No Device Data in Netvox device

Hi, we have been testing the LoRaserver.io with the Netvox sensor. It just like all other people post in here, we could get the join accept and all good with uplink in the LoRaWan Frame, and also get the 1st uplink from the Netvox sensor. However, after the 1st uplink in the Device Data, there is no longer have any uplink message received but there is LoRaWan Frame received. I have a very occasionally, 1/100 time, could get an uplink data, but only 1 times for 2-3 message then never have it again!

By the way, I am using AS923 frequency, see below Lorawan Frame and Device data, and also the log from the TCP in the gateway.

23:06:50.724616 IP (tos 0x0, ttl 208, id 16731, offset 0, flags [DF], proto UDP (17), length 243)
ec2-52-211-65-43.eu-west-1.compute.amazonaws.com.1700 > 192.168.2.111.51850: [udp sum ok] RADIUS, length: 215
Access-Accept (2), id: 0xf5, Authenticator: 7b227478706b223a7b22696d6d65223a
Unknown Attribute (102), length: 97, Value:
0x0000: 6c73 652c 2272 6663 6822 3a30 2c22 706f
0x0010: 7765 223a 3134 2c22 616e 7422 3a30 2c22
0x0020: 6272 6422 3a30 2c22 746d 7374 223a 3430
0x0030: 3839 3738 3235 3536 2c22 6672 6571 223a
0x0040: 3932 332e 342c 226d 6f64 7522 3a22 4c4f
0x0050: 5241 222c 2264 6174 7222 3a22 5346 31
Acct-Output-Packets Attribute (48), length: 66, Value: ERROR: length 64 != 4
0x0000: 5731 3235 222c 2263 6f64 7222 3a22 342f
0x0010: 3522 2c22 6970 6f6c 223a 7472 7565 2c22
0x0020: 7369 7a65 223a 3333 2c22 6461 7461 223a
0x0030: 2249 4241 6c6e 3441 7346 5a76 6f45 6465
Unknown Attribute (108), length: 106 (bogus, goes past end of packet)
E…A[@…/.4.A+…o… …{“txpk”:{“imme”:false,“rfch”:0,“powe”:14,“ant”:0,“brd”:0,“tmst”:4089782556,“freq”:923.4,“modu”:“LORA”,“datr”:“SF10BW125”,“codr”:“4/5”,“ipol”:true,“size”:33,“data”:“IBAln4AsFZvoEdeljUHrggw/vEJRHO7IigIuoo9pyuPG”}}
23:06:50.734366 IP (tos 0x0, ttl 64, id 2428, offset 0, flags [DF], proto UDP (17), length 40)
192.168.2.111.51850 > ec2-52-211-65-43.eu-west-1.compute.amazonaws.com.1700: [udp sum ok] [|radius]
E…( |@.@…3…o4.A+…3I
23:06:59.933154 IP (tos 0x0, ttl 64, id 3134, offset 0, flags [DF], proto UDP (17), length 40)
192.168.2.111.51850 > ec2-52-211-65-43.eu-west-1.compute.amazonaws.com.1700: [udp sum ok] [|radius]
E…(.>@.@…q…o4.A+…$}…3I
23:07:00.322158 IP (tos 0x0, ttl 208, id 18072, offset 0, flags [DF], proto UDP (17), length 32)
ec2-52-211-65-43.eu-west-1.compute.amazonaws.com.1700 > 192.168.2.111.51850: [udp sum ok] [|radius]
E… F.@…+.4.A+…o…vi.$}…
23:07:02.076101 IP (tos 0x0, ttl 208, id 18398, offset 0, flags [DF], proto UDP (17), length 223)
ec2-52-211-65-43.eu-west-1.compute.amazonaws.com.1700 > 192.168.2.111.51850: [udp sum ok] RADIUS, length: 195
Access-Accept (2), id: 0x82, Authenticator: 7b227478706b223a7b22696d6d65223a
Unknown Attribute (102), length: 97, Value:
0x0000: 6c73 652c 2272 6663 6822 3a30 2c22 706f
0x0010: 7765 223a 3134 2c22 616e 7422 3a30 2c22
0x0020: 6272 6422 3a30 2c22 746d 7374 223a 3430
0x0030: 3937 3035 3331 3732 2c22 6672 6571 223a
0x0040: 3932 332e 322c 226d 6f64 7522 3a22 4c4f
0x0050: 5241 222c 2264 6174 7222 3a22 5346 31
Acct-Output-Packets Attribute (48), length: 66, Value: ERROR: length 64 != 4
0x0000: 5731 3235 222c 2263 6f64 7222 3a22 342f
0x0010: 3522 2c22 6970 6f6c 223a 7472 7565 2c22
0x0020: 7369 7a65 223a 3137 2c22 6461 7461 223a
0x0030: 2259 5065 4479 5143 4641 4141 4441 5038
Tunnel-Medium-Type Attribute (65), length: 65 (bogus, goes past end of packet)
E…G.@…).4.A+…o…:…f.{“txpk”:{“imme”:false,“rfch”:0,“powe”:14,“ant”:0,“brd”:0,“tmst”:4097053172,“freq”:923.2,“modu”:“LORA”,“datr”:“SF10BW125”,“codr”:“4/5”,“ipol”:true,“size”:17,“data”:“YPeDyQCFAAADAP8AAY2D3b4=”}}
23:07:02.084229 IP (tos 0x0, ttl 64, id 3255, offset 0, flags [DF], proto UDP (17), length 40)

