Telegram ENETUNREACH

I have a raspberry pi running Node-Red and it has been working for some time with no problems. I'm using Telegram to send me a report every morning on the main parameters being monitored. It's a remote home automation application.
About a week ago I stopped getting the report come through. When I was able to get to the remote location I had to reboot the router and the raspberry pi.
Now I am not getting the report from the Telegram bot. In the Node-Red debug window I now get a message like this:

Caught exception in sender node: Error: EFATAL: Error: connect ENETUNREACH 149.154.167.220:443 - Local (0.0.0.0:0) when processing message: {"payload":{"chatId":12345678,"type":"message","content":"Kitchen PIR triggered","options":{"chat_id":12345678,"text":"Kitchen PIR triggered"}},"_msgid":"c1afa97b32cfd67b"}

I have changed the chatid there.

In addition, I have been using Remote-Red on my iphone to monitor the Dashboard and this too is showing errors. I deleted the Remote Access node and when I tried to re-establish a link, a similar ENETUNREACH error came up as I tried to get the QR code.

I think it is something to do with https access but I'm not to bright when it comes to this sort of thing. I am a hardware engineer not a software engineer so be gentle with me!

First thing to check is if you are connected to Telegram, if you are and are using node-red-contrib-telegrambot, you should get a status displayed that tells you.
2023-03-27_18-21

If it is not connected, it may be that something is wrong with your credentials.

Yes the Telegram Sender node is showing 'connected'. So I don't think it's that.
Thank you for you input.
It's the fact I get a similar error message when setting up the Remote-Red 'remote access' node, as well. Makes me think that it is a https issue. It comes up with a ENETUNREACH error but a different ip address

:443 is the HTTPS connection port, so here is hoping you are on the right path there.

Thanks. Just not sure where to look now. As I say, I'm a hardware engineer!

Just took a look in a Browser and the SSL Certificate only works for *.telegram.org or telegram.org.

This suggests to me that something is not set up correctly in the Telegram Node, but quite where is above my pay grade.

Which Telegram node are you using?
Does the the error in the debug window originate at the telegram node?

I think I may have an idea what might be wrong but can't check until I am at the remote location.
I didn't want to confuse the issue to much but here is what might have happened. I have been using a Vigor router but have been experiencing issues with it. Perhaps once a month it drops out, despite having a scheduled reset every evening. My solution on the day things went wrong was to swap the router for a much simpler one given to me by the service provider. However, it everything went belly up because the static ip address had been set by the old router. I made a change in the pi to set the static ip address - the usual /etc/dhcpcd.conf edit. Most things then started working but I didn't notice the issue with the Telegram Sender port. My ESP32-CAM modules have PIRs that trigger a photo and send via Telegram - totally independent of Node-Red - but they do use the WiFi. So when I started getting the Telegram photos I assumed all was ok. Insufficient software testing!!
I believe that while the ip address has been allocated correctly, I may have may a typo in one of the other addresses.
I also found that the Remote-Red app had stopped working and got distracted by that problem - removing the node and trying to set it up again - getting a similar ENETUNREACH error message. I decided to revert back to the old router only to find that the same issue occurred with it. It was only as I was leaving the site that I found the issue with Telegram and captured the message.
So, because the issue occurs with both routers and I haven't edited the Telegram node, I assume it is not a router problem. That leaves the Pi and the only thing I changed was the /etc/dhcpcd.conf file to set the static ip. I'm just going to have to wait until I am on site next to check.

Thank you so much for your assistance. It is very much appreciated. I'll post on here when I investigate later in the week.

The RPi is the place I would check if that is the only thing changed.

Check the voltage coming out of the Draytek PSU Brick if you can, I have had a problem with one in the past causing 'unreliable connection'. (Only problem I have had with my 3 Drayteks in 20+years!)

