Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Nighthawk X6 WAP issues

    Scheduled Pinned Locked Moved Wireless
    26 Posts 4 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      The actual IP setup of the X6 shouldn't make any difference. In AP mode it should be operating entirely at later 2 just passing wireless traffic to pfSense.
      Does it connect via it's WAN port in AP mode or one of the LAN ports? They may all be connected as one switch in that mode anyway.
      Testing from the X6 ports should prove the connection to the pfSense box anyway. If it's good there it can only be a wifi issue or something the X6 is doing between wireless and wired.

      Steve

      1 Reply Last reply Reply Quote 0
      • G
        god_bmxes
        last edited by

        Alright I ran a packet capture for about a minute while trying to load a few websites. The one that would not load was dell.com

        16:48:51.636951 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41822, length 8
        16:48:51.638395 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41822, length 8
        16:48:51.844434 IP XXX.48663 > 64.233.185.138.443: tcp 92
        16:48:51.844677 IP XXX.48663 > 64.233.185.138.443: tcp 46
        16:48:51.845050 IP XXX.48663 > 64.233.185.138.443: tcp 198
        16:48:51.857510 IP 64.233.185.138.443 > XXX.48663: tcp 0
        16:48:51.857759 IP 64.233.185.138.443 > XXX.48663: tcp 0
        16:48:51.857884 IP 64.233.185.138.443 > XXX.48663: tcp 46
        16:48:51.870627 IP 64.233.185.138.443 > XXX.48663: tcp 77
        16:48:51.870635 IP 64.233.185.138.443 > XXX.48663: tcp 93
        16:48:51.870751 IP 64.233.185.138.443 > XXX.48663: tcp 147
        16:48:51.870759 IP 64.233.185.138.443 > XXX.48663: tcp 46
        16:48:51.877656 IP XXX.48663 > 64.233.185.138.443: tcp 0
        16:48:51.878405 IP XXX.48663 > 64.233.185.138.443: tcp 46
        16:48:51.931591 IP 64.233.185.138.443 > XXX.48663: tcp 0
        16:48:52.088496 IP 104.16.59.37.443 > XXX: tcp 82
        16:48:52.129756 IP XXX.22783 > 104.16.59.37.443: tcp 0
        16:48:52.169197 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41823, length 8
        16:48:52.170568 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41823, length 8
        16:48:52.559208 IP 172.104.216.121.443 > XXX.17909: tcp 34
        16:48:52.599715 IP XXX.17909 > 172.104.216.121.443: tcp 0
        16:48:52.701452 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41824, length 8
        16:48:52.702867 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41824, length 8
        16:48:53.233701 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41825, length 8
        16:48:53.235041 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41825, length 8
        16:48:53.722498 IP 104.16.59.37.443 > XXX.22783: tcp 82
        16:48:53.763754 IP XXX.22783 > 104.16.59.37.443: tcp 0
        16:48:53.765954 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41826, length 8
        16:48:53.767340 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41826, length 8
        16:48:54.298209 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41827, length 8
        16:48:54.299639 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41827, length 8
        16:48:54.830345 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41828, length 8
        16:48:54.831689 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41828, length 8
        16:48:55.029570 IP 104.16.59.37.443 > XXX.22783: tcp 192
        16:48:55.069713 IP XXX.22783 > 104.16.59.37.443: tcp 0
        16:48:55.292693 IP XXX.37290 > 64.233.185.102.443: tcp 0
        16:48:55.305898 IP 64.233.185.102.443 > XXX.37290: tcp 0
        16:48:55.362590 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41829, length 8
        16:48:55.364112 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41829, length 8
        16:48:55.894841 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41830, length 8
        16:48:55.896536 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41830, length 8
        16:48:56.082762 IP XXX.40657 > 216.239.36.10.53: UDP, length 41
        16:48:56.096914 IP 216.239.36.10.53 > XXX.40657: UDP, length 80
