSFT - Classless route)
  441.                                              33 (Static route)
  442.                                             252 (MSFT - WinSock Proxy Auto Detect)
  443.                                              42 (NTP servers)

  444. ---------------------------------------------------------------------------

  445.   TIME: 2015-04-23 14:06:38.505
  446.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 192.168.42.12 (c:d2:92:1:f0:63)
  447.     OP: 2 (BOOTPREPLY)
  448. HTYPE: 1 (Ethernet)
  449.   HLEN: 6
  450.   HOPS: 0
  451.    XID: 82ac0032
  452.   SECS: 0
  453. FLAGS: 0
  454. CIADDR: 0.0.0.0
  455. YIADDR: 192.168.42.12
  456. SIADDR: 0.0.0.0
  457. GIADDR: 0.0.0.0
  458. CHADDR: 0c:d2:92:01:f0:63:00:00:00:00:00:00:00:00:00:00
  459. SNAME: .
  460. FNAME: .
  461. OPTION:  53 (  1) DHCP message type         5 (DHCPACK)
  462. OPTION:  54 (  4) Server identifier         192.168.42.1
  463. OPTION:  51 (  4) IP address leasetime      600 (10m)
  464. OPTION:   1 (  4) Subnet mask               255.255.255.0
  465. OPTION:  28 (  4) Broadcast address         192.168.42.255
  466. OPTION:   3 (  4) Routers                   192.168.42.1
  467. OPTION:  15 (  5) Domainname                local
  468. OPTION:   6 (  8) DNS server                8.8.8.8,8.8.4.4
  469. ---------------------------------------------------------------------------

  470.   TIME: 2015-04-23 14:06:47.904
  471.     IP: 0.0.0.0 (c:d2:92:1:f0:63) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  472.     OP: 1 (BOOTPREQUEST)
  473. HTYPE: 1 (Ethernet)
  474.   HLEN: 6
  475.   HOPS: 0
  476.    XID: 7bd8f611
  477.   SECS: 0
  478. FLAGS: 0
  479. CIADDR: 0.0.0.0
  480. YIADDR: 0.0.0.0
  481. SIADDR: 0.0.0.0
  482. GIADDR: 0.0.0.0
  483. CHADDR: 0c:d2:92:01:f0:63:00:00:00:00:00:00:00:00:00:00
  484. SNAME: .
  485. FNAME: .
  486. OPTION:  53 (  1) DHCP message type         3 (DHCPREQUEST)
  487. OPTION:  50 (  4) Request IP address        192.168.42.12
  488. OPTION:  12 ( 15) Host name                 cmdann-GE70-0NC
  489. OPTION:  55 ( 18) Parameter Request List      1 (Subnet mask)
  490.                                              28 (Broadcast address)
  491.                                               2 (Time offset)
  492.                                               3 (Routers)
  493.                                              15 (Domainname)
  494.                                               6 (DNS server)
  495.                                             119 (Domain Search)
  496.                                              12 (Host name)
  497.                                              44 (NetBIOS name server)
  498.                                              47 (NetBIOS scope)
  499.                                              26 (Interface MTU)
  500.                                             121 (Classless Static Route)
  501.                                              42 (NTP servers)
  502.                                             121 (Classless Static Route)
  503.                                             249 (MSFT - Classless route)
  504.                                              33 (Static route)
  505.                                             252 (MSFT - WinSock Proxy Auto Detect)
  506.                                              42 (NTP servers)

  507. ---------------------------------------------------------------------------

  508.   TIME: 2015-04-23 14:06:47.911
  509.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 192.168.42.12 (c:d2:92:1:f0:63)
  510.     OP: 2 (BOOTPREPLY)
  511. HTYPE: 1 (Ethernet)
  512.   HLEN: 6
  513.   HOPS: 0
  514.    XID: 7bd8f611
  515.   SECS: 0
  516. FLAGS: 0
  517. CIADDR: 0.0.0.0
  518. YIADDR: 192.168.42.12
  519. SIADDR: 0.0.0.0
  520. GIADDR: 0.0.0.0
  521. CHADDR: 0c:d2:92:01:f0:63:00:00:00:00:00:00:00:00:00:00
  522. SNAME: .
  523. FNAME: .
  524. OPTION:  53 (  1) DHCP message type         5 (DHCPACK)
  525. OPTION:  54 (  4) Server identifier         192.168.42.1
  526. OPTION:  51 (  4) IP address leasetime      600 (10m)
  527. OPTION:   1 (  4) Subnet mask               255.255.255.0
  528. OPTION:  28 (  4) Broadcast address         192.168.42.255
  529. OPTION:   3 (  4) Routers                   192.168.42.1
  530. OPTION:  15 (  5) Domainname                local
  531. OPTION:   6 (  8) DNS server                8.8.8.8,8.8.4.4
  532. ---------------------------------------------------------------------------

