нестабильное соединение ADSL

Беспроводной маршрутизатор со встроенным модемом ADSL 2+ серии N, до 300Мбит/с с поддержкой USB
Ответить
aleksandr.kustov
Сообщения: 3
Зарегистрирован: 03 авг 2017, 13:54

нестабильное соединение ADSL

Сообщение aleksandr.kustov » 29 сен 2017, 21:01

Название темы: нестабильное соединение ADSL
Аппаратная версия устройства: ver. 4.0
Версия встроенного ПО: 1.0.5 Build 160309 Rel.62287
Провайдер: Ростелеком
VPI, VCI по договору с провайдером: VPI-60, VCI-67
Логи оборудования: Jan 1 00:00:35 daemon warn kernel: [DoCreateDeviceReq.3089]: register_netdev done
Jan 1 00:00:35 daemon warn kernel: bcmxtmcfg: Reserve ATM vcid=0 port=0
Jan 1 00:00:35 daemon warn kernel: bcmxtmcfg: Reserve TxQueueIdx=0 for vcid 0
Jan 1 00:00:35 daemon warn kernel: XTM Init: Ch:0 - 400 tx BDs at 0xa1828000
Jan 1 00:00:35 daemon warn kernel: bcmxtmcfg: Connection UP, LinkActiveStatus=0x1, US=637000, DS=6144000
Jan 1 00:00:35 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:35 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:35 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:35 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:35 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:35 daemon warn kernel: netdev path : atm0.1 -> atm0
Jan 1 00:00:35 daemon warn kernel: BCMVLAN : atm0 mode was set to RG
Jan 1 00:00:36 daemon notice syslog: ***In initPPPoE Set -z
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon info kernel: device atm0.1 entered promiscuous mode
Jan 1 00:00:36 daemon info kernel: device atm0 entered promiscuous mode
Jan 1 00:00:36 daemon info kernel: br0: port 6(atm0.1) entering forwarding state
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon err pptp: Couldn't stat /dev/-c: No such file or directory
Jan 1 00:00:36 daemon err pptp: unrecognized option '-c'
Jan 1 00:00:36 daemon notice pptp: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:36 daemon notice pptp: PPP: Start to connect ...
Jan 1 00:00:37 daemon crit pptp: PPP server detected.
Jan 1 00:00:37 daemon crit pptp: PPP session established.
Jan 1 00:00:37 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:37 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:37 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:37 daemon warn kernel: netdev path : ppp0.1 -> atm0.1 -> atm0
Jan 1 00:00:37 daemon crit pptp: Using interface ppp0.1
Jan 1 00:00:37 daemon crit pptp: Connect: ppp0.1 <--> atm0.1
Jan 1 00:00:38 daemon crit pptp: PPP LCP UP.
Jan 1 00:00:38 daemon warn radvd[889]: received RS from fe80::8a70:8cff:fe14:c676
Jan 1 00:00:38 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:38 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:38 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:38 daemon crit pptp: Received valid IP address from server. Connection UP.
Jan 1 00:00:40 daemon warn kernel: bcmxtmcfg: Reserve TxQueueIdx=1 for vcid 0
Jan 1 00:00:40 daemon warn kernel: bcmxtmcfg: Reserve MP group=0 priority=0 weight=1
Jan 1 00:00:40 daemon warn kernel: XTM Init: Ch:1 - 400 tx BDs at 0xa378c000
Jan 1 00:00:42 daemon info racoon: INFO: @(#)ipsec-tools 0.8.0 (http://ipsec-tools.sourceforge.net)
Jan 1 00:00:42 daemon info racoon: INFO: @(#)This product linked OpenSSL 0.9.7f 22 Mar 2005 (http://www.openssl.org/)
Jan 1 00:00:42 daemon info racoon: INFO: Reading configuration from "/var/ipsec/racoon.conf"
Jan 1 00:00:42 daemon warn radvd[889]: received RS from fe80::8a70:8cff:fe14:c676
Jan 1 00:00:42 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:42 daemon info racoon: INFO: 192.168.1.1[500] used as isakmp port (fd=7)
Jan 1 00:00:42 daemon info racoon: INFO: 5.139.149.243[500] used as isakmp port (fd=8)
Jan 1 00:00:42 daemon info racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=9)
Jan 1 00:00:42 daemon info racoon: INFO: 127.0.0.0[500] used as isakmp port (fd=10)
Jan 1 00:00:47 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:47 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:47 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:21:15 daemon warn radvd[889]: received RS from fe80::2acc:1ff:fe15:24da
Sep 29 19:21:22 daemon warn radvd[889]: received RS from fe80::2acc:1ff:fe15:24da
Sep 29 19:21:36 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=5.188.10.176 DST=5.139.149.243 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=11783 DF PROTO=TCP SPT=49026 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:21:37 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=5.188.10.176 DST=5.139.149.243 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=11784 DF PROTO=TCP SPT=49026 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:21:39 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=5.188.10.176 DST=5.139.149.243 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=11785 DF PROTO=TCP SPT=49026 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:21:43 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=5.188.10.176 DST=5.139.149.243 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=11786 DF PROTO=TCP SPT=49026 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:21:55 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=5.139.86.211 DST=5.139.149.243 LEN=52 TOS=0x00 PREC=0x00 TTL=59 ID=14615 DF PROTO=TCP SPT=56854 DPT=28222 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:25:41 daemon crit kernel: eth0 Link UP 100 mbps full duplex
