What's new

ASUS RT-AC66U Dropping Wifi Connections

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Tony Johnson

New Around Here
Hello all,

First, let me say I have loved my AC66U for the past few years I have had a great rock steady connection.

However, about a month ago the neighbor behind me got some new router that is blasting a hell of a signal.
I can use the wifi analyzer on my phone and be standing beside my AC66U router and still get a stronger signal from his Netgear router. In fact serval times in the evening now all my devices seem to lose connection to my router for a few minutes then reconnect. My Roku boxes will buffer, my phones will lose connection. Frustrating as hell! But my wired security cameras never lose connection when wireless goes down. So I am not sure if the router has developed a wireless issue or this guy is just killing my wifi.

My router is very centrally located in the house, always had a good signal throughout the house until now.
I have changed channels on the router to keep it off the same channel as the net gear, still drops out often.

So of course here is my obvious question, if I upgrade to an AC5300 or something someone recommends, will this help? Is the newer technology that much better than a 6-year-old router?

Thanks,

Tony
 
What firmware version are you using?

Have you looked in the router's syslog for error/information messages?

What band is this happening on?

What channels are you and your neighbour using? What bandwidth are you using?
 
Firmware Version:3.0.0.4.382_51641
Happens on mainly 2.4 but occasional on 5ghz




Wireless Log
SSID: "NameGoesHere"
RSSI: 0 dBm SNR: 0 dB noise: -75 dBm Channel: 8
BSSID: AC:22:0B:CF:18:60 Capability: ESS ShortSlot
Supported Rates: [ 1(b) 2(b) 5.5(b) 6 9 11(b) 12 18 24 36 48 54 ]
HT Capable:
Chanspec: 2.4GHz channel 8 20MHz (0x1008)
Primary channel: 8
HT Capabilities:
Supported MCS : [ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ]

Interference Level: Acceptable
Mode : AP Only

Stations List
----------------------------------------
idx MAC Associated Authorized RSSI PHY PSM Tx rate Rx rate Connect Time
B0:FC:0D:2D:4A:63 Yes Yes -48dBm n No 72.2M 01:32:12
D8:28:C9:20:D7:46 Yes Yes -45dBm n No 72.2M 01:32:31
B8:D7:AF:1E:E1:21 Yes Yes -51dBm n Yes 1M 01:32:41
3C:5C:C4:69:8F:B9 Yes Yes -43dBm n No 72.2M 1M 01:32:44
DC:EF:CA:24:A0:CE Yes Yes -57dBm n No 52M 01:32:44

SSID: "NameGoesHere5ghz"
RSSI: 0 dBm SNR: 0 dB noise: -92 dBm Channel: 48/80
BSSID: AC:22:0B:CF:18:64 Capability: ESS
Supported Rates: [ 6(b) 9 12(b) 18 24(b) 36 48 54 ]
VHT Capable:
Chanspec: 5GHz channel 42 80MHz (0xe32a)
Primary channel: 48
HT Capabilities:
Supported MCS : [ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ]
VHT Capabilities:
Supported VHT (tx) Rates:
NSS: 1 MCS: 0-9
NSS: 2 MCS: 0-9
NSS: 3 MCS: 0-9
Supported VHT (rx) Rates:
NSS: 1 MCS: 0-9
NSS: 2 MCS: 0-9
NSS: 3 MCS: 0-9

Interference Level: Acceptable
Mode : AP Only

Stations List
----------------------------------------
idx MAC Associated Authorized RSSI PHY PSM Tx rate Rx rate Connect Time
AC:63:BE:CF:44:23 Yes Yes -54dBm n No 585M 6M 01:32:40



Here is a snippet of the general log

May 3 09:39:27 vpnserver1[691]: IP packet with unknown IP version=0 seen
May 3 09:39:27 vpnserver1[691]: IP packet with unknown IP version=0 seen
May 4 22:21:42 rc_service: httpd 353:notify_rc start_webs_update
May 4 23:44:13 rc_service: httpd 353:notify_rc restart_wireless;restart_qos;restart_firewall;
May 4 23:44:18 acsd: scan in progress ...
May 4 23:44:20 acsd: scan in progress ...
May 4 23:44:21 acsd: COEX: downgraded chanspec 0x1909 to 0x100b: channel 6 used by exiting BSSs
May 4 23:44:21 acsd: selected channel spec: 0x100b (11)
May 4 23:44:21 acsd: acs_set_chspec: 0x100b (11) for reason APCS_INIT
May 4 23:44:22 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
May 4 23:44:22 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
May 4 23:44:23 miniupnpd[664]: shutting down MiniUPnPd
May 4 23:44:23 nat: apply nat rules (/tmp/nat_rules_eth0_eth0)
May 4 23:44:23 miniupnpd[7324]: version 1.9 started
May 4 23:44:23 miniupnpd[7324]: HTTP listening on port 48211
May 4 23:44:23 miniupnpd[7324]: Listening for NAT-PMP/PCP traffic on port 5351
May 4 23:45:44 rc_service: httpd 353:notify_rc restart_wireless
May 4 23:45:52 acsd: scan in progress ...
May 4 23:45:52 acsd: COEX: downgraded chanspec 0x1909 to 0x100b: channel 6 used by exiting BSSs
May 4 23:45:52 acsd: selected channel spec: 0x100b (11)
May 4 23:45:52 acsd: acs_set_chspec: 0x100b (11) for reason APCS_INIT
May 4 23:51:55 rc_service: httpd 353:notify_rc restart_wireless;restart_qos;restart_firewall;

May 4 23:52:02 acsd: scan in progress ...
May 4 23:52:03 acsd: COEX: downgraded chanspec 0x1909 to 0x100b: channel 4 used by exiting BSSs
May 4 23:52:03 acsd: selected channel spec: 0x100b (11)
May 4 23:52:03 acsd: acs_set_chspec: 0x100b (11) for reason APCS_INIT
May 4 23:52:05 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
May 4 23:52:05 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
May 4 23:52:05 miniupnpd[7324]: shutting down MiniUPnPd
May 4 23:52:05 nat: apply nat rules (/tmp/nat_rules_eth0_eth0)
May 4 23:52:05 miniupnpd[9005]: version 1.9 started
May 4 23:52:05 miniupnpd[9005]: HTTP listening on port 40201
May 4 23:52:05 miniupnpd[9005]: Listening for NAT-PMP/PCP traffic on port 5351
May 4 23:52:06 miniupnpd[9005]: Unknown udp packet received from 192.168.1.140:1900
May 4 23:52:07 miniupnpd[9005]: Unknown udp packet received from 192.168.1.169:1900
May 4 23:52:07 miniupnpd[9005]: Unknown udp packet received from 192.168.1.60:60000
May 5 05:00:47 vpnserver1[691]: IP packet with unknown IP version=0 seen
May 5 05:00:47 vpnserver1[691]: IP packet with unknown IP version=0 seen
May 5 05:00:47 vpnserver1[691]: IP packet with unknown IP version=0 seen
May 5 08:30:32 kernel: wlc_dump_aggfifo:
May 5 08:30:32 kernel: framerdy 0x18 bmccmd 4 framecnt 1
May 5 08:30:32 kernel: AQM agg params 0xfc0 maxlen hi/lo 0x0 0xffff minlen 0x0 adjlen 0x8
May 5 08:30:32 kernel: AQM agg results 0x8000 len hi/lo: 0x0 0x0 BAbitmap(0-3) 0 0 0 0
May 5 18:39:16 vpnserver1[691]: IP packet with unknown IP version=0 seen
May 5 18:39:16 vpnserver1[691]: IP packet with unknown IP version=0 seen

