Chuckles67
Regular Contributor
RT-AX86U is rebooting unexpectedly runing this asuswrt-merlin FW: I've seen it happen 5 times in the last two months.
Merlin current Version : 3004.388.9_2
amtm add-ons: diversion, conmon, vnstat, entware packages, disk check script, format disk, swap file
on 4/28 I did an upgrade from Merlin 3004.388.8_2 to Merlin 3004.388.9 then did an "hard factory reset" including disconnecting USB drive before the upgrade then later formatting that USB drive before reconnecting.
Dirty upgrade to *.9_2 released one day later - unlucky timing with that dot release
The router has a stable configuration since several years including amtm, diversion, vnstat, conmon and ovpn servers.
The system log for the reboot (my spouse texted at 15:38 saying "no internet again...")
Any specific smoking guns here?
I've now set the log levels to `notice` and `debug`. If/when happens again then I'll update this thread with the latest log.
UPDATED
- clarified hard reset => factory reset
- clarified the factory reset was done after the .9 install
- add link to "hard factory reset"
- added amtm add-ons.
Merlin current Version : 3004.388.9_2
amtm add-ons: diversion, conmon, vnstat, entware packages, disk check script, format disk, swap file
on 4/28 I did an upgrade from Merlin 3004.388.8_2 to Merlin 3004.388.9 then did an "hard factory reset" including disconnecting USB drive before the upgrade then later formatting that USB drive before reconnecting.
Dirty upgrade to *.9_2 released one day later - unlucky timing with that dot release

The router has a stable configuration since several years including amtm, diversion, vnstat, conmon and ovpn servers.
The system log for the reboot (my spouse texted at 15:38 saying "no internet again...")
Code:
<snip>
Jun 12 06:26:50 ovpn-server2[2385]: xx.xx.xxx.xxx:3878 Connection reset, restarting [0]
Jun 12 15:25:57 rc_service: httpd 1771:notify_rc restart_logger
Jun 12 15:25:57 custom_script: Running /jffs/scripts/service-event (args: restart logger)
Jun 12 15:25:57 syslogd exiting
Jun 12 15:25:57 syslogd started: BusyBox v1.25.1
Jun 12 15:25:57 kernel: klogd started: BusyBox v1.25.1 (2025-04-28 17:28:04 EDT)
Jun 12 15:34:39 wlceventd: wlceventd_proc_event(685): eth7: Auth B2:59:37:CE:36:45, status: Successful (0), rssi:0
Jun 12 15:34:39 hostapd: eth7: STA b2:59:37:ce:36:45 IEEE 802.11: associated
Jun 12 15:34:39 wlceventd: wlceventd_proc_event(722): eth7: Assoc B2:59:37:CE:36:45, status: Successful (0), rssi:-52
Jun 12 15:34:39 hostapd: eth7: STA b2:59:37:ce:36:45 RADIUS: starting accounting session BE9C87EA17DDE7F4
Jun 12 15:34:39 hostapd: eth7: STA b2:59:37:ce:36:45 WPA: pairwise key handshake completed (RSN)
Jun 12 15:34:44 hostapd: eth7: STA b2:59:37:ce:36:45 IEEE 802.11: disassociated
Jun 12 15:34:44 wlceventd: wlceventd_proc_event(662): eth7: Disassoc B2:59:37:CE:36:45, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jun 12 15:34:44 wlceventd: wlceventd_proc_event(662): eth7: Disassoc B2:59:37:CE:36:45, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jun 12 15:34:44 hostapd: eth7: STA b2:59:37:ce:36:45 IEEE 802.11: disassociated
Jun 12 15:34:49 wlceventd: wlceventd_proc_event(685): eth7: Auth B2:59:37:CE:36:45, status: Successful (0), rssi:0
Jun 12 15:34:49 wlceventd: wlceventd_proc_event(722): eth7: Assoc B2:59:37:CE:36:45, status: Successful (0), rssi:-52
Jun 12 15:34:49 hostapd: eth7: STA b2:59:37:ce:36:45 IEEE 802.11: associated
Jun 12 15:34:49 hostapd: eth7: STA b2:59:37:ce:36:45 RADIUS: starting accounting session D1414503465E2068
Jun 12 15:34:49 hostapd: eth7: STA b2:59:37:ce:36:45 WPA: pairwise key handshake completed (RSN)
Jun 12 15:45:10 ovpn-server2[2389]: TCP connection established with [AF_INET]204.76.203.208:59862
Jun 12 15:45:10 ovpn-server2[2389]: 204.76.203.208:59862 TCP connection established with [AF_INET]204.76.203.208:59874
Jun 12 15:45:10 ovpn-server2[2389]: 204.76.203.208:59874 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1768 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Jun 12 15:45:10 ovpn-server2[2389]: 204.76.203.208:59874 Connection reset, restarting [0]
Jun 12 15:45:10 ovpn-server2[2389]: 204.76.203.208:59874 SIGUSR1[soft,connection-reset] received, client-instance restarting
Jun 12 15:45:10 ovpn-server2[2389]: 204.76.203.208:59862 Connection reset, restarting [0]
Jun 12 15:45:10 ovpn-server2[2389]: 204.76.203.208:59862 SIGUSR1[soft,connection-reset] received, client-instance restarting
Jun 12 15:48:23 hostapd: eth6: STA 34:60:f9:23:b2:fb WPA: group key handshake completed (RSN)
</snip>
I've now set the log levels to `notice` and `debug`. If/when happens again then I'll update this thread with the latest log.
UPDATED
- clarified hard reset => factory reset
- clarified the factory reset was done after the .9 install
- add link to "hard factory reset"
- added amtm add-ons.
Last edited: