Наши проекты:
Журнал · Discuz!ML · Wiki · DRKB · Помощь проекту |
||
ПРАВИЛА | FAQ | Помощь | Поиск | Участники | Календарь | Избранное | RSS |
[18.222.182.73] |
|
Страницы: (2) [1] 2 все ( Перейти к последнему сообщению ) |
Сообщ.
#1
,
|
|
|
Как такое могло получиться? DSL модем TP-Link TD8810 в режиме роутера получает гейт из внутренней сети провайдера. При этом праймари днс определяется верно. vpi/vci прова - 0/35. Mtu стоит по дефолту на самом модеме.
При диагностике получаю следующие ошибки: Test ATM OAM F5 segment ping: FAIL Test ATM OAM F5 end-to-end ping: FAIL Ping default gateway: FAIL Естественно нет не работает. Саппорт прова ничего вразумительного объяснить не смог, ограничился - "У вас проблемы на линии". |
Сообщ.
#2
,
|
|
|
на чем сетка? pppoe, ipoe, глянь и скинь сюды логи мопеда
|
Сообщ.
#3
,
|
|
|
pppoe
Date/Time Facility Severity Message Jan 1 00:00:16 syslog emerg BCM96345 started: BusyBox v1.00 (2006.09.02-02:44+0000) Jan 1 00:00:22 user crit kernel: ADSL G.992 started Jan 1 00:00:26 user crit kernel: ADSL G.992 channel analysis Jan 1 00:00:30 user crit kernel: ADSL G.992 message exchange Jan 1 00:00:30 user crit kernel: ADSL link up, interleaved, us=510, ds=510 Jan 1 00:00:32 daemon crit pppd[225]: PPP server detected. Jan 1 00:00:34 daemon crit pppd[225]: PPP session established. Jan 1 00:00:37 daemon crit pppd[225]: PPP LCP UP. Jan 1 00:00:42 daemon crit pppd[225]: Received valid IP address from server. Connection UP. Jan 1 00:04:49 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=172.16.102.63 DST=172.16.102.44 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2071 DF PROTO=TCP SPT=1429 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 1 00:04:52 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=172.16.102.63 DST=172.16.102.44 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2145 DF PROTO=TCP SPT=1429 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 1 00:13:29 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=172.16.102.63 DST=172.16.102.44 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=6536 DF PROTO=TCP SPT=1881 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 1 00:13:32 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=172.16.102.63 DST=172.16.102.44 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=6538 DF PROTO=TCP SPT=1881 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 1 00:14:15 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=172.16.102.101 DST=172.16.102.44 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=384 DF PROTO=TCP SPT=1123 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 1 00:21:03 daemon crit pppd[225]: Clear IP addresses. Connection DOWN. Jan 1 00:21:03 daemon crit pppd[225]: Clear IP addresses. PPP connection DOWN. Jan 1 00:21:09 daemon crit pppd[225]: PPP server detected. Jan 1 00:21:09 daemon crit pppd[225]: PPP session established. Jan 1 00:21:12 daemon crit pppd[225]: PPP LCP UP. Jan 1 00:21:17 daemon crit pppd[225]: Received valid IP address from server. Connection UP. Добавлено Лог можно сконфигурить на локал/ремоут, дебаг и тп. |
Сообщ.
#4
,
|
|
|
Цитата Received valid IP address from server. Connection UP. сервак ипку отдал и коннект поднял, но не отдал дефолтный гетвей и днс, если есть под рукой для теста другой мопед, попробуй поднять коннект на нем, если таже хрень - терзай прова |
Сообщ.
#5
,
|
|
|
Цитата SPT=1123 DPT=445 у тебя чтото ломится на 445-й порт, возможно вирусня, если пров злой и не просто тупо дропает "нехорошие" пакетики, он могет дропать коннект, хотя это маловероянтно |
Сообщ.
#6
,
|
|
|
mtu сколько выставить?
|
Сообщ.
#7
,
|
|
|
я всегда ставлю дефолтом, хз как у вас там в сетке, спроси у лучше саппорта
|
Сообщ.
#8
,
|
|
|
Второй модем требует его проставить. Саппорт прова не знает, что это такое.
|
Сообщ.
