Setup: Unifi Pro 7 ---> FreeBSD 14.3 with dnsmasq. The FreeBSD machine is 10.1.1.1, the Unifi device is 10.1.1.5.
In the logs of dnsmasq I get lots and lots of lines like the following. Shall I be worried or is this normal?
The corresponding lines on the Unifi device looks like the following. I tried a mac filter on
With the mac unfiltered:
In the logs of dnsmasq I get lots and lots of lines like the following. Shall I be worried or is this normal?
Code:
dnsmasq Dec 18 06:53:21 dnsmasq[1524]: UDP 296674 10.1.1.1/63805 query[PTR] 5.1.1.10.in-addr.arpa from 10.1.1.1
dnsmasq Dec 18 06:53:21 dnsmasq[1524]: UDP 296674 10.1.1.1/63805 DHCP 10.1.1.5 is unifi-7-pro
dnsmasq Dec 18 06:53:21 dnsmasq[1524]: UDP 296675 10.1.1.1/20863 query[PTR] 5.1.1.10.in-addr.arpa from 10.1.1.1
dnsmasq Dec 18 06:53:21 dnsmasq[1524]: UDP 296675 10.1.1.1/20863 DHCP 10.1.1.5 is unifi-7-pro
dnsmasq Dec 18 06:53:21 dnsmasq[1524]: UDP 296676 10.1.1.1/14651 query[PTR] 5.1.1.10.in-addr.arpa from 10.1.1.1
dnsmasq Dec 18 06:53:21 dnsmasq[1524]: UDP 296676 10.1.1.1/14651 DHCP 10.1.1.5 is unifi-7-pro
The corresponding lines on the Unifi device looks like the following. I tried a mac filter on
c4:82:e1:9a:e6:7f, but unblocking has no effect.
Code:
Thu Dec 18 06:53:21 2025 kern.info kernel: wlan: [0:I:ANY] [UNSPECIFIED] vap-0(wifi0ap0): [c4:82:e1:9a:e6:7f]recv auth frame with algorithm 0 seq 1 rssi:3 minrssi:0
Thu Dec 18 06:53:21 2025 kern.info kernel: wlan: [0:I:ANY] [UNSPECIFIED] vap-0(wifi0ap0):[c4:82:e1:9a:e6:7f] auth: disallowed by ACL
Thu Dec 18 06:53:21 2025 kern.info kernel: wlan: [0:I:ANY] [UNSPECIFIED] vap-0(wifi0ap0):mlme_recv_auth_ap_defer auth failed with status 37
Thu Dec 18 06:53:21 2025 kern.err kernel: wlan: [0:E:ANY] dp_get_peer_stats: avoid pulling stats for inactive peer
Thu Dec 18 06:53:21 2025 kern.info kernel: wlan: [0:I:ANY] [UNSPECIFIED] vap-0(wifi0ap0):mlme_recv_auth_ap_defer[3044]: client[c4:82:e1:9a:e6:7f] rejected, reason=37
Thu Dec 18 06:53:21 2025 user.info hostapd[5134]: wifi0ap0: STA c4:82:e1:9a:e6:7f IEEE 802.11: disassociated
Thu Dec 18 06:53:21 2025 user.info stahtd[5131]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","event_type":"auth_flood","mac":"c4:82:e1:9a:e6:7f","vap":"wifi0ap0","assoc_status":"0","auth_rate": "9","exceed_cnt": "2134","period_ms": "30000"}
Code:
Thu Dec 18 07:42:29 2025 user.info hostapd[14073]: wifi0ap0: STA c4:82:e1:9a:e6:7f IEEE 802.11: authenticated
Thu Dec 18 07:42:29 2025 user.info stahtd[5131]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","event_type":"auth_flood","mac":"c4:82:e1:9a:e6:7f","vap":"wifi0ap0","assoc_status":"0","auth_rate": "11","exceed_cnt": "2178","period_ms": "30000"}
Thu Dec 18 07:42:32 2025 kern.info kernel: wlan: [0:I:ANY] [UNSPECIFIED] vap-0(wifi0ap0): [c4:82:e1:9a:e6:7f]recv auth frame with algorithm 0 seq 1 rssi:10 minrssi:0
Thu Dec 18 07:42:32 2025 user.err hostapd[14073]: ERROR: NULL Pointer ap_get_ft_ds_ml_sta:104