        16:48:56.096999 IP XXX.23910 > 216.239.36.10.53: UDP, length 53
        16:48:56.110821 IP XXX.39625 > 169.44.166.66.5938: tcp 24
        16:48:56.110906 IP 216.239.36.10.53 > XXX.23910: UDP, length 298
        16:48:56.143058 IP XXX.19212 > 172.217.11.142.443: UDP, length 1350
        16:48:56.145803 IP XXX.29181 > 172.217.11.142.443: tcp 0
        16:48:56.157752 IP 172.217.11.142.443 > XXX.19212: UDP, length 1350
        16:48:56.157763 IP 172.217.11.142.443 > XXX.19212: UDP, length 31
        16:48:56.158876 IP 172.217.11.142.443 > XXX.29181: tcp 0
        16:48:56.164281 IP XXX.29181 > 172.217.11.142.443: tcp 0
        16:48:56.166030 IP XXX.19212 > 172.217.11.142.443: UDP, length 39
        16:48:56.166278 IP 173.XXX.19212 > 172.217.11.142.443: UDP, length 30
        16:48:56.167528 IP XXX.19212 > 172.217.11.142.443: UDP, length 1337
        16:48:56.168528 IP XXX.29181 > 172.217.11.142.443: tcp 517
        16:48:56.179612 IP 169.44.166.66.5938 > 173.XXX.39625: tcp 24
        16:48:56.180487 IP 172.217.11.142.443 > XXX.19212: UDP, length 22
        16:48:56.181737 IP 172.217.11.142.443 > XXX.29181: tcp 0
        16:48:56.181861 IP 172.217.11.142.443 > XXX.29181: tcp 156
        16:48:56.186642 IP XXX.29181 > 172.217.11.142.443: tcp 0
        16:48:56.187515 IP XXX.29181 > 172.217.11.142.443: tcp 51
        16:48:56.197602 IP 172.217.11.142.443 > XXX.19212: UDP, length 262
        16:48:56.197608 IP 172.217.11.142.443 > XXX.19212: UDP, length 16
        16:48:56.200100 IP 172.217.11.142.443 > XXX.29181: tcp 69
        16:48:56.216623 IP XXX.19212 > 172.217.11.142.443: UDP, length 30
        16:48:56.220746 IP XXX.39625 > 169.44.166.66.5938: tcp 0
        16:48:56.235862 IP XXX.29181 > 172.217.11.142.443: tcp 0
        16:48:56.427098 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41831, length 8
        16:48:56.428585 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41831, length 8
        16:48:56.705589 IP XXX.61006 > 8.8.8.8.53: UDP, length 32
        16:48:56.706457 IP XXX.57796 > 8.8.4.4.53: UDP, length 32
        16:48:56.719782 IP 8.8.4.4.53 > XXX.57796: UDP, length 128
        16:48:56.720031 IP 8.8.8.8.53 > XXX.61006: UDP, length 128
        16:48:56.959353 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41832, length 8
        16:48:56.960759 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41832, length 8
        16:48:57.491605 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41833, length 8
        16:48:57.492933 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41833, length 8
        16:48:57.695063 IP 104.16.59.37.443 > XXX.22783: tcp 89
        16:48:57.734696 IP XXX.22783 > 104.16.59.37.443: tcp 0
        16:48:57.782041 IP XXX.37463 > 35.186.224.47.443: tcp 50
        16:48:57.795373 IP 35.186.224.47.443 > XXX.37463: tcp 0
        16:48:57.842471 IP 35.186.224.47.443 > XXX.37463: tcp 47
        16:48:57.882729 IP XXX.37463 > 35.186.224.47.443: tcp 0
        16:48:58.023860 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41834, length 8
        16:48:58.025232 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41834, length 8
        16:48:58.556111 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41835, length 8
        16:48:58.557531 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41835, length 8
        16:48:58.578394 IP 104.16.59.37.443 > XXX.22783: tcp 99
        16:48:58.618780 IP XXX.22783 > 104.16.59.37.443: tcp 0
        16:48:59.088366 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41836, length 8
        16:48:59.089705 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41836, length 8
        16:48:59.406638 IP 104.16.59.37.443 > XXX.22783: tcp 77
        16:48:59.446773 IP XXX.22783 > 104.16.59.37.443: tcp 0
        16:48:59.615588 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41837, length 8
        16:48:59.616883 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41837, length 8
        16:49:00.147837 IP XXX > 173.240.128.1: ICMP echo request, id 26336, seq 41838, length 8
        16:49:00.150306 IP 173.240.128.1 > XXX: ICMP echo reply, id 26336, seq 41838, length 8
        16:49:00.192818 IP XXX.12528 > 173.194.219.132.443: tcp 0
        16:49:00.205772 IP 173.194.219.132.443 > XXX..12528: tcp 0

