Дорогие пользователи! У нас появился новый форум на платформе tp-link.community (Сообщество)

Форум доступен по ссылке https://community.tp-link.com/ru

Если при регистрации в Сообществе Вы укажете адрес электронный почты, который используете на данном форуме, то Ваши данные будут перенесены на форум Сообщества автоматически.
Также, если на форуме Сообщества Ваш никнейм будет занят, то Вам предложат сменить его или оставить, но с приставкой "_RU".

Подробнее Вы можете прочитать тут: https://community.tp-link.com/ru/home/f ... pic/501542

Убедительная просьба не дублировать темы на старом/новом форуме.

Разрывы связи (disconnection)

Беспроводной маршрутизатор со встроенным модемом ADSL 2+ серии N
Goodwin
Сообщения: 4361
Зарегистрирован: 25 май 2011, 10:56
Страна: Россия

Разрывы связи (disconnection)

Сообщение Goodwin » 06 июн 2011, 16:55

При разрывах связи, заполните следующую форму перед обращением:

1. Hardware версия устройства (посмотреть можно в статусе, либо на коробке)
2. Версия прошивки (смотреть там же)
3. Ваша страна.
4. Название провайдера.
5. Тип подключения (например PPTP\L2TP\PPPoE\dynamic ip)
6. Скорость по тарифу.
7. Подключение с компьютерами по wi-fi, либо по LAN?
8. Как часто происходят Обрывы?
9. Наблюдается ли данная проблема, когда нет нагрузки (закачки, просмотр странниц)
10. Разрывы происходят непосредственно на роутере, либо статус роутера показывает, что роутер подключен, но интернета нет?
11. Наблюдается ли данная проблема при подключении без роутера?



Первичные сообщения без данной формы не рассматриваются и удаляются, а авторам выносятся предупреждения.
Также обязательно выложить содержимое LOG файла. Это можно сделать, если зайти в меню роутера System Tools - System LOG, нажать SAVE LOG и содержимое этого лога выложить здесь.

Если при разрыве роутер недоступен (нельзя зайти на 192.168.1.1), укажите об этом дополнительно
Перед тем, как создать тему, посетите раздел ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ
TP-LINK Archer C7v2
Личные сообщения по техническим проблемам без сообщения на форуме не рассматриваются!

Dmitriy
Модератор
Модератор
Сообщения: 2716
Зарегистрирован: 19 авг 2011, 14:59
Страна: Россия
Откуда: Москва
Контактная информация:

Re: Разрывы связи (disconnection)

Сообщение Dmitriy » 13 мар 2012, 16:51

aleksey_p писал(а):1) Firmware Version: 1.4.0 Build 111108 Rel.40398n
2) Hardware Version: TD-W8960N v3 0x00000002
3)Uzb
4) http://www.stream.uz Sharq Stream
5) PPPoE
6) 2042 кбит/c внутренние ресурсы, 256 - в мир
7)Подключение с компьютером по LAN с нетбуком и смартфоном wi fi
8) раз в 1ч бывает и чаще
9)и с закачкой и без закачки
10)именно на роутере,(роутер перезагружается)
11)нет
Модуляция G.DTM, AnnexL,AnnexM
Параметры линии
Downstream Upstream
Line Coding(Trellis): On On
SNR Margin (0.1 dB): 330 250
Attenuation (0.1 dB): 140 100
Output Power (0.1 dBm): 169 125
Attainable Rate (Kbps): 11840 1248
Кажется это стало после прошивки на 1.4, как вернуть прошивку 1.3.6?((
Причем после того как роутер ребутится, на нем дата сбивается, приходит ставить синхронизировать с ПК

лог
System Log
Date/Time Facility Severity Message
Jan 1 00:00:07 user notice kernel: Linux version 2.6.21.5 (root@localhost.localdomain) (gcc version 4.2.3) #4 Fri Oct 28 18:30:25 CST 2011
Jan 1 00:00:07 user warn kernel: Serial flash device: name S25FL032A, id 0x0115, size 4096KB
Jan 1 00:00:07 user warn kernel: 96358VW2 prom init
Jan 1 00:00:07 user warn kernel: CPU revision is: 0002a010
Jan 1 00:00:07 user warn kernel: Determined physical RAM map:
Jan 1 00:00:07 user warn kernel: memory: 01fa0000 @ 00000000 (usable)
Jan 1 00:00:07 user debug kernel: On node 0 totalpages: 8096
Jan 1 00:00:07 user debug kernel: DMA zone: 32 pages used for memmap
Jan 1 00:00:07 user debug kernel: DMA zone: 0 pages reserved
Jan 1 00:00:07 user debug kernel: DMA zone: 4064 pages, LIFO batch:0
Jan 1 00:00:07 user debug kernel: Normal zone: 31 pages used for memmap
Jan 1 00:00:07 user debug kernel: Normal zone: 3969 pages, LIFO batch:0
Jan 1 00:00:07 user warn kernel: Built 1 zonelists. Total pages: 8033
Jan 1 00:00:07 user notice kernel: Kernel command line: root=31:0 ro noinitrd console=ttyS0,115200
Jan 1 00:00:07 user warn kernel: brcm mips: enabling icache and dcache...
Jan 1 00:00:07 user warn kernel: Primary instruction cache 32kB, physically tagged, 2-way, linesize 16 bytes.
Jan 1 00:00:07 user warn kernel: Primary data cache 16kB, 2-way, linesize 16 bytes.
Jan 1 00:00:07 user info kernel: Synthesized TLB refill handler (21 instructions).
Jan 1 00:00:07 user info kernel: Synthesized TLB load handler fastpath (33 instructions).
Jan 1 00:00:07 user info kernel: Synthesized TLB store handler fastpath (33 instructions).
Jan 1 00:00:07 user info kernel: Synthesized TLB modify handler fastpath (32 instructions).
Jan 1 00:00:07 user warn kernel: PID hash table entries: 128 (order: 7, 512 bytes)
Jan 1 00:00:07 user warn kernel: Using 150.000 MHz high precision timer.
Jan 1 00:00:07 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)
Jan 1 00:00:07 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)
Jan 1 00:00:07 user info kernel: Memory: 29684k/32384k available (1809k kernel code, 2700k reserved, 322k data, 88k init, 0k highmem)
Jan 1 00:00:07 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80300000 ... 0x80400000>
Jan 1 00:00:07 user debug kernel: Calibrating delay loop... 297.98 BogoMIPS (lpj=148992)
Jan 1 00:00:07 user warn kernel: Mount-cache hash table entries: 512
Jan 1 00:00:07 user info kernel: NET: Registered protocol family 16
Jan 1 00:00:07 user warn kernel: Total Flash size: 4096K with 64 sectors
Jan 1 00:00:07 user warn kernel: File system address: 0xbfc10100
Jan 1 00:00:07 user warn kernel: registering PCI controller with io_map_base unset
Jan 1 00:00:07 user warn kernel: BLOG v1.0 Initialized
Jan 1 00:00:07 user info kernel: NET: Registered protocol family 8
Jan 1 00:00:07 user info kernel: NET: Registered protocol family 20
Jan 1 00:00:07 user info kernel: Time: MIPS clocksource has been installed.
Jan 1 00:00:07 user info kernel: NET: Registered protocol family 2
Jan 1 00:00:07 user warn kernel: IP route cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:07 user warn kernel: TCP established hash table entries: 1024 (order: 1, 8192 bytes)
Jan 1 00:00:07 user warn kernel: TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:07 user info kernel: TCP: Hash tables configured (established 1024 bind 1024)
Jan 1 00:00:07 user info kernel: TCP reno registered
Jan 1 00:00:07 user info kernel: squashfs: version 3.2-r2 (2007/01/15) Phillip Lougher
Jan 1 00:00:07 user warn kernel: squashfs: LZMA suppport for slax.org by jro
Jan 1 00:00:07 user info kernel: io scheduler noop registered (default)
Jan 1 00:00:07 user info kernel: PPP generic driver version 2.4.2
Jan 1 00:00:07 user info kernel: NET: Registered protocol family 24
Jan 1 00:00:07 user warn kernel: bcm963xx_mtd driver v1.0
Jan 1 00:00:07 user warn kernel: brcmboard: brcm_board_init entry
Jan 1 00:00:07 user warn kernel: SES: Button Interrupt 0x3 is enabled
Jan 1 00:00:07 user warn kernel: SES: LED GPIO 0x4 is enabled
Jan 1 00:00:07 user warn kernel: irq.c: reset_fac_irq is set to low_trigger.
Jan 1 00:00:07 user info kernel: Serial: BCM63XX driver $Revision: 3.00 $
Jan 1 00:00:07 user info kernel: ttyS0 at MMIO 0xfffe0100 (irq = 10) is a BCM63XX
Jan 1 00:00:07 user info kernel: ttyS1 at MMIO 0xfffe0120 (irq = 11) is a BCM63XX
Jan 1 00:00:07 user warn kernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46
Jan 1 00:00:07 user warn kernel: Mirror/redirect action on
Jan 1 00:00:07 user warn kernel: u32 classifier
Jan 1 00:00:07 user warn kernel: Actions configured
Jan 1 00:00:07 user info kernel: TCP cubic registered
Jan 1 00:00:07 user info kernel: Initializing XFRM netlink socket
Jan 1 00:00:07 user info kernel: NET: Registered protocol family 1
Jan 1 00:00:07 user info kernel: NET: Registered protocol family 17
Jan 1 00:00:07 user info kernel: NET: Registered protocol family 15
Jan 1 00:00:07 user notice kernel: Ebtables v2.0 registered
Jan 1 00:00:07 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear
Jan 1 00:00:07 user info kernel: All bugs added by David S. Miller
Jan 1 00:00:07 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan 1 00:00:07 user info kernel: Freeing unused kernel memory: 88k freed
Jan 1 00:00:07 user warn kernel: pktflow: module license 'Proprietary' taints kernel.
Jan 1 00:00:07 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.
Jan 1 00:00:07 user warn kernel: Created Proc FS /procfs/fcache
Jan 1 00:00:07 user warn kernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08
Jan 1 00:00:07 user warn kernel: bcmxtmcfg: bcmxtmcfg_init entry
Jan 1 00:00:07 user warn kernel: adsl: adsl_init entry
Jan 1 00:00:07 user info kernel: Broadcom BCMPROCFS v1.0 initialized
Jan 1 00:00:07 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Apr 10 2011 18:09:31
Jan 1 00:00:07 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface
Jan 1 00:00:07 user warn kernel: ethsw: found bcm5325e!
Jan 1 00:00:07 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered
Jan 1 00:00:07 user warn kernel: rate ctrl page 0x35, addr 0x02: 0
Jan 1 00:00:07 user warn kernel: 8021x_1 page 0x0A, addr 0x4C: 0
Jan 1 00:00:07 user warn kernel: 8021x_2 page 0x0A, addr 0x4E: 0
Jan 1 00:00:07 user warn kernel: eth0: MAC Address: 94:0C:6D:A5:51:4B
Jan 1 00:00:07 user crit kernel: eth0 Link UP.
Jan 1 00:00:07 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)
Jan 1 00:00:07 user debug kernel: PCI: Setting latency timer of device 0000:00:01.0 to 64
Jan 1 00:00:07 user warn kernel: wl0: Broadcom BCM4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0
Jan 1 00:00:07 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered
Jan 1 00:00:07 user warn kernel: Broadcom Packet Flow Cache learning via BLOG disabled.
Jan 1 00:00:07 user warn kernel: Deleted Proc FS /procfs/fcache
Jan 1 00:00:07 user warn kernel: Active<0> = <0> - <0>
Jan 1 00:00:07 user warn kernel: Destructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08
Jan 1 00:00:10 user warn kernel: eth0.2: MAC Address: 94:0C:6D:A5:51:4B
Jan 1 00:00:10 user warn kernel: eth0.3: MAC Address: 94:0C:6D:A5:51:4B
Jan 1 00:00:10 user warn kernel: eth0.4: MAC Address: 94:0C:6D:A5:51:4B
Jan 1 00:00:10 user warn kernel: eth0.5: MAC Address: 94:0C:6D:A5:51:4B
Jan 1 00:00:10 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.
Jan 1 00:00:10 user warn kernel: Created Proc FS /procfs/fcache
Jan 1 00:00:10 user warn kernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08
Jan 1 00:00:11 user info kernel: device eth0.2 entered promiscuous mode
Jan 1 00:00:11 user info kernel: br0: port 1(eth0.2) entering learning state
Jan 1 00:00:11 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:11 user info kernel: br0: port 1(eth0.2) entering forwarding state
Jan 1 00:00:11 user info kernel: device eth0.3 entered promiscuous mode
Jan 1 00:00:11 user info kernel: br0: port 2(eth0.3) entering learning state
Jan 1 00:00:11 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:11 user info kernel: br0: port 2(eth0.3) entering forwarding state
Jan 1 00:00:11 user info kernel: device eth0.4 entered promiscuous mode
Jan 1 00:00:11 user info kernel: br0: port 3(eth0.4) entering learning state
Jan 1 00:00:11 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:11 user info kernel: br0: port 3(eth0.4) entering forwarding state
Jan 1 00:00:11 user info kernel: device eth0.5 entered promiscuous mode
Jan 1 00:00:11 user info kernel: br0: port 4(eth0.5) entering learning state
Jan 1 00:00:11 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:11 user info kernel: br0: port 4(eth0.5) entering forwarding state
Jan 1 00:00:12 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:12 user info kernel: br0: port 5(wl0) entering learning state
Jan 1 00:00:12 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:12 user info kernel: br0: port 5(wl0) entering forwarding state
Jan 1 00:00:12 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744
Jan 1 00:00:12 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00000981 adsl2=0x00000003
Jan 1 00:00:12 user warn kernel: KLOB extended to 2 pools
Jan 1 00:00:12 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B77EF 0xDEADBEEF
Jan 1 00:00:13 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712
Jan 1 00:00:13 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C
Jan 1 00:00:13 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00000981 adsl2=0x00000003
Jan 1 00:00:13 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:13 user warn kernel: KLOB extended to 3 pools
Jan 1 00:00:13 user warn kernel: KLOB extended to 4 pools
Jan 1 00:00:13 user warn kernel: KLOB extended to 5 pools
Jan 1 00:00:13 user warn kernel: KLOB extended to 6 pools
Jan 1 00:00:13 user warn kernel: KLOB extended to 7 pools
Jan 1 00:00:13 user warn kernel: KLOB extended to 8 pools
Jan 1 00:00:13 user warn kernel: bcmxtmrt: MAC address: 94 0c 6d a5 51 4c
Jan 1 00:00:13 daemon notice syslog: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:14 user info kernel: device wl0 left promiscuous mode
Jan 1 00:00:14 user info kernel: br0: port 5(wl0) entering disabled state
Jan 1 00:00:14 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:14 user info kernel: br0: port 5(wl0) entering learning state
Jan 1 00:00:14 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:14 user info kernel: br0: port 5(wl0) entering forwarding state
Jan 1 00:00:16 user crit kernel: xDSL G.994 training
Jan 1 00:00:16 user info kernel: br0: port 5(wl0) entering disabled state
Jan 1 00:00:17 user info kernel: br0: port 5(wl0) entering learning state
Jan 1 00:00:17 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:17 user info kernel: br0: port 5(wl0) entering forwarding state
Jan 1 00:00:17 user info kernel: device wl0 left promiscuous mode
Jan 1 00:00:17 user info kernel: br0: port 5(wl0) entering disabled state
Jan 1 00:00:17 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:17 user info kernel: br0: port 5(wl0) entering learning state
Jan 1 00:00:17 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:17 user info kernel: br0: port 5(wl0) entering forwarding state
Jan 1 00:00:33 user crit kernel: ADSL G.992 started
Jan 1 00:00:35 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:40 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:40 user crit kernel: ADSL link up, interleaved, us=544, ds=1056
Jan 1 00:00:41 daemon notice syslog: PPP: Start to connect ...
Jan 1 00:00:43 daemon crit syslog: PPP server detected.
Jan 1 00:00:43 daemon crit syslog: PPP session established.
Jan 1 00:00:44 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
Jan 1 00:00:44 user warn kernel: Netfilter messages via NETLINK v0.30.
Jan 1 00:00:45 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)
Jan 1 00:00:46 daemon crit syslog: PPP LCP UP.
Jan 1 00:00:49 daemon err syslog: User name and password authentication failed.
Jan 1 00:00:52 daemon notice syslog: PPP: Start to connect ...
Jan 1 00:00:52 daemon crit syslog: PPP server detected.
Jan 1 00:00:53 daemon crit syslog: PPP session established.
Jan 1 00:00:56 daemon crit syslog: PPP LCP UP.
Jan 1 00:00:59 daemon err syslog: User name and password authentication failed.
Jan 1 00:01:02 daemon notice syslog: PPP: Start to connect ...
Jan 1 00:01:02 daemon crit syslog: PPP server detected.
Jan 1 00:01:02 daemon crit syslog: PPP session established.
Jan 1 00:01:05 daemon crit syslog: PPP LCP UP.
Jan 1 00:01:08 daemon err syslog: User name and password authentication failed.
Jan 1 00:01:11 daemon notice syslog: PPP: Start to connect ...
Mar 12 21:03:29 daemon crit syslog: PPP server detected.
Mar 12 21:03:32 daemon notice syslog: PPP: Start to connect ...
Mar 12 21:03:32 daemon crit syslog: PPP server detected.
Mar 12 21:03:32 daemon crit syslog: PPP session established.
Mar 12 21:03:35 daemon crit syslog: PPP LCP UP.
Mar 12 21:03:38 daemon err syslog: User name and password authentication failed.
Mar 12 21:03:41 daemon notice syslog: PPP: Start to connect ...
Mar 12 21:03:41 daemon crit syslog: PPP server detected.
Mar 12 21:03:41 daemon crit syslog: PPP session established.
Mar 12 21:03:44 daemon crit syslog: PPP LCP UP.
Mar 12 21:03:47 daemon err syslog: User name and password authentication failed.
http://www.tp-linkru.com/support/downlo ... n=V3#tbl_j - вот тут все доступные прошивки.
Что-то в логах не видно первичного нормального подключения, только ошибка авторизации.
Перед тем, как создать тему, посетите раздел ->ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ<-

aleksey_p
Сообщения: 8
Зарегистрирован: 17 окт 2011, 10:40

Re: Разрывы связи (disconnection)

Сообщение aleksey_p » 13 мар 2012, 17:34

Dmitriy писал(а): http://www.tp-linkru.com/support/downlo ... n=V3#tbl_j - вот тут все доступные прошивки.
Что-то в логах не видно первичного нормального подключения, только ошибка авторизации.
Прошивки я знаю где, но как откатить назад, не вскрывая модем?
В логах нету, т.к. он перезагружается и логи все удаляются и дата сбивается, как будто выключаешь и включаешь вручную, но настройки сохраняются

aleksey_p
Сообщения: 8
Зарегистрирован: 17 окт 2011, 10:40

Re: Разрывы связи (disconnection)

Сообщение aleksey_p » 15 мар 2012, 07:48

Сбросил настройки модема на заводски через вэб интерфейс
И по совету логи начал писать через програмку на комп, вот они
И за ночь несколько таких моментов бывает
7:47:16 192.168.1.1 <26> syslog: PPP LCP UP.
7:47:19 192.168.1.1 <27> syslog: User name and password authentication failed.
7:47:22 192.168.1.1 <29> syslog: PPP: Start to connect ...
7:47:22 192.168.1.1 <26> syslog: PPP server detected.
7:47:22 192.168.1.1 <26> syslog: PPP session established.
7:47:25 192.168.1.1 <26> syslog: PPP LCP UP.
7:47:28 192.168.1.1 <27> syslog: User name and password authentication failed.
7:47:31 192.168.1.1 <29> syslog: PPP: Start to connect ...
7:47:31 192.168.1.1 <26> syslog: PPP server detected.
7:47:31 192.168.1.1 <26> syslog: PPP session established.
7:47:34 192.168.1.1 <26> syslog: PPP LCP UP.
7:47:37 192.168.1.1 <27> syslog: User name and password authentication failed.
7:47:40 192.168.1.1 <29> syslog: PPP: Start to connect ...
7:47:40 192.168.1.1 <26> syslog: PPP server detected.
7:47:41 192.168.1.1 <26> syslog: PPP session established.
7:47:44 192.168.1.1 <26> syslog: PPP LCP UP.
7:47:47 192.168.1.1 <27> syslog: User name and password authentication failed.
7:47:50 192.168.1.1 <29> syslog: PPP: Start to connect ...
7:47:50 192.168.1.1 <26> syslog: PPP server detected.
7:47:50 192.168.1.1 <26> syslog: PPP session established.
7:47:53 192.168.1.1 <26> syslog: PPP LCP UP.
7:47:56 192.168.1.1 <27> syslog: User name and password authentication failed.
7:47:59 192.168.1.1 <29> syslog: PPP: Start to connect ...
7:47:59 192.168.1.1 <26> syslog: PPP server detected.
7:47:59 192.168.1.1 <26> syslog: PPP session established.
7:48:02 192.168.1.1 <26> syslog: PPP LCP UP.
7:48:05 192.168.1.1 <27> syslog: User name and password authentication failed.
7:48:08 192.168.1.1 <29> syslog: PPP: Start to connect ...
7:48:08 192.168.1.1 <26> syslog: PPP server detected.
7:48:08 192.168.1.1 <26> syslog: PPP session established.
7:48:09 192.168.1.1 <12> dnsprobe[718]: dns query failed
7:48:11 192.168.1.1 <26> syslog: PPP LCP UP.
7:48:14 192.168.1.1 <12> dnsprobe[718]: dns query failed
7:48:14 192.168.1.1 <27> syslog: User name and password authentication failed.
7:48:17 192.168.1.1 <29> syslog: PPP: Start to connect ...
7:48:17 192.168.1.1 <26> syslog: PPP server detected.
7:48:18 192.168.1.1 <26> syslog: PPP session established.
7:48:19 192.168.1.1 <12> dnsprobe[718]: dns query failed
7:48:21 192.168.1.1 <26> syslog: PPP LCP UP.
7:48:21 192.168.1.1 <26> syslog: Received valid IP address from server. Connection UP.
7:48:21 192.168.1.1 <13> dnsprobe[963]: dnsprobe started!
7:48:29 192.168.1.1 <9> kernel: Intrusion -> IN=ppp0_2 OUT= MAC= SRC=213.230.103.39 DST=83.221.172.249 LEN=48 TOS=0x10 PREC=0x20 TTL=122 ID=11729 DF PROTO=TCP SPT=56383 DPT=23929 WINDOW=8192 RES=0x00 SYN URGP=0
7:49:20 192.168.1.1 <9> kernel: Intrusion -> IN=ppp0_2 OUT= MAC= SRC=92.100.123.135 DST=83.221.172.249 LEN=48 TOS=0x08 PREC=0x60 TTL=114 ID=26097 DF PROTO=TCP SPT=53270 DPT=29110 WINDOW=8192 RES=0x00 SYN URGP=0
7:49:23 192.168.1.1 <9> kernel: Intrusion -> IN=ppp0_2 OUT= MAC= SRC=92.100.123.135 DST=83.221.172.249 LEN=48 TOS=0x08 PREC=0x60 TTL=114 ID=26607 DF PROTO=TCP SPT=53270 DPT=29110 WINDOW=8192 RES=0x00 SYN URGP=0
7:49:23 192.168.1.1 <9> kernel: Intrusion -> IN=ppp0_2 OUT= MAC= SRC=213.230.104.239 DST=83.221.172.249 LEN=48 TOS=0x10 PREC=0x20 TTL=122 ID=12749 DF PROTO=TCP SPT=59983 DPT=23929 WINDOW=8192 RES=0x00 SYN URGP=0