Sep 29 19:25:41 daemon info kernel: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Sep 29 19:25:41 daemon info kernel: br0: port 1(eth0) entering forwarding state
Sep 29 19:25:41 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:41 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:41 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:25:41 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:41 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:41 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:25:51 daemon crit kernel: eth0 Link DOWN.
Sep 29 19:25:51 daemon info kernel: br0: port 1(eth0) entering disabled state
Sep 29 19:25:51 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:51 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:51 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:25:51 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:51 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:51 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:25:54 daemon crit kernel: eth0 Link UP 100 mbps full duplex
Sep 29 19:25:54 daemon info kernel: br0: port 1(eth0) entering forwarding state
Sep 29 19:25:54 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:54 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:54 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:25:54 daemon info radvd[889]: attempting to reread config file
Sep 29 19:25:54 daemon info radvd[889]: resuming normal operation
Sep 29 19:25:54 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:26:10 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:26:26 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:26:42 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:31:43 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=77.222.98.45 DST=5.139.149.243 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=3698 DF PROTO=TCP SPT=51370 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:36:10 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:42:54 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=45.77.79.166 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=36784 PROTO=TCP SPT=43171 DPT=53398 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:44:05 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:48:40 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 19:52:14 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=114.69.249.206 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=54 ID=7426 PROTO=TCP SPT=44600 DPT=23 WINDOW=16584 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 19:56:39 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:01:01 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:01:59 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=94.74.81.97 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=32210 PROTO=TCP SPT=42715 DPT=3128 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 20:09:28 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:12:52 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=95.85.2.83 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=1952 PROTO=TCP SPT=40413 DPT=3534 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 20:13:01 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:17:14 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:22:19 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=113.106.202.61 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=106 ID=256 PROTO=TCP SPT=6000 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 20:24:07 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 20:31:43 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=185.130.212.19 DST=5.139.149.243 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=48744 DF PROTO=TCP SPT=2 DPT=30010 WINDOW=512 RES=0x00 SYN URGP=0 MARK=0x8000000
Описание проблемы: на волне вирусной эпидемии на старых моделях приобрел td-w8968 ver. 4.0. работа устройства не радует, кроме слабого по мощности wi-fi, идут частые разрывы соединения по линии ADSL: час -два держит стабильно, затем в течении 5-10 минут наблюдаются кратковременные разрывы-переподключения со сменой внешнего WanIP, системный журнал красный. Ростелеkомовские спецы перенастраивали - часа четыре держал, затем проблема стала повторятся, снова дал заявку, но спецы предполагают проблему с модемом. Линия вроде неплохая:
Режим: ADSL_2plus
Тип трафика: ATM
Состояние питания соединения: L0
Входящая Исходящая
Соотношение сигнала к шуму (0.1 dB): 310 170
затухание (0.1 dB): 160 68
Выходная Мощность (0.1 dBm): 232 104
Допустимая частота (Kbps): 20,324 736
Rate (Kbps): 6,144 637

