Been glancing over the data, and here is what I have so far....
The camera served its last image to motion at 10:05.07, and got the first disconnection grey screen at 10:05.12
Here is a small section of the tcpdump (without the actual packet data to keep it small). You can see that the foscam would send 2 packets of data to the core, then the core would send an ACK.. This repeated for over 10 minutes - 2 data packets from the foscam, and ack from the core.. repeat... repeat...
Then, look at packet 206761... The foscam sends only a single package, and its marked as a retransmission, then the core sends a duplicate ACK.. From there, things look a little messed up for a few packages, then the ARP requests start firing, and the foscam never responds..
No. Time Source Destination Protocol Info
206752 686.838205 192.168.80.1 192.168.80.202 TCP 60632 > http [ACK] Seq=124 Ack=189955810 Win=87872 Len=0 TSV=12705657 TSER=5021270
206753 686.838592 192.168.80.202 192.168.80.1 HTTP Continuation or non-HTTP traffic[Packet size limited during capture]
206754 686.838857 192.168.80.202 192.168.80.1 HTTP Continuation or non-HTTP traffic[Packet size limited during capture]
206755 686.838936 192.168.80.1 192.168.80.202 TCP 60632 > http [ACK] Seq=124 Ack=189957993 Win=87872 Len=0 TSV=12705658 TSER=5021270
206756 686.874947 192.168.80.202 192.168.80.1 HTTP Continuation or non-HTTP traffic[Packet size limited during capture]
206757 686.875301 192.168.80.202 192.168.80.1 HTTP Continuation or non-HTTP traffic[Packet size limited during capture]
206758 686.875411 192.168.80.1 192.168.80.202 TCP 60632 > http [ACK] Seq=124 Ack=189960889 Win=87872 Len=0 TSV=12705667 TSER=5021273
206759 686.875852 192.168.80.202 192.168.80.1 HTTP Continuation or non-HTTP traffic[Packet size limited during capture]
206760 686.915893 192.168.80.1 192.168.80.202 TCP 60632 > http [ACK] Seq=124 Ack=189962337 Win=87872 Len=0 TSV=12705677 TSER=5021273
206761 687.046868 192.168.80.202 192.168.80.1 HTTP [TCP Retransmission] Continuation or non-HTTP traffic[Packet size limited during capture]
206762 687.046942 192.168.80.1 192.168.80.202 TCP [TCP Dup ACK 206760#1] 60632 > http [ACK] Seq=124 Ack=189962337 Win=87872 Len=0 TSV=12705710 TSER=5021273 SLE=189950018 SRE=189951466
206763 687.178848 PcPartne_27:b8:1a DavicomS_86:78:a6 ARP Who has 192.168.80.202? Tell 192.168.80.1
206764 687.466883 192.168.80.202 192.168.80.1 HTTP [TCP Retransmission] Continuation or non-HTTP traffic[Packet size limited during capture]
206765 687.466960 192.168.80.1 192.168.80.202 TCP [TCP Dup ACK 206760#2] 60632 > http [ACK] Seq=124 Ack=189962337 Win=87872 Len=0 TSV=12705815 TSER=5021273 SLE=189950018 SRE=189951466
206766 687.832034 192.168.80.1 192.168.80.202 NBNS Name query NBSTAT *<00><00><00><00><00><00><00><00><00><00><00><00><00><00><00>
206767 688.179661 PcPartne_27:b8:1a DavicomS_86:78:a6 ARP Who has 192.168.80.202? Tell 192.168.80.1
206768 688.306900 192.168.80.202 192.168.80.1 HTTP [TCP Retransmission] Continuation or non-HTTP traffic[Packet size limited during capture]
206769 688.306997 192.168.80.1 192.168.80.202 TCP [TCP Dup ACK 206760#3] 60632 > http [ACK] Seq=124 Ack=189962337 Win=87872 Len=0 TSV=12706025 TSER=5021273 SLE=189950018 SRE=189951466
206770 689.179664 PcPartne_27:b8:1a DavicomS_86:78:a6 ARP Who has 192.168.80.202? Tell 192.168.80.1
206771 689.986923 192.168.80.202 192.168.80.1 HTTP [TCP Retransmission] Continuation or non-HTTP traffic[Packet size limited during capture]
206772 689.987066 192.168.80.1 192.168.80.202 TCP [TCP Dup ACK 206760#4] 60632 > http [ACK] Seq=124 Ack=189962337 Win=87872 Len=0 TSV=12706444 TSER=5021273 SLE=189950018 SRE=189951466
206773 693.346951 192.168.80.202 192.168.80.1 HTTP [TCP Retransmission] Continuation or non-HTTP traffic[Packet size limited during capture]
206774 693.350801 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206775 694.350674 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206776 695.351191 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206777 696.879048 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206778 697.879183 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206779 698.880183 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206780 699.939171 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206781 700.067001 192.168.80.202 192.168.80.1 HTTP [TCP Retransmission] Continuation or non-HTTP traffic[Packet size limited during capture]
206782 700.939177 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206783 701.939205 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206784 703.203170 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206785 704.203180 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206786 705.203174 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206787 709.731170 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206788 710.730686 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206789 711.732741 PcPartne_27:b8:1a Broadcast ARP Who has 192.168.80.202? Tell 192.168.80.1
206790 713.507129 192.168.80.202 192.168.80.1 HTTP [TCP Retransmission] Continuation or non-HTTP traffic[Packet size limited during capture]
(if anyone wants the full dump of this data that includes the packet data, I have that available too)
Ok, now lets look at the dhcpd log data for this time frame:
Dec 17 09:47:32 dcerouter dhcpd: For info, please visit http://www.isc.org/sw/dhcp/
Dec 17 09:47:32 dcerouter dhcpd: Wrote 0 deleted host decls to leases file.
Dec 17 09:47:32 dcerouter dhcpd: Wrote 0 new dynamic host decls to leases file.
Dec 17 09:47:32 dcerouter dhcpd: Wrote 14 leases to leases file.
Dec 17 10:05:35 dcerouter dhcpd: DHCPREQUEST for 192.168.80.200 from 00:17:ab:41:72:c5 (Wii) via eth0
Dec 17 10:05:35 dcerouter dhcpd: DHCPACK on 192.168.80.200 to 00:17:ab:41:72:c5 (Wii) via eth0
Dec 17 10:12:36 dcerouter dhcpd: DHCPREQUEST for 192.168.80.200 from 00:17:ab:41:72:c5 (Wii) via eth0
Dec 17 10:12:36 dcerouter dhcpd: DHCPACK on 192.168.80.200 to 00:17:ab:41:72:c5 (Wii) via eth0
As you can see, there are no indications that the connection was dropped by the dhcp server (it would show a DHCPNAK if it did). There is a request at 10:05.35, but this should be totally unrelated and was after 10:05.12 anyways...
One more log I checked was /var/log/pluto/dhcp_pnp.log, and it showed nothing to indicate a a DHCP problem.
So it looks like the tcpdump data is all we have to go by and now we have to figure out how and why it goes haywire