Дорогие пользователи! У нас появился новый форум на платформе tp-link.community (Сообщество)

Форум доступен по ссылке https://community.tp-link.com/ru

Если при регистрации в Сообществе Вы укажете адрес электронный почты, который используете на данном форуме, то Ваши данные будут перенесены на форум Сообщества автоматически.
Также, если на форуме Сообщества Ваш никнейм будет занят, то Вам предложат сменить его или оставить, но с приставкой "_RU".

Подробнее Вы можете прочитать тут: https://community.tp-link.com/ru/home/f ... pic/501542

Убедительная просьба не дублировать темы на старом/новом форуме.

Разрывы связи (disconnection)

Беспроводной маршрутизатор со встроенным модемом ADSL2+ серии Lite N, до 150Мбит/с
Ответить
Goodwin
Сообщения: 4361
Зарегистрирован: 25 май 2011, 10:56
Страна: Россия

Разрывы связи (disconnection)

Сообщение Goodwin » 06 июн 2011, 16:55

При разрывах связи, заполните следующую форму перед обращением:

1. Hardware версия устройства (посмотреть можно в статусе, либо на коробке)
2. Версия прошивки (смотреть там же)
3. Ваша страна.
4. Название провайдера.
5. Тип подключения (например PPTP\L2TP\PPPoE\dynamic ip)
6. Скорость по тарифу.
7. Подключение с компьютерами по wi-fi, либо по LAN?
8. Как часто происходят Обрывы?
9. Наблюдается ли данная проблема, когда нет нагрузки (закачки, просмотр странниц)
10. Разрывы происходят непосредственно на роутере, либо статус роутера показывает, что роутер подключен, но интернета нет?
11. Наблюдается ли данная проблема при подключении без роутера?



Первичные сообщения без данной формы не рассматриваются и удаляются, а авторам выносятся предупреждения.
Также обязательно выложить содержимое LOG файла. Это можно сделать, если зайти в меню роутера System Tools - System LOG, нажать SAVE LOG и содержимое этого лога выложить здесь.

Если при разрыве роутер недоступен (нельзя зайти на 192.168.1.1), укажите об этом дополнительно
Перед тем, как создать тему, посетите раздел ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ
TP-LINK Archer C7v2
Личные сообщения по техническим проблемам без сообщения на форуме не рассматриваются!

Respone
Сообщения: 1
Зарегистрирован: 30 дек 2011, 16:40

Re: Разрывы связи (disconnection)

Сообщение Respone » 30 дек 2011, 17:01

1. Hardware версия W8950ND
2. v1 00000001
3. Россия
4. Авангард ADSL
5. PPPoE
6. Скорость по тарифу 2000 кбит/с
7. Два подключения ноутбук по Wi-Fi, а ПК по LAN Проводу
8. Обрывы происходят ~ раз в 5 минут
9. Да, проблема наблюдается даже когда не загружаются файлы.
10. Разрывы происходят непосредственно на роутере!
11. При подключении без роутера проблема не наблюдается


Dmitriy
Модератор
Модератор
Сообщения: 2716
Зарегистрирован: 19 авг 2011, 14:59
Страна: Россия
Откуда: Москва
Контактная информация:

Re: Разрывы связи (disconnection)

Сообщение Dmitriy » 10 янв 2012, 17:23

Respone писал(а):1. Hardware версия W8950ND
2. v1 00000001
3. Россия
4. Авангард ADSL
5. PPPoE
6. Скорость по тарифу 2000 кбит/с
7. Два подключения ноутбук по Wi-Fi, а ПК по LAN Проводу
8. Обрывы происходят ~ раз в 5 минут
9. Да, проблема наблюдается даже когда не загружаются файлы.
10. Разрывы происходят непосредственно на роутере!
11. При подключении без роутера проблема не наблюдается

Пришлите логи и настройки модема для ознакомления с проблемой. Management > System log.
Перед тем, как создать тему, посетите раздел ->ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ<-

xxxUnReaLxxx
Сообщения: 3
Зарегистрирован: 20 мар 2012, 23:22

Re: Разрывы связи (disconnection)

Сообщение xxxUnReaLxxx » 20 мар 2012, 23:31

1. Hardware версия W8950ND v1 00000001
2. 1.2.9 build 110106 Rel.59540n
3. Россия
4. Авангард ADSL
5. PPPoE
6. Скорость по тарифу 10000 кбит/с
7. 4 ПК по LAN Проводу, wi-fi свисток, плюс ноутбук и коммуникаторы
8. Обрывы происходят ~ раз в 5-15 минут
9. Да, проблема наблюдается даже когда не загружаются файлы.
10. Разрывы происходят непосредственно на роутере
11. При подключении без роутера проблема не наблюдается/
System Log
Date/Time Facility Severity Message
Mar 20 22:31:52 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.146.68.254 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=4561 DF PROTO=TCP SPT=13926 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:31:53 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.146.68.254 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=4705 DF PROTO=TCP SPT=13926 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:32:21 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=35115 DF PROTO=TCP SPT=3174 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:32:21 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=35814 DF PROTO=TCP SPT=3174 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:32:22 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=36568 DF PROTO=TCP SPT=3174 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:32:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=176.194.24.209 DST=178.70.197.161 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=9412 DF PROTO=TCP SPT=54768 DPT=23568 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:32:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=176.194.24.209 DST=178.70.197.161 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=9736 DF PROTO=TCP SPT=54768 DPT=23568 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:32:45 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=187.101.63.89 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=22164 DF PROTO=TCP SPT=58913 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:32:46 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=187.101.63.89 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=22197 DF PROTO=TCP SPT=58913 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:32:47 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=187.101.63.89 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=22228 DF PROTO=TCP SPT=58913 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:16 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.95.192.132 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=23748 DF PROTO=TCP SPT=1141 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:33:16 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=212.156.98.210 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=3994 DF PROTO=TCP SPT=7206 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:17 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.95.192.132 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=23845 DF PROTO=TCP SPT=1141 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:33:17 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=212.156.98.210 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=4002 DF PROTO=TCP SPT=7206 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:18 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.95.192.132 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=24129 DF PROTO=TCP SPT=1141 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:33:38 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.79.8.48 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=20500 DF PROTO=TCP SPT=54719 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:39 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.79.8.48 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=20509 DF PROTO=TCP SPT=52929 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:39 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.79.8.48 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=57 ID=20520 DF PROTO=TCP SPT=51137 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:48 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=94.179.196.74 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=29049 PROTO=TCP SPT=39621 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:55 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=94.179.196.74 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=29104 PROTO=TCP SPT=30194 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:34:02 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=87.239.29.57 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=4149 DF PROTO=TCP SPT=51337 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:34:03 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=87.239.29.57 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=4185 DF PROTO=TCP SPT=51337 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:34:37 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=51167 DF PROTO=TCP SPT=2070 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:34:37 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=51625 DF PROTO=TCP SPT=2070 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:34:38 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=52056 DF PROTO=TCP SPT=2070 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:34:42 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.214.137.217 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=25956 DF PROTO=TCP SPT=4402 DPT=15209 WINDOW=16384 RES=0x00 SYN URGP=0
Mar 20 22:34:42 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=200.108.107.97 DST=178.70.197.161 LEN=52 TOS=0x08 PREC=0x00 TTL=113 ID=20078 DF PROTO=TCP SPT=10604 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:02 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.43.163 DST=178.70.197.161 LEN=52 TOS=0x02 PREC=0x00 TTL=120 ID=4619 DF PROTO=TCP SPT=54507 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:03 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.43.163 DST=178.70.197.161 LEN=52 TOS=0x02 PREC=0x00 TTL=120 ID=4788 DF PROTO=TCP SPT=54507 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:04 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.43.163 DST=178.70.197.161 LEN=48 TOS=0x02 PREC=0x00 TTL=120 ID=4942 DF PROTO=TCP SPT=54507 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:13 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=151.29.16.38 DST=178.70.197.161 LEN=60 TOS=0x00 PREC=0x00 TTL=116 ID=1401 DF PROTO=TCP SPT=49472 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:13 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=151.29.16.38 DST=178.70.197.161 LEN=60 TOS=0x00 PREC=0x00 TTL=116 ID=1402 DF PROTO=TCP SPT=49671 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:45 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.231.51 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=2111 DF PROTO=TCP SPT=61324 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:46 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.231.51 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=2137 DF PROTO=TCP SPT=61324 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:47 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.231.51 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=2173 DF PROTO=TCP SPT=61324 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:50 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.79.8.48 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=3835 DF PROTO=TCP SPT=50972 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:51 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.79.8.48 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=4179 DF PROTO=TCP SPT=61939 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=212.156.98.210 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=6321 DF PROTO=TCP SPT=21474 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.76.116.155 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=19098 DF PROTO=TCP SPT=63515 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:28 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=212.156.98.210 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=6338 DF PROTO=TCP SPT=24546 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:28 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.241.67 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=18204 DF PROTO=TCP SPT=14880 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:29 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.241.67 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=18220 DF PROTO=TCP SPT=14880 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:30 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.241.67 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=18250 DF PROTO=TCP SPT=14880 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:30 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=61.43.139.78 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=42384 PROTO=TCP SPT=30332 DPT=22 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:36:35 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=190.51.86.157 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=16105 DF PROTO=TCP SPT=13415 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:36 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=190.51.86.157 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=16118 DF PROTO=TCP SPT=13418 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:37 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=190.51.86.157 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=16133 DF PROTO=TCP SPT=13423 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:43 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.125.34.39 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=14044 DF PROTO=TCP SPT=2215 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:36:43 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=62.213.57.167 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=585 DF PROTO=TCP SPT=64685 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:37:12 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.121.118.147 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=29280 DF PROTO=TCP SPT=1476 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:37:13 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.121.118.147 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=29350 DF PROTO=TCP SPT=1476 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:37:14 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.121.118.147 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=29387 DF PROTO=TCP SPT=1476 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:37:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=41.200.72.21 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=23561 DF PROTO=TCP SPT=50775 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:37:28 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=41.200.72.21 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=23570 DF PROTO=TCP SPT=50775 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:00 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.74.224.65 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=11329 DF PROTO=TCP SPT=2140 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:38:00 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.74.224.65 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=11400 DF PROTO=TCP SPT=2140 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:38:01 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.74.224.65 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=11451 DF PROTO=TCP SPT=2140 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:38:10 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=83.60.153.22 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=27420 DF PROTO=TCP SPT=16920 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:11 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=83.60.153.22 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=27567 DF PROTO=TCP SPT=16920 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:30 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.76.116.155 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=20264 DF PROTO=TCP SPT=60369 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:31 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.76.116.155 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=20267 DF PROTO=TCP SPT=60369 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:32 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.76.116.155 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=20289 DF PROTO=TCP SPT=60369 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:35 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.106.128.38 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=20202 DF PROTO=TCP SPT=14698 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:36 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.106.128.38 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=20229 DF PROTO=TCP SPT=14732 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:07 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=94.179.196.74 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=4295 PROTO=TCP SPT=2908 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:12 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.54.33.39 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=124 ID=26631 DF PROTO=TCP SPT=51942 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:12 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.54.33.39 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=124 ID=26650 DF PROTO=TCP SPT=51942 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:13 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.54.33.39 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=124 ID=26695 DF PROTO=TCP SPT=51942 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:14 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=94.179.196.74 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=4364 PROTO=TCP SPT=24360 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:19 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.214.137.217 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=33140 DF PROTO=TCP SPT=4740 DPT=15209 WINDOW=16384 RES=0x00 SYN URGP=0