присоединяю лог журнала через два часа, модем за это время не отключался, но произошло несколько разрывов, IP изменился:
Sep 29 21:41:29 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=201.143.32.110 DST=46.61.33.218 LEN=52 TOS=0x00 PREC=0x00 TTL=108 ID=25011 DF PROTO=TCP SPT=57340 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 21:41:30 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:41:30 daemon crit kernel: eth0 Link DOWN.
Sep 29 21:41:30 daemon info kernel: br0: port 1(eth0) entering disabled state
Sep 29 21:41:30 daemon info radvd[889]: attempting to reread config file
Sep 29 21:41:30 daemon info radvd[889]: resuming normal operation
Sep 29 21:41:30 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:41:30 daemon info radvd[889]: attempting to reread config file
Sep 29 21:41:30 daemon info radvd[889]: resuming normal operation
Sep 29 21:41:30 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:41:32 daemon crit kernel: eth0 Link UP 100 mbps full duplex
Sep 29 21:41:32 daemon info kernel: br0: port 1(eth0) entering forwarding state
Sep 29 21:41:32 daemon info radvd[889]: attempting to reread config file
Sep 29 21:41:32 daemon info radvd[889]: resuming normal operation
Sep 29 21:41:32 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:41:32 daemon info radvd[889]: attempting to reread config file
Sep 29 21:41:32 daemon info radvd[889]: resuming normal operation
Sep 29 21:41:32 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:41:41 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=128.199.42.134 DST=46.61.33.218 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=49615 PROTO=TCP SPT=43348 DPT=6861 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 21:41:48 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:42:04 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:42:20 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Sep 29 21:42:30 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=185.130.212.4 DST=46.61.33.218 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=20525 DF PROTO=TCP SPT=1 DPT=83 WINDOW=512 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 21:43:32 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=120.198.118.38 DST=46.61.33.218 LEN=44 TOS=0x04 PREC=0x00 TTL=234 ID=50421 PROTO=TCP SPT=52695 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x8000000
Sep 29 21:43:54 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=46.101.97.51 DST=46.61.33.218 LEN=40 TOS=0x00 PREC=0x00 TTL=23 ID=26437 PROTO=TCP SPT=3389 DPT=3389 WINDOW=50723 RES=0x00 SYN URGP=50723 MARK=0x8000000
Sep 29 21:46:34 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
что посоветуете ?

Ame
Модератор
Модератор
Сообщения: 361
Зарегистрирован: 07 апр 2014, 11:41
Страна: Москва

Re: нестабильное соединение ADSL

Сообщение Ame » 30 сен 2017, 18:46

А что происходит с индикацией когда прерывается соединение ? Индикатор adsl гаснет ? так же меняются ли отношение сигнал шум и затухание в данный момент ?