#9
,
|
|
|
Цитата Мохнатый @ Саппорт прова не знает, что это такое. Глянь какой стоит в 8810 - поставь такой же ЗЫ. У мну 8817 - стоит 1480 |
Сообщ.
#10
,
|
|
|
Попробовал второй модем TP-Link 108M. mtu по дефолту там 1492
Тут еще лучше ситуация Date/Time Facility Severity Message Jan 1 00:00:21 syslog emerg TD-W8920G started: BusyBox v1.00 (2008.02.20-02:31+0000) Jan 1 00:00:20 user notice kernel: klogd started: BusyBox v1.00 (2008.02.20-02:31+0000) Jan 1 00:00:21 user warn kernel: Linux version 2.6.8.1 (root@linuxServer) (gcc version 3.4.2) #1 Wed Feb 20 10:25:52 CST 2008 Jan 1 00:00:21 user warn kernel: Parallel flash device: name SST39VF3201, id 0x235b, size 4096KB Jan 1 00:00:21 user warn kernel: Total Flash size: 4096K with 1024 sectors Jan 1 00:00:21 user warn kernel: usedBlkSize 65536 persistent_length 65536 blk_offset 0^M Jan 1 00:00:21 user warn kernel: fInfo.flash_scratch_pad_start_blk = 6 Jan 1 00:00:21 user warn kernel: fInfo.flash_scratch_pad_number_blk = 2 Jan 1 00:00:21 user warn kernel: fInfo.flash_scratch_pad_length = 0x2000 Jan 1 00:00:21 user warn kernel: fInfo.flash_scratch_pad_blk_offset = 0x0 Jan 1 00:00:21 user warn kernel: fInfo.flash_nvram_start_blk = 4 Jan 1 00:00:21 user warn kernel: fInfo.flash_nvram_blk_offset = 0x0 Jan 1 00:00:21 user warn kernel: fInfo.flash_nvram_number_blk = 1 Jan 1 00:00:21 user warn kernel: psi startAddr = bfff0000 Jan 1 00:00:21 user warn kernel: fInfo.flash_persistent_start_blk = 1008 Jan 1 00:00:21 user warn kernel: fInfo.flash_persistent_blk_offset = 0x0 Jan 1 00:00:21 user warn kernel: fInfo.flash_persistent_number_blk = 16 Jan 1 00:00:21 user warn kernel: TD-W8920G-11 prom init Jan 1 00:00:21 user warn kernel: CPU revision is: 00029107 Jan 1 00:00:21 user warn kernel: Determined physical RAM map: Jan 1 00:00:21 user warn kernel: memory: 00fa0000 @ 00000000 (usable) Jan 1 00:00:21 user warn kernel: Built 1 zonelists Jan 1 00:00:21 user warn kernel: Kernel command line: root=31:0 ro noinitrd Jan 1 00:00:21 user warn kernel: brcm mips: enabling icache and dcache... Jan 1 00:00:21 user warn kernel: Primary instruction cache 16kB, physically tagged, 2-way, linesize 16 bytes. Jan 1 00:00:21 user warn kernel: Primary data cache 8kB 2-way, linesize 16 bytes. Jan 1 00:00:21 user warn kernel: PID hash table entries: 64 (order 6: 512 bytes) Jan 1 00:00:21 user warn kernel: Using 128.000 MHz high precision timer. Jan 1 00:00:21 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes) Jan 1 00:00:21 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes) Jan 1 00:00:21 user info kernel: Memory: 13940k/16000k available (1431k kernel code, 2040k reserved, 208k data, 72k init, 0k highmem) Jan 1 00:00:21 user warn kernel: Calibrating delay loop... 254.77 BogoMIPS Jan 1 00:00:21 user warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes) Jan 1 00:00:21 user warn kernel: Checking for 'wait' instruction... unavailable. Jan 1 00:00:21 user info kernel: NET: Registered protocol family 16 Jan 1 00:00:21 user warn kernel: MPI: No Card is in the PCMCIA slot Jan 1 00:00:21 user warn kernel: Can't analyze prologue code at 801745c4 Jan 1 00:00:21 user info kernel: Initializing Cryptographic API Jan 1 00:00:21 user info kernel: PPP generic driver version 2.4.2 Jan 1 00:00:21 user info kernel: NET: Registered protocol family 24 Jan 1 00:00:21 user warn