Dmitriy
Модератор
Модератор
Сообщения: 2716
Зарегистрирован: 19 авг 2011, 14:59
Страна: Россия
Откуда: Москва
Контактная информация:

Re: Разрывы связи (disconnection)

Сообщение Dmitriy » 21 мар 2012, 13:38

xxxUnReaLxxx писал(а):1. Hardware версия W8950ND v1 00000001
2. 1.2.9 build 110106 Rel.59540n
3. Россия
4. Авангард ADSL
5. PPPoE
6. Скорость по тарифу 10000 кбит/с
7. 4 ПК по LAN Проводу, wi-fi свисток, плюс ноутбук и коммуникаторы
8. Обрывы происходят ~ раз в 5-15 минут
9. Да, проблема наблюдается даже когда не загружаются файлы.
10. Разрывы происходят непосредственно на роутере
11. При подключении без роутера проблема не наблюдается/
System Log
Date/Time Facility Severity Message
Mar 20 22:31:52 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.146.68.254 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=4561 DF PROTO=TCP SPT=13926 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:31:53 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.146.68.254 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=4705 DF PROTO=TCP SPT=13926 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:32:21 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=35115 DF PROTO=TCP SPT=3174 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:32:21 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=35814 DF PROTO=TCP SPT=3174 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:32:22 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=36568 DF PROTO=TCP SPT=3174 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:32:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=176.194.24.209 DST=178.70.197.161 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=9412 DF PROTO=TCP SPT=54768 DPT=23568 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:32:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=176.194.24.209 DST=178.70.197.161 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=9736 DF PROTO=TCP SPT=54768 DPT=23568 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:32:45 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=187.101.63.89 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=22164 DF PROTO=TCP SPT=58913 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:32:46 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=187.101.63.89 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=22197 DF PROTO=TCP SPT=58913 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:32:47 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=187.101.63.89 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=22228 DF PROTO=TCP SPT=58913 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:16 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.95.192.132 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=23748 DF PROTO=TCP SPT=1141 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:33:16 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=212.156.98.210 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=3994 DF PROTO=TCP SPT=7206 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:17 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.95.192.132 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=23845 DF PROTO=TCP SPT=1141 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:33:17 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=212.156.98.210 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=4002 DF PROTO=TCP SPT=7206 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:18 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.95.192.132 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=24129 DF PROTO=TCP SPT=1141 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:33:38 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.79.8.48 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=20500 DF PROTO=TCP SPT=54719 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:39 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.79.8.48 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=20509 DF PROTO=TCP SPT=52929 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:39 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.79.8.48 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=57 ID=20520 DF PROTO=TCP SPT=51137 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:48 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=94.179.196.74 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=29049 PROTO=TCP SPT=39621 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:33:55 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=94.179.196.74 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=29104 PROTO=TCP SPT=30194 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:34:02 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=87.239.29.57 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=4149 DF PROTO=TCP SPT=51337 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:34:03 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=87.239.29.57 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=4185 DF PROTO=TCP SPT=51337 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:34:37 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=51167 DF PROTO=TCP SPT=2070 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:34:37 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=51625 DF PROTO=TCP SPT=2070 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:34:38 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.157.168.20 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=52056 DF PROTO=TCP SPT=2070 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:34:42 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.214.137.217 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=25956 DF PROTO=TCP SPT=4402 DPT=15209 WINDOW=16384 RES=0x00 SYN URGP=0
Mar 20 22:34:42 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=200.108.107.97 DST=178.70.197.161 LEN=52 TOS=0x08 PREC=0x00 TTL=113 ID=20078 DF PROTO=TCP SPT=10604 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:02 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.43.163 DST=178.70.197.161 LEN=52 TOS=0x02 PREC=0x00 TTL=120 ID=4619 DF PROTO=TCP SPT=54507 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:03 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.43.163 DST=178.70.197.161 LEN=52 TOS=0x02 PREC=0x00 TTL=120 ID=4788 DF PROTO=TCP SPT=54507 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:04 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.43.163 DST=178.70.197.161 LEN=48 TOS=0x02 PREC=0x00 TTL=120 ID=4942 DF PROTO=TCP SPT=54507 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:13 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=151.29.16.38 DST=178.70.197.161 LEN=60 TOS=0x00 PREC=0x00 TTL=116 ID=1401 DF PROTO=TCP SPT=49472 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:13 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=151.29.16.38 DST=178.70.197.161 LEN=60 TOS=0x00 PREC=0x00 TTL=116 ID=1402 DF PROTO=TCP SPT=49671 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:45 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.231.51 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=2111 DF PROTO=TCP SPT=61324 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:46 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.231.51 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=2137 DF PROTO=TCP SPT=61324 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:47 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.231.51 