На главную Наши проекты:
Журнал   ·   Discuz!ML   ·   Wiki   ·   DRKB   ·   Помощь проекту
ПРАВИЛА FAQ Помощь Участники Календарь Избранное RSS
msm.ru
Страницы: (2) [1] 2  все  ( Перейти к последнему сообщению )  
> DSL модем неверно получает гейт
    Как такое могло получиться? DSL модем TP-Link TD8810 в режиме роутера получает гейт из внутренней сети провайдера. При этом праймари днс определяется верно. vpi/vci прова - 0/35. Mtu стоит по дефолту на самом модеме.

    При диагностике получаю следующие ошибки:

    Test ATM OAM F5 segment ping: FAIL
    Test ATM OAM F5 end-to-end ping: FAIL
    Ping default gateway: FAIL

    Естественно нет не работает. Саппорт прова ничего вразумительного объяснить не смог, ограничился - "У вас проблемы на линии".
      на чем сетка? pppoe, ipoe, глянь и скинь сюды логи мопеда
        pppoe

        Date/Time Facility Severity Message
        Jan 1 00:00:16 syslog emerg BCM96345 started: BusyBox v1.00 (2006.09.02-02:44+0000)
        Jan 1 00:00:22 user crit kernel: ADSL G.992 started
        Jan 1 00:00:26 user crit kernel: ADSL G.992 channel analysis
        Jan 1 00:00:30 user crit kernel: ADSL G.992 message exchange
        Jan 1 00:00:30 user crit kernel: ADSL link up, interleaved, us=510, ds=510
        Jan 1 00:00:32 daemon crit pppd[225]: PPP server detected.
        Jan 1 00:00:34 daemon crit pppd[225]: PPP session established.
        Jan 1 00:00:37 daemon crit pppd[225]: PPP LCP UP.
        Jan 1 00:00:42 daemon crit pppd[225]: Received valid IP address from server. Connection UP.

        Jan 1 00:04:49 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=172.16.102.63 DST=172.16.102.44 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2071 DF PROTO=TCP SPT=1429 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0

        Jan 1 00:04:52 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=172.16.102.63 DST=172.16.102.44 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2145 DF PROTO=TCP SPT=1429 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0

        Jan 1 00:13:29 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=172.16.102.63 DST=172.16.102.44 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=6536 DF PROTO=TCP SPT=1881 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0

        Jan 1 00:13:32 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=172.16.102.63 DST=172.16.102.44 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=6538 DF PROTO=TCP SPT=1881 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0

        Jan 1 00:14:15 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=172.16.102.101 DST=172.16.102.44 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=384 DF PROTO=TCP SPT=1123 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0

        Jan 1 00:21:03 daemon crit pppd[225]: Clear IP addresses. Connection DOWN.
        Jan 1 00:21:03 daemon crit pppd[225]: Clear IP addresses. PPP connection DOWN.
        Jan 1 00:21:09 daemon crit pppd[225]: PPP server detected.
        Jan 1 00:21:09 daemon crit pppd[225]: PPP session established.
        Jan 1 00:21:12 daemon crit pppd[225]: PPP LCP UP.
        Jan 1 00:21:17 daemon crit pppd[225]: Received valid IP address from server. Connection UP.

        Добавлено
        Лог можно сконфигурить на локал/ремоут, дебаг и тп.
          Цитата
          Received valid IP address from server. Connection UP.

          сервак ипку отдал и коннект поднял, но не отдал дефолтный гетвей и днс, если есть под рукой для теста другой мопед, попробуй поднять коннект на нем, если таже хрень - терзай прова
            Цитата
            SPT=1123 DPT=445

            у тебя чтото ломится на 445-й порт, возможно вирусня, если пров злой и не просто тупо дропает "нехорошие" пакетики, он могет дропать коннект, хотя это маловероянтно
              mtu сколько выставить?
                я всегда ставлю дефолтом, хз как у вас там в сетке, спроси у лучше саппорта
                  Второй модем требует его проставить. Саппорт прова не знает, что это такое.
                    Цитата Мохнатый @
                    Саппорт прова не знает, что это такое.