        I went through and swapped my IP with ''XXX''. I have not been able to try my ethernet ports on my X6 but the LAN connection to it is connected to its WAN port.

        GrimsonG 1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Really you'd need to open that in Wireshark and look for TCP resets or retransmissions. Or just missing packets.

          Steve

          1 Reply Last reply Reply Quote 0
          • GrimsonG
            Grimson Banned @god_bmxes
            last edited by

            @god_bmxes said in Nighthawk X6 WAP issues:

            I have not been able to try my ethernet ports on my X6 but the LAN connection to it is connected to its WAN port.

            Basic rule when using routers/gateways as AP, don't use the WAN port.

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Ah, missed that.
              If AP mode is intended to use the WAN that way it should be OK. But I would definitely test connecting the link to pfSense to one of it's 'LAN' ports.

              Steve

              GrimsonG 1 Reply Last reply Reply Quote 0
              • GrimsonG
                Grimson Banned @stephenw10
                last edited by

                @stephenw10 said in Nighthawk X6 WAP issues:

                If AP mode is intended to use the WAN that way it should be OK.

                The thing with these devices is that they do allow you to use the WAN port as a LAN port in AP mode. But they do it by using a software bridge between WAN and LAN, and this comes with the usual caveats and performance issues. So if you must you can use that WAN port for a single client, but never use it as your uplink.

                stephenw10S 1 Reply Last reply Reply Quote 0
                • G
                  god_bmxes
                  last edited by

                  I just swapped the x6 port I'm using from the Wan to lan4. So I'll see what it does when it comes back up

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator @Grimson
                    last edited by

                    @grimson said in Nighthawk X6 WAP issues:

                    The thing with these devices is that they do allow you to use the WAN port as a LAN port in AP mode. But they do it by using a software bridge between WAN and LAN, and this comes with the usual caveats and performance issues.

                    That can certainly be the case and if it is the throughput would likely be limited.
                    However the ports might be on the same switch IC separated by VLANs in which case AP mode could simply add that port to the existing VLAN. If it's been programmed to do so. 😉
                    The wifi is usually bridged to the LAN anyway so it should be capable.

                    Steve

                    GrimsonG 1 Reply Last reply Reply Quote 0
                    • G
                      god_bmxes
                      last edited by

                      Well, it didn't take long to find out but the Wan and lan ports are running about the same lol

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Ok, that's still testing via the wifi though?

                        We need to confirm it's good (or bad) with a wired client connected to the X6.

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • G
                          god_bmxes
                          last edited by

                          This post is deleted!
                          1 Reply Last reply Reply Quote 0
                          • G
                            god_bmxes
                            last edited by

                            @stephenw10 so run it as an AP and connect a wired device to connect through the X6?

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Yes. If it's still bad there then there is some issue with the connection between the X6 and pfSense.

                              If it's good there then the issue lies with how the wifi is connected to the Ethernet ports in the X6.

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • G
                                god_bmxes
                                last edited by

                                Alright, I'll go and run something off of that it and see. Also downloaded Wireshark to see if there is dropped packets etc

                                1 Reply Last reply Reply Quote 0
                                • GrimsonG
                                  Grimson Banned @stephenw10
                                  last edited by

                                  @stephenw10 said in Nighthawk X6 WAP issues:

                                  However the ports might be on the same switch IC separated by VLANs in which case AP mode could simply add that port to the existing VLAN. If it's been programmed to do so. 😉

                                  For the last ~10 years I have been knee deep in the open source firmware parts of those Netgear, Linksys and Asus routers, and let me tell you it's ugly and one of the mayor reasons I switched to pfSense for my home too. Yes they could change the VLANs but they don't, or at least they did not until the end of 2017.

                                  1 Reply Last reply Reply Quote 0
                                  • G
                                    god_bmxes
                                    last edited by

                                    Alright, I have my desktop connected to the X6 on a lan port and I have the line in from the switch coming from the switch going to the lan port aswell on the x6. I do not get internet on the desktop now while it's hardwired to the x6 in AP mode. I did download the cable shark, but I have no ideas what I'm looking at in the logs. So I think the x6 may be the issue right now. Maybe I should look at a different ap

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Hmm, looks like AP mode on that just bridges wifi to the WAN port. And in fact disables the switch entirely. Odd design choice...

                                      You could just set it back to router mode, disable DHCP and connect to the LAN ports as you have it. That should do the same thing. As described here for devices that don't have a specific AP mode:
                                      https://www.netgate.com/docs/pfsense/wireless/use-an-existing-wireless-router-with-pfsense.html

                                      Steve

                                      G 1 Reply Last reply Reply Quote 0
                                      • G
                                        god_bmxes @stephenw10
                                        last edited by god_bmxes

                                        @stephenw10 I don't need the ports, just need the wifi. I'll probably pick up a ubiquity AP and give that a shot. Also gonna look at the logs and see what is dropping etc. It's all on the same vlan and switch though so there is no reason for the wifi issues in theory

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Yes, running in router mode is not to give you ports rather it's to enable you to test. Also since that's how it's configured normally we know it behaves as expected in router mode.

                                          Steve

                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            akuma1x @god_bmxes
                                            last edited by

                                            @god_bmxes said in Nighthawk X6 WAP issues:

                                            I know some of my hardware is a little OP but I had it laying around. And in a side note my wired is fine except I am getting strict NAT type in some games that could be causing some issues in the future.

                                            Nobody helped you with this part yet, but when you figure out your access point thing, here are the steps to get the NAT type fixed for your game console.

                                            You need to set static DHCP leases for your PS4 or XBox. After this is set, in the NAT section, under Outbound, select Hybrid Outbound NAT and make 1 mapping rule.

                                            Interface: WAN
                                            Protocol: Any
                                            Source: Network, your static IP address for your console goes here, pick /32 from the drop down list
                                            Translation: Static Port checked
                                            Description: PS4 or XBox

                                            When I setup this outbound NAT mapping, my PS4 went from a level 3 to a level 2.

                                            Hope that helps!

                                            Jeff

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.