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=2173 DF PROTO=TCP SPT=61324 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:50 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.79.8.48 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=3835 DF PROTO=TCP SPT=50972 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:35:51 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.79.8.48 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=4179 DF PROTO=TCP SPT=61939 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=212.156.98.210 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=6321 DF PROTO=TCP SPT=21474 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.76.116.155 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=19098 DF PROTO=TCP SPT=63515 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:28 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=212.156.98.210 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=6338 DF PROTO=TCP SPT=24546 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:28 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.241.67 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=18204 DF PROTO=TCP SPT=14880 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:29 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.241.67 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=18220 DF PROTO=TCP SPT=14880 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:30 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.123.241.67 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=18250 DF PROTO=TCP SPT=14880 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:30 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=61.43.139.78 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=42384 PROTO=TCP SPT=30332 DPT=22 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:36:35 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=190.51.86.157 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=16105 DF PROTO=TCP SPT=13415 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:36 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=190.51.86.157 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=16118 DF PROTO=TCP SPT=13418 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:37 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=190.51.86.157 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=16133 DF PROTO=TCP SPT=13423 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:36:43 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.125.34.39 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=14044 DF PROTO=TCP SPT=2215 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:36:43 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=62.213.57.167 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=585 DF PROTO=TCP SPT=64685 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:37:12 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.121.118.147 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=29280 DF PROTO=TCP SPT=1476 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:37:13 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.121.118.147 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=29350 DF PROTO=TCP SPT=1476 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:37:14 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.121.118.147 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=29387 DF PROTO=TCP SPT=1476 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:37:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=41.200.72.21 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=23561 DF PROTO=TCP SPT=50775 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:37:28 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=41.200.72.21 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=23570 DF PROTO=TCP SPT=50775 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:00 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.74.224.65 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=11329 DF PROTO=TCP SPT=2140 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:38:00 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.74.224.65 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=11400 DF PROTO=TCP SPT=2140 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:38:01 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.74.224.65 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=11451 DF PROTO=TCP SPT=2140 DPT=15209 WINDOW=65535 RES=0x00 SYN URGP=0
Mar 20 22:38:10 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=83.60.153.22 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=27420 DF PROTO=TCP SPT=16920 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:11 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=83.60.153.22 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=27567 DF PROTO=TCP SPT=16920 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:30 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.76.116.155 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=20264 DF PROTO=TCP SPT=60369 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:31 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.76.116.155 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=20267 DF PROTO=TCP SPT=60369 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:32 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.76.116.155 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=20289 DF PROTO=TCP SPT=60369 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:35 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.106.128.38 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=20202 DF PROTO=TCP SPT=14698 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:38:36 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.106.128.38 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=20229 DF PROTO=TCP SPT=14732 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:07 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=94.179.196.74 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=4295 PROTO=TCP SPT=2908 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:12 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.54.33.39 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=124 ID=26631 DF PROTO=TCP SPT=51942 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:12 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.54.33.39 DST=178.70.197.161 LEN=52 TOS=0x00 PREC=0x00 TTL=124 ID=26650 DF PROTO=TCP SPT=51942 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:13 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.54.33.39 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=124 ID=26695 DF PROTO=TCP SPT=51942 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:14 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=94.179.196.74 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=4364 PROTO=TCP SPT=24360 DPT=15209 WINDOW=8192 RES=0x00 SYN URGP=0
Mar 20 22:39:19 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.214.137.217 DST=178.70.197.161 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=33140 DF PROTO=TCP SPT=4740 DPT=15209 WINDOW=16384 RES=0x00 SYN URGP=0
На самом деле в этих логах видны только обращения, разрывов не видно. Дождитесь разрыва, снимите лог и укажите, в какой момент лога произошёл разрыв.
Перед тем, как создать тему, посетите раздел ->ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ<-