  533.   TIME: 2015-04-23 14:07:07.029
  534.     IP: 0.0.0.0 (d0:e7:82:ec:3a:dd) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  535.     OP: 1 (BOOTPREQUEST)
  536. HTYPE: 1 (Ethernet)
  537.   HLEN: 6
  538.   HOPS: 0
  539.    XID: afebdf87
  540.   SECS: 0
  541. FLAGS: 0
  542. CIADDR: 0.0.0.0
  543. YIADDR: 0.0.0.0
  544. SIADDR: 0.0.0.0
  545. GIADDR: 0.0.0.0
  546. CHADDR: d0:e7:82:ec:3a:dd:00:00:00:00:00:00:00:00:00:00
  547. SNAME: .
  548. FNAME: .
  549. OPTION:  53 (  1) DHCP message type         1 (DHCPDISCOVER)
  550. OPTION:  61 (  7) Client-identifier         01:d0:e7:82:ec:3a:dd
  551. OPTION:  57 (  2) Maximum DHCP message size 1500
  552. OPTION:  60 ( 12) Vendor class identifier   dhcpcd 5.1.4
  553. OPTION:  55 ( 15) Parameter Request List      1 (Subnet mask)
  554.                                             121 (Classless Static Route)
  555.                                              33 (Static route)
  556.                                               3 (Routers)
  557.                                               6 (DNS server)
  558.                                              12 (Host name)
  559.                                              15 (Domainname)
  560.                                              26 (Interface MTU)
  561.                                              28 (Broadcast address)
  562.                                              51 (IP address leasetime)
  563.                                              54 (Server identifier)
  564.                                              58 (T1)
  565.                                              59 (T2)
  566.                                             119 (Domain Search)
  567.                                             252 (MSFT - WinSock Proxy Auto Detect)

  568. ---------------------------------------------------------------------------

  569.   TIME: 2015-04-23 14:07:08.031
  570.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 192.168.42.13 (d0:e7:82:ec:3a:dd)
  571.     OP: 2 (BOOTPREPLY)
  572. HTYPE: 1 (Ethernet)
  573.   HLEN: 6
  574.   HOPS: 0
  575.    XID: afebdf87
  576.   SECS: 0
  577. FLAGS: 0
  578. CIADDR: 0.0.0.0
  579. YIADDR: 192.168.42.13
  580. SIADDR: 0.0.0.0
  581. GIADDR: 0.0.0.0
  582. CHADDR: d0:e7:82:ec:3a:dd:00:00:00:00:00:00:00:00:00:00
  583. SNAME: .
  584. FNAME: .
  585. OPTION:  53 (  1) DHCP message type         2 (DHCPOFFER)
  586. OPTION:  54 (  4) Server identifier         192.168.42.1
  587. OPTION:  51 (  4) IP address leasetime      600 (10m)
  588. OPTION:   1 (  4) Subnet mask               255.255.255.0
  589. OPTION:   3 (  4) Routers                   192.168.42.1
  590. OPTION:   6 (  8) DNS server                8.8.8.8,8.8.4.4
  591. OPTION:  15 (  5) Domainname                local
  592. OPTION:  28 (  4) Broadcast address         192.168.42.255
  593. ---------------------------------------------------------------------------

