Armor Z2 NBG6817 Maintenance Log hammered with Z2 kern.warn kernel: [5807911.411986] [wifi0] FWLOG:

The following are log messages that show up about 5 per second:

1     2022 Jan 28 18:56:32     Z2 kern.warn kernel: [5807911.411986] [wifi0] FWLOG: [41194979] vap-0 AP PS: AID=4353740 select next response 
12     2022 Jan 28 19:09:34     Z2 user.info igmpproxy[22627]: Updated route entry for 224.0.0.252 on VIF #1
13     2022 Jan 28 19:09:34     Z2 user.notice igmpproxy[22627]: RECV V2 member report from 192.168.2.191 to 224.0.0.252
14     2022 Jan 28 19:09:34     Z2 user.info igmpproxy[22627]: Updated route entry for 224.0.0.252 on VIF #1
15     2022 Jan 28 19:09:34     Z2 user.notice igmpproxy[22627]: RECV V2 member report from 192.168.2.191 to 224.0.0.252
16     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.577309] [wifi0] FWLOG: [41995412] vap-0 AP PS: AID=4353740 select next response
17     2022 Jan 28 19:09:34     Z2 user.info igmpproxy[22627]: Updated route entry for 239.255.255.246 on VIF #1
18     2022 Jan 28 19:09:34     Z2 user.notice igmpproxy[22627]: RECV V2 member report from 192.168.2.121 to 239.255.255.246
19     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.362345] [wifi1] FWLOG: [41966075] vap-0 AP PS: AID=4353996 select next response
20     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.362345] [wifi1] FWLOG: [41966075] vap-0 AP PS: AID=4354124 select next response
21     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.362345] [wifi1] FWLOG: [41966075] vap-0 AP PS: AID=4353548 select next response
22     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.362314] [wifi1] FWLOG: [41966075] vap-0 AP PS: AID=4353932 select next response
23     2022 Jan 28 19:09:34     Z2 kern.warn kernel: [5808693.362314] [wifi1] FWLOG: [41966075] vap-0 AP PS: AID=4353804 select next response
24     2022 Jan 28 19:09:33     Z2 user.info igmpproxy[22627]: Updated route entry for 225.0.0.222 on VIF #1
25     2022 Jan 28 19:09:33     Z2 user.notice igmpproxy[22627]: RECV V2 member report from 192.168.2.191 to 225.0.0.222
26     2022 Jan 28 19:09:33     Z2 kern.warn kernel: [5808692.577028] [wifi0] FWLOG: [41994888] vap-0 AP PS: AID=4353740 select next response
27     2022 Jan 28 19:09:33     Z2 kern.warn kernel: [5808692.576996] [wifi0] FWLOG: [41994678] vap-0 AP PS: AID=4353740 select next response
28     2022 Jan 28 19:09:33     Z2 kern.warn kernel: [5808692.576996] [wifi0] FWLOG: [41994364] vap-0 AP PS: AID=4353740 select next response
29     2022 Jan 28 19:09:33     Z2 user.notice igmpproxy[22627]: Adding MFC: 192.168.2.168 -> 239.255.255.250, InpVIf: 0
30     2022 Jan 28 19:09:33     Z2 user.info igmpproxy[22627]: Updated route entry for 239.255.255.250 on VIF #1
31     2022 Jan 28 19:09:33     Z2 user.notice igmpproxy[22627]: RECV V2 member report from 192.168.2.125 to 239.255.255.250
32     2022 Jan 28 19:09:33     Z2 kern.warn kernel: [5808692.362282] [wifi1] FWLOG: [41965549] vap-0 AP PS: AID=4353996 select next response
33     2022 Jan 28 19:09:33     Z2 kern.warn kernel: [5808692.362282] [wifi1] FWLOG: [41965549] vap-0 AP PS: AID=4354124 select next response 

These show up immediately and indicate from a firewall log for wifi. I have no IGMP requirement as this is on a single router network with no servers or other special needs. The .191 and .121 and .125 appear to be randomly selected devices from the network, being a laptop, a smart TV, and wireless printer. There is no logical reason apparent for the IGMPPROXY notices. Has anyone seen anything like this?



All Replies

  • Hill
    Hill Posts: 154  Master Member
    Is there any device streaming when the issue occur?
    What do you mean the .191 and .121 and .125 are randomly selected device?

Consumer Product Help Center