нестабильное соединение ADSL
Эта ветка закрыта для дальнейших ответов. Вы можете создать новую тему, чтобы поделиться своими идеями или задать вопросы.
нестабильное соединение ADSL
Аппаратная версия устройства: ver. 4.0
Версия встроенного ПО: 1.0.5 Build 160309 Rel.62287
Провайдер: Ростелеком
VPI, VCI по договору с провайдером: VPI-60, VCI-67
Jan 1 00:00:35 daemon warn kernel: bcmxtmcfg: Reserve ATM vcid=0 port=0
Jan 1 00:00:35 daemon warn kernel: bcmxtmcfg: Reserve TxQueueIdx=0 for vcid 0
Jan 1 00:00:35 daemon warn kernel: XTM Init: Ch:0 - 400 tx BDs at 0xa1828000
Jan 1 00:00:35 daemon warn kernel: bcmxtmcfg: Connection UP, LinkActiveStatus=0x1, US=637000, DS=6144000
Jan 1 00:00:35 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:35 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:35 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:35 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:35 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:35 daemon warn kernel: netdev path : atm0.1 -> atm0
Jan 1 00:00:35 daemon warn kernel: BCMVLAN : atm0 mode was set to RG
Jan 1 00:00:36 daemon notice syslog: ***In initPPPoE Set -z
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon info kernel: device atm0.1 entered promiscuous mode
Jan 1 00:00:36 daemon info kernel: device atm0 entered promiscuous mode
Jan 1 00:00:36 daemon info kernel: br0: port 6(atm0.1) entering forwarding state
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon err pptp: Couldn't stat /dev/-c: No such file or directory
Jan 1 00:00:36 daemon err pptp: unrecognized option '-c'
Jan 1 00:00:36 daemon notice pptp: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:36 daemon notice pptp: PPP: Start to connect ...
Jan 1 00:00:37 daemon crit pptp: PPP server detected.
Jan 1 00:00:37 daemon crit pptp: PPP session established.
Jan 1 00:00:37 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:37 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:37 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:37 daemon warn kernel: netdev path : ppp0.1 -> atm0.1 -> atm0
Jan 1 00:00:37 daemon crit pptp: Using interface ppp0.1
Jan 1 00:00:37 daemon crit pptp: Connect: ppp0.1 <--> atm0.1
Jan 1 00:00:38 daemon crit pptp: PPP LCP UP.
Jan 1 00:00:38 daemon warn radvd[889]: received RS from fe80::8a70:8cff:fe14:c676
Jan 1 00:00:38 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:38 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:38 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:38 daemon crit pptp: Received valid IP address from server. Connection UP.
Jan 1 00:00:40 daemon warn kernel: bcmxtmcfg: Reserve TxQueueIdx=1 for vcid 0
Jan 1 00:00:40 daemon warn kernel: bcmxtmcfg: Reserve MP group=0 priority=0 weight=1
Jan 1 00:00:40 daemon warn kernel: XTM Init: Ch:1 - 400 tx BDs at 0xa378c000
Jan 1 00:00:42 daemon info racoon: INFO: @(#)ipsec-tools 0.8.0 (http://ipsec-tools.sourceforge.net)
Jan 1 00:00:42 daemon info racoon: INFO: @(#)This product linked OpenSSL 0.9.7f 22 Mar 2005 (http://www.openssl.org/)
Jan 1 00:00:42 daemon info racoon: INFO: Reading configuration from "/var/ipsec/racoon.conf"
Jan 1 00:00:42 daemon warn radvd[889]: received RS from fe80::8a70:8cff:fe14:c676
Jan 1 00:00:42 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:42 daemon info racoon: INFO: 192.168.1.1[500] used as isakmp port (fd=7)
Jan 1 00:00:42 daemon info racoon: INFO: 5.139.149.243[500] used as isakmp port (fd=8)
Jan 1 00:00:42 daemon info racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=9)
Jan 1 00:00:42 daemon info racoon: INFO: 127.0.0.0[500] used as isakmp port (fd=10)
Jan 1 00:00:47 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:47 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:47 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:21:15 daemon warn radvd[889]: received RS from fe80::2acc:1ff:fe15:24da
Sep 29 19:21:22 daemon warn radvd[889]: received RS from fe80::2acc:1ff:fe15:24da
Sep 29 19:21:36 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=5.188.10.176 DST=5.139.149.243 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=11783 DF PROTO=TCP SPT=49026 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:21:37 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=5.188.10.176 DST=5.139.149.243 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=11784 DF PROTO=TCP SPT=49026 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:21:39 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=5.188.10.176 DST=5.139.149.243 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=11785 DF PROTO=TCP SPT=49026 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:21:43 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=5.188.10.176 DST=5.139.149.243 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=11786 DF PROTO=TCP SPT=49026 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:21:55 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=5.139.86.211 DST=5.139.149.243 LEN=52 TOS=0x00 PREC=0x00 TTL=59 ID=14615 DF PROTO=TCP SPT=56854 DPT=28222 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:25:41 daemon crit kernel: eth0 Link UP 100 mbps full duplex
Sep 29 19:25:41 daemon info kernel: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Sep 29 19:25:41 daemon info kernel: br0: port 1(eth0) entering forwarding state
Sep 29 19:25:41 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:41 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:41 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:25:41 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:41 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:41 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:25:51 daemon crit kernel: eth0 Link DOWN.