  594.   TIME: 2015-04-23 14:07:08.115
  595.     IP: 0.0.0.0 (d0:e7:82:ec:3a:dd) > 255.255.255.255 (ff:ff:ff:ff:ff:ff)
  596.     OP: 1 (BOOTPREQUEST)
  597. HTYPE: 1 (Ethernet)
  598.   HLEN: 6
  599.   HOPS: 0
  600.    XID: afebdf87
  601.   SECS: 1
  602. FLAGS: 0
  603. CIADDR: 0.0.0.0
  604. YIADDR: 0.0.0.0
  605. SIADDR: 0.0.0.0
  606. GIADDR: 0.0.0.0
  607. CHADDR: d0:e7:82:ec:3a:dd:00:00:00:00:00:00:00:00:00:00
  608. SNAME: .
  609. FNAME: .
  610. OPTION:  53 (  1) DHCP message type         3 (DHCPREQUEST)
  611. OPTION:  61 (  7) Client-identifier         01:d0:e7:82:ec:3a:dd
  612. OPTION:  50 (  4) Request IP address        192.168.42.13
  613. OPTION:  54 (  4) Server identifier         192.168.42.1
  614. OPTION:  57 (  2) Maximum DHCP message size 1500
  615. OPTION:  60 ( 12) Vendor class identifier   dhcpcd 5.1.4
  616. OPTION:  55 ( 15) Parameter Request List      1 (Subnet mask)
  617.                                             121 (Classless Static Route)
  618.                                              33 (Static route)
  619.                                               3 (Routers)
  620.                                               6 (DNS server)
  621.                                              12 (Host name)
  622.                                              15 (Domainname)
  623.                                              26 (Interface MTU)
  624.                                              28 (Broadcast address)
  625.                                              51 (IP address leasetime)
  626.                                              54 (Server identifier)
  627.                                              58 (T1)
  628.                                              59 (T2)
  629.                                             119 (Domain Search)
  630.                                             252 (MSFT - WinSock Proxy Auto Detect)

  631. ---------------------------------------------------------------------------

  632.   TIME: 2015-04-23 14:07:08.122
  633.     IP: 192.168.42.1 (2:1a:11:f0:bc:c6) > 192.168.42.13 (d0:e7:82:ec:3a:dd)
  634.     OP: 2 (BOOTPREPLY)
  635. HTYPE: 1 (Ethernet)
  636.   HLEN: 6
  637.   HOPS: 0
  638.    XID: afebdf87
  639.   SECS: 1
  640. FLAGS: 0
  641. CIADDR: 0.0.0.0
  642. YIADDR: 192.168.42.13
  643. SIADDR: 0.0.0.0
  644. GIADDR: 0.0.0.0
  645. CHADDR: d0:e7:82:ec:3a:dd:00:00:00:00:00:00:00:00:00:00
  646. SNAME: .
  647. FNAME: .
  648. OPTION:  53 (  1) DHCP message type         5 (DHCPACK)
  649. OPTION:  54 (  4) Server identifier         192.168.42.1
  650. OPTION:  51 (  4) IP address leasetime      600 (10m)
  651. OPTION:   1 (  4) Subnet mask               255.255.255.0
  652. OPTION:   3 (  4) Routers                   192.168.42.1
  653. OPTION:   6 (  8) DNS server                8.8.8.8,8.8.4.4
  654. OPTION:  15 (  5) Domainname                local
  655. OPTION:  28 (  4) Broadcast address         192.168.42.255
  656. ---------------------------------------------------------------------------
Copy the Code
The 6th connection doesn't even create a request here. Sorry for the incredibly long post, I am trying to provide all the information needed. It is weird that I don't even see a request on the last client though.

igorpec  
Edited by igorpec at Thu Apr 23, 2015 17:55

Usually the client number limit is fixed by wireless driver firmware.

Don't know exactly for this situation.

CMDann  
igorpec replied at Thu Apr 23, 2015 10:54
Usually the client number limit is fixed by wireless driver firmware.

Don't know exactly for this s ...

That is what I am currently trying to determine. I don't know where to look for that. I hope that isn't the case.

igorpec  
Than simply ask responsible Broadcomm developer. They are willing to help.

hawhill  
Monitoring the "wlan0" interface won't lead to any more information. That's why I asked for the monitor interface - it should give 802.11 traffic, too. Curious it doesn't  give anything at all, though.

You have to log in before you can reply Login | Sign Up

Points Rules