Will do. I have to say the Draytek has been a great router apart from this one issue. I have learned a lot from using it because there are so many features. Most of the terms it uses could be Martian to me - tantalising words that I understand but strung together in what to me is meaningless!
The supply to the remote location is not great and there is probably one significant power break every month. I'm not entirely sure why the router drops out. When it does, I have no WiFi. The camera modules I designed have proper Watch Dog Timers circuits so when the the WiFi goes they enter a 5 minute reset cycle so effective stop working.
I must try logging status to a memory stick and see if that throws light on things.
Perhaps I could put a little flow into the Node-Red to record the last 10 messages with a time code.
Hmmm future project coming up. It's great being retired!! Unfortunately the brain is not always up to the task!
Thanks again.

Would an snmp flow help? It will send messages to Telegram if Internet drops, but of course, it may be too late, but at least you would get some kind of message...

[{"id":"e9c59b03.a502c8","type":"function","z":"223f145.6913d6c","name":"Router","func":"function pad2(number) {\n  number = '0' + Math.floor(number);\n  return number.substr(number.length - 2);\n}\n\nfunction pad3(number) {\n  number = \"0\" + Math.floor(number);\n  return number.substr(number.length - 3);\n}\n\nvar ticks = msg.payload[0].value;\nvar seconds = ticks / 100; \nvar hour = Math.floor(seconds / 3600);\nvar minute = Math.floor((seconds / 60) % 60);\nvar second = seconds % 60;\n\nvar result = pad3(hour) + ':' + pad2(minute) + ':' + pad2(second)\nvar rx1 = (msg.payload[3].value/1000000).toFixed(1);\nvar rx2 = (msg.payload[4].value/1000000).toFixed(1);\nvar tx1 = (msg.payload[5].value/1000000).toFixed(1);\n\nmsg.V2762 = \"Uptime: \" + result + \"</br>\";\nmsg.V2762 += \"SNR (Downstream): \" +  msg.payload[1].value + \"dB</br>\";\nmsg.V2762 += \"Status: \" + msg.payload[2].value + \" | \" + msg.payload[6].value + \"</br>\";\nmsg.V2762 += \"Rx: \" + rx1 + \"/\";\nmsg.V2762 += rx2 + \" | \";\nmsg.V2762 += \"Tx: \" + tx1;\nreturn msg;","outputs":1,"noerr":0,"initialize":"","finalize":"","libs":[],"x":890,"y":2396,"wires":[["c79feb1d.90f218"]]},{"id":"45bb15c.ebffbec","type":"function","z":"223f145.6913d6c","name":"Internet Status","func":"delete msg.oid;\ndelete msg.V2762;\nif (msg.payload[6].value === null){msg.payload[6].value = \"SHOWTIME  (or null!)