Для проверки работоспособности данного роутера , модно попробовать его подключить например у друзей и посмотреть есть ли подобное в его поведении

aleksandr.kustov
Сообщения: 3
Зарегистрирован: 03 авг 2017, 13:54

Re: нестабильное соединение ADSL

Сообщение aleksandr.kustov » 30 сен 2017, 20:23

Отклонений в индикации не заметил пока, может быть из-за того, что разрывы происходят в течении 2-3 сек.? показатели линии тоже особенно не меняются в сторону ухудшения:
Режим: ADSL_2plus
Тип трафика: ATM
Состояние питания соединения: L0
Входящая Исходящая
Соотношение сигнала к шуму (0.1 dB): 298 95
затухание (0.1 dB): 160 68
Выходная Мощность (0.1 dBm): 207 104
Допустимая частота (Kbps): 23,988 992
В 16.00 позвонили из Ростелеkом, они что-то сделали на своей стороне и до 20.00 мы мониторили, но проблема осталась. Объясните, это нормально? - когда открываю системный журнал, то логи начинаются с Jan 1, 00ч:00мин..? и только потом начинаются записи с датой, согласно реальному времени; только два-три раза видел, что записи логов шли начинаясь реальным временем:
Время Facility Важность Уведомление
Jan 1 00:00:21 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:22 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:22 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:22 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:22 daemon alert kernel: INFO1586: Bind to br0
Jan 1 00:00:22 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:22 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:22 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:22 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:22 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:22 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:22 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:22 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:22 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:22 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:22 daemon info kernel: br0: port 5(wl0) entering disabled state
Jan 1 00:00:22 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:22 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:22 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:22 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:22 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:22 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:22 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:22 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:22 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:22 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:22 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:22 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:22 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:22 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:22 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:22 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:22 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:23 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:23 daemon info kernel: device wl0 left promiscuous mode
Jan 1 00:00:23 daemon info kernel: br0: port 5(wl0) entering disabled state
Jan 1 00:00:23 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:23 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:23 daemon info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:23 daemon info radvd[829]: attempting to reread config file
Jan 1 00:00:23 daemon info radvd[829]: resuming normal operation
Jan 1 00:00:23 daemon warn radvd[829]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:23 daemon warn radvd[829]: poll error: Interrupted system call
Jan 1 00:00:23 daemon warn radvd[829]: Exiting, sigterm received.
Jan 1 00:00:23 daemon info radvd[889]: version 1.8 started
Jan 1 00:00:23 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:23 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:23 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:23 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:23 daemon info kernel: br0: port 5(wl0) entering forwarding state
Jan 1 00:00:23 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:23 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:23 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:24 daemon crit kernel: Line 0: ADSL G.992 started