                    :hang:
                    Глянь какой стоит в 8810 - поставь такой же
                    ЗЫ. У мну 8817 - стоит 1480
                      Попробовал второй модем TP-Link 108M. mtu по дефолту там 1492

                      Тут еще лучше ситуация

                      Date/Time Facility Severity Message
                      Jan 1 00:00:21 syslog emerg TD-W8920G started: BusyBox v1.00 (2008.02.20-02:31+0000)
                      Jan 1 00:00:20 user notice kernel: klogd started: BusyBox v1.00 (2008.02.20-02:31+0000)
                      Jan 1 00:00:21 user warn kernel: Linux version 2.6.8.1 (root@linuxServer) (gcc version 3.4.2) #1 Wed Feb 20 10:25:52 CST 2008
                      Jan 1 00:00:21 user warn kernel: Parallel flash device: name SST39VF3201, id 0x235b, size 4096KB
                      Jan 1 00:00:21 user warn kernel: Total Flash size: 4096K with 1024 sectors
                      Jan 1 00:00:21 user warn kernel: usedBlkSize 65536 persistent_length 65536 blk_offset 0^M
                      Jan 1 00:00:21 user warn kernel: fInfo.flash_scratch_pad_start_blk = 6
                      Jan 1 00:00:21 user warn kernel: fInfo.flash_scratch_pad_number_blk = 2
                      Jan 1 00:00:21 user warn kernel: fInfo.flash_scratch_pad_length = 0x2000
                      Jan 1 00:00:21 user warn kernel: fInfo.flash_scratch_pad_blk_offset = 0x0
                      Jan 1 00:00:21 user warn kernel: fInfo.flash_nvram_start_blk = 4
                      Jan 1 00:00:21 user warn kernel: fInfo.flash_nvram_blk_offset = 0x0
                      Jan 1 00:00:21 user warn kernel: fInfo.flash_nvram_number_blk = 1
                      Jan 1 00:00:21 user warn kernel: psi startAddr = bfff0000
                      Jan 1 00:00:21 user warn kernel: fInfo.flash_persistent_start_blk = 1008
                      Jan 1 00:00:21 user warn kernel: fInfo.flash_persistent_blk_offset = 0x0
                      Jan 1 00:00:21 user warn kernel: fInfo.flash_persistent_number_blk = 16
                      Jan 1 00:00:21 user warn kernel: TD-W8920G-11 prom init
                      Jan 1 00:00:21 user warn kernel: CPU revision is: 00029107
                      Jan 1 00:00:21 user warn kernel: Determined physical RAM map:
                      Jan 1 00:00:21 user warn kernel: memory: 00fa0000 @ 00000000 (usable)
                      Jan 1 00:00:21 user warn kernel: Built 1 zonelists
                      Jan 1 00:00:21 user warn kernel: Kernel command line: root=31:0 ro noinitrd
                      Jan 1 00:00:21 user warn kernel: brcm mips: enabling icache and dcache...
                      Jan 1 00:00:21 user warn kernel: Primary instruction cache 16kB, physically tagged, 2-way, linesize 16 bytes.
                      Jan 1 00:00:21 user warn kernel: Primary data cache 8kB 2-way, linesize 16 bytes.
                      Jan 1 00:00:21 user warn kernel: PID hash table entries: 64 (order 6: 512 bytes)
                      Jan 1 00:00:21 user warn kernel: Using 128.000 MHz high precision timer.
                      Jan 1 00:00:21 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)
                      Jan 1 00:00:21 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)
                      Jan 1 00:00:21 user info kernel: Memory: 13940k/16000k available (1431k kernel code, 2040k reserved, 208k data, 72k init, 0k highmem)
                      Jan 1 00:00:21 user warn kernel: Calibrating delay loop... 254.77 BogoMIPS
                      Jan 1 00:00:21 user warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
                      Jan 1 00:00:21 user warn kernel: Checking for 'wait' instruction... unavailable.
                      Jan 1 00:00:21 user info kernel: NET: Registered protocol family 16
                      Jan 1 00:00:21 user warn kernel: MPI: No Card is in the PCMCIA slot
                      Jan 1 00:00:21 user warn kernel: Can't analyze prologue code at 801745c4
                      Jan 1 00:00:21 user info kernel: Initializing Cryptographic API
                      Jan 1 00:00:21 user info kernel: PPP generic driver version 2.4.2
                      Jan 1 00:00:21 user info kernel: NET: Registered protocol family 24
                      Jan 1 00:00:21 user warn kernel: Using noop io scheduler
                      Jan 1 00:00:21 user warn kernel: TD-W8920G_mtd driver v1.0
                      Jan 1 00:00:21 user warn kernel: brcmboard: brcm_board_init entry
                      Jan 1 00:00:21 user warn kernel: systemLedCtrl kLedStateOn 1^M
                      Jan 1 00:00:21 user warn kernel: systemLedCtrl kLedStateOn ^M
                      Jan 1 00:00:21 user warn kernel: proid 50 52 49 44 ffffff89 10 00 02^M
                      Jan 1 00:00:21 user warn kernel: pro id 89100002^M
                      Jan 1 00:00:21 user warn kernel: TD-W8920G_serial driver v2.0
                      Jan 1 00:00:21 user info kernel: NET: Registered protocol family 2
                      Jan 1 00:00:21 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes
                      Jan 1 00:00:21 user info kernel: TCP: Hash tables configured (established 512 bind 1024)
                      Jan 1 00:00:21 user info kernel: Initializing IPsec netlink socket
                      Jan 1 00:00:21 user info kernel: NET: Registered protocol family 1
                      Jan 1 00:00:21 user info kernel: NET: Registered protocol family 17
                      Jan 1 00:00:21 user info kernel: NET: Registered protocol family 15
                      Jan 1 00:00:21 user notice kernel: Ebtables v2.0 registered
                      Jan 1 00:00:21 user info kernel: NET: Registered protocol family 8
                      Jan 1 00:00:21 user info kernel: NET: Registered protocol family 20
                      Jan 1 00:00:21 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear
                      Jan 1 00:00:21 user info kernel: All bugs added by David S. Miller
                      Jan 1 00:00:21 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
                      Jan 1 00:00:21 user info kernel: Freeing unused kernel memory: 72k freed
                      Jan 1 00:00:21 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5
                      Jan 1 00:00:21 user warn kernel: atmapi: module license 'Proprietary' taints kernel.
                      Jan 1 00:00:21 user warn kernel: blaadd: blaa_detect entry
                      Jan 1 00:00:21 user warn kernel: adsl: adsl_init entry
                      Jan 1 00:00:21 user info kernel: TP-LINK TLPROCFS v1.0 initialized
                      Jan 1 00:00:21 user warn kernel: TP-LINK TL6348B0 Ethernet Network Device v0.3 Feb 20 2008 10:24:14
                      Jan 1 00:00:21 user warn kernel: before read_though,emac = 0xfffe6800^M
                      Jan 1 00:00:21 user warn kernel: end before read_though,emac ^M
                      Jan 1 00:00:21 user warn kernel: Ethernet_switch
                      Jan 1 00:00:21 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface
                      Jan 1 00:00:21 user warn kernel: reset switchPorts 5
                      Jan 1 00:00:21 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered
                      Jan 1 00:00:21 user warn kernel: get mac address i 11 ulId 5 nRet 0 ulNumMac 11 mac:00 21 27 ee 01 dd ^M
                      Jan 1 00:00:21 user warn kernel: eth0: MAC Address: 00:21:27:EE:01:DD
                      Jan 1 00:00:21 user warn kernel: TLAdsl_Initialize=0xC005E228, g_pFnNotifyCallback=0xC0074C84
                      Jan 1 00:00:21 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x44813 0xDEADBEEF
                      Jan 1 00:00:21 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FFBB64
                      Jan 1 00:00:21 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
                      Jan 1 00:00:21 user crit kernel: eth0 Link UP.
                      Jan 1 00:00:21 user warn kernel: ip_tables: © 2000-2002 Netfilter core team
                      Jan 1 00:00:21 user warn kernel: ip_conntrack version 2.1 (125 buckets, 0 max) - 368 bytes per conntrack
                      Jan 1 00:00:21 user warn kernel: ip_conntrack_pptp version 2.1 loaded
                      Jan 1 00:00:21 user warn kernel: ip_nat_pptp version 2.0 loaded
                      Jan 1 00:00:21 user crit kernel: ADSL G.994 training
                      Jan 1 00:00:21 user warn kernel: ip_conntrack_h323: init
                      Jan 1 00:00:21 user warn kernel: ip_nat_h323: initialize the module!
                      Jan 1 00:00:21 user warn kernel: ip_conntrack_rtsp v0.01 loading
                      Jan 1 00:00:21 user warn kernel: ip_nat_rtsp v0.01 loading
                      Jan 1 00:00:21 user info kernel: device eth0 entered promiscuous mode