kernel: Using noop io scheduler Jan 1 00:00:21 user warn kernel: TD-W8920G_mtd driver v1.0 Jan 1 00:00:21 user warn kernel: brcmboard: brcm_board_init entry Jan 1 00:00:21 user warn kernel: systemLedCtrl kLedStateOn 1^M Jan 1 00:00:21 user warn kernel: systemLedCtrl kLedStateOn ^M Jan 1 00:00:21 user warn kernel: proid 50 52 49 44 ffffff89 10 00 02^M Jan 1 00:00:21 user warn kernel: pro id 89100002^M Jan 1 00:00:21 user warn kernel: TD-W8920G_serial driver v2.0 Jan 1 00:00:21 user info kernel: NET: Registered protocol family 2 Jan 1 00:00:21 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes Jan 1 00:00:21 user info kernel: TCP: Hash tables configured (established 512 bind 1024) Jan 1 00:00:21 user info kernel: Initializing IPsec netlink socket Jan 1 00:00:21 user info kernel: NET: Registered protocol family 1 Jan 1 00:00:21 user info kernel: NET: Registered protocol family 17 Jan 1 00:00:21 user info kernel: NET: Registered protocol family 15 Jan 1 00:00:21 user notice kernel: Ebtables v2.0 registered Jan 1 00:00:21 user info kernel: NET: Registered protocol family 8 Jan 1 00:00:21 user info kernel: NET: Registered protocol family 20 Jan 1 00:00:21 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear Jan 1 00:00:21 user info kernel: All bugs added by David S. Miller Jan 1 00:00:21 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly. Jan 1 00:00:21 user info kernel: Freeing unused kernel memory: 72k freed Jan 1 00:00:21 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5 Jan 1 00:00:21 user warn kernel: atmapi: module license 'Proprietary' taints kernel. Jan 1 00:00:21 user warn kernel: blaadd: blaa_detect entry Jan 1 00:00:21 user warn kernel: adsl: adsl_init entry Jan 1 00:00:21 user info kernel: TP-LINK TLPROCFS v1.0 initialized Jan 1 00:00:21 user warn kernel: TP-LINK TL6348B0 Ethernet Network Device v0.3 Feb 20 2008 10:24:14 Jan 1 00:00:21 user warn kernel: before read_though,emac = 0xfffe6800^M Jan 1 00:00:21 user warn kernel: end before read_though,emac ^M Jan 1 00:00:21 user warn kernel: Ethernet_switch Jan 1 00:00:21 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface Jan 1 00:00:21 user warn kernel: reset switchPorts 5 Jan 1 00:00:21 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered Jan 1 00:00:21 user warn kernel: get mac address i 11 ulId 5 nRet 0 ulNumMac 11 mac:00 21 27 ee 01 dd ^M Jan 1 00:00:21 user warn kernel: eth0: MAC Address: 00:21:27:EE:01:DD Jan 1 00:00:21 user warn kernel: TLAdsl_Initialize=0xC005E228, g_pFnNotifyCallback=0xC0074C84 Jan 1 00:00:21 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x44813 0xDEADBEEF Jan 1 00:00:21 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FFBB64 Jan 1 00:00:21 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered Jan 1 00:00:21 user crit kernel: eth0 Link UP. Jan 1 00:00:21 user warn kernel: ip_tables: © 2000-2002 Netfilter core team Jan 1 00:00:21 user warn kernel: ip_conntrack version 2.1 (125 buckets, 0 max) - 368 bytes per conntrack Jan 1 00:00:21 user warn kernel: ip_conntrack_pptp version 2.1 loaded Jan 1 00:00:21 user warn kernel: ip_nat_pptp version 2.0 loaded Jan 1 00:00:21 user crit kernel: ADSL G.994 training Jan 1 00:00:21 user warn kernel: ip_conntrack_h323: init Jan 1 00:00:21 user warn kernel: ip_nat_h323: initialize the module! Jan 1 00:00:21 user warn kernel: ip_conntrack_rtsp v0.01 loading Jan 1 00:00:21 user warn kernel: ip_nat_rtsp v0.01 loading Jan 1 00:00:21 user info kernel: device eth0 entered promiscuous mode Jan 1 00:00:21 user info kernel: br0: port 1(eth0) entering learning state Jan 1 00:00:21 user info kernel: gy change detected, propagating Jan 1 00:00:21 user info kernel: br0: port 1(eth0) entering forwarding state Jan 1 00:00:21 user info kernel: wlan: 0.8.4.2 (Atheros/multi-bss) Jan 1 00:00:21 user info kernel: ath_hal: 0.9.17.1 (AR5212, RF2413) Jan 1 00:00:21 user info kernel: ath_rate_atheros: Version 2.0.1 Jan 1 00:00:21 user warn kernel: Copyright © 2001-2004 Atheros Communications, Inc, All Rights Reserved Jan 1 00:00:21 user info kernel: ath_dfs: Version 2.0.0 Jan 1 00:00:21 user warn kernel: Copyright © 2005-2006 Atheros Communications, Inc. All Rights Reserved Jan 1 00:00:21 user info kernel: ath_pci: 0.9.4.5 (Atheros/multi-bss) Jan 1 00:00:21 user warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002) Jan 1 00:00:21 user warn kernel: Setting ah_eepromDetach Jan 1 00:00:21 user warn kernel: **** Going to ath_hal_readEepromIntoDataset Jan 1 00:00:21 user warn kernel: Overwrite regdomain to 003a Jan 1 00:00:21 user warn kernel: wifi0: 11b rates: 1Mbps 2Mbps 5.5Mbps 11Mbps Jan 1 00:00:21 user warn kernel: wifi0: 11g rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps Jan 1 00:00:21 user warn kernel: wifi0: turboG rates: 6Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps Jan 1 00:00:21 user warn kernel: wifi0: mac 7.9 phy 4.5 radio 5.6 Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 1 for WME_AC_BE traffic Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 0 for WME_AC_BK traffic Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 2 for WME_AC_VI traffic Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 3 for WME_AC_VO traffic Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 8 for CAB traffic Jan 1 00:00:21 user warn kernel: wifi0: Use hw queue 9 for beacons Jan 1 00:00:21 user info kernel: wifi0: Atheros 5212: mem=0x10000000, irq=32 Jan 1 00:00:21 user info kernel: wlan: mac acl policy registered Jan 1 00:00:21 user warn kernel: get mac address i 11 ulId 32 nRet 0 ulNumMac 11 mac:00 21 27 ee 01 de ^M Jan 1 00:00:21 user warn kernel: get mac address i 1 ulId 32 nRet 0 ulNumMac 11 mac:00 21 27 ee 01 de ^M Jan 1 00:00:21 user warn kernel: missBeacon=0, stuckBeacon=0. xrBeaconThreshold=3, beaconGenerate=0.^M Jan 1 00:00:21 user warn kernel: get mac address i 11 ulId 36 nRet 0 ulNumMac 11 mac:00 21 27 ee 01 df ^M Jan 1 00:00:21 user info kernel: device eth0 left promiscuous mode Jan 1 00:00:21 user info kernel: br0: port 1(eth0) entering disabled state Jan 1 00:00:21 user warn kernel: eth0.2: MAC Address: 00:21:27:EE:01:DD Jan 1 00:00:21 user warn kernel: eth0.3: MAC Address: 00:21:27:EE:01:DD Jan 1 00:00:21 user warn kernel: eth0.4: MAC Address: 00:21:27:EE:01:DD Jan 1 00:00:21 user warn kernel: eth0.5: MAC Address: 00:21:27:EE:01:DD Jan 1 00:00:21 user crit kernel: ADSL G.992 started Jan 1 00:00:21 user info kernel: device wl0 entered promiscuous mode Jan 1 00:00:21 user info kernel: device eth0.2 entered promiscuous mode Jan 1 00:00:21 user info kernel: br0: port 2(eth0.2) entering learning state Jan 1 00:00:21 user info kernel: br0: topology change detected, propagating Jan 1 00:00:21 user info