Goodwin
Сообщения: 4361
Зарегистрирован: 25 май 2011, 10:56
Страна: Россия

Re: Разрывы связи (disconnection)

Сообщение Goodwin » 15 мар 2012, 17:40

я могу сказать в чём причина разрывов и последующий лог, который вы видите: у вас линия мягко говоря "хреновая", ничего удивительно, что после потери несущий идёт разрыв связи. А уж после разрыва связи, роутер заного пытается подключиться, но ваш провайдер роутер не пускает с комментарием "чувак, с таким логином и паролем уже есть подключение". Почему? потому что сессия "залипает", некорректно разорванная. У вас параметры линии в статистики просто ужасные. Не удивляйтесь, что у вас разрывы.
Перед тем, как создать тему, посетите раздел ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ
TP-LINK Archer C7v2
Личные сообщения по техническим проблемам без сообщения на форуме не рассматриваются!

aleksey_p
Сообщения: 8
Зарегистрирован: 17 окт 2011, 10:40

Re: Разрывы связи (disconnection)

Сообщение aleksey_p » 16 мар 2012, 10:16

Goodwin писал(а):я могу сказать в чём причина разрывов и последующий лог, который вы видите: у вас линия мягко говоря "хреновая", ничего удивительно, что после потери несущий идёт разрыв связи. А уж после разрыва связи, роутер заного пытается подключиться, но ваш провайдер роутер не пускает с комментарием "чувак, с таким логином и паролем уже есть подключение". Почему? потому что сессия "залипает", некорректно разорванная. У вас параметры линии в статистики просто ужасные. Не удивляйтесь, что у вас разрывы.
Да всего вы правы, модем тут не причем, я поставил D-Link DSL 200, такая же проблема
Уже звонил к провайдеру вызвал монтажника, будем проверять линию на магистрали и от шкафа до меня

Stranger87
Сообщения: 1
Зарегистрирован: 25 мар 2012, 13:14

Re: Разрывы связи (disconnection)

Сообщение Stranger87 » 25 мар 2012, 13:25

Добрый день.
1)Firmware Version: 1.4.0 Build 111108 Rel.40398n
2)Hardware Version: TD-W8960N v3 0x00000002
3) Россия, Санкт-Петербург
4)http://www.avangard-dsl.ru/pubsas/test- ... index.html
5) 4мбит/с
6) PPoE
7) Стационарный компьютер Lan (кабель из комплекта модема) + wifi ноутбук и iphone
8) Сразной периодичностью от 5 минут до нескольких часов
9) Не имеет значения (пока писал вам сообщение был разрыв)
10) Индикатор Internet не горит на роутере, при этом индикатор ADSL горит
11) Два дня назад только купил роутер, до этого 4 года трудился zyxel prestige 600 series (USB, 1 port rj11)


ЛОГ
Jan 1 00:00:06 user crit kernel: eth0 Link UP.
Jan 1 00:00:14 user crit kernel: xDSL G.994 training
Jan 1 00:00:22 user crit kernel: ADSL G.992 started
Jan 1 00:00:27 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:33 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:33 user crit kernel: ADSL link up, Path 0, us=1233, ds=21387
Jan 1 00:00:34 daemon crit syslog: PPP server detected.
Jan 1 00:00:35 daemon crit syslog: PPP session established.
Jan 1 00:00:35 daemon crit syslog: PPP LCP UP.
Jan 1 00:00:36 daemon crit syslog: Received valid IP address from server. Connection UP.
Jan 1 00:00:48 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=88.201.209.54 DST=95.55.169.40 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=16250 DF PROTO=TCP SPT=52740 DPT=49786 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:00:51 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=88.201.209.54 DST=95.55.169.40 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=16440 DF PROTO=TCP SPT=52740 DPT=49786 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:00:51 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=213.87.134.40 DST=95.55.169.40 LEN=64 TOS=0x00 PREC=0x00 TTL=51 ID=33823 DF PROTO=TCP SPT=20754 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:52 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=213.87.134.40 DST=95.55.169.40 LEN=64 TOS=0x00 PREC=0x00 TTL=51 ID=47642 DF PROTO=TCP SPT=20754 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:54 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=37.157.210.88 DST=95.55.169.40 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=8574 DF PROTO=TCP SPT=49407 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:13:24 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=190.42.27.112 DST=95.55.169.40 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=8442 DF PROTO=TCP SPT=2600 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0

aleksey_p
Сообщения: 8
Зарегистрирован: 17 окт 2011, 10:40

Re: Разрывы связи (disconnection)

Сообщение aleksey_p » 29 мар 2012, 07:19

Параметры линии
Downstream Upstream
Line Coding(Trellis): On On
SNR Margin (0.1 dB): 330 250
Attenuation (0.1 dB): 140 105
Output Power (0.1 dBm): 172 125
Attainable Rate (Kbps): 12032 1280

SNR получилось улучшить путем понижения upload до 512
Но обрывы так же остались каждые 1.5-2ч, модем д-линк дсл 200 пашет на ура
Проблема точно в модеме, что можете посоветовать? СЦ в моем городе нету, а гарантия уже истекла вроде как(
0:04:58 192.168.1.1 <9> kernel: Intrusion -> IN=ppp0_2 OUT= MAC= SRC=81.200.20.37 DST=83.221.185.74 LEN=48 TOS=0x08 PREC=0x60 TTL=46 ID=46369 DF PROTO=TCP SPT=50584 DPT=43841 WINDOW=65535 RES=0x00 SYN URGP=0
0:14:59 192.168.1.1 <9> kernel: Intrusion -> IN=ppp0_2 OUT= MAC= SRC=81.88.222.36 DST=83.221.185.74 LEN=48 TOS=0x08 PREC=0x60 TTL=111 ID=14829 DF PROTO=TCP SPT=9528 DPT=43841 WINDOW=8192 RES=0x00 SYN URGP=0
0:24:59 192.168.1.1 <9> kernel: Intrusion -> IN=ppp0_2 OUT= MAC= SRC=178.22.51.138 DST=83.221.185.74 LEN=64 TOS=0x08 PREC=0x60 TTL=48 ID=17214 DF PROTO=TCP SPT=58321 DPT=43841 WINDOW=65535 RES=0x00 SYN URGP=0
0:34:59 192.168.1.1 <9> kernel: Intrusion -> IN=ppp0_2 OUT= MAC= SRC=178.125.208.239 DST=83.221.185.74 LEN=60 TOS=0x08 PREC=0x60 TTL=110 ID=31666 DF PROTO=TCP SPT=11810 DPT=43841 WINDOW=8192 RES=0x00 SYN URGP=0
0:44:59 192.168.1.1 <9> kernel: Intrusion -> IN=ppp0_2 OUT= MAC= SRC=37.55.17.101 DST=83.221.185.74 LEN=64 TOS=0x08 PREC=0x60 TTL=47 ID=15998 DF PROTO=TCP SPT=64283 DPT=43841 WINDOW=65535 RES=0x00 SYN URGP=0
0:55:02 192.168.1.1 <9> kernel: Intrusion -> IN=ppp0_2 OUT= MAC= SRC=91.76.64.28 DST=83.221.185.74 LEN=48 TOS=0x08 PREC=0x60 TTL=110 ID=274 DF PROTO=TCP SPT=33139 DPT=43841 WINDOW=65535 RES=0x00 SYN URGP=0
0:55:32 192.168.1.1 <14> kernel: br0: port 4(eth0.5) entering learning state
0:55:32 192.168.1.1 <14> kernel: br0: topology change detected, propagating
0:55:32 192.168.1.1 <14> kernel: br0: port 4(eth0.5) entering forwarding state
0:55:32 192.168.1.1 <14> kernel: device wl0 entered promiscuous mode
0:55:32 192.168.1.1 <14> kernel: br0: port 5(wl0) entering learning state
0:55:32 192.168.1.1 <14> kernel: br0: topology change detected, propagating
0:55:32 192.168.1.1 <14> kernel: br0: port 5(wl0) entering forwarding state
0:55:37 192.168.1.1 <14> kernel: br0: port 5(wl0) entering learning state
0:55:37 192.168.1.1 <14> kernel: br0: topology change detected, propagating
0:55:37 192.168.1.1 <14> kernel: br0: port 5(wl0) entering forwarding state
0:55:37 192.168.1.1 <14> kernel: device wl0 left promiscuous mode
0:55:37 192.168.1.1 <14> kernel: br0: port 5(wl0) entering disabled state
0:55:37 192.168.1.1 <10> kernel: xDSL G.994 training
0:55:37 192.168.1.1 <14> kernel: device wl0 entered promiscuous mode
0:55:37 192.168.1.1 <14> kernel: br0: port 5(wl0) entering learning state
0:55:37 192.168.1.1 <14> kernel: br0: topology change detected, propagating
0:55:37 192.168.1.1 <14> kernel: br0: port 5(wl0) entering forwarding state
0:55:56 192.168.1.1 <10> kernel: ADSL G.992 started
0:55:59 192.168.1.1 <10> kernel: ADSL G.992 channel analysis
0:56:03 192.168.1.1 <10> kernel: ADSL G.992 message exchange
0:56:04 192.168.1.1 <10> kernel: ADSL link up, interleaved, us=544, ds=2112
0:56:04 192.168.1.1 <29> syslog: PPP: Start to connect ...
0:56:06 192.168.1.1 <26> syslog: PPP server detected.
0:56:07 192.168.1.1 <26> syslog: PPP session established.
0:56:10 192.168.1.1 <26> syslog: PPP LCP UP.
0:56:13 192.168.1.1 <27> syslog: User name and password authentication failed.
0:56:13 192.168.1.1 <12> kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
0:56:13 192.168.1.1 <12> kernel: Netfilter messages via NETLINK v0.30.
0:56:13 192.168.1.1 <12> kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)
0:56:16 192.168.1.1 <13> dnsprobe[720]: dnsprobe started!
0:56:16 192.168.1.1 <29> syslog: PPP: Start to connect ...
0:56:16 192.168.1.1 <26> syslog: PPP server detected.
0:56:16 192.168.1.1 <26> syslog: PPP session established.
0:56:19 192.168.1.1 <26> syslog: PPP LCP UP.
0:56:21 192.168.1.1 <12> dnsprobe[720]: dns query failed
0:56:22 192.168.1.1 <27> syslog: User name and password authentication failed.
0:56:25 192.168.1.1 <29> syslog: PPP: Start to connect ...
0:56:25 192.168.1.1 <26> syslog: PPP server detected.
0:56:25 192.168.1.1 <26> syslog: PPP session established.
0:56:26 192.168.1.1 <12> dnsprobe[720]: dns query failed
0:56:28 192.168.1.1 <26> syslog: PPP LCP UP.
0:56:31 192.168.1.1 <12> dnsprobe[720]: dns query failed
0:56:31 192.168.1.1 <13> dnsprobe[720]: Primary DNS server Is Down... Switching To Secondary DNS server
0:56:31 192.168.1.1 <27> syslog: User name and password authentication failed.
0:56:34 192.168.1.1 <29> syslog: PPP: Start to connect ...
0:56:34 192.168.1.1 <26> syslog: PPP server detected.
0:56:34 192.168.1.1 <26> syslog: PPP session established.
0:56:37 192.168.1.1 <26> syslog: PPP LCP UP.
0:56:40 192.168.1.1 <27> syslog: User name and password authentication failed.
0:56:44 192.168.1.1 <29> syslog: PPP: Start to connect ...
0:56:44 192.168.1.1 <26> syslog: PPP server detected.
0:56:44 192.168.1.1 <26> syslog: PPP session established.
0:56:47 192.168.1.1 <26> syslog: PPP LCP UP.
0:56:50 192.168.1.1 <27> syslog: User name and password authentication failed.
0:56:53 192.168.1.1 <29> syslog: PPP: Start to connect ...
0:56:53 192.168.1.1 <26> syslog: PPP server detected.
0:56:53 192.168.1.1 <26> syslog: PPP session established.
0:56:56 192.168.1.1 <26> syslog: PPP LCP UP.
0:56:59 192.168.1.1 <27> syslog: User name and password authentication failed.
0:57:02 192.168.1.1 <29> syslog: PPP: Start to connect ...
0:57:02 192.168.1.1 <26> syslog: PPP server detected.
0:57:02 192.168.1.1 <26> syslog: PPP session established.
0:57:05 192.168.1.1 <26> syslog: PPP LCP UP.
0:57:08 192.168.1.1 <27> syslog: User name and password authentication failed.
0:57:11 192.168.1.1 <29> syslog: PPP: Start to connect ...
0:57:11 192.168.1.1 <26> syslog: PPP server detected.
0:57:11 192.168.1.1 <26> syslog: PPP session established.
0:57:14 192.168.1.1 <26> syslog: PPP LCP UP.
0:57:18 192.168.1.1 <27> syslog: User name and password authentication failed.
0:57:21 192.168.1.1 <29> syslog: PPP: Start to connect ...
0:57:21 192.168.1.1 <26> syslog: PPP server detected.
0:57:21 192.168.1.1 <26> syslog: PPP session established.
0:57:24 192.168.1.1 <26> syslog: PPP LCP UP.
0:57:27 192.168.1.1 <27> syslog: User name and password authentication failed.
0:57:30 192.168.1.1 <29> syslog: PPP: Start to connect ...
0:57:30 192.168.1.1 <26> syslog: PPP server detected.
0:57:30 192.168.1.1 <26> syslog: PPP session established.
0:57:33 192.168.1.1 <26> syslog: PPP LCP UP.
0:57:33 192.168.1.1 <26> syslog: Received valid IP address from server. Connection UP.