                      Jan 1 00:00:21 user info kernel: br0: port 1(eth0) entering learning state
                      Jan 1 00:00:21 user info kernel: gy change detected, propagating
                      Jan 1 00:00:21 user info kernel: br0: port 1(eth0) entering forwarding state
                      Jan 1 00:00:21 user info kernel: wlan: 0.8.4.2 (Atheros/multi-bss)
                      Jan 1 00:00:21 user info kernel: ath_hal: 0.9.17.1 (AR5212, RF2413)
                      Jan 1 00:00:21 user info kernel: ath_rate_atheros: Version 2.0.1
                      Jan 1 00:00:21 user warn kernel: Copyright © 2001-2004 Atheros Communications, Inc, All Rights Reserved
                      Jan 1 00:00:21 user info kernel: ath_dfs: Version 2.0.0
                      Jan 1 00:00:21 user warn kernel: Copyright © 2005-2006 Atheros Communications, Inc. All Rights Reserved
                      Jan 1 00:00:21 user info kernel: ath_pci: 0.9.4.5 (Atheros/multi-bss)
                      Jan 1 00:00:21 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)
                      Jan 1 00:00:21 user warn kernel: Setting ah_eepromDetach
                      Jan 1 00:00:21 user warn kernel: **** Going to ath_hal_readEepromIntoDataset
                      Jan 1 00:00:21 user warn kernel: Overwrite regdomain to 003a
                      Jan 1 00:00:21 user warn kernel: wifi0: 11b rates: 1Mbps 2Mbps 5.5Mbps 11Mbps
                      Jan 1 00:00:21 user warn kernel: wifi0: 11g rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
                      Jan 1 00:00:21 user warn kernel: wifi0: turboG rates: 6Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
                      Jan 1 00:00:21 user warn kernel: wifi0: mac 7.9 phy 4.5 radio 5.6
                      Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 1 for WME_AC_BE traffic
                      Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 0 for WME_AC_BK traffic
                      Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 2 for WME_AC_VI traffic
                      Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 3 for WME_AC_VO traffic
                      Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 8 for CAB traffic
                      Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 9 for beacons
                      Jan 1 00:00:21 user info kernel: wifi0: Atheros 5212: mem=0x10000000, irq=32
                      Jan 1 00:00:21 user info kernel: wlan: mac acl policy registered
                      Jan 1 00:00:21 user warn kernel: get mac address i 11 ulId 32 nRet 0 ulNumMac 11 mac:00 21 27 ee 01 de ^M
                      Jan 1 00:00:21 user warn kernel: get mac address i 1 ulId 32 nRet 0 ulNumMac 11 mac:00 21 27 ee 01 de ^M
                      Jan 1 00:00:21 user warn kernel: missBeacon=0, stuckBeacon=0. xrBeaconThreshold=3, beaconGenerate=0.^M
                      Jan 1 00:00:21 user warn kernel: get mac address i 11 ulId 36 nRet 0 ulNumMac 11 mac:00 21 27 ee 01 df ^M
                      Jan 1 00:00:21 user info kernel: device eth0 left promiscuous mode
                      Jan 1 00:00:21 user info kernel: br0: port 1(eth0) entering disabled state
                      Jan 1 00:00:21 user warn kernel: eth0.2: MAC Address: 00:21:27:EE:01:DD
                      Jan 1 00:00:21 user warn kernel: eth0.3: MAC Address: 00:21:27:EE:01:DD
                      Jan 1 00:00:21 user warn kernel: eth0.4: MAC Address: 00:21:27:EE:01:DD
                      Jan 1 00:00:21 user warn kernel: eth0.5: MAC Address: 00:21:27:EE:01:DD
                      Jan 1 00:00:21 user crit kernel: ADSL G.992 started
                      Jan 1 00:00:21 user info kernel: device wl0 entered promiscuous mode
                      Jan 1 00:00:21 user info kernel: device eth0.2 entered promiscuous mode
                      Jan 1 00:00:21 user info kernel: br0: port 2(eth0.2) entering learning state
                      Jan 1 00:00:21 user info kernel: br0: topology change detected, propagating
                      Jan 1 00:00:21 user info kernel: br0: port 2(eth0.2) entering forwarding state
                      Jan 1 00:00:21 user info kernel: device eth0.3 entered promiscuous mode
                      Jan 1 00:00:21 user info kernel: br0: port 3(eth0.3) entering learning state