xxxUnReaLxxx
Сообщения: 3
Зарегистрирован: 20 мар 2012, 23:22

Re: Разрывы связи (disconnection)

Сообщение xxxUnReaLxxx » 26 мар 2012, 12:08

Mar 26 11:49:17 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:49:20 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:49:26 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:51:28 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:51:31 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:51:37 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:54:46 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:54:49 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:54:55 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1

Dmitriy
Модератор
Модератор
Сообщения: 2716
Зарегистрирован: 19 авг 2011, 14:59
Страна: Россия
Откуда: Москва
Контактная информация:

Re: Разрывы связи (disconnection)

Сообщение Dmitriy » 26 мар 2012, 18:18

xxxUnReaLxxx писал(а):
Mar 26 11:49:17 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:49:20 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:49:26 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:51:28 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:51:31 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:51:37 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:54:46 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:54:49 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Mar 26 11:54:55 user warn kernel: 87.247.50.129 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
а что это за казахский ip?
Перед тем, как создать тему, посетите раздел ->ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ<-

xxxUnReaLxxx
Сообщения: 3
Зарегистрирован: 20 мар 2012, 23:22

Re: Разрывы связи (disconnection)

Сообщение xxxUnReaLxxx » 01 апр 2012, 22:53

без понятия.. что то я совсем не могу разобраться с этим логом...
Apr 1 22:51:30 user warn kernel: 94.231.166.118 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Apr 1 22:51:33 user warn kernel: 94.231.166.118 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
Apr 1 22:51:39 user warn kernel: 94.231.166.118 sent an invalid ICMP type 3, code 0 error to a broadcast: 0.0.0.0 on ppp_0_0_35_1
как раз во время обрыва
Jan 1 00:00:17 syslog emerg BCM96345 started: BusyBox v1.00 (2010.12.27-08:47+0000)
Jan 1 00:00:17 user warn kernel: Linux version 2.6.8.1 (yangxu@rd3linux.tplink) (gcc version 3.4.2) #1 Mon Dec 27 16:43:59 CST 2010
Jan 1 00:00:17 user warn kernel: Serial flash device: name S25FL032A, id 0x0115, size 4096KB
Jan 1 00:00:17 user warn kernel: 96338L-2M-8M prom init
Jan 1 00:00:17 user warn kernel: CPU revision is: 00029010
Jan 1 00:00:17 user warn kernel: Determined physical RAM map:
Jan 1 00:00:17 user warn kernel: memory: 00fa0000 @ 00000000 (usable)
Jan 1 00:00:17 user warn kernel: Built 1 zonelists
Jan 1 00:00:17 user warn kernel: Kernel command line: root=31:0 ro noinitrd console=ttyS0,115200
Jan 1 00:00:17 user warn kernel: brcm mips: enabling icache and dcache...
Jan 1 00:00:17 user warn kernel: Primary instruction cache 16kB, physically tagged, 2-way, linesize 16 bytes.
Jan 1 00:00:17 user warn kernel: Primary data cache 8kB 2-way, linesize 16 bytes.
Jan 1 00:00:17 user warn kernel: PID hash table entries: 64 (order 6: 512 bytes)
Jan 1 00:00:17 user warn kernel: Using 120.000 MHz high precision timer.
Jan 1 00:00:17 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)
Jan 1 00:00:17 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)
Jan 1 00:00:17 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80e00000 ... 0x80f00000>
Jan 1 00:00:17 user warn kernel: Calibrating delay loop... 239.20 BogoMIPS
Jan 1 00:00:17 user warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
Jan 1 00:00:17 user warn kernel: Checking for 'wait' instruction... unavailable.
Jan 1 00:00:17 user warn kernel: Total Flash size: 4096K with 64 sectors
Jan 1 00:00:17 user warn kernel: File system address: 0xbfc10100
Jan 1 00:00:17 user warn kernel: Can't analyze prologue code at 80177cf4
Jan 1 00:00:17 user warn kernel: Using noop io scheduler
Jan 1 00:00:17 user warn kernel: bcm963xx_mtd driver v1.0
Jan 1 00:00:17 user warn kernel: brcmboard: brcm_board_init entry
Jan 1 00:00:17 user warn kernel: ttyS0 at MMIO 0xfffe0300 (irq = 10) is a BCM63XX
Jan 1 00:00:17 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan 1 00:00:17 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Jan 1 00:00:17 user warn kernel: atmapi: module license 'Proprietary' taints kernel.
Jan 1 00:00:17 user warn kernel: adsl: adsl_init entry
Jan 1 00:00:17 user warn kernel: blaadd: blaa_detect entry
Jan 1 00:00:17 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3 Dec 27 2010 16:42:37
Jan 1 00:00:17 user warn kernel: Config Internal PHY Through MDIO
Jan 1 00:00:17 user warn kernel: mii_manconfig
Jan 1 00:00:17 user warn kernel: work in mdi mode
Jan 1 00:00:17 user warn kernel: force to 100BASE-X
Jan 1 00:00:17 user warn kernel: eth0: MAC Address: F8:D1:11:31:6E:E8
Jan 1 00:00:17 user crit kernel: eth0 Link UP.
Jan 1 00:00:17 user warn kernel: BcmAdsl_Initialize=0xC00613C8, g_pFnNotifyCallback=0xC007A274
Jan 1 00:00:17 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:17 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x0 0x0
Jan 1 00:00:17 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FFD3D4
Jan 1 00:00:17 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:17 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:17 user warn kernel: ATM proc init !!!
Jan 1 00:00:17 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:17 user warn kernel: ip_conntrack version 2.1 (125 buckets, 0 max) - 392 bytes per conntrack
Jan 1 00:00:17 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 00:00:17 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 00:00:17 user crit kernel: ADSL G.994 training
Jan 1 00:00:17 user warn kernel: ip_ct_h323: init success
Jan 1 00:00:17 user warn kernel: ip_nat_h323: init success
Jan 1 00:00:17 user warn kernel: BRCM NAT Caching v0.1 Jul 3 2007 10:16:19
Jan 1 00:00:17 user warn kernel: BRCM NAT Cache: Hooking hit function @ c004ec48
Jan 1 00:00:17 user warn kernel: ip_conntrack_rtsp v0.01 loading
Jan 1 00:00:17 user warn kernel: ip_nat_rtsp v0.01 loading
Jan 1 00:00:17 user crit kernel: ADSL G.992 started
Jan 1 00:00:20 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:26 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:27 user crit kernel: ADSL link down

denis777
Сообщения: 1
Зарегистрирован: 22 апр 2013, 16:10
Страна: Россия

Re: Разрывы связи (disconnection)

Сообщение denis777 » 22 апр 2013, 16:16

1. W8950ND v1 00000001
2. 1.2.9 build 110106 Rel.59540n
3. Россия
4. Авангард ADSL
5. PPPoE
6. Скорость по тарифу = 10 мб
7. Подключение с компьютерами один по wi-fi, один по LAN?

Далее лучше опишу своими словами.
Когда подключен один комп - все нормально летает.
Но когда подключается второй (один по лан, второй wi-fi) - оба начинают хромать. то у одного интрнет оборвется, то у второго, и скорость тоже скачет.
В чем может быть проблема?

zaero
Сообщения: 1
Зарегистрирован: 28 сен 2013, 01:02
Страна: Украина

Re: Разрывы связи (disconnection)