May 4 23:44:21 acsd: COEX: downgraded chanspec 0x1909 to 0x100b: channel 6 used by exiting BSSs
May 4 23:44:21 acsd: selected channel spec: 0x100b (11)
May 4 23:44:21 acsd: acs_set_chspec: 0x100b (11) for reason APCS_INIT
May 4 23:44:22 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
May 4 23:44:22 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
May 4 23:44:23 miniupnpd[664]: shutting down MiniUPnPd
May 4 23:44:23 nat: apply nat rules (/tmp/nat_rules_eth0_eth0)
May 4 23:44:23 miniupnpd[7324]: version 1.9 started
May 4 23:44:23 miniupnpd[7324]: HTTP listening on port 48211
May 4 23:44:23 miniupnpd[7324]: Listening for NAT-PMP/PCP traffic on port 5351
May 4 23:45:44 rc_service: httpd 353:notify_rc restart_wireless

May 4 23:45:52 acsd: scan in progress ...
May 4 23:45:52 acsd: COEX: downgraded chanspec 0x1909 to 0x100b: channel 6 used by exiting BSSs
May 4 23:45:52 acsd: selected channel spec: 0x100b (11)
May 4 23:45:52 acsd: acs_set_chspec: 0x100b (11) for reason APCS_INIT
May 4 23:51:55 rc_service: httpd 353:notify_rc restart_wireless;restart_qos;restart_firewall;

May 4 23:52:02 acsd: scan in progress ...
May 4 23:52:03 acsd: COEX: downgraded chanspec 0x1909 to 0x100b: channel 4 used by exiting BSSs
May 4 23:52:03 acsd: selected channel spec: 0x100b (11)
May 4 23:52:03 acsd: acs_set_chspec: 0x100b (11) for reason APCS_INIT
May 4 23:52:05 kernel: HTB: quantum of class 10002 is big. Consider r2q change.
May 4 23:52:05 kernel: HTB: quantum of class 10060 is big. Consider r2q change.
May 4 23:52:05 miniupnpd[7324]: shutting down MiniUPnPd
May 4 23:52:05 nat: apply nat rules (/tmp/nat_rules_eth0_eth0)
May 4 23:52:05 miniupnpd[9005]: version 1.9 started
May 4 23:52:05 miniupnpd[9005]: HTTP listening on port 40201
May 4 23:52:05 miniupnpd[9005]: Listening for NAT-PMP/PCP traffic on port 5351
May 4 23:52:06 miniupnpd[9005]: Unknown udp packet received from 192.168.1.140:1900
May 4 23:52:07 miniupnpd[9005]: Unknown udp packet received from 192.168.1.169:1900
May 4 23:52:07 miniupnpd[9005]: Unknown udp packet received from 192.168.1.60:60000
May 5 05:00:47 vpnserver1[691]: IP packet with unknown IP version=0 seen
May 5 05:00:47 vpnserver1[691]: IP packet with unknown IP version=0 seen
May 5 05:00:47 vpnserver1[691]: IP packet with unknown IP version=0 seen
May 5 05:00:47 vpnserver1[691]: IP packet with unknown IP version=0 seen

May 6 11:41:34 rc_service: httpd 353:notify_rc restart_wireless
May 6 11:41:39 acsd: scan in progress ...
May 6 11:41:40 acsd: scan in progress ...
May 6 11:41:40 acsd: scan in progress ...
May 6 11:41:40 acsd: scan in progress ...
May 6 11:41:40 acsd: scan in progress ...
May 6 11:41:41 acsd: scan in progress ...
May 6 11:41:41 acsd: scan in progress ...
May 6 11:41:41 acsd: scan in progress ...
May 6 11:41:41 acsd: scan in progress ...
May 6 11:41:42 acsd: scan in progress ...
May 6 11:41:42 acsd: selected channel spec: 0x1008 (8)
 
I would start by changing the 2.4 GHz channel from automatic to 11 and the bandwidth from 40MHz to 20MHz as your neighbour's WiFi is forcing it into those settings anyway.
 

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top