Tarsik
Сообщения: 1
Зарегистрирован: 10 ноя 2012, 01:53
Страна: Украіна

Re: Разрывы связи (disconnection)

Сообщение Tarsik » 11 ноя 2012, 18:08

1) Firmware Version: 1.4.0 Build 110620 Rel.52053n
2) Hardware Version: TD-W8960N v3 0x00000002
3) Украина
4) http://www.ukrtelecom.ua
5) PPPoE
6) до 10 Мбіт/с
7) Подключение с компьютером по LAN
8) Обрыв бывае раз или два в сутки
9) Проблема не зависит от загрузки роутера
10) На роутере,пропадает интернет,гаснет лампочка и нет повторного соединения
11) Нет

лог
Date/Time Facility Severity Message
Jan 1 00:00:28 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:29 user crit kernel: ADSL link up, Path 0, us=1070, ds=16131
Jan 1 00:00:35 daemon crit syslog: PPP server detected.
Jan 1 00:00:35 daemon crit syslog: PPP session established.
Jan 1 00:00:35 daemon crit syslog: PPP LCP UP.
Jan 1 00:00:37 daemon crit syslog: Received valid IP address from server. Connection UP.
Nov 11 14:24:06 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=24.10.170.197 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=105 ID=26357 DF PROTO=TCP SPT=58556 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 14:24:06 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=78.36.135.138 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=26467 DF PROTO=TCP SPT=57598 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 14:24:09 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=24.10.170.197 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=105 ID=26365 DF PROTO=TCP SPT=58556 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 14:24:09 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=78.36.135.138 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=26470 DF PROTO=TCP SPT=57598 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 14:24:15 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=24.10.170.197 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=105 ID=26373 DF PROTO=TCP SPT=58556 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 14:34:08 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=91.193.230.23 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=2751 DF PROTO=TCP SPT=61812 DPT=41364 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 14:44:06 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.171.69.228 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=6864 DF PROTO=TCP SPT=58384 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 14:54:28 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=46.118.92.77 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=124 ID=39854 DF PROTO=TCP SPT=4910 DPT=41364 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 15:04:07 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=178.206.135.118 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=1403 DF PROTO=TCP SPT=52872 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 15:14:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=91.122.6.111 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=13989 DF PROTO=TCP SPT=51189 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 15:24:07 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=46.109.242.135 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=59050 DF PROTO=TCP SPT=4345 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 15:34:08 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=46.118.61.79 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=124 ID=10562 DF PROTO=TCP SPT=54676 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 15:44:07 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.139.180.13 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=65449 DF PROTO=TCP SPT=15538 DPT=41364 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 15:54:50 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=202.88.39.135 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=483 DF PROTO=TCP SPT=7140 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 16:04:14 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=31.23.227.154 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=41314 DF PROTO=TCP SPT=1099 DPT=41364 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 16:14:09 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=193.238.132.84 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=22428 DF PROTO=TCP SPT=60543 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 16:24:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=31.163.238.7 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=29915 DF PROTO=TCP SPT=60024 DPT=19658 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 16:34:19 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=193.238.132.84 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=11281 DF PROTO=TCP SPT=50643 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 16:44:07 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.132.70.130 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=23583 DF PROTO=TCP SPT=2588 DPT=41364 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 16:54:26 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=88.134.30.153 DST=91.124.97.40 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=33312 DF PROTO=TCP SPT=24819 DPT=1083 WINDOW=512 RES=0x00 SYN URGP=0
Nov 11 17:04:06 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=46.187.74.96 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=51029 DF PROTO=TCP SPT=3493 DPT=41364 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 17:14:08 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=212.22.205.40 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=26811 DF PROTO=TCP SPT=59011 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 17:24:07 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=77.232.159.148 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=6026 DF PROTO=TCP SPT=55374 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 17:34:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.29.121.140 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=3906 DF PROTO=TCP SPT=4129 DPT=48393 WINDOW=16384 RES=0x00 SYN URGP=0
Nov 11 17:44:47 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=83.142.111.199 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=121 ID=20624 DF PROTO=TCP SPT=52123 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 17:54:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=217.19.218.237 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=49594 DF PROTO=TCP SPT=3351 DPT=11581 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 18:04:41 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=31.135.77.96 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=15327 DF PROTO=TCP SPT=62485 DPT=25787 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 18:14:12 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.229.57.222 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=58204 DF PROTO=TCP SPT=2298 DPT=41364 WINDOW=16384 RES=0x00 SYN URGP=0
Nov 11 18:25:45 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=89.222.181.68 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=8552 DF PROTO=TCP SPT=51668 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 18:34:30 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=85.26.184.170 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=17822 DF PROTO=TCP SPT=9435 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 18:45:53 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.50.115.238 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=25208 DF PROTO=TCP SPT=56034 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 18:54:58 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=31.31.107.94 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=18929 DF PROTO=TCP SPT=64160 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 19:04:09 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.229.57.222 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=9826 DF PROTO=TCP SPT=4648 DPT=41364 WINDOW=16384 RES=0x00 SYN URGP=0
Nov 11 19:14:57 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=193.58.246.2 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=9901 DF PROTO=TCP SPT=53748 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 19:24:55 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=213.88.112.16 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=2883 DF PROTO=TCP SPT=57366 DPT=33730 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 19:34:12 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=217.66.152.232 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=32038 DF PROTO=TCP SPT=32766 DPT=54218 WINDOW=64512 RES=0x00 SYN URGP=0
Nov 11 19:44:17 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=217.19.218.237 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=29766 DF PROTO=TCP SPT=2013 DPT=11581 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 19:55:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.229.57.222 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=40791 DF PROTO=TCP SPT=2885 DPT=41364 WINDOW=16384 RES=0x00 SYN URGP=0
Nov 11 20:05:49 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=37.147.6.83 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=119 ID=337 DF PROTO=TCP SPT=53319 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 20:14:07 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=77.123.185.252 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=3257 DF PROTO=TCP SPT=4106 DPT=41364 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 20:26:44 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=188.235.245.247 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=54969 DF PROTO=TCP SPT=1159 DPT=40210 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 20:34:29 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=92.101.169.114 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=50 ID=1653 DF PROTO=TCP SPT=3174 DPT=41364 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 20:44:45 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.181.111.125 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=17098 DF PROTO=TCP SPT=57620 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 20:54:09 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.190.250.2 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=32343 DF PROTO=TCP SPT=52747 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 21:04:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.173.116.174 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=31492 DF PROTO=TCP SPT=59701 DPT=41364 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 21:14:48 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=188.235.245.247 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=38240 DF PROTO=TCP SPT=1175 DPT=40210 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 21:24:49 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=217.19.218.237 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=1613 DF PROTO=TCP SPT=3634 DPT=11581 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 11 21:34:06 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.27.96.99 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=18507 DF PROTO=TCP SPT=65130 DPT=27561 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 21:44:25 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.25.30.201 DST=91.124.97.40 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=21801 DF PROTO=TCP SPT=55806 DPT=27561 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 21:54:07 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=213.222.227.62 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=11778 DF PROTO=TCP SPT=58220 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 11 22:04:07 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.180.219.170 DST=91.124.97.40 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=23201 DF PROTO=TCP SPT=65434 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Сегодня днем опять пропал интернет,и модем неможет восстановить связь.Подскажите в чем причина.Уже несколько раз вызывал мастеров проверять линию,говорят что все впорядке.Модемом пользуюсь около полтора месяца,он еще на гарантии но уже КОНКРЕТНО меня задолбал обрывами.