\";}\nmsg.payload = \"Internet Status Changed - \" + msg.payload[6].value;\nreturn msg;","outputs":1,"noerr":0,"initialize":"","finalize":"","libs":[],"x":1080,"y":2460,"wires":[["91187368.2e33"]]},{"id":"91187368.2e33","type":"link out","z":"223f145.6913d6c","name":"Router","links":["90b920aa.9feb78"],"x":1235,"y":2460,"wires":[]},{"id":"1d54a569.8d0cc3","type":"inject","z":"223f145.6913d6c","name":"","props":[{"p":"payload"},{"p":"topic","vt":"str"}],"repeat":"","crontab":"","once":false,"onceDelay":0.1,"topic":"","payload":"","payloadType":"date","x":240,"y":2460,"wires":[["5a89a2d3.5ebadc"]]},{"id":"201018e2.cc2678","type":"switch","z":"223f145.6913d6c","name":"","property":"payload[2].value","propertyType":"msg","rules":[{"t":"cont","v":"TRAINING","vt":"str"},{"t":"cont","v":"READY","vt":"str"},{"t":"cont","v":"FAIL","vt":"str"},{"t":"null"},{"t":"else"}],"checkall":"true","repair":false,"outputs":5,"x":570,"y":2436,"wires":[["1fa35e94.3da939"],["1fa35e94.3da939"],["1fa35e94.3da939"],["1fa35e94.3da939"],["c79feb1d.90f218","cfc356d6.7a50f","e9c59b03.a502c8"]]},{"id":"1fa35e94.3da939","type":"function","z":"223f145.6913d6c","name":"","func":"msg.payload[6].value = \"Down\";\nreturn msg;","outputs":1,"noerr":0,"initialize":"","finalize":"","libs":[],"x":720,"y":2396,"wires":[["cfc356d6.7a50f","e9c59b03.a502c8"]]},{"id":"cfc356d6.7a50f","type":"rbe","z":"223f145.6913d6c","name":"Stat change","func":"rbei","gap":"","start":"","inout":"out","septopics":true,"property":"payload[6].value","topi":"topic","x":890,"y":2460,"wires":[["45bb15c.ebffbec"]]},{"id":"5cc8ec92.a0acec","type":"comment","z":"223f145.6913d6c","name":"Router Stats (Open for OIDs)","info":"1.3.6.1.2.1.1.3.0\n1.3.6.1.2.1.10.94.1.1.3.1.4.4\n1.3.6.1.2.1.10.94.1.1.3.1.6.4\n1.3.6.1.2.1.10.94.1.1.3.1.8.4\n1.3.6.1.2.1.10.94.1.1.4.1.2.4\n1.3.6.1.2.1.10.94.1.1.5.1.2.4\n1.3.6.1.2.1.4.20.1.1.80.229.20.16\n\nVigor Routers support MIB-II, ADSL-LINE-MIB, VDSL2-LINE-MIB and customized DrayTek-MIB.\nThe OIDs supported are listed below.\n\nCategory:\n\n    System\n    Interface\n    IP\n    ICMP\n    TCP\n    UDP\n    SNMP\n    ADSL\n    VDSL\n    USB sensor\n    VPN\n    Router Information\n\nSystem\n1.3.6.1.2.1.1.1\tsysDescr\n1.3.6.1.2.1.1.2\tsysObjectID\n1.3.6.1.2.1.1.3\tsysUpTime\n1.3.6.1.2.1.1.4\tsysContact\n1.3.6.1.2.1.1.5\tsysName\n1.3.6.1.2.1.1.6\tsysLocation\n1.3.6.1.2.1.1.7\tsysServices\nInterface: WAN, LAN, and