Jan 1 00:00:28 daemon crit kernel: Line 0: ADSL G.992 channel analysis
Jan 1 00:00:34 daemon warn radvd[889]: received RS from fe80::3aa4:edff:fe14:fe2b
Jan 1 00:00:34 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:34 daemon warn radvd[889]: received RS from fe80::2acc:1ff:fe15:24da
Jan 1 00:00:35 daemon crit kernel: Line 0: ADSL link up, Bearer 0, us=892, ds=6144
Jan 1 00:00:35 daemon warn kernel: bcmxtmcfg: XTM Link Information, port = 0, State = UP, Service Support = ATM
Jan 1 00:00:35 daemon warn kernel: bcmxtmcfg: ReconfigureSAR port 0 traffictype 1
Jan 1 00:00:35 daemon warn kernel: bcmxtmcfg: Normal(XTM/PTM) Mode enabled
Jan 1 00:00:35 daemon warn kernel: TxLineRateTimer=59438
Jan 1 00:00:35 daemon warn kernel: bcmxtmrt: MAC address: 18 d6 c7 80 cb 56
Jan 1 00:00:35 daemon warn kernel: [DoCreateDeviceReq.3087]: register_netdev
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon warn kernel: [DoCreateDeviceReq.3089]: register_netdev done
Jan 1 00:00:36 daemon warn kernel: bcmxtmcfg: Reserve ATM vcid=0 port=0
Jan 1 00:00:36 daemon warn kernel: bcmxtmcfg: Reserve TxQueueIdx=0 for vcid 0
Jan 1 00:00:36 daemon warn kernel: XTM Init: Ch:0 - 400 tx BDs at 0xa1828000
Jan 1 00:00:36 daemon warn kernel: bcmxtmcfg: Connection UP, LinkActiveStatus=0x1, US=892000, DS=6144000
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon notice syslog: ***In initPPPoE Set -z
Jan 1 00:00:36 daemon warn kernel: netdev path : atm0.1 -> atm0
Jan 1 00:00:36 daemon warn kernel: BCMVLAN : atm0 mode was set to RG
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info kernel: device atm0.1 entered promiscuous mode
Jan 1 00:00:36 daemon info kernel: device atm0 entered promiscuous mode
Jan 1 00:00:36 daemon info kernel: br0: port 6(atm0.1) entering forwarding state
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:36 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:36 daemon err pptp: Couldn't stat /dev/-c: No such file or directory
Jan 1 00:00:36 daemon err pptp: unrecognized option '-c'
Jan 1 00:00:36 daemon notice pptp: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:36 daemon notice pptp: PPP: Start to connect ...
Jan 1 00:00:37 daemon crit pptp: PPP server detected.
Jan 1 00:00:37 daemon crit pptp: PPP session established.
Jan 1 00:00:37 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:37 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:37 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:37 daemon warn kernel: netdev path : ppp0.1 -> atm0.1 -> atm0
Jan 1 00:00:37 daemon crit pptp: Using interface ppp0.1
Jan 1 00:00:37 daemon crit pptp: Connect: ppp0.1 <--> atm0.1
Jan 1 00:00:38 daemon crit pptp: PPP LCP UP.
Jan 1 00:00:38 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:38 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:38 daemon warn radvd[889]: received RS from fe80::2acc:1ff:fe15:24da
Jan 1 00:00:38 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:39 daemon crit pptp: Received valid IP address from server. Connection UP.
Jan 1 00:00:41 daemon warn kernel: bcmxtmcfg: Reserve TxQueueIdx=1 for vcid 0
Jan 1 00:00:41 daemon warn kernel: bcmxtmcfg: Reserve MP group=0 priority=0 weight=1
Jan 1 00:00:41 daemon warn kernel: XTM Init: Ch:1 - 400 tx BDs at 0xa19c8000
Jan 1 00:00:42 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Jan 1 00:00:42 daemon info racoon: INFO: @(#)ipsec-tools 0.8.0 (http://ipsec-tools.sourceforge.net)
Jan 1 00:00:42 daemon info racoon: INFO: @(#)This product linked OpenSSL 0.9.7f 22 Mar 2005 (http://www.openssl.org/)
Jan 1 00:00:42 daemon info racoon: INFO: Reading configuration from "/var/ipsec/racoon.conf"
Jan 1 00:00:42 daemon info racoon: INFO: 192.168.1.1[500] used as isakmp port (fd=7)
Jan 1 00:00:42 daemon info racoon: INFO: 109.165.72.119[500] used as isakmp port (fd=8)
Jan 1 00:00:42 daemon info racoon: INFO: 127.0.0.1[500] used as isakmp port (fd=9)
Jan 1 00:00:42 daemon info racoon: INFO: 127.0.0.0[500] used as isakmp port (fd=10)
Jan 1 00:00:47 daemon info radvd[889]: attempting to reread config file
Jan 1 00:00:47 daemon info radvd[889]: resuming normal operation