лог
Date/Time Facility Severity Message
Jan 1 00:00:18 user crit kernel: ADSL G.992 started
Jan 1 00:00:22 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:28 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:29 user crit kernel: ADSL link up, Path 0, us=1085, ds=16150
Jan 1 00:00:32 daemon crit syslog: PPP server detected.
Jan 1 00:00:32 daemon crit syslog: PPP session established.
Jan 1 00:00:33 daemon crit syslog: PPP LCP UP.
Jan 1 00:00:33 daemon crit syslog: Received valid IP address from server. Connection UP.
Jan 1 00:00:38 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=213.87.121.108 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=104 ID=19101 DF PROTO=TCP SPT=5424 DPT=14275 WINDOW=64240 RES=0x00 SYN URGP=0
Jan 1 00:00:39 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.205.249.98 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=27649 DF PROTO=TCP SPT=29338 DPT=14275 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:00:39 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.83.190.247 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=25651 DF PROTO=TCP SPT=15679 DPT=14275 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:00:39 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=37.113.240.109 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=26609 DF PROTO=TCP SPT=53370 DPT=14275 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 21:36:13 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.205.249.98 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=27818 DF PROTO=TCP SPT=29338 DPT=14275 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 21:46:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.71.177.245 DST=91.124.75.114 LEN=64 TOS=0x00 PREC=0x00 TTL=49 ID=43706 DF PROTO=TCP SPT=62740 DPT=43371 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 12 21:56:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.165.87.28 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=55802 DF PROTO=TCP SPT=4127 DPT=62147 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 12 22:06:09 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=89.223.25.97 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=25325 DF PROTO=TCP SPT=64205 DPT=14275 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 22:16:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=77.120.75.154 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=122 ID=47090 DF PROTO=TCP SPT=2493 DPT=42313 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 12 22:22:25 user alert kernel: Intrusion -> IN=ppp0 OUT=br0 SRC=109.127.131.95 DST=192.168.1.100 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=13523 DF PROTO=TCP SPT=52833 DPT=42344 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 22:22:26 user alert kernel: Intrusion -> IN=ppp0 OUT=br0 SRC=91.189.163.128 DST=192.168.1.100 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=53397 DF PROTO=TCP SPT=2387 DPT=42344 WINDOW=16384 RES=0x00 SYN URGP=0
Nov 12 22:22:26 user alert kernel: Intrusion -> IN=ppp0 OUT=br0 SRC=95.71.26.151 DST=192.168.1.100 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=7907 DF PROTO=TCP SPT=1958 DPT=42344 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 12 22:22:27 user alert kernel: Intrusion -> IN=ppp0 OUT=br0 SRC=212.66.42.138 DST=192.168.1.100 LEN=48 TOS=0x00 PREC=0x00 TTL=23 ID=14634 DF PROTO=TCP SPT=50755 DPT=42344 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 22:22:28 user alert kernel: Intrusion -> IN=ppp0 OUT=br0 SRC=79.165.73.159 DST=192.168.1.100 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=27033 DF PROTO=TCP SPT=54090 DPT=42344 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 22:26:09 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=78.137.60.72 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=20719 DF PROTO=TCP SPT=59196 DPT=42344 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 22:36:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.137.24.66 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=6430 DF PROTO=TCP SPT=54523 DPT=49833 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 22:46:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=93.100.50.44 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=14059 DF PROTO=TCP SPT=61146 DPT=42344 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 22:56:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.29.12.220 DST=91.124.75.114 LEN=60 TOS=0x00 PREC=0x00 TTL=55 ID=54398 DF PROTO=TCP SPT=53153 DPT=59613 WINDOW=8160 RES=0x00 SYN URGP=0
Nov 12 23:06:20 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=178.159.59.121 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=23815 DF PROTO=TCP SPT=59758 DPT=42344 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 23:16:29 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=178.45.211.147 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=32032 DF PROTO=TCP SPT=53465 DPT=57626 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 23:26:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=188.134.46.86 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=19892 DF PROTO=TCP SPT=59584 DPT=57626 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 23:36:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=46.0.71.123 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=29316 DF PROTO=TCP SPT=61095 DPT=42344 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 12 23:46:09 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=84.54.213.173 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=37984 DF PROTO=TCP SPT=1965 DPT=42344 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 12 23:56:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=178.92.87.145 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=45547 DF PROTO=TCP SPT=4018 DPT=42344 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 13 00:06:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=188.244.46.2 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=48 ID=49449 DF PROTO=TCP SPT=52932 DPT=43371 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 13 00:16:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=77.91.198.194 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=9602 DF PROTO=TCP SPT=64983 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 00:26:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=176.8.98.87 DST=91.124.75.114 LEN=56 TOS=0x00 PREC=0x00 TTL=123 ID=1833 DF PROTO=TCP SPT=61795 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 00:36:17 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.253.162.223 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=121 ID=10922 DF PROTO=TCP SPT=64816 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 00:46:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=193.169.80.41 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=58049 DF PROTO=TCP SPT=3429 DPT=34627 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 13 00:56:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=80.89.192.57 DST=91.124.75.114 LEN=56 TOS=0x00 PREC=0x00 TTL=103 ID=31859 DF PROTO=TCP SPT=7809 DPT=43371 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 13 01:06:16 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.140.92.9 DST=91.124.75.114 LEN=44 TOS=0x00 PREC=0x00 TTL=243 ID=14690 PROTO=TCP SPT=23463 DPT=43371 WINDOW=32768 RES=0x00 SYN URGP=0
Nov 13 01:16:12 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=194.79.63.130 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=121 ID=11734 DF PROTO=TCP SPT=64729 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 01:26:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=37.144.62.134 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=10361 DF PROTO=TCP SPT=51710 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 01:36:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=91.204.176.21 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=27911 DF PROTO=TCP SPT=50905 DPT=14275 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 01:46:12 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=41.36.52.43 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=4880 DF PROTO=TCP SPT=61620 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 01:56:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=176.108.250.57 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=30415 PROTO=TCP SPT=50482 DPT=14275 WINDOW=63443 RES=0x00 SYN URGP=0
Nov 13 02:06:12 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.134.18.89 DST=91.124.75.114 LEN=56 TOS=0x00 PREC=0x00 TTL=62 ID=27383 DF PROTO=TCP SPT=51385 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 02:16:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.179.58.226 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=46398 DF PROTO=TCP SPT=10046 DPT=34627 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 13 02:26:17 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=46.147.90.174 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=8631 DF PROTO=TCP SPT=3893 DPT=42402 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 13 02:36:12 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=31.40.196.136 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=27988 DF PROTO=TCP SPT=3633 DPT=42313 WINDOW=64380 RES=0x00 SYN URGP=0
Nov 13 02:46:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=93.173.191.41 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=15757 DF PROTO=TCP SPT=64956 DPT=14275 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 02:56:12 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.72.43.157 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=9312 DF PROTO=TCP SPT=49896 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 03:06:48 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=2.95.141.122 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=58234 DF PROTO=TCP SPT=2309 DPT=43371 WINDOW=16384 RES=0x00 SYN URGP=0
Nov 13 03:16:22 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.167.192.159 DST=91.124.75.114 LEN=64 TOS=0x00 PREC=0x00 TTL=46 ID=23683 DF PROTO=TCP SPT=30823 DPT=59613 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 03:26:24 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=80.252.253.241 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=121 ID=22212 DF PROTO=TCP SPT=61223 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 03:36:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=194.44.222.44 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=122 ID=11548 DF PROTO=TCP SPT=61706 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 03:46:16 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=2.95.141.122 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=50316 DF PROTO=TCP SPT=4438 DPT=43371 WINDOW=16384 RES=0x00 SYN URGP=0
Nov 13 03:56:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=2.198.135.119 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=18045 DF PROTO=TCP SPT=1717 DPT=80 WINDOW=16384 RES=0x00 SYN URGP=0
Nov 13 04:06:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=176.52.59.68 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=16469 DF PROTO=TCP SPT=57889 DPT=14275 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 04:16:13 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.134.91.149 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=11033 DF PROTO=TCP SPT=3084 DPT=42402 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 13 04:26:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=46.175.160.11 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=330 DF PROTO=TCP SPT=1852 DPT=43371 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 13 04:36:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=188.191.187.65 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=44415 DF PROTO=TCP SPT=2293 DPT=14275 WINDOW=24576 RES=0x00 SYN URGP=0
Nov 13 04:46:47 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.179.37.22 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=61 ID=2150 DF PROTO=TCP SPT=1035 DPT=43371 WINDOW=64240 RES=0x00 SYN URGP=0
Nov 13 04:56:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.29.12.220 DST=91.124.75.114 LEN=60 TOS=0x00 PREC=0x00 TTL=55 ID=64681 DF PROTO=TCP SPT=50883 DPT=59613 WINDOW=8160 RES=0x00 SYN URGP=0
Nov 13 05:06:12 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=109.63.186.22 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=55279 DF PROTO=TCP SPT=2070 DPT=59613 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 13 05:16:12 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=188.163.12.40 DST=91.124.75.114 LEN=52 TOS=0x00 PREC=0x00 TTL=124 ID=19760 DF PROTO=TCP SPT=53006 DPT=42344 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 05:26:11 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=178.137.111.55 DST=91.124.75.114 LEN=48 TOS=0x00 PREC=0x00 TTL=124 ID=991 DF PROTO=TCP SPT=59239 DPT=42344 WINDOW=8192 RES=0x00 SYN URGP=0
лог
Date/Time Facility Severity Message
Jan 1 00:00:06 user crit kernel: eth0 Link UP.
Jan 1 00:00:10 user crit kernel: xDSL G.994 training
Jan 1 00:00:18 user crit kernel: ADSL G.992 started
Jan 1 00:00:22 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:28 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:29 user crit kernel: ADSL link up, Path 0, us=1067, ds=17268
Jan 1 00:00:30 daemon crit syslog: PPP server detected.
Jan 1 00:00:30 daemon crit syslog: PPP session established.
Jan 1 00:00:31 daemon crit syslog: PPP LCP UP.
Jan 1 00:00:31 daemon crit syslog: Received valid IP address from server. Connection UP.
Nov 13 23:04:48 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=78.85.186.36 DST=91.124.84.29 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=28547 DF PROTO=TCP SPT=59894 DPT=35691 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 23:04:51 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=78.85.186.36 DST=91.124.84.29 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=29352 DF PROTO=TCP SPT=59894 DPT=35691 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 23:04:57 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=78.85.186.36 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=30654 DF PROTO=TCP SPT=59894 DPT=35691 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 23:06:01 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=178.54.26.105 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=1139 DF PROTO=TCP SPT=63967 DPT=47432 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 23:06:04 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=178.54.26.105 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=1467 DF PROTO=TCP SPT=63967 DPT=47432 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 23:14:49 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.215.254.5 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=29888 DF PROTO=TCP SPT=55105 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 23:24:52 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=37.29.88.133 DST=91.124.84.29 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=30614 DF PROTO=TCP SPT=13289 DPT=45832 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 13 23:35:10 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.26.96.7 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=8557 DF PROTO=TCP SPT=3764 DPT=35691 WINDOW=16384 RES=0x00 SYN URGP=0
Nov 13 23:44:49 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.220.26.156 DST=91.124.84.29 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=13738 DF PROTO=TCP SPT=49600 DPT=43371 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 13 23:54:47 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=89.169.91.74 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=38188 DF PROTO=TCP SPT=1193 DPT=48334 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 14 00:04:58 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.190.17.100 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=55298 DF PROTO=TCP SPT=4891 DPT=34076 WINDOW=64240 RES=0x00 SYN URGP=0
Nov 14 00:14:51 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.190.17.100 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=20853 DF PROTO=TCP SPT=15518 DPT=34076 WINDOW=64240 RES=0x00 SYN URGP=0
Nov 14 00:25:01 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.190.17.100 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=59638 DF PROTO=TCP SPT=26145 DPT=34076 WINDOW=64240 RES=0x00 SYN URGP=0
Nov 14 00:34:50 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=85.170.227.228 DST=91.124.84.29 LEN=52 TOS=0x00 PREC=0x00 TTL=114 ID=13524 DF PROTO=TCP SPT=52574 DPT=35691 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 14 00:44:58 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.190.17.100 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=19387 DF PROTO=TCP SPT=47048 DPT=34076 WINDOW=64240 RES=0x00 SYN URGP=0
Nov 14 00:55:09 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.190.17.100 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=7841 DF PROTO=TCP SPT=57722 DPT=34076 WINDOW=64240 RES=0x00 SYN URGP=0
Nov 14 00:55:11 user alert kernel: Intrusion -> IN=ppp0 OUT=br0 SRC=89.222.215.17 DST=192.168.1.101 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=3489 DF PROTO=TCP SPT=56880 DPT=6881 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 14 00:55:11 user alert kernel: Intrusion -> IN=ppp0 OUT=br0 SRC=213.5.124.36 DST=192.168.1.101 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=28685 DF PROTO=TCP SPT=62245 DPT=6881 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 14 00:55:11 user alert kernel: Intrusion -> IN=ppp0 OUT=br0 SRC=31.23.64.169 DST=192.168.1.101 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=21400 DF PROTO=TCP SPT=51816 DPT=6881 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 14 00:55:11 user alert kernel: Intrusion -> IN=ppp0 OUT=br0 SRC=77.51.201.26 DST=192.168.1.101 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=800 DF PROTO=TCP SPT=51870 DPT=6881 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 14 00:55:11 user alert kernel: Intrusion -> IN=ppp0 OUT=br0 SRC=176.57.72.66 DST=192.168.1.101 LEN=52 TOS=0x00 PREC=0x00 TTL=110 ID=17204 DF PROTO=TCP SPT=54406 DPT=6881 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 14 01:04:48 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=130.0.9.150 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=516 DF PROTO=TCP SPT=28507 DPT=6881 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 14 01:14:48 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=2.92.45.113 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=22105 DF PROTO=TCP SPT=53989 DPT=6881 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 14 01:24:48 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=5.139.37.66 DST=91.124.84.29 LEN=52 TOS=0x00 PREC=0x00 TTL=110 ID=23767 DF PROTO=TCP SPT=62745 DPT=6881 WINDOW=8192 RES=0x00 SYN URGP=0
Nov 14 01:34:49 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=79.133.146.91 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=57386 DF PROTO=TCP SPT=23595 DPT=6881 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 14 01:44:48 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.20.67.106 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=47337 DF PROTO=TCP SPT=16811 DPT=6881 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 14 01:54:48 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=94.198.234.135 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=32876 DF PROTO=TCP SPT=4354 DPT=6881 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 14 02:04:48 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=178.44.114.113 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=48559 PROTO=TCP SPT=2400 DPT=6881 WINDOW=64380 RES=0x00 SYN URGP=0
Nov 14 02:14:49 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=95.135.73.188 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=21722 DF PROTO=TCP SPT=2283 DPT=6881 WINDOW=65535 RES=0x00 SYN URGP=0
Nov 14 02:24:49 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=91.215.145.212 DST=91.124.84.29 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=46437 DF PROTO=TCP SPT=4284 DPT=6881 WINDOW=16384 RES=0x00 SYN URGP=0