Сообщение zaero » 28 сен 2013, 01:14

1. TD-W8950ND V2
2. 1.0.1 Build 130503 Rel.9932
3. Украина
4. Vega (Одесса)
5. PPOE
6. Скорость по тарифу 8мб\сек.
7. Lan
8. Систематический. Может каждую секунду или каждую минуту или раз в 10 минут, но не реже.
9. Да
10. На роутере.
11. нет, модем D-Link 500T работает нормально
Date/Time Facility Severity Message
Jan 1 01:43:04 daemon info racoon: INFO: @(#)ipsec-tools 0.8.0 (http://ipsec-tools.sourceforge.net)
Jan 1 01:43:04 daemon info racoon: INFO: @(#)This product linked OpenSSL 0.9.7f 22 Mar 2005 (http://www.openssl.org/)
Jan 1 01:43:04 daemon info racoon: INFO: Reading configuration from "/var/ipsec/racoon.conf"
Jan 1 01:43:05 daemon info racoon: INFO: 192.168.1.1[500] used as isakmp port (fd=7)
Jan 1 01:43:05 daemon info racoon: INFO: 93.88.54.243[500] used as isakmp port (fd=8)
Jan 1 01:43:05 daemon info racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=9)
Jan 1 01:43:05 daemon info racoon: INFO: 127.0.0.0[500] used as isakmp port (fd=10)
Jan 1 01:43:05 user debug kernel: atm0.1: no IPv6 routers present
Jan 1 01:43:05 user debug kernel: atm1.1: no IPv6 routers present
Jan 1 01:43:08 daemon crit syslog: Clear IP addresses. PPP connection DOWN.
Jan 1 01:43:10 daemon crit syslog: Clear IP addresses. Connection DOWN.
Jan 1 01:43:10 user notice dnsprobe[18481]: dnsprobe started!
Jan 1 01:43:10 user warn dnsprobe[18481]: No Primary DNS server found
Jan 1 01:43:10 user info kernel: device atm1.1 left promiscuous mode
Jan 1 01:43:10 user info kernel: device atm1 left promiscuous mode
Jan 1 01:43:10 user info kernel: br0: port 6(atm1.1) entering disabled state
Jan 1 01:43:16 user crit kernel: Line 0: ADSL link down
Jan 1 01:43:16 user warn kernel: bcmxtmcfg: XTM Link Information, port = 0, State = DOWN, Service Support = ATM
Jan 1 01:43:16 user warn kernel: HOST XTM Tx ch 0 down success
Jan 1 01:43:16 user warn kernel: bcmxtmcfg: Connection DOWN, LinkActiveStatus=0x0
Jan 1 01:43:16 user warn kernel: HOST XTM Tx ch 1 down success
Jan 1 01:43:16 user warn kernel: bcmxtmcfg: Connection DOWN, LinkActiveStatus=0x0
Jan 1 01:43:16 user info kernel: device atm0.1 left promiscuous mode
Jan 1 01:43:16 user info kernel: device atm0 left promiscuous mode
Jan 1 01:43:16 user info kernel: br0: port 5(atm0.1) entering disabled state
Jan 1 01:43:18 user crit kernel: Line 0: xDSL G.994 training
Jan 1 01:43:24 user crit kernel: Line 0: ADSL G.992 started
Jan 1 01:43:30 user crit kernel: Line 0: ADSL link down
Jan 1 01:43:30 user warn kernel: bcmxtmcfg: XTM Link Information, port = 0, State = DOWN, Service Support = PTM
Jan 1 01:43:31 user crit kernel: Line 0: xDSL G.994 training
Jan 1 01:43:37 user crit kernel: Line 0: ADSL G.992 started
Jan 1 01:43:38 user warn kernel: BcmAdsl_Initialize=0xC00FDDA0, g_pFnNotifyCallback=0xC012E8A4
Jan 1 01:43:38 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 01:43:39 user crit kernel: Line 0: ADSL link down
Jan 1 01:43:39 user warn kernel: bcmxtmcfg: XTM Link Information, port = 0, State = DOWN, Service Support = PTM
Jan 1 01:43:42 user crit kernel: Line 0: xDSL G.994 training
Jan 1 01:43:43 user crit kernel: Line 0: ADSL G.992 started
Jan 1 01:43:46 user crit kernel: Line 0: ADSL G.992 channel analysis
Jan 1 01:43:50 user crit kernel: Line 0: ADSL G.992 message exchange
Jan 1 01:43:50 user crit kernel: Line 0: ADSL link up, interleaved, us=928, ds=7136
Jan 1 01:43:50 user warn kernel: bcmxtmcfg: XTM Link Information, port = 0, State = UP, Service Support = ATM
Jan 1 01:43:50 user warn kernel: bcmxtmrt: MAC address: 64 66 b3 d1 f4 d4
Jan 1 01:43:50 user warn kernel: [DoCreateDeviceReq.2920]: register_netdev
Jan 1 01:43:50 user warn kernel: [DoCreateDeviceReq.2922]: register_netdev done
Jan 1 01:43:50 user warn kernel: XTM Init: 400 tx BDs at 0xa233e000
Jan 1 01:43:50 user warn kernel: bcmxtmcfg: Connection UP, LinkActiveStatus=0x1, US=928000, DS=7136000
Jan 1 01:43:50 user warn kernel: bcmxtmrt: MAC address: 64 66 b3 d1 f4 d5
Jan 1 01:43:50 user warn kernel: [DoCreateDeviceReq.2920]: register_netdev
Jan 1 01:43:51 user warn kernel: [DoCreateDeviceReq.2922]: register_netdev done
Jan 1 01:43:51 user warn kernel: XTM Init: 400 tx BDs at 0xa290c000
Jan 1 01:43:51 user warn kernel: bcmxtmcfg: Connection UP, LinkActiveStatus=0x1, US=928000, DS=7136000
Jan 1 01:43:51 user warn kernel: netdev path : atm0.1 -> atm0
Jan 1 01:43:51 user warn kernel: BCMVLAN : atm0 mode was set to RG
Jan 1 01:43:51 user info kernel: device atm0.1 entered promiscuous mode
Jan 1 01:43:51 user info kernel: device atm0 entered promiscuous mode
Jan 1 01:43:51 user info kernel: br0: port 5(atm0.1) entering forwarding state
Jan 1 01:43:51 user info kernel: br0: port 5(atm0.1) entering disabled state