WLAN\n1.3.6.1.2.1.2.1\tifnumber\n1.3.6.1.2.1.2.2\tifTable\n1.3.6.1.2.1.2.2.1\tifEntry\n1.3.6.1.2.1.2.2.1.1\tifIndex\n1.3.6.1.2.1.2.2.1.2\tifDescr\n1.3.6.1.2.1.2.2.1.3\tifType\n1.3.6.1.2.1.2.2.1.4\tifMtu\n1.3.6.1.2.1.2.2.1.5\tifSpeed\n1.3.6.1.2.1.2.2.1.6\tifPhysAddress\n1.3.6.1.2.1.2.2.1.7\tifAdminStatus\n1.3.6.1.2.1.2.2.1.8\tifOperStatus\n1.3.6.1.2.1.2.2.1.9\tifLastChange\n1.3.6.1.2.1.2.2.1.10\tifInOctets\n1.3.6.1.2.1.2.2.1.11\tifInUcastPkts\n1.3.6.1.2.1.2.2.1.12\tifInNUcastPkts\n1.3.6.1.2.1.2.2.1.13\tifInDiscards\n1.3.6.1.2.1.2.2.1.14\tifInErrors\n1.3.6.1.2.1.2.2.1.15\tifInUnknownProtos\n1.3.6.1.2.1.2.2.1.16\tifOutOctets\n1.3.6.1.2.1.2.2.1.17\tifOutUcastPkts\n1.3.6.1.2.1.2.2.1.18\tifOupNUcastPkts\n1.3.6.1.2.1.2.2.1.19\tifOutDiscards\n1.3.6.1.2.1.2.2.1.20\tifOutErrors\n1.3.6.1.2.1.2.2.1.21\tifOutQlen\n1.3.6.1.2.1.2.2.1.22\tifSpecific\nIP\n1.3.6.1.2.1.4.1\tipForwarding\n1.3.6.1.2.1.4.2\tipDefaultTTL\n1.3.6.1.2.1.4.3\tipInReceives\n1.3.6.1.2.1.4.4\tipInHdrErrors\n1.3.6.1.2.1.4.5\tipInAddrErrors\n1.3.6.1.2.1.4.6\tipForwDatagrams\n1.3.6.1.2.1.4.7\tipInknownProtos\n1.3.6.1.2.1.4.8\tipInDiscards\n1.3.6.1.2.1.4.9\tipInDelivers\n1.3.6.1.2.1.4.10\tipOutRequests\n1.3.6.1.2.1.4.11\tipOutDiscards\n1.3.6.1.2.1.4.12\tipOutNoRoutes\n1.3.6.1.2.1.4.13\tipReasmTimeout\n1.3.6.1.2.1.4.14\tipReasmReqds\n1.3.6.1.2.1.4.15\tipReasmOKs\n1.3.6.1.2.1.4.16\tipReasmFails\n1.3.6.1.2.1.4.17\tipFragOKs\n1.3.6.1.2.1.4.18\tipFragFails\n1.3.6.1.2.1.4.19\tipFragCreates\n1.3.6.1.2.1.4.20\tipAddrTable\n1.3.6.1.2.1.4.21\tipRouteTable\n1.3.6.1.2.1.4.22\tipNetToMediaTable\n1.3.6.1.2.1.4.23\tipRoutingDiscards\nICMP\n1.3.6.1.2.1.5.1\ticmpInMsgs\n1.3.6.1.2.1.5.2\ticmpInErrors\n1.3.6.1.2.1.5.3\ticmpInDestUnreachs\n1.3.6.1.2.1.5.4\ticmpInTimeExcds\n1.3.6.1.2.1.5.5\ticmpInParmProbs\n1.3.6.1.2.1.5.6\ticmpInSrcQuenchs\n1.3.6.1.2.1.5.7\ticmpInRedirects\n1.3.6.1.2.1.5.8\ticmpInEchos\n1.3.6.1.2.1.5.9\ticmpInEchoReps\n1.3.6.1.2.1.5.10\ticmpInTimestamps\n1.3.6.1.2.1.5.11\ticmpInTimestampReps\n1.3.6.1.2.1.5.12\ticmpInAddrMasks\n1.3.6.1.2.1.5.13\ticmpInAddrMaskReps\n1.3.6.1.2.1.5.14\ticmpOutMsgs\n1.3.6.1.2.1.5.15\ticmpOutErrors\n1.3.6.1.2.1.5.16\ticmpOutDestUnreachs\n1.3.6.1.2.1.5.17\ticmpOutTimeExcds\n1.3.6.1.2.1.5.18\ticmpOutParmProbs\n1.3.6.1.2.1.5.19\ticmpOutSrcQuenchs\n1.3.6.1.2.1.5.20\ticmpOutRedirects\n1.3.6.1.2.1.5.21\ticmpOutEchos\n1.3.6.1.2.1.5.22\ticmpOutEchoReps\n1.3.6.1.2.1.5.23\ticmpOutTimestamps\n1.3.6.1.2.1.5.24\ticmpOutTimestampsReps\n1.3.6.1.2.1.5.25\ticmpOutAddrMasks\n1.3.6.1.2.1.5.26\ticmpOutAddrMaskReps\nTCP\n1.3.6.1.2.1.6.1\ttcpRtoAlgorithm\n1.3.6.1.2.1.6.2\ttcpRtoMin\n1.3.6.1.2.1.6.3\ttcpRtoMax\n1.3.6.1.2.1.6.4\ttcpMaxConn\n1.3.6.1.2.1.6.5\ttcpActiveOpens\n1.3.6.1.2.1.6.6\ttcpPassiveOpens\n1.3.6.1.2.1.6.7\ttcpAttemptFails\n1.3.6.1.2.1.6.8\ttcpEstabResets\n1.3.6.1.2.1.6.9\ttcpCurrEstab\n1.3.6.1.2.1.6.10\ttcpInSegs\n1.3.6.1.2.1.6.11\ttcpOutSegs\n1.3.6.1.2.1.6.12\ttcpRetransSegs\n1.3.6.1.2.1.6.14\ttcpInErrors\n1.3.6.1.2.1.6.15\ttcpOutRsts\nUDP\n1.3.6.1.2.1.7.1\tudpInDatagrams\n1.3.6.1.2.1.