Jedi92
Сообщения: 3
Зарегистрирован: 22 ноя 2012, 17:43
Страна: Россия

Re: Разрывы связи (disconnection)

Сообщение Jedi92 » 25 ноя 2012, 19:05

При разрывах связи, заполните следующую форму перед обращением:

1. Hardware Version: WR842ND v1 00000000
2. Firmware Version: 3.12.22 Build 120424 Rel.39632n
3. Россия
4. Уфанет
5. PPTP
6. 50 мбит.
7. В данный момент подключение через роутер, скорость:
http://www.speedtest.net/result/2330828550.png
8. По разному. Пару дней назад к вечеру стабильно около одного разрыва в час, днем не было возможности тестировать, сказать не могу. Сейчас за день уже было 3 дисконнекта (в обед, ближе к вечеру и вот недавно).
9. Не могу сказать, т.к. нагрузка есть практически всегда (просмотр страниц, онлайн игры, включенные мессенджеры и т.п.).
10. Полностью теряется доступ к роутеру и перейти по адресу 192.168.0.1 становится невозможно. Всё приходит в норму после выключения питания и последующего включения.
11. Не наблюдается.

Логи (получены уже после перезагрузки и получения доступа к устройству, так что не знаю о чём они вам скажут):
####################################################################
# TL-WR842ND System Log
# Time = 2012-11-25 21:48:14 177s
# H-Ver = WR842ND v1 00000000 : S-Ver = 3.12.22 Build 120424 Rel.39632n
# L = 192.168.0.1 : M = 255.255.255.0
# W1 = PPTP : W = 79.140.25.251 : M = 255.255.255.255 : G = 79.140.25.251
####################################################################

Nov 25 21:45:26 DHCP NOTICE DHCP server started
Nov 25 21:45:26 SECURITY INFO PPTP Passthrough enabled
Nov 25 21:45:26 SECURITY INFO L2TP Passthrough enabled
Nov 25 21:45:26 SECURITY INFO IPSEC Passthrough enabled
Nov 25 21:45:27 SECURITY INFO FTP ALG enabled
Nov 25 21:45:27 SECURITY INFO TFTP ALG enabled
Nov 25 21:45:27 SECURITY INFO H323 ALG enabled
Nov 25 21:45:27 SECURITY INFO RTSP ALG enabled
Nov 25 21:45:49 VPN ERROR Failed to apply IPsec configuration
Nov 25 21:45:53 DHCP NOTICE DHCPS:Recv REQUEST from 14:DA:E9:22:18:A3
Nov 25 21:45:54 DHCP NOTICE DHCPS:Send ACK to 192.168.0.102
Nov 25 21:45:55 DHCP NOTICE DHCPS:Recv REQUEST from 00:1A:4D:FC:14:D8
Nov 25 21:45:56 DHCP NOTICE DHCPS:Send ACK to 192.168.0.100
Nov 25 21:46:00 DHCP NOTICE DHCPS:Recv INFORM from 00:1A:4D:FC:14:D8
Nov 25 21:46:01 DHCP NOTICE DHCPC Send DISCOVER with request ip 0 and unicast flag 0
Nov 25 21:46:01 DHCP NOTICE DHCPC Recv OFFER from server ac68001 with ip ac680eb
Nov 25 21:46:01 DHCP NOTICE DHCPC Send REQUEST to server ac68001 with request ip ac680eb
Nov 25 21:46:02 DHCP NOTICE DHCPC Recv ACK from server ac68001 with ip ac680eb lease time 3600
Nov 25 21:46:02 DHCP NOTICE DHCPC: get 1 static route from classless static route option(121)
Nov 25 21:46:02 DHCP NOTICE DHCPC: get 1 static route from Microsoft classless static route option(249)
Nov 25 21:46:02 DHCP NOTICE DHCPC: get 2 static route from static route option(33)
Nov 25 21:46:02 DHCP NOTICE DHCPC:GET ip:ac680eb mask:ffffff00 gateway:ac68001 dns1:a080301 dns2:0 static route:4
Nov 25 21:46:06 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:06 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:07 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:07 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:08 PPP INFO sent [LCP Req mru=1420 magic=0x3565ac6a]
Nov 25 21:46:08 PPP INFO rcvd [LCP Ack mru=1420 magic=0x3565ac6a]
Nov 25 21:46:09 PPP INFO rcvd [LCP Req mru=1400 magic=0xf99eaffa auth=chap-MD5]
Nov 25 21:46:09 PPP INFO sent [LCP Ack mru=1400 magic=0xf99eaffa auth=chap-MD5]
Nov 25 21:46:09 PPP INFO rcvd [CHAP Challenge (bb1e683b38e1f925f1b0e2f0530ed84fc8), name = ""]
Nov 25 21:46:09 PPP INFO sent [CHAP Response (384c9da8b0f9bfd70564e2bbd8f8c595), name = "16596"]
Nov 25 21:46:10 PPP INFO rcvd [CHAP Failure "21"]
Nov 25 21:46:10 PPP ERROR Failed to authenticate ourselves to peer
Nov 25 21:46:10 PPP ERROR LCP down
Nov 25 21:46:10 PPP INFO sent [LCP TermReq]
Nov 25 21:46:10 PPP INFO rcvd [LCP TermReq]
Nov 25 21:46:10 PPP INFO sent [LCP TermAck]
Nov 25 21:46:10 PPP INFO rcvd [LCP TermAck]
Nov 25 21:46:10 PPP INFO rcvd Call-disconnect-notification
Nov 25 21:46:19 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:19 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:20 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:20 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:20 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:20 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:21 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:21 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:21 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:21 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:22 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:22 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:22 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:22 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:23 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:23 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:23 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:23 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:24 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:24 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:24 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:24 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:25 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:25 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:25 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:25 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:26 DHCP NOTICE DHCPS:Recv REQUEST from 64:27:37:21:46:F4
Nov 25 21:46:26 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:26 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:26 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:26 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:27 DHCP NOTICE DHCPS:Send ACK to 192.168.0.101
Nov 25 21:46:27 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:27 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:27 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:27 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:28 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:28 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:28 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:28 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:29 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:29 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:29 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:29 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:30 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:30 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:30 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:30 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:31 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:31 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:31 PPP INFO sent [LCP Req mru=1420 magic=0x5e36b992]
Nov 25 21:46:31 PPP INFO rcvd [LCP Ack mru=1420 magic=0x5e36b992]
Nov 25 21:46:31 PPP ERROR User request
Nov 25 21:46:31 PPP INFO sent [LCP TermReq]
Nov 25 21:46:31 PPP INFO rcvd [LCP TermAck]
Nov 25 21:46:31 PPP INFO sent Call-Clear-Request
Nov 25 21:46:42 PPP INFO sent Start-Control-Connection-Request
Nov 25 21:46:42 PPP INFO rcvd Start-Control-Connection-Reply
Nov 25 21:46:43 PPP INFO sent Outgoing-Call-Request
Nov 25 21:46:43 PPP INFO rcvd Outgoing-Call-Reply
Nov 25 21:46:43 PPP INFO sent [LCP Req mru=1420 magic=0x2fe8b2ea]
Nov 25 21:46:43 PPP INFO rcvd [LCP Ack mru=1420 magic=0x2fe8b2ea]
Nov 25 21:46:45 PPP INFO rcvd [LCP Req mru=1400 magic=0x8c177d74 auth=chap-MD5]
Nov 25 21:46:45 PPP INFO sent [LCP Ack mru=1400 magic=0x8c177d74 auth=chap-MD5]
Nov 25 21:46:45 PPP INFO rcvd [CHAP Challenge (bb1e686aee80aa4dcb37ae5a1dd389fcb2d5230e237ed16e8bef8221b90d991af80f84e6902e), name = ""]
Nov 25 21:46:45 PPP INFO sent [CHAP Response (e358096f82690dbdc23a09bdc68fed99), name = "16596"]
Nov 25 21:46:45 PPP INFO rcvd [CHAP Success "Welcome"]
Nov 25 21:46:45 PPP INFO sent [IPCP Req addr=0.0.0.0 dns1=0.0.0.0 dns3=0.0.0.0]
Nov 25 21:46:45 PPP INFO rcvd [IPCP Req addr=79.140.16.91]
Nov 25 21:46:45 PPP INFO sent [IPCP Ack addr=79.140.16.91]
Nov 25 21:46:45 PPP INFO rcvd [IPCP Nak addr=79.140.25.251 dns1=79.140.16.5 dns3=79.140.19.2]
Nov 25 21:46:45 PPP INFO sent [IPCP Req addr=79.140.25.251 dns1=79.140.16.5 dns3=79.140.19.2]
Nov 25 21:46:45 PPP INFO rcvd [IPCP Ack addr=79.140.25.251 dns1=79.140.16.5 dns3=79.140.19.2]
Nov 25 21:46:55 PPP NOTICE PPTP connected

vanjakz
Сообщения: 3
Зарегистрирован: 04 дек 2012, 18:30
Страна: Казахстан

Re: Разрывы связи (disconnection)

Сообщение vanjakz » 05 дек 2012, 18:52

1. Hardware версия устройства: TD-W8960N v3 0x00000002
2. Версия прошивки: 1.4.0 Build 111108 Rel.40398n
3. Ваша страна: Казахстан
4. Название провайдера: Megaline
5. Тип подключения: PPPoE
6. Скорость по тарифу: 8mbit/sec
7. Подключение с компьютерами: по LAN
8. Как часто происходят Обрывы: примерно 7-10 раз в сутки
9. Наблюдается ли данная проблема, когда нет нагрузки (закачки, просмотр странниц): да
10. Разрывы происходят непосредственно на роутере, либо статус роутера показывает, что роутер подключен, но интернета нет: роутер подключен, но нет интернета
11. Наблюдается ли данная проблема при подключении без роутера: нет, на USB-модеме D-Link DSL-200 "ни единого разрыва".

Cетевой кабель проверяли (проблема не в связи с компом - на устройствах, соединенных по WiFi также теряется интернет).
Вызывали специалистов из телекома, меняли телефонный кабель до распред. коробки, переключали на другую несущую пару до ATC.
Сбрасывал к заводским настройкам, несколько раз обновлял прошивку (как только появлялась новая).
Проблеме уже 2-ой год, и, откровенно говоря, достало... Пишу после очередного разрыва, прошу вашей помощи и совета здесь.