kernel: br0: port 2(eth0.2) entering forwarding state Jan 1 00:00:21 user info kernel: device eth0.3 entered promiscuous mode Jan 1 00:00:21 user info kernel: br0: port 3(eth0.3) entering learning state Jan 1 00:00:21 user info kernel: br0: topology change detected, propagating Jan 1 00:00:21 user info kernel: br0: port 3(eth0.3) entering forwarding state Jan 1 00:00:21 user info kernel: device eth0.4 entered promiscuous mode Jan 1 00:00:21 user info kernel: br0: port 4(eth0.4) entering learning state Jan 1 00:00:21 user info kernel: br0: topology change detected, propagating Jan 1 00:00:21 user info kernel: br0: port 4(eth0.4) entering forwarding state Jan 1 00:00:21 user info kernel: device eth0.5 entered promiscuous mode Jan 1 00:00:21 user info kernel: br0: port 5(eth0.5) entering learning state Jan 1 00:00:21 user info kernel: br0: topology change detected, propagating Jan 1 00:00:21 user info kernel: br0: port 5(eth0.5) entering forwarding state Jan 1 00:00:22 user info kernel: br0: port 2(eth0.2) entering disabled state Jan 1 00:00:22 daemon notice pppd[389]: pppd 2.4.1 started by admin, uid 0 Jan 1 00:00:22 user info kernel: br0: port 3(eth0.3) entering disabled state Jan 1 00:00:22 user info kernel: br0: port 4(eth0.4) entering disabled state Jan 1 00:00:22 user crit kernel: ADSL G.992 channel analysis Jan 1 00:00:29 user crit kernel: ADSL link up, interleaved, us=510, ds=512 Jan 1 00:00:31 daemon notice pppd[389]: PPP: Start to connect ... Jan 1 00:00:31 daemon crit pppd[389]: PPP server detected. Jan 1 00:00:45 daemon notice pppd[389]: PPP: Start to connect ... Jan 1 00:00:45 daemon crit pppd[389]: PPP server detected. Jan 1 00:00:50 user crit kernel: OAM loopback response not received on VPI/VCI 0/35. Jan 1 00:00:51 user crit kernel: OAM loopback response not received on VPI/VCI 0/35. Jan 1 00:00:59 daemon notice pppd[389]: PPP: Start to connect ... Jan 1 00:01:00 daemon crit pppd[389]: PPP server detected. Jan 1 00:01:14 daemon notice pppd[389]: PPP: Start to connect ... Jan 1 00:01:14 daemon crit pppd[389]: PPP server detected. Jan 1 00:01:28 daemon notice pppd[389]: PPP: Start to connect ... Jan 1 00:01:28 daemon crit pppd[389]: PPP server detected. Jan 1 00:01:42 daemon notice pppd[389]: PPP: Start to connect ... Jan 1 00:01:42 daemon crit pppd[389]: PPP server detected. Jan 1 00:01:56 daemon notice pppd[389]: PPP: Start to connect ... Jan 1 00:01:56 daemon crit pppd[389]: PPP server detected. Jan 1 00:02:10 daemon notice pppd[389]: PPP: Start to connect ... Jan 1 00:02:10 daemon crit pppd[389]: PPP server detected. Jan 1 00:02:24 daemon notice pppd[389]: PPP: Start to connect ... Jan 1 00:02:24 daemon crit pppd[389]: PPP server detected. |
Сообщ.
#11
,
|
|
|
На эту лапшу инет вешаешь первый раз, или до этого инет был?
|
Сообщ.
#12
,
|
|
|
До этого другой пров был. Только у него vpi/vci 8/35 было. Но инет работал, не без глюков конечно, но работал и соединение с ррр сервером устанавливалось без ошибок.
ЗЫ: модем до сих пор в шоке daemon crit pppd[389]: PPP server detected. daemon notice pppd[389]: PPP: Start to connect ... Лампочка System мигает постоянно. |
Сообщ.
#13
,
|
|
|
Значит линия в порядке, могешь смело высылать вазелин прову...
|
Сообщ.
#14
,
|
|
|
Спасибо, уже пакую. Посмотрим, что они скажут.
|
Сообщ.
#15
,
|
|
|
Потом отпишись, интересно чем дело закончится
|