Sep 29 19:25:51 daemon info kernel: br0: port 1(eth0) entering disabled state
Sep 29 19:25:51 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:51 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:51 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:25:51 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:51 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:51 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:25:54 daemon crit kernel: eth0 Link UP 100 mbps full duplex
Sep 29 19:25:54 daemon info kernel: br0: port 1(eth0) entering forwarding state
Sep 29 19:25:54 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:54 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:54 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:25:54 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:54 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:54 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:26:10 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:26:26 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:26:42 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:31:43 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=77.222.98.45 DST=5.139.149.243 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=3698 DF PROTO=TCP SPT=51370 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:36:10 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:42:54 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=45.77.79.166 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=36784 PROTO=TCP SPT=43171 DPT=53398 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:44:05 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:48:40 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:52:14 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=114.69.249.206 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=54 ID=7426 PROTO=TCP SPT=44600 DPT=23 WINDOW=16584 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:56:39 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:01:01 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:01:59 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=94.74.81.97 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=32210 PROTO=TCP SPT=42715 DPT=3128 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 20:09:28 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:12:52 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=95.85.2.83 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=1952 PROTO=TCP SPT=40413 DPT=3534 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 20:13:01 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:17:14 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:22:19 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=113.106.202.61 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=106 ID=256 PROTO=TCP SPT=6000 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 20:24:07 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:31:43 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=185.130.212.19 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=48744 DF PROTO=TCP SPT=2 DPT=30010 WINDOW=512 RES=0x00 SYN URGP=0 MARK=0x8000000
Режим: ADSL_2plus
Тип трафика: ATM
Состояние питания соединения: L0
Входящая Исходящая
Соотношение сигнала к шуму (0.1 dB): 310 170
затухание (0.1 dB): 160 68
Выходная Мощность (0.1 dBm): 232 104
Допустимая частота (Kbps): 20,324 736
Rate (Kbps): 6,144 637
присоединяю лог журнала через два часа, модем за это время не отключался, но произошло несколько разрывов, IP изменился:
Sep 29 21:41:30 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:41:30 daemon crit kernel: eth0 Link DOWN.
Sep 29 21:41:30 daemon info kernel: br0: port 1(eth0) entering disabled state
Sep 29 21:41:30 daemon info radvd[889]: attempting to reread config file
Sep 29 21:41:30 daemon info radvd[889]: resuming normal operation
Sep 29 21:41:30 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:41:30 daemon info radvd[889]: attempting to reread config file
Sep 29 21:41:30 daemon info radvd[889]: resuming normal operation
Sep 29 21:41:30 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:41:32 daemon crit kernel: eth0 Link UP 100 mbps full duplex
Sep 29 21:41:32 daemon info kernel: br0: port 1(eth0) entering forwarding state
Sep 29 21:41:32 daemon info radvd[889]: attempting to reread config file
Sep 29 21:41:32 daemon info radvd[889]: resuming normal operation
Sep 29 21:41:32 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:41:32 daemon info radvd[889]: attempting to reread config file
Sep 29 21:41:32 daemon info radvd[889]: resuming normal operation
Sep 29 21:41:32 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:41:41 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=128.199.42.134 DST=46.61.33.218 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=49615 PROTO=TCP SPT=43348 DPT=6861 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 21:41:48 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:42:04 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:42:20 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:42:30 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=185.130.212.4 DST=46.61.33.218 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=20525 DF PROTO=TCP SPT=1 DPT=83 WINDOW=512 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 21:43:32 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=120.198.118.38 DST=46.61.33.218 LEN=44 TOS=0x04 PREC=0x00 TTL=234 ID=50421 PROTO=TCP SPT=52695 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 21:43:54 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=46.101.97.51 DST=46.61.33.218 LEN=40 TOS=0x00 PREC=0x00 TTL=23 ID=26437 PROTO=TCP SPT=3389 DPT=3389 WINDOW=50723 RES=0x00 SYN URGP=50723 MARK=0x8000000
Sep 29 21:46:34 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54