7.2\tudpNoPorts\n1.3.6.1.2.1.7.3\tudpInErrors\n1.3.6.1.2.1.7.4\tudpOutDatagrams\nSNMP\n1.3.6.1.2.1.11.1\tsnmpInPkts\n1.3.6.1.2.1.11.2\tsnmpOutPkts\n1.3.6.1.2.1.11.3\tsnmpInBadVersions\n1.3.6.1.2.1.11.4\tsnmpInBadCommunityNames\n1.3.6.1.2.1.11.5\tsnmpInBadCommunityUses\n1.3.6.1.2.1.11.6\tsnmpInASNParseErrs\n1.3.6.1.2.1.11.8\tsnmpInTooBigs\n1.3.6.1.2.1.11.9\tsnmpInNoSuchNames\n1.3.6.1.2.1.11.10\tsnmpInBadValues\n1.3.6.1.2.1.11.11\tsnmpInReadOnlys\n1.3.6.1.2.1.11.12\tsnmpInGenErrs\n1.3.6.1.2.1.11.13\tsnmpInTotalReqVars\n1.3.6.1.2.1.11.14\tsnmpInTotalSetVars\n1.3.6.1.2.1.11.15\tsnmpInGetRequests\n1.3.6.1.2.1.11.16\tsnmpInGetNexts\n1.3.6.1.2.1.11.17\tsnmpInSetRequests\n1.3.6.1.2.1.11.18\tsnmpInGetResponses\n1.3.6.1.2.1.11.19\tsnmpInTraps\n1.3.6.1.2.1.11.20\tsnmpOutTooBigs\n1.3.6.1.2.1.11.21\tsnmpOutNoSuchNames\n1.3.6.1.2.1.11.22\tsnmpOutBadValues\n1.3.6.1.2.1.11.24\tsnmpOutGenErrs\n1.3.6.1.2.1.11.25\tsnmpOutGetRequests\n1.3.6.1.2.1.11.26\tsnmpOutGetNexts\n1.3.6.1.2.1.11.27\tsnmpOutSetRequests\n1.3.6.1.2.1.11.28\tsnmpOutGetResponses\n1.3.6.1.2.1.11.29\tsnmpOutTraps\n1.3.6.1.2.1.11.30\tsnmpEnableAuthenTraps\nADSL\n1.3.6.1.2.1.10.94.1.1.1.1.1\tadslLineCoding\n1.3.6.1.2.1.10.94.1.1.1.1.2\tadslLineType\n1.3.6.1.2.1.10.94.1.1.1.1.3\tadslLineSpecific\n1.3.6.1.2.1.10.94.1.1.1.1.4\tadslLineConfProfile\n1.3.6.1.2.1.10.94.1.1.1.1.5\tadslLineAlarmConfProfile\n1.3.6.1.2.1.10.94.1.1.2.1.1\tadslAtucInvSerialNumber\n1.3.6.1.2.1.10.94.1.1.2.1.2\tadslAtucInvVendorID\n1.3.6.1.2.1.10.94.1.1.2.1.3\tadslAtucInvVersionNumber\n1.3.6.1.2.1.10.94.1.1.2.1.4\tadslAtucCurrSnrMgn\n1.3.6.1.2.1.10.94.1.1.2.1.5\tadslAtucCurrAtn\n1.3.6.1.2.1.10.94.1.1.2.1.6\tadslAtucCurrStatus\n1.3.6.1.2.1.10.94.1.1.2.1.7\tadslAtucCurrOutputPwr\n1.3.6.1.2.1.10.94.1.1.2.1.8\tadslAtucCurrAttainableRate\n1.3.6.1.2.1.10.94.1.1.3.1.1\tadslAturInvSerialNumber\n1.3.6.1.2.1.10.94.1.1.3.1.2\tadslAturInvVendorID\n1.3.6.1.2.1.10.94.1.1.3.1.3\tadslAturInvVersionNumber\n1.3.6.1.2.1.10.94.1.1.3.1.4\tadslAturCurrSnrMgn\n1.3.6.1.2.1.10.94.1.1.3.1.5\tadslAturCurrAtn\n1.3.6.1.2.1.10.94.1.1.3.1.6\tadslAturCurrStatus\n1.3.6.1.2.1.10.94.1.1.3.1.7\tadslAturCurrOutputPwr\n1.3.6.1.2.1.10.94.1.1.3.1.8\tadslAturCurrAttainableRate\n1.3.6.1.2.1.10.94.1.1.4.1.1\tadslAtucChanInterleaveDelay\n1.3.6.1.2.1.10.94.1.1.4.1.2\tadslAtucChanCurrTxRate\n1.3.6.1.2.1.10.94.1.1.4.1.3\tadslAtucChanPrevTxRate\n1.3.6.1.2.1.10.94.1.1.4.1.4\tadslAtucChanCrcBlockLength\n1.3.6.1.2.1.10.94.1.1.5.1.1\tadslAturChanInterleaveDelay\n1.3.6.1.2.1.10.94.1.1.5.1.2\tadslAturChanCurrTxRate\n1.3.6.1.2.1.10.94.1.1.5.1.3\tadslAturChanPrevTxRate\n1.3.6.1.2.1.10.94.1.1.5.1.4\tadslAturChanCrcBlockLength\n\nNote: ADSL and VDSL share same OIDs in models 2860 or earlier, firmware version 3.9.0 or earlier.