Показатели линии сейчас:

Код: Выделить всё

Mode: ADSL_G.dmt
Traffic Type: ATM
Status: Up
Link Power State: L0
                           Downstream Upstream 
Line Coding(Trellis): On On 
SNR Margin (0.1 dB): 302 120 
Attenuation (0.1 dB): 210 120 
Output Power (0.1 dBm): 86 124 
Attainable Rate (Kbps): 11168 1004 
                Path 0: Downstream Upstream 
Rate (Kbps): 2368 896

K (number of bytes in DMT frame): 75 29
R (number of check bytes in RS code word): 0 0
S (RS code word size in DMT frame): 0.50 1.00
D (interleaver depth): 1 1
Delay (msec): 0.13 0.25
INP (DMT symbol): 0.00 0.00
  
Super Frames: 240542 240476
Super Frame Errors: 0 0
RS Words: 0 0
RS Correctable Errors: 0 0
RS Uncorrectable Errors: 0 0
  
HEC Errors: 0 0
OCD Errors: 0 0
LCD Errors: 0 0
Total Cells: 22838015 0
Data Cells: 17468390 0
Bit Errors: 0 0
  
Total ES: 0 0 
Total SES: 0 0 
Total UAS: 11 11
Содержимое LOG'а в момент разрыва: (на всякий случай устанавливал уровень детализации "Warn")

Один разрыв:

Код: Выделить всё

Date/Time Facility Severity Message 
Jan 1 00:00:06 user warn kernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46  
Jan 1 00:00:06 user warn kernel: Mirror/redirect action on  
Jan 1 00:00:06 user warn kernel: u32 classifier  
Jan 1 00:00:06 user warn kernel: Actions configured  
Jan 1 00:00:06 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.  
Jan 1 00:00:06 user warn kernel: pktflow: module license 'Proprietary' taints kernel.  
Jan 1 00:00:06 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.  
Jan 1 00:00:06 user warn kernel: Created Proc FS /procfs/fcache  
Jan 1 00:00:06 user warn kernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08  
Jan 1 00:00:06 user warn kernel: bcmxtmcfg: bcmxtmcfg_init entry  
Jan 1 00:00:06 user warn kernel: adsl: adsl_init entry  
Jan 1 00:00:06 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Apr 10 2011 18:09:31  
Jan 1 00:00:06 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface  
Jan 1 00:00:06 user warn kernel: ethsw: found bcm5325e!  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered  
Jan 1 00:00:06 user warn kernel: rate ctrl page 0x35, addr 0x02: 0  
Jan 1 00:00:06 user warn kernel: 8021x_1 page 0x0A, addr 0x4C: 0  
Jan 1 00:00:06 user warn kernel: 8021x_2 page 0x0A, addr 0x4E: 0  
Jan 1 00:00:06 user warn kernel: eth0: MAC Address: 00:23:CD:20:44:8D  
Jan 1 00:00:06 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)  
Jan 1 00:00:06 user warn kernel: 4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL G.992 message exchange  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46  
Jan 1 00:00:06 user warn kernel: Mirror/redirect action on  
Jan 1 00:00:06 user warn kernel: u32 classifier  
Jan 1 00:00:06 user warn kernel: Actions configured  
Jan 1 00:00:06 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.  
Jan 1 00:00:06 user warn kernel: pktflow: module license 'Proprietary' taints kernel.  
Jan 1 00:00:06 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.  
Jan 1 00:00:06 user warn kernel: Created Proc FS /procfs/fcache  
Jan 1 00:00:06 user warn kernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08  
Jan 1 00:00:06 user warn kernel: bcmxtmcfg: bcmxtmcfg_init entry  
Jan 1 00:00:06 user warn kernel: adsl: adsl_init entry  
Jan 1 00:00:06 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Apr 10 2011 18:09:31  
Jan 1 00:00:06 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface  
Jan 1 00:00:06 user warn kernel: ethsw: found bcm5325e!  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered  
Jan 1 00:00:06 user warn kernel: rate ctrl page 0x35, addr 0x02: 0  
Jan 1 00:00:06 user warn kernel: 8021x_1 page 0x0A, addr 0x4C: 0  
Jan 1 00:00:06 user warn kernel: 8021x_2 page 0x0A, addr 0x4E: 0  
Jan 1 00:00:06 user warn kernel: eth0: MAC Address: 00:23:CD:20:44:8D  
Jan 1 00:00:06 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)  
Jan 1 00:00:06 user warn kernel: 4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL G.992 message exchange  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46  
Jan 1 00:00:06 user warn kernel: Mirror/redirect action on  
Jan 1 00:00:06 user warn kernel: u32 classifier  
Jan 1 00:00:06 user warn kernel: Actions configured  
Jan 1 00:00:06 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.  
Jan 1 00:00:06 user warn kernel: pktflow: module license 'Proprietary' taints kernel.  
Jan 1 00:00:06 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.  
Jan 1 00:00:06 user warn kernel: Created Proc FS /procfs/fcache  
Jan 1 00:00:06 user warn kernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08  
Jan 1 00:00:06 user warn kernel: bcmxtmcfg: bcmxtmcfg_init entry  
Jan 1 00:00:06 user warn kernel: adsl: adsl_init entry  
Jan 1 00:00:06 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Apr 10 2011 18:09:31  
Jan 1 00:00:06 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface  
Jan 1 00:00:06 user warn kernel: ethsw: found bcm5325e!  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered  
Jan 1 00:00:06 user warn kernel: rate ctrl page 0x35, addr 0x02: 0  
Jan 1 00:00:06 user warn kernel: 8021x_1 page 0x0A, addr 0x4C: 0  
Jan 1 00:00:06 user warn kernel: 8021x_2 page 0x0A, addr 0x4E: 0  
Jan 1 00:00:06 user warn kernel: eth0: MAC Address: 00:23:CD:20:44:8D  
Jan 1 00:00:06 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)  
Jan 1 00:00:06 user warn kernel: 4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL G.992 message exchange  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46  
Jan 1 00:00:06 user warn kernel: Mirror/redirect action on  
Jan 1 00:00:06 user warn kernel: u32 classifier  
Jan 1 00:00:06 user warn kernel: Actions configured  
Jan 1 00:00:06 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.  
Jan 1 00:00:06 user warn kernel: pktflow: module license 'Proprietary' taints kernel.  
Jan 1 00:00:06 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.  
Jan 1 00:00:06 user warn kernel: Created Proc FS /procfs/fcache  
Jan 1 00:00:06 user warn kernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08  
Jan 1 00:00:06 user warn kernel: bcmxtmcfg: bcmxtmcfg_init entry  
Jan 1 00:00:06 user warn kernel: adsl: adsl_init entry  
Jan 1 00:00:06 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Apr 10 2011 18:09:31  
Jan 1 00:00:06 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface  
Jan 1 00:00:06 user warn kernel: ethsw: found bcm5325e!  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered  
Jan 1 00:00:06 user warn kernel: rate ctrl page 0x35, addr 0x02: 0  
Jan 1 00:00:06 user warn kernel: 8021x_1 page 0x0A, addr 0x4C: 0  
Jan 1 00:00:06 user warn kernel: 8021x_2 page 0x0A, addr 0x4E: 0  
Jan 1 00:00:06 user warn kernel: eth0: MAC Address: 00:23:CD:20:44:8D  
Jan 1 00:00:06 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)  
Jan 1 00:00:06 user warn kernel: 4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL G.992 message exchange  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46  
Jan 1 00:00:06 user warn kernel: Mirror/redirect action on  
Jan 1 00:00:06 user warn kernel: u32 classifier  
Jan 1 00:00:06 user warn kernel: Actions configured  
Jan 1 00:00:06 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.  
Jan 1 00:00:06 user warn kernel: pktflow: module license 'Proprietary' taints kernel.  
Jan 1 00:00:06 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.  
Jan 1 00:00:06 user warn kernel: Created Proc FS /procfs/fcache  
Jan 1 00:00:06 user warn kernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08  
Jan 1 00:00:06 user warn kernel: bcmxtmcfg: bcmxtmcfg_init entry  
Jan 1 00:00:06 user warn kernel: adsl: adsl_init entry  
Jan 1 00:00:06 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Apr 10 2011 18:09:31  
Jan 1 00:00:06 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface  
Jan 1 00:00:06 user warn kernel: ethsw: found bcm5325e!  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered  
Jan 1 00:00:06 user warn kernel: rate ctrl page 0x35, addr 0x02: 0  
Jan 1 00:00:06 user warn kernel: 8021x_1 page 0x0A, addr 0x4C: 0  
Jan 1 00:00:06 user warn kernel: 8021x_2 page 0x0A, addr 0x4E: 0  
Jan 1 00:00:06 user warn kernel: eth0: MAC Address: 00:23:CD:20:44:8D  
Jan 1 00:00:06 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)  
Jan 1 00:00:06 user warn kernel: 4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL G.992 message exchange  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: 4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL G.992 message exchange  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: 4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL G.992 message exchange  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: 4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL G.992 message exchange  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: 4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL G.992 message exchange  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: 4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL G.992 message exchange  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:01:42 daemon crit syslog: PPP server detected.  
Jan 1 00:01:54 daemon crit syslog: PPP session established.  
Jan 1 00:00:38 daemon err syslog: We limites PPPoE dial time is about 15s, Now timeout!  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:01 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:01:42 daemon crit syslog: PPP server detected.  
Jan 1 00:01:54 daemon crit syslog: PPP session established.  
Jan 1 00:01:55 daemon crit syslog: PPP LCP UP.  
Jan 1 00:01:56 daemon crit syslog: Received valid IP address from server. Connection UP.  
Jan 1 00:02:00 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=178.130.42.1 DST=178.91.190.58 LEN=52 TOS=0x00 PREC=0x20 TTL=111 ID=32353 DF PROTO=TCP SPT=61878 DPT=61529 WINDOW=8192 RES=0x00 SYN URGP=0  
Еще один разрыв:

Код: Выделить всё

System Log 
 
Date/Time Facility Severity Message 
Jan 1 00:00:06 user warn kernel: Built 1 zonelists. Total pages: 8033  
Jan 1 00:00:06 user warn kernel: brcm mips: enabling 0 06 user warn kernel BcmAdsl_I 0  
Jan 1 000000 AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00 ADSL Gnitialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00icache and dcache...  
Jan 1 00:00:06 user warn kernel: Primary instruction cache 32kB, physically tagged, 2-way, linesize 16 bytes.  
Jan 1 00:00:06 user warn kernel: Primary data cache 16kB, 2-way, linesize 16 bytes.  
Jan 1 00:00:06 user warn kernel: PID hash table entries: 128 (order: 7, 512 bytes)  
Jan 1 00:00:06 user warn kernel: Using 150.000 MHz high precision timer.  
Jan 1 00:00:06 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)  
Jan 1 00:00:06 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)  
Jan 1 00:00:06 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80300000 ... 0x80400000>  
Jan 1 00:00:06 user warn kernel: Mount-cache hash table entries: 512  
Jan 1 00:00:06 user warn kernel: Total Flash size: 4096K with 64 sectors  
Jan 1 00:00:06 user warn kernel: File system address: 0xbfc10100  
Jan 1 00:00:06 user warn kernel: registering PCI controller with io_map_base unset  
Jan 1 00:00:06 user warn kernel: BLOG v1.0 Initialized  
Jan 1 00:00:06 user warn kernel: IP route cache hash table entries: 1024 (order: 0, 4096 bytes)  
Jan 1 00:00:06 user warn kernel: TCP established hash table entries: 1024 (order: 1, 8192 bytes)  
Jan 1 00:00:06 user warn kernel: TCP bind hash table entries: 1024 (order: 0, 4096 bytes)  
Jan 1 00:00:06 user warn kernel: squashfs: LZMA suppport for slax.org by jro  
Jan 1 00:00:06 user warn kernel: bcm963xx_mtd driver v1.0  
Jan 1 00:00:06 user warn kernel: brcmboard: brcm_board_init entry  
Jan 1 00:00:06 user warn kernel: SES: Button Interrupt 0x3 is enabled  
Jan 1 00:00:06 user warn kernel: SES: LED GPIO 0x4 is enabled  
Jan 1 00:00:06 user warn kernel: irq.c: reset_fac_irq is set to low_trigger.  
Jan 1 00:00:06 user warn kernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46  
Jan 1 00:00:06 user warn kernel: Mirror/redirect action on  
Jan 1 00:00:06 user warn kernel: u32 classifier  
Jan 1 00:00:06 user warn kernel: Actions configured  
Jan 1 00:00:06 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.  
Jan 1 00:00:06 user warn kernel: pktflow: module license 'Proprietary' taints kernel.  
Jan 1 00:00:06 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.  
Jan 1 00:00:06 user warn kernel: Created Proc FS /procfs/fcache  
Jan 1 00:00:06 user warn kernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08  
Jan 1 00:00:06 user warn kernel: bcmxtmcfg: bcmxtmcfg_init entry  
Jan 1 00:00:06 user warn kernel: adsl: adsl_init entry  
Jan 1 00:00:06 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Apr 10 2011 18:09:31  
Jan 1 00:00:06 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface  
Jan 1 00:00:06 user warn kernel: ethsw: found bcm5325e!  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered  
Jan 1 00:00:06 user warn kernel: rate ctrl page 0x35, addr 0x02: 0  
Jan 1 00:00:06 user warn kernel: 8021x_1 page 0x0A, addr 0x4C: 0  
Jan 1 00:00:06 user warn kernel: 8021x_2 page 0x0A, addr 0x4E: 0  
Jan 1 00:00:06 user warn kernel: eth0: MAC Address: 00:23:CD:20:44:8D  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:06 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)  
Jan 1 00:00:06 user warn kernel: wl0: Broadcom BCM4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: Built 1 zonelists. Total pages: 8033  
Jan 1 00:00:06 user warn kernel: brcm mips: enabling icache and dcache...  
Jan 1 00:00:06 user warn kernel: Primary instruction cache 32kB, physically tagged, 2-way, linesize 16 bytes.  
Jan 1 00:00:06 user warn kernel: Primary data cache 16kB, 2-way, linesize 16 bytes.  
Jan 1 00:00:06 user warn kernel: PID hash table entries: 128 (order: 7, 512 bytes)  
Jan 1 00:00:06 user warn kernel: Using 150.000 MHz high precision timer.  
Jan 1 00:00:06 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)  
Jan 1 00:00:06 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)  
Jan 1 00:00:06 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80300000 ... 0x80400000>  
Jan 1 00:00:06 user warn kernel: Mount-cache hash table entries: 512  
Jan 1 00:00:06 user warn kernel: Total Flash size: 4096K with 64 sectors  
Jan 1 00:00:06 user warn kernel: File system address: 0xbfc10100  
Jan 1 00:00:06 user warn kernel: registering PCI controller with io_map_base unset  
Jan 1 00:00:06 user warn kernel: BLOG v1.0 Initialized  
Jan 1 00:00:06 user warn kernel: IP route cache hash table entries: 1024 (order: 0, 4096 bytes)  
Jan 1 00:00:06 user warn kernel: TCP established hash table entries: 1024 (order: 1, 8192 bytes)  
Jan 1 00:00:06 user warn kernel: TCP bind hash table entries: 1024 (order: 0, 4096 bytes)  
Jan 1 00:00:06 user warn kernel: squashfs: LZMA suppport for slax.org by jro  
Jan 1 00:00:06 user warn kernel: bcm963xx_mtd driver v1.0  
Jan 1 00:00:06 user warn kernel: brcmboard: brcm_board_init entry  
Jan 1 00:00:06 user warn kernel: SES: Button Interrupt 0x3 is enabled  
Jan 1 00:00:06 user warn kernel: SES: LED GPIO 0x4 is enabled  
Jan 1 00:00:06 user warn kernel: irq.c: reset_fac_irq is set to low_trigger.  
Jan 1 00:00:06 user warn kernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46  
Jan 1 00:00:06 user warn kernel: Mirror/redirect action on  
Jan 1 00:00:06 user warn kernel: u32 classifier  
Jan 1 00:00:06 user warn kernel: Actions configured  
Jan 1 00:00:06 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.  
Jan 1 00:00:06 user warn kernel: pktflow: module license 'Proprietary' taints kernel.  
Jan 1 00:00:06 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.  
Jan 1 00:00:06 user warn kernel: Created Proc FS /procfs/fcache  
Jan 1 00:00:06 user warn kernel: Constructed Broadcom Packet Flow Cache v0.1 Feb 26 2009 14:21:08  
Jan 1 00:00:06 user warn kernel: bcmxtmcfg: bcmxtmcfg_init entry  
Jan 1 00:00:06 user warn kernel: adsl: adsl_init entry  
Jan 1 00:00:06 user warn kernel: Broadcom BCM6358A1 Ethernet Network Device v0.3 Apr 10 2011 18:09:31  
Jan 1 00:00:06 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface  
Jan 1 00:00:06 user warn kernel: ethsw: found bcm5325e!  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered  
Jan 1 00:00:06 user warn kernel: rate ctrl page 0x35, addr 0x02: 0  
Jan 1 00:00:06 user warn kernel: 8021x_1 page 0x0A, addr 0x4C: 0  
Jan 1 00:00:06 user warn kernel: 8021x_2 page 0x0A, addr 0x4E: 0  
Jan 1 00:00:06 user warn kernel: eth0: MAC Address: 00:23:CD:20:44:8D  
Jan 1 00:00:06 user crit kernel: eth0 Link UP.  
Jan 1 00:00:06 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)  
Jan 1 00:00:06 user warn kernel: wl0: Broadcom BCM4351 802.11 Wireless Controller 5.10.85.0.cpe4.402.0  
Jan 1 00:00:06 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:00:06 user warn kernel: Built 1 zonelists. Total pages: 8033  
Jan 1 00:00:06 user warn kernel: brcm mips: enabling icache and dcache...  
Jan 1 00:00:06 user warn kernel: Primary instruction cache 32kB, physically tagged, 2-way, linesize 16 bytes.  
Jan 1 00:00:06 user warn kernel: Primary data cache 16kB, 2-way, linesize 16 bytes.  
Jan 1 00:00:06 user warn kernel: PID hash table entries: 128 (order: 7, 512 bytes)  
Jan 1 00:00:06 user warn kernel: Using 150.000 MHz high precision timer.  
Jan 1 00:00:06 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)  
Jan 1 00:00:06 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)  
Jan 1 00:00:06 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80300000 ... 0x80400000>  
Jan 1 00:00:06 user warn kernel: Mount-cache hash table entries: 512  
Jan 1 00:00:06 user warn kernel: Total Flash size: 4096K with 64 sectors  
Jan 1 00:00:06 user warn kernel: File system address: 0xbfc10100  
Jan 1 00:00:06 user warn kernel: registering PCI controller with io_map_base unset  
Jan 1 00:00:06 user warn kernel: BLOG v1.0 Initialized  
Jan 1 00:00:06 user warn kernel: IP route cache hash table entries: 1024 (order: 0, 4096 bytes)  
Jan 1 00:00:06 user warn kernel: TCP established hash table entries: 1024 (order: 1, 8192 bytes)  
Jan 1 00:00:06 user warn kernel: TCP bind hash table entries: 1024 (order: 0, 4096 bytes)  
Jan 1 00:00:06 user warn kernel: squashfs: LZMA suppport for slax.org by jro  
Jan 1 00:00:06 user warn kernel: bcm963xx_mtd driver v1.0  
Jan 1 00:00:06 user warn kernel: brcmboard: brcm_board_init entry  
Jan 1 00:00:06 user warn kernel: SES: Button Interrupt 0x3 is enabled  
Jan 1 00:00:06 user warn kernel: SES: LED GPIO 0x4 is enabled  
Jan 1 00:00:06 user warn kernel: irq.c: reset_fac_irq is set to low_trigger.  
Jan 1 00:00:06 user warn kernel: bcmxtmrt: Broadcom BCM6358A1 ATM Network Device v0.1 Apr 10 2011 18:09:46  
Jan 1 00:00:06 user warn kernel: Mirror/redirect action on  
Jan 1 00:00:06 user warn kernel: u32 classifier  
Jan 1 00:00:06 user warn kernel: Actions configured  
Jan 1 00:00:06 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.  
Jan 1 00:00:06 user warn kernel: pktflow: module license 'Proprietary' taints kernel.  
Jan 1 00:00:06 user warn kernel: Broadcom Packet Flow Cache learning via BLOG enabled.  
 
------------------
обновил окно лога:
------------------
System Log 
 
Date/Time Facility Severity Message 
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:02 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744  
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:02 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
Jan 1 00:00:07 user warn kernel: BcmAdsl_Initialize=0xC006B1F8, g_pFnNotifyCallback=0xC0088744 
Jan 1 00:00:07 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:07 user warn kernel: pSdramPHY=0xA1FFFFF8, 0x1B7934 0xDEADBEEF  
Jan 1 00:00:08 user warn kernel: AdslCoreSharedMemInit: shareMemAvailable=21712  
Jan 1 00:00:08 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA1FEF96C  
Jan 1 00:00:08 user warn kernel: AnnexCParam=0x00000000 AnnexAParam=0x00003981 adsl2=0x00000000  
Jan 1 00:00:08 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered  
Jan 1 00:00:08 user warn kernel: KLOB extended to 3 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 4 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 5 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 6 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 7 pools  
Jan 1 00:00:08 user warn kernel: KLOB extended to 8 pools  
Jan 1 00:00:08 user warn kernel: bcmxtmrt: MAC address: 00 23 cd 20 44 8e  
Jan 1 00:00:09 user warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team  
Jan 1 00:00:09 user warn kernel: nf_conntrack version 0.5.0 (253 buckets, 2024 max)  
Jan 1 00:00:09 user warn kernel: Netfilter messages via NETLINK v0.30.  
Jan 1 00:00:10 user crit kernel: xDSL G.994 training  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:12 user crit kernel: Virtual device wl0 asks to queue packet!  
Jan 1 00:00:14 user crit kernel: ADSL G.992 started  
Jan 1 00:00:17 user crit kernel: ADSL G.992 channel analysis  
Jan 1 00:00:21 user crit kernel: ADSL link up, fast, us=896, ds=2368  
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:02 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:00:07 user warn kernel: KLOB extended to 2 pools  
 
--------------------------
обновил окно лога еще раз:
--------------------------
System Log 
 
Date/Time Facility Severity Message 
Jan 1 00:00:21 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:02 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:01:42 daemon crit syslog: PPP server detected.  
Jan 1 00:02:02 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:02 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:01:42 daemon crit syslog: PPP server detected.  
Jan 1 00:02:02 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:02 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:01:42 daemon crit syslog: PPP server detected.  
Jan 1 00:02:02 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:02 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:01:42 daemon crit syslog: PPP server detected.  
Jan 1 00:02:02 daemon crit syslog: PPP server detected.  
Jan 1 00:00:41 daemon crit syslog: PPP server detected.  
Jan 1 00:01:02 daemon crit syslog: PPP server detected.  
Jan 1 00:01:22 daemon crit syslog: PPP server detected.  
Jan 1 00:01:42 daemon crit syslog: PPP server detected.  
Jan 1 00:02:02 daemon crit syslog: PPP server detected.  
Jan 1 00:02:05 daemon crit syslog: PPP session established.  
Jan 1 00:02:06 daemon crit syslog: PPP LCP UP.  
Jan 1 00:02:09 daemon crit syslog: Received valid IP address from server. Connection UP.  
Jan 1 00:02:12 user alert kernel: Intrusion -> IN=ppp0 OUT= MAC= SRC=195.225.158.190 DST=178.91.169.68 LEN=64 TOS=0x00 PREC=0x20 TTL=45 ID=52291 DF PROTO=TCP SPT=53524 DPT=15379 WINDOW=8192 RES=0x00 SYN URGP=0  
Если при разрыве роутер недоступен (нельзя зайти на 192.168.1.1), укажите об этом дополнительно:
Иногда, но достаточно редко, бывает недоступен так, что приходится вручную отключать/включать его кнопку питания. Но чаще перезапускаю из веб-интерфейса в разделе Management - Reboot (чтобы быстрее поднялся приходится делать 2-3 раза). И иногда он сам поднимается, но нужно ждать.

Ответить

Вернуться в «TD-W8960N / TD-W8950N»