23:07:11.983231 IP (tos 0x0, ttl 208, id 20307, offset 0, flags [DF], proto UDP (17), length 223)
ec2-52-211-65-43.eu-west-1.compute.amazonaws.com.1700 > 192.168.2.111.51850: [udp sum ok] RADIUS, length: 195
Access-Accept (2), id: 0x77, Authenticator: 7b227478706b223a7b22696d6d65223a
Unknown Attribute (102), length: 97, Value:
0x0000: 6c73 652c 2272 6663 6822 3a30 2c22 706f
0x0010: 7765 223a 3134 2c22 616e 7422 3a30 2c22
0x0020: 6272 6422 3a30 2c22 746d 7374 223a 3431
0x0030: 3036 3939 3436 3932 2c22 6672 6571 223a
0x0040: 3932 332e 342c 226d 6f64 7522 3a22 4c4f
0x0050: 5241 222c 2264 6174 7222 3a22 5346 31
Acct-Output-Packets Attribute (48), length: 66, Value: ERROR: length 64 != 4
0x0000: 5731 3235 222c 2263 6f64 7222 3a22 342f
0x0010: 3522 2c22 6970 6f6c 223a 7472 7565 2c22
0x0020: 7369 7a65 223a 3137 2c22 6461 7461 223a
0x0030: 2259 5065 4479 5143 4641 5141 4441 5038
Tunnel-Medium-Type Attribute (65), length: 65 (bogus, goes past end of packet)
E…OS@…!.4.A+…o…&…w…{“txpk”:{“imme”:false,“rfch”:0,“powe”:14,“ant”:0,“brd”:0,“tmst”:4106994692,“freq”:923.4,“modu”:“LORA”,“datr”:“SF10BW125”,“codr”:“4/5”,“ipol”:true,“size”:17,“data”:“YPeDyQCFAQADAP8AARfxbxo=”}}
23:07:11.992378 IP (tos 0x0, ttl 64, id 3743, offset 0, flags [DF], proto UDP (17), length 40)
192.168.2.111.51850 > ec2-52-211-65-43.eu-west-1.compute.amazonaws.com.1700: [udp sum ok] [|radius]