\nVDSL\n1.3.6.1.2.1.10.251.1.2.2.1.1\txdsl2ChStatusUnit\n1.3.6.1.2.1.10.251.1.2.2.1.2\txdsl2ChStatusActDataRate\n1.3.6.1.2.1.10.251.1.2.2.1.3\txdsl2ChStatusPrevDataRate\n1.3.6.1.2.1.10.251.1.2.2.1.4\txdsl2ChStatusActDelay\n1.3.6.1.2.1.10.251.1.2.2.1.5\txdsl2ChStatusActInp\n1.3.6.1.2.1.10.251.1.2.2.1.6\txdsl2ChStatusInpReport\n1.3.6.1.2.1.10.251.1.2.2.1.7\txdsl2ChStatusNFec\n1.3.6.1.2.1.10.251.1.2.2.1.8\txdsl2ChStatusRFec\n1.3.6.1.2.1.10.251.1.2.2.1.9\txdsl2ChStatusLSymb\n1.3.6.1.2.1.10.251.1.2.2.1.10\txdsl2ChStatusIntlvDepth\n1.3.6.1.2.1.10.251.1.2.2.1.11\txdsl2ChStatusIntlvBlock\n1.3.6.1.2.1.10.251.1.2.2.1.12\txdsl2ChStatusLPath\n1.3.6.1.2.1.10.251.1.2.2.1.13\txdsl2ChStatusAtmStatus\n1.3.6.1.2.1.10.251.1.2.2.1.14\txdsl2ChStatusPtmStatus\nThe following OIDs are customized DrayTek-MIB:\nUSB sensor\n1.3.6.1.4.1.7367.1.1\ttemperValue\n1.3.6.1.4.1.7367.1.2\thumiValue\nVPN\nVPN Status\n1.3.6.1.4.1.7367.2.1.1\tconnectedTunnels\n1.3.6.1.4.1.7367.2.1.2\tconnectedTunnelIdx\n1.3.6.1.4.1.7367.2.1.3\tconnectedVPNprofilename\n1.3.6.1.4.1.7367.2.1.4\tconnectedVPNType\n1.3.6.1.4.1.7367.2.1.5\tconnectedVPNClientIP\n1.3.6.1.4.1.7367.2.1.6\tconnectedVPNWanIntface\n1.3.6.1.4.1.7367.2.1.7\tconnectedVPNRemoteSubnet\n1.3.6.1.4.1.7367.2.1.8\tconnectedVPNTXPkts\n1.3.6.1.4.1.7367.2.1.9\tconnectedVPNRXPkts\n1.3.6.1.4.1.7367.2.1.10\tconnectedVPNTXRate\n1.3.6.1.4.1.7367.2.1.11\tconnectedVPNRXRate\n1.3.6.1.4.1.7367.2.1.12\tconnectedVPNUpTime\n1.3.6.1.4.1.7367.2.1.13\tconnectedVPNActionDrop\nLan-to-Lan Profile Status\n1.3.6.1.4.1.7367.2.2.1\tconnectedL2LTunnels\n1.3.6.1.4.1.7367.2.2.2\tlan2LanProfileIdx\n1.3.6.1.4.1.7367.2.2.3\tlan2LanProfilename\n1.3.6.1.4.1.7367.2.2.4\tconnectedVPNType\n1.3.6.1.4.1.7367.2.2.5\tconnectedVPNClientIP\n1.3.6.1.4.1.7367.2.2.6\tconnectedVPNWanIntface\n1.3.6.1.4.1.7367.2.2.7\tconnectedVPNRemoteSubnet\n1.3.6.1.4.1.7367.2.2.8\tconnectedVPNTXPkts\n1.3.6.1.4.1.7367.2.2.9\tconnectedVPNRXPkts\n1.3.6.1.4.1.7367.2.2.10\tconnectedVPNTXRate\n1.3.6.1.4.1.7367.2.2.11\tconnectedVPNRXRate\n1.3.6.1.4.1.7367.2.2.12\tconnectedVPNUpTime\n1.3.6.1.4.1.7367.2.2.13\tconnectedVPNActionDrop\nRemote Dial-in Profile Status\n1.3.6.1.4.1.7367.2.3.1\tconnectedRDinTunnels\n1.3.6.1.4.1.7367.2.3.2\trDinProfileIdx\n1.3.6.1.4.1.7367.2.3.3\trDinProfilename\n1.3.6.1.4.1.7367.2.3.4\tconnectedVPNType\n1.3.6.1.4.1.7367.2.3.5\tconnectedVPNClientIP\n1.3.6.1.4.1.7367.2.3.6\tconnectedVPNWanIntface\n1.3.6.1.4.1.7367.2.3.7\tconnectedVPNRemoteSubnet\n1.3.6.1.4.1.7367.2.3.8\tconnectedVPNTXPkts\n1.3.6.1.4.1.7367.2.3.9\tconnectedVPNRXPkts\n1.3.6.1.4.1.7367.2.3.10\tconnectedVPNTXRate\n1.3.6.1.4.1.7367.2.3.11\tconnectedVPNRXRate\n1.3.6.1.4.1.7367.2.3.12\tconnectedVPNUpTime\n1.3.6.1.4.1.7367.2.3.13\tconnectedVPNActionDrop\nRouter