                      Jan 1 00:00:21 user info kernel: br0: topology change detected, propagating
                      Jan 1 00:00:21 user info kernel: br0: port 3(eth0.3) entering forwarding state
                      Jan 1 00:00:21 user info kernel: device eth0.4 entered promiscuous mode
                      Jan 1 00:00:21 user info kernel: br0: port 4(eth0.4) entering learning state
                      Jan 1 00:00:21 user info kernel: br0: topology change detected, propagating
                      Jan 1 00:00:21 user info kernel: br0: port 4(eth0.4) entering forwarding state
                      Jan 1 00:00:21 user info kernel: device eth0.5 entered promiscuous mode
                      Jan 1 00:00:21 user info kernel: br0: port 5(eth0.5) entering learning state
                      Jan 1 00:00:21 user info kernel: br0: topology change detected, propagating
                      Jan 1 00:00:21 user info kernel: br0: port 5(eth0.5) entering forwarding state
                      Jan 1 00:00:22 user info kernel: br0: port 2(eth0.2) entering disabled state
                      Jan 1 00:00:22 daemon notice pppd[389]: pppd 2.4.1 started by admin, uid 0
                      Jan 1 00:00:22 user info kernel: br0: port 3(eth0.3) entering disabled state
                      Jan 1 00:00:22 user info kernel: br0: port 4(eth0.4) entering disabled state
                      Jan 1 00:00:22 user crit kernel: ADSL G.992 channel analysis
                      Jan 1 00:00:29 user crit kernel: ADSL link up, interleaved, us=510, ds=512
                      Jan 1 00:00:31 daemon notice pppd[389]: PPP: Start to connect ...
                      Jan 1 00:00:31 daemon crit pppd[389]: PPP server detected.
                      Jan 1 00:00:45 daemon notice pppd[389]: PPP: Start to connect ...
                      Jan 1 00:00:45 daemon crit pppd[389]: PPP server detected.
                      Jan 1 00:00:50 user crit kernel: OAM loopback response not received on VPI/VCI 0/35.
                      Jan 1 00:00:51 user crit kernel: OAM loopback response not received on VPI/VCI 0/35.
                      Jan 1 00:00:59 daemon notice pppd[389]: PPP: Start to connect ...
                      Jan 1 00:01:00 daemon crit pppd[389]: PPP server detected.
                      Jan 1 00:01:14 daemon notice pppd[389]: PPP: Start to connect ...
                      Jan 1 00:01:14 daemon crit pppd[389]: PPP server detected.
                      Jan 1 00:01:28 daemon notice pppd[389]: PPP: Start to connect ...
                      Jan 1 00:01:28 daemon crit pppd[389]: PPP server detected.
                      Jan 1 00:01:42 daemon notice pppd[389]: PPP: Start to connect ...
                      Jan 1 00:01:42 daemon crit pppd[389]: PPP server detected.
                      Jan 1 00:01:56 daemon notice pppd[389]: PPP: Start to connect ...
                      Jan 1 00:01:56 daemon crit pppd[389]: PPP server detected.
                      Jan 1 00:02:10 daemon notice pppd[389]: PPP: Start to connect ...
                      Jan 1 00:02:10 daemon crit pppd[389]: PPP server detected.
                      Jan 1 00:02:24 daemon notice pppd[389]: PPP: Start to connect ...
                      Jan 1 00:02:24 daemon crit pppd[389]: PPP server detected.
                        На эту лапшу инет вешаешь первый раз, или до этого инет был?
                          До этого другой пров был. Только у него vpi/vci 8/35 было. Но инет работал, не без глюков конечно, но работал и соединение с ррр сервером устанавливалось без ошибок.

                          ЗЫ: модем до сих пор в шоке

                          daemon crit pppd[389]: PPP server detected.
                          daemon notice pppd[389]: PPP: Start to connect ...

                          Лампочка System мигает постоянно.
                          Сообщение отредактировано: Мохнатый -
                            Значит линия в порядке, могешь смело высылать вазелин прову...
                              Спасибо, уже пакую. Посмотрим, что они скажут.
                                Потом отпишись, интересно чем дело закончится :)
                                1 пользователей читают эту тему (1 гостей и 0 скрытых пользователей)
                                0 пользователей:


                                Рейтинг@Mail.ru
                                [ Script execution time: 0,1083 ]   [ 14 queries used ]   [ Generated: 6.10.24, 08:59 GMT ]