Armor Z2 NBG6817 Maintenance Log hammered with Z2 kern.warn kernel: [5807911.411986] [wifi0] FWLOG:

The following are log messages that show up about 5 per second:

1     2022 Jan 28 18:56:32     Z2 kern.warn kernel: [5807911.411986] [wifi0] FWLOG: [41194979] vap-0 AP PS: AID=4353740 select next response 
12     2022 Jan 28 19:09:34     Z2 user.info igmpproxy[22627]: Updated route entry for 224.0.0.252 on VIF #1
13     2022 Jan 28 19:09:34     Z2 user.notice igmpproxy[22627]: RECV V2 member report from 192.168.2.191 to 224.0.0.252
14     2022 Jan 28 19:09:34     Z2 user.info igmpproxy[22627]: Updated route entry for 224.0.0.252 on VIF #1
15     2022 Jan 28 19:09:34     Z2 user.notice igmpproxy[22627]: RECV V2 member report from 192.168.2.191 to 224.0.0.252
16     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.577309] [wifi0] FWLOG: [41995412] vap-0 AP PS: AID=4353740 select next response
17     2022 Jan 28 19:09:34     Z2 user.info igmpproxy[22627]: Updated route entry for 239.255.255.246 on VIF #1
18     2022 Jan 28 19:09:34     Z2 user.notice igmpproxy[22627]: RECV V2 member report from 192.168.2.121 to 239.255.255.246
19     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.362345] [wifi1] FWLOG: [41966075] vap-0 AP PS: AID=4353996 select next response
20     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.362345] [wifi1] FWLOG: [41966075] vap-0 AP PS: AID=4354124 select next response
21     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.362345] [wifi1] FWLOG: [41966075] vap-0 AP PS: AID=4353548 select next response
22     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.362314] [wifi1] FWLOG: [41966075] vap-0 AP PS: AID=4353932 select next response
23     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.362314] [wifi1] FWLOG: [41966075] vap-0 AP PS: AID=4353804 select next response
24     2022 Jan 28 19:09:33     Z2 user.info igmpproxy[22627]: Updated route entry for 225.0.0.222 on VIF #1
25     2022 Jan 28 19:09:33     Z2 user.notice igmpproxy[22627]: RECV V2 member report from 192.168.2.191 to 225.0.0.222
26     2022 Jan 28 19:09:33     Z2 kern.warn kernel: [5808692.577028] [wifi0] FWLOG: [41994888] vap-0 AP PS: AID=4353740 select next response
27     2022 Jan 28 19:09:33     Z2 kern.warn kernel: [5808692.576996] [wifi0] FWLOG: [41994678] vap-0 AP PS: AID=4353740 select next response
28     2022 Jan 28 19:09:33     Z2 kern.warn kernel: [5808692.576996] [wifi0] FWLOG: [41994364] vap-0 AP PS: AID=4353740 select next response
29     2022 Jan 28 19:09:33     Z2 user.notice igmpproxy[22627]: Adding MFC: 192.168.2.168 -> 239.255.255.250, InpVIf: 0
30     2022 Jan 28 19:09:33     Z2 user.info igmpproxy[22627]: Updated route entry for 239.255.255.250 on VIF #1
31     2022 Jan 28 19:09:33     Z2 user.notice igmpproxy[22627]: RECV V2 member report from 192.168.2.125 to 239.255.255.250
32     2022 Jan 28 19:09:33     Z2 kern.warn kernel: [5808692.362282] [wifi1] FWLOG: [41965549] vap-0 AP PS: AID=4353996 select next response
33     2022 Jan 28 19:09:33     Z2 kern.warn kernel: [5808692.362282] [wifi1] FWLOG: [41965549] vap-0 AP PS: AID=4354124 select next response 

These show up immediately and indicate from a firewall log for wifi. I have no IGMP requirement as this is on a single router network with no servers or other special needs. The .191 and .121 and .125 appear to be randomly selected devices from the network, being a laptop, a smart TV, and wireless printer. There is no logical reason apparent for the IGMPPROXY notices. Has anyone seen anything like this?



All Replies

  • Hill
    Hill Posts: 156  Master Member
    First Comment Fifth Anniversary
    Is there any device streaming when the issue occur?
    What do you mean the .191 and .121 and .125 are randomly selected device?

Consumer Product Help Center