Information\n1.3.6.1.4.1.7367.3.1\trouterModel\n1.3.6.1.4.1.7367.3.2\trouterRevision\n1.3.6.1.4.1.7367.3.3\tfwBuildDate\n1.3.6.1.4.1.7367.3.4\tdslVersion\n1.3.6.1.4.1.7367.3.5\tcountryCode\n1.3.6.1.4.1.7367.3.6\twirelessRegion\n1.3.6.1.4.1.7367.3.7\tmemoryUsage\n1.3.6.1.4.1.7367.3.8\tlanMac\nNOTE:\n\n    VPN SNMP OIDs are available in models 2862/2926 or later, firmware version 3.9.4 or later.\n    VPN Status OIDs are available only when VPN connection is established.\n    Lan-to-Lan and Remote Dial-in Profile Stautus are only available in models 2962/3910.\n    Download Draytek-MIB tree file here.\n\nPublished On:2016-02-24 \n","x":440,"y":2375,"wires":[]},{"id":"c79feb1d.90f218","type":"ui_text","z":"223f145.6913d6c","group":"962d6eb8.701498","order":1,"width":6,"height":2,"name":"","label":"Router stats","format":"{{msg.V2762}}","layout":"col-center","x":1070,"y":2396,"wires":[]},{"id":"2fb7f44f.092284","type":"cronplus","z":"223f145.6913d6c","name":"Router","outputField":"payload","timeZone":"","persistDynamic":false,"commandResponseMsgOutput":"output1","outputs":1,"options":[{"name":"schedule1","topic":"schedule1","payloadType":"default","payload":"","expressionType":"cron","expression":"*/10 * * * * *","location":"","offset":"0","solarType":"all","solarEvents":"sunrise,sunset"}],"x":230,"y":2396,"wires":[["5a89a2d3.5ebadc"]]},{"id":"5a89a2d3.5ebadc","type":"snmp","z":"223f145.6913d6c","host":"172.27.123.4","version":"2c","timeout":5,"community":"public","auth":"noAuthNoPriv","oids":"1.3.6.1.2.1.1.3.0,1.3.6.1.2.1.10.94.1.1.3.1.4.4,1.3.6.1.2.1.10.94.1.1.3.1.6.4,1.3.6.1.2.1.10.94.1.1.3.1.8.4,1.3.6.1.2.1.10.251.1.2.2.1.2.4.1,1.3.6.1.2.1.10.251.1.2.2.1.2.4.2,1.3.6.1.2.1.4.20.1.1.80.229.20.16\n\n","name":"Router Speeds","x":420,"y":2440,"wires":[["201018e2.cc2678"]]},{"id":"91a78ca770b67330","type":"catch","z":"223f145.6913d6c","name":"","scope":["5a89a2d3.5ebadc"],"uncaught":false,"x":410,"y":2475,"wires":[["eeeac6856c84945a"]]},{"id":"eeeac6856c84945a","type":"debug","z":"223f145.6913d6c","name":"","active":false,"tosidebar":true,"console":false,"tostatus":false,"complete":"false","statusVal":"","statusType":"auto","x":570,"y":2575,"wires":[]},{"id":"962d6eb8.701498","type":"ui_group","z":"223f145.6913d6c","name":"Router","tab":"8f66b6dd.6e06b8","order":7,"disp":false,"width":"6","collapse":false},{"id":"8f66b6dd.6e06b8","type":"ui_tab","name":"HMI","icon":"dashboard","order":1,"disabled":false,"hidden":false}]