Jan 1 01:43:51 user info kernel: br0: port 1(eth0) entering disabled state
Jan 1 01:43:51 user info kernel: br0: port 5(atm0.1) entering forwarding state
Jan 1 01:43:51 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 01:43:52 user warn kernel: netdev path : atm1.1 -> atm1
Jan 1 01:43:52 user warn kernel: BCMVLAN : atm1 mode was set to RG
Jan 1 01:43:52 user info kernel: device atm1.1 entered promiscuous mode
Jan 1 01:43:52 user info kernel: device atm1 entered promiscuous mode
Jan 1 01:43:52 user info kernel: br0: port 6(atm1.1) entering forwarding state
Jan 1 01:43:52 daemon notice syslog: pppd 2.4.1 started by admin, uid 0
Jan 1 01:43:52 daemon notice syslog: PPP: Start to connect ...
Jan 1 01:43:53 daemon crit syslog: PPP server detected.
Jan 1 01:43:53 daemon crit syslog: PPP session established.
Jan 1 01:43:53 user warn kernel: netdev path : ppp0.1 -> atm1.1 -> atm1
Jan 1 01:43:57 daemon crit syslog: PPP LCP UP.
Jan 1 01:43:57 daemon crit syslog: Received valid IP address from server. Connection UP.
Jan 1 01:43:59 user notice dnsprobe[18956]: dnsprobe started!
Jan 1 01:44:00 daemon info racoon: INFO: @(#)ipsec-tools 0.8.0 (http://ipsec-tools.sourceforge.net)
Jan 1 01:44:00 daemon info racoon: INFO: @(#)This product linked OpenSSL 0.9.7f 22 Mar 2005 (http://www.openssl.org/)
Jan 1 01:44:00 daemon info racoon: INFO: Reading configuration from "/var/ipsec/racoon.conf"
Jan 1 01:44:00 daemon info racoon: INFO: 192.168.1.1[500] used as isakmp port (fd=7)
Jan 1 01:44:00 daemon info racoon: INFO: 93.88.54.243[500] used as isakmp port (fd=8)
Jan 1 01:44:00 daemon info racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=9)
Jan 1 01:44:00 daemon info racoon: INFO: 127.0.0.0[500] used as isakmp port (fd=10)
Jan 1 01:44:00 user debug kernel: atm0: no IPv6 routers present
Jan 1 01:44:01 user debug kernel: atm1: no IPv6 routers present
Jan 1 01:44:01 user debug kernel: atm0.1: no IPv6 routers present
Jan 1 01:44:02 user debug kernel: atm1.1: no IPv6 routers present
Jan 1 01:44:03 daemon crit syslog: Clear IP addresses. PPP connection DOWN.
Jan 1 01:44:05 daemon crit syslog: Clear IP addresses. Connection DOWN.
Jan 1 01:44:05 user notice dnsprobe[19672]: dnsprobe started!
Jan 1 01:44:05 user warn dnsprobe[19672]: No Primary DNS server found
Jan 1 01:44:06 user info kernel: device atm1.1 left promiscuous mode
Jan 1 01:44:06 user info kernel: device atm1 left promiscuous mode
Jan 1 01:44:06 user info kernel: br0: port 6(atm1.1) entering disabled state
Jan 1 01:44:11 daemon notice syslog: PPP: Start to connect ...
Jan 1 01:44:12 daemon crit syslog: PPP server detected.
Jan 1 01:44:12 daemon crit syslog: PPP session established.
Jan 1 01:44:12 user warn kernel: netdev path : ppp0.1 -> atm1.1 -> atm1
Jan 1 01:44:17 daemon crit syslog: PPP LCP UP.
Jan 1 01:44:17 daemon crit syslog: Received valid IP address from server. Connection UP.
Jan 1 01:44:19 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=178.221.139.111 DST=93.88.54.243 LEN=48 TOS=0x1C PREC=0xE0 TTL=119 ID=15484 DF PROTO=TCP SPT=64165 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:44:19 user notice dnsprobe[19816]: dnsprobe started!
Jan 1 01:44:20 daemon info racoon: INFO: @(#)ipsec-tools 0.8.0 (http://ipsec-tools.sourceforge.net)
Jan 1 01:44:20 daemon info racoon: INFO: @(#)This product linked OpenSSL 0.9.7f 22 Mar 2005 (http://www.openssl.org/)
Jan 1 01:44:20 daemon info racoon: INFO: Reading configuration from "/var/ipsec/racoon.conf"
Jan 1 01:44:20 daemon info racoon: INFO: 192.168.1.1[500] used as isakmp port (fd=7)
Jan 1 01:44:20 daemon info racoon: INFO: 93.88.54.243[500] used as isakmp port (fd=8)
Jan 1 01:44:20 daemon info racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=9)
Jan 1 01:44:20 daemon info racoon: INFO: 127.0.0.0[500] used as isakmp port (fd=10)
Jan 1 01:44:22 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=178.221.139.111 DST=93.88.54.243 LEN=48 TOS=0x1C PREC=0xE0 TTL=119 ID=15732 DF PROTO=TCP SPT=64165 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:44:28 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=178.221.139.111 DST=93.88.54.243 LEN=48 TOS=0x1C PREC=0xE0 TTL=119 ID=16219 DF PROTO=TCP SPT=64165 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:44:52 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=80.248.73.98 DST=93.88.54.243 LEN=52 TOS=0x04 PREC=0x80 TTL=110 ID=6923 DF PROTO=TCP SPT=50485 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:44:54 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=202.160.18.63 DST=93.88.54.243 LEN=52 TOS=0x04 PREC=0x80 TTL=116 ID=26355 DF PROTO=TCP SPT=50938 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:44:55 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=80.248.73.98 DST=93.88.54.243 LEN=52 TOS=0x04 PREC=0x80 TTL=110 ID=7071 DF PROTO=TCP SPT=50485 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:47:12 daemon crit syslog: Clear IP addresses. PPP connection DOWN.
