"Quick scan"-like behavior interrupting low latency streams on AP6-PRO

I have an Alta Labs AP6-PRO wireless access point connected to an Alta Route10 router as the sole AP in a residential setup.

It is configured to use a static channel and channel bandwidth for both 2.4GHz and 5GHz spectrums: Channel 6 at 40MHz for 2.4GHz and Channel 36 at 80MHz for 5GHz. I believe this puts me safely out of DFS range for the United States.

Despite this static configuration, the access point still performs a “quick scan” of all channels at irregular intervals (sometimes every couple of minutes, sometimes every half hour, sometimes not at all for a couple of hours).

This activity interrupts our VR equipment streaming very low latency video at a constant 65 Mbit/s on the 5GHz network of the device. It manifests as four or five short pauses in quick succession and then recovers, but puts the VR out of sync afterwards, adding a delay and causing us to need to restart our VR equipment. It wasn’t frequent enough to matter at first, but yesterday it was happening often enough to merit investigating and putting a stop to it.

I have some confidence that it is channel scanning, because I isolated all the devices except the VR equipment - to the point of powering everything else down - to see if the issue stopped, and that didn’t help. I was able to reproduce the exact behavior experienced when pressing the “Quick scan” button on the Info tab for the AP6-PRO.

This doesn’t happen when using a borrowed access point from another vendor with the same configuration. How can this auto-scanning-like behavior be stopped, if it is the cause?

Is there a command line interface for the access point to disable this action or feature? For our setup and location, we don’t require features such as checking for noise floor changes, other hidden/rogue APs, or co-channel congestion. I have already disabled the DPI engine, thinking that this might also turn off any periodic auto scanning, but it hasn’t.

Here are some config screenshots - if anyone notices anything I should change that might stop the scanning, please let me know.

You can ssh/terminal into the AP and run killall qcawifi-scanner to disable scanning. To make this permanent, you can add it to /cfg/post-cfg.sh. Please keep in mind that this will make neighbor reports useless for scanning, and rogue APs will not be detected (unless the rogue is on the current channel).

5 Likes

Thanks for the quick response, I’ll give this a go!