(Draytek 2762)

Cor lummy. That is a flow and a half! I've spent the day at the remote location and here are my findings. The /etc/dhcpcd.conf was not corrupt, but still when I reverted to the Vigor router it would not work. So I deleted the lines in /etc/dhcpcd.conf that I had added and rebooted both the router and the Pi. Now everything is back to normal. The Vigor router is setting the Static ip address.
So now I can worry about what is causing the router to fall over. I need to do a more systematic check on what is working and what is not. Up until now I've just opted to get things going again. I have 7 WiFi devices associated with Node-Red. I also have hardwired CCTV and some Meross smart plugs. Next time it goes down I will check if the Ethernet devices work, the Meross ( which of course are independent of the Pi ) and finally the WiFi modules linked to the Pi. Some serious investigation to be done.
Next time I go over I'll have another look.
I'm a bit reluctant to add the node you sent just yet, but it may come in handy later.
Thanks again for your assistance.

2 Likes

Don't forget to check the voltage to the Router, and also to the Pi. RPi's are known to not like undervoltages. Just make sure the Power Supply is rated high enough.

The flow uses the OIDs used in my Draytek, which I am pretty sure is universal for all Drayteks. Some light reading for you. Draytek also have a page related to SNMP, but when I checked, they are almost correct, except they need an extra digit. Found this by 'walking through' the OIDs using a program that can check.

Good luck with your fault finding.

Thank you so much for your help. The logical thing to do is to identify what is going on with the router.

This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.