Jan 1 01:47:12 daemon crit syslog: Clear IP addresses. Connection DOWN.
Jan 1 01:47:13 daemon notice syslog: ppp: ppp0.1 is closed now.
Jan 1 01:47:13 daemon info syslog: Exit.
Jan 1 01:47:17 user warn kernel: netdev path : atm1.1 -> atm1
Jan 1 01:47:17 user warn kernel: BCMVLAN : atm1 mode was set to RG
Jan 1 01:47:17 user info kernel: device atm1.1 entered promiscuous mode
Jan 1 01:47:17 user info kernel: device atm1 entered promiscuous mode
Jan 1 01:47:17 user info kernel: br0: port 6(atm1.1) entering forwarding state
Jan 1 01:47:17 daemon notice syslog: pppd 2.4.1 started by admin, uid 0
Jan 1 01:47:17 daemon notice syslog: PPP: Start to connect ...
Jan 1 01:47:18 daemon crit syslog: PPP server detected.
Jan 1 01:47:18 daemon crit syslog: PPP session established.
Jan 1 01:47:18 user warn kernel: netdev path : ppp0.1 -> atm1.1 -> atm1
Jan 1 01:47:23 daemon crit syslog: PPP LCP UP.
Jan 1 01:47:24 daemon info racoon: INFO: 93.88.54.243[500] used as isakmp port (fd=8)
Jan 1 01:47:25 daemon crit syslog: Received valid IP address from server. Connection UP.
Jan 1 01:47:26 daemon info racoon: INFO: unsupported PF_KEY message REGISTER
Jan 1 01:47:27 user debug kernel: atm1.1: no IPv6 routers present
Jan 1 01:47:36 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=197.0.223.203 DST=93.88.54.243 LEN=52 TOS=0x04 PREC=0x80 TTL=111 ID=24893 DF PROTO=TCP SPT=63573 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:47:39 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=197.0.223.203 DST=93.88.54.243 LEN=52 TOS=0x04 PREC=0x80 TTL=111 ID=25090 DF PROTO=TCP SPT=63573 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:47:45 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=197.0.223.203 DST=93.88.54.243 LEN=48 TOS=0x04 PREC=0x80 TTL=111 ID=25595 DF PROTO=TCP SPT=63573 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:47:48 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=202.160.18.63 DST=93.88.54.243 LEN=52 TOS=0x04 PREC=0x80 TTL=116 ID=29643 DF PROTO=TCP SPT=49477 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:47:51 user alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=202.160.18.63 DST=93.88.54.243 LEN=52 TOS=0x04 PREC=0x80 TTL=116 ID=29862 DF PROTO=TCP SPT=49477 DPT=51413 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Jan 1 01:54:42 user warn dnsprobe[19816]: dns query failed
Jan 1 01:54:44 user warn dnsprobe[19816]: dns query failed
Jan 1 01:54:46 user warn dnsprobe[19816]: dns query failed
Jan 1 01:54:46 user notice dnsprobe[19816]: Primary DNS server Is Down... Switching To Secondary DNS server
Jan 1 01:55:18 user warn dnsprobe[19816]: dns query failed
Jan 1 01:55:20 user warn dnsprobe[19816]: dns query failed
Jan 1 01:55:22 user warn dnsprobe[19816]: dns query failed
Jan 1 01:55:30 user warn kernel: bcmxtmcfg: OAM loopback response not received on VCC 1.8.3
Jan 1 01:55:31 user warn kernel: bcmxtmcfg: OAM loopback response not received on VCC 1.8.35
Jan 1 01:55:32 user warn kernel: bcmxtmcfg: OAM loopback response not received on VCC 1.8.4
Jan 1 01:55:33 user warn kernel: bcmxtmcfg: OAM loopback response not received on VCC 1.8.35
Jan 1 01:55:54 user warn dnsprobe[19816]: dns query failed
Jan 1 01:55:56 user warn dnsprobe[19816]: dns query failed
Jan 1 01:55:58 user warn dnsprobe[19816]: dns query failed
Jan 1 01:56:30 user warn dnsprobe[19816]: dns query failed
Jan 1 01:56:32 user warn dnsprobe[19816]: dns query failed
Jan 1 01:56:34 user warn dnsprobe[19816]: dns query failed
Jan 1 01:57:06 user warn dnsprobe[19816]: dns query failed
Jan 1 01:57:08 user warn dnsprobe[19816]: dns query failed
Jan 1 01:57:10 user warn dnsprobe[19816]: dns query failed
Jan 1 01:57:42 user warn dnsprobe[19816]: dns query failed
Jan 1 01:57:44 user warn dnsprobe[19816]: dns query failed
Jan 1 01:57:46 user warn dnsprobe[19816]: dns query failed
Jan 1 01:58:18 user warn dnsprobe[19816]: dns query failed
Jan 1 01:58:20 user warn dnsprobe[19816]: dns query failed
Jan 1 01:58:22 user warn dnsprobe[19816]: dns query failed
Jan 1 01:58:55 user warn dnsprobe[19816]: dns query failed
Jan 1 01:58:55 daemon crit syslog: Clear IP addresses. PPP connection DOWN.
Jan 1 01:58:55 daemon crit syslog: Clear IP addresses. Connection DOWN.
Jan 1 01:58:55 user notice dnsprobe[21242]: dnsprobe started!
Jan 1 01:58:55 user warn dnsprobe[21242]: No Primary DNS server found
Jan 1 01:58:55 user info kernel: device atm1.1 left promiscuous mode
Jan 1 01:58:55 user info kernel: device atm1 left promiscuous mode
Jan 1 01:58:55 user info kernel: br0: port 6(atm1.1) entering disabled state

Ответить

Вернуться в «TD-W8950ND»