23:08:02.427568 IP (tos 0x0, ttl 208, id 25493, offset 0, flags [DF], proto UDP (17), length 223)
ec2-52-211-65-43.eu-west-1.compute.amazonaws.com.1700 > 192.168.2.111.51850: [udp sum ok] RADIUS, length: 195
Access-Accept (2), id: 0xca, Authenticator: 7b227478706b223a7b22696d6d65223a
Unknown Attribute (102), length: 97, Value:
0x0000: 6c73 652c 2272 6663 6822 3a30 2c22 706f
0x0010: 7765 223a 3134 2c22 616e 7422 3a30 2c22
0x0020: 6272 6422 3a30 2c22 746d 7374 223a 3431
0x0030: 3537 3433 3630 3238 2c22 6672 6571 223a
0x0040: 3932 332e 342c 226d 6f64 7522 3a22 4c4f
0x0050: 5241 222c 2264 6174 7222 3a22 5346 31
Acct-Output-Packets Attribute (48), length: 66, Value: ERROR: length 64 != 4
0x0000: 5731 3235 222c 2263 6f64 7222 3a22 342f
0x0010: 3522 2c22 6970 6f6c 223a 7472 7565 2c22
0x0020: 7369 7a65 223a 3137 2c22 6461 7461 223a
0x0030: 2259 5065 4479 5143 4641 6741 4441 5038
Tunnel-Medium-Type Attribute (65), length: 65 (bogus, goes past end of packet)
E…c.@…c4.A+…o…{“txpk”:{“imme”:false,“rfch”:0,“powe”:14,“ant”:0,“brd”:0,“tmst”:4157436028,“freq”:923.4,“modu”:“LORA”,“datr”:“SF10BW125”,“codr”:“4/5”,“ipol”:true,“size”:17,“data”:“YPeDyQCFAgADAP8AATKAtgE=”}}
23:08:02.434134 IP (tos 0x0, ttl 64, id 5554, offset 0, flags [DF], proto UDP (17), length 40)
192.168.2.111.51850 > ec2-52-211-65-43.eu-west-1.compute.amazonaws.com.1700: [udp sum ok] [|radius]
E…(…@.@…o4.A+…3I
23:08:23.080964 IP (tos 0x0, ttl 208, id 26143, offset 0, flags [DF], proto UDP (17), length 223)
ec2-52-211-65-43.eu-west-1.compute.amazonaws.com.1700 > 192.168.2.111.51850: [udp sum ok] RADIUS, length: 195
Access-Accept (2), id: 0xa1, Authenticator: 7b227478706b223a7b22696d6d65223a
Unknown Attribute (102), length: 97, Value:
0x0000: 6c73 652c 2272 6663 6822 3a30 2c22 706f
0x0010: 7765 223a 3134 2c22 616e 7422 3a30 2c22
0x0020: 6272 6422 3a30 2c22 746d 7374 223a 3431
0x0030: 3738 3039 3235 3936 2c22 6672 6571 223a
0x0040: 3932 332e 342c 226d 6f64 7522 3a22 4c4f
0x0050: 5241 222c 2264 6174 7222 3a22 5346 31
Acct-Output-Packets Attribute (48), length: 66, Value: ERROR: length 64 != 4
0x0000: 5731 3235 222c 2263 6f64 7222 3a22 342f
0x0010: 3522 2c22 6970 6f6c 223a 7472 7565 2c22
0x0020: 7369 7a65 223a 3137 2c22 6461 7461 223a
0x0030: 2259 5065 4479 5143 4641 7741 4441 5038
Tunnel-Medium-Type Attribute (65), length: 65 (bogus, goes past end of packet)
E…f.@…
.4.A+…o…R.{“txpk”:{“imme”:false,“rfch”:0,“powe”:14,“ant”:0,“brd”:0,“tmst”:4178092596,“freq”:923.4,“modu”:“LORA”,“datr”:“SF10BW125”,“codr”:“4/5”,“ipol”:true,“size”:17,“data”:“YPeDyQCFAwADAP8AAeq4ljI=”}}
23:08:23.090676 IP (tos 0x0, ttl 64, id 7012, offset 0, flags [DF], proto UDP (17), length 40)

Hi there,

I am unable to help with your problem but maybe you can help with mine. I am trying to configure my chirpstack application to pair with a netvox device - however, I am unable to get any kind of join accept message, I just get repeated join requests. Did you set up as OTAA or ABP and can you please share the configuration of your device-profile?

Thanks!