Jan 1 00:00:47 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 14:28:15 daemon warn radvd[889]: received RS from fe80::2acc:1ff:fe15:24da
Oct 1 14:28:36 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=188.32.23.234 DST=109.165.72.119 LEN=64 TOS=0x00 PREC=0x00 TTL=56 ID=8624 DF PROTO=TCP SPT=56468 DPT=6112 WINDOW=65535 RES=0x00 SYN URGP=0 MARK=0x8000000
Oct 1 14:28:37 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=188.32.23.234 DST=109.165.72.119 LEN=64 TOS=0x00 PREC=0x00 TTL=56 ID=52158 DF PROTO=TCP SPT=56468 DPT=6112 WINDOW=65535 RES=0x00 SYN URGP=0 MARK=0x8000000
Oct 1 14:28:38 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=188.32.23.234 DST=109.165.72.119 LEN=64 TOS=0x00 PREC=0x00 TTL=56 ID=38138 DF PROTO=TCP SPT=56468 DPT=6112 WINDOW=65535 RES=0x00 SYN URGP=0 MARK=0x8000000
Oct 1 14:28:39 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=188.32.23.234 DST=109.165.72.119 LEN=64 TOS=0x00 PREC=0x00 TTL=56 ID=61726 DF PROTO=TCP SPT=56468 DPT=6112 WINDOW=65535 RES=0x00 SYN URGP=0 MARK=0x8000000
Oct 1 14:28:40 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=188.32.23.234 DST=109.165.72.119 LEN=64 TOS=0x00 PREC=0x00 TTL=56 ID=44034 DF PROTO=TCP SPT=56468 DPT=6112 WINDOW=65535 RES=0x00 SYN URGP=0 MARK=0x8000000
Oct 1 14:38:36 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=14.199.199.45 DST=109.165.72.119 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=3662 DF PROTO=TCP SPT=60202 DPT=6112 WINDOW=64240 RES=0x00 SYN URGP=0 MARK=0x8000000
Oct 1 14:48:48 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=46.250.82.29 DST=109.165.72.119 LEN=60 TOS=0x00 PREC=0x00 TTL=245 ID=5609 DF PROTO=TCP SPT=61279 DPT=6112 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Oct 1 14:54:35 daemon crit kernel: eth0 Link UP 100 mbps full duplex
Oct 1 14:54:35 daemon info kernel: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct 1 14:54:35 daemon info kernel: br0: port 1(eth0) entering forwarding state
Oct 1 14:54:35 daemon info radvd[889]: attempting to reread config file
Oct 1 14:54:35 daemon info radvd[889]: resuming normal operation
Oct 1 14:54:35 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 14:54:35 daemon info radvd[889]: attempting to reread config file
Oct 1 14:54:36 daemon info radvd[889]: resuming normal operation
Oct 1 14:54:36 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 14:54:47 daemon crit kernel: eth0 Link DOWN.
Oct 1 14:54:47 daemon info kernel: br0: port 1(eth0) entering disabled state
Oct 1 14:54:47 daemon info radvd[889]: attempting to reread config file
Oct 1 14:54:47 daemon info radvd[889]: resuming normal operation
Oct 1 14:54:47 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 14:54:47 daemon info radvd[889]: attempting to reread config file
Oct 1 14:54:47 daemon info radvd[889]: resuming normal operation
Oct 1 14:54:47 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 14:54:49 daemon crit kernel: eth0 Link UP 100 mbps full duplex
Oct 1 14:54:49 daemon info kernel: br0: port 1(eth0) entering forwarding state
Oct 1 14:54:49 daemon info radvd[889]: attempting to reread config file
Oct 1 14:54:49 daemon info radvd[889]: resuming normal operation
Oct 1 14:54:49 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 14:54:49 daemon info radvd[889]: attempting to reread config file
Oct 1 14:54:49 daemon info radvd[889]: resuming normal operation
Oct 1 14:54:49 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 14:55:05 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 14:55:21 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 14:55:37 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 14:58:51 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=94.255.247.18 DST=109.165.72.119 LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=36792 PROTO=TCP SPT=38457 DPT=2323 WINDOW=58951 RES=0x00 SYN URGP=0 MARK=0x8000000
Oct 1 15:02:16 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 15:08:51 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=178.140.2.209 DST=109.165.72.119 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=8011 DF PROTO=TCP SPT=1270 DPT=1234 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Oct 1 15:11:44 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 15:18:40 daemon alert kernel: Intrusion -> IN=ppp0.1 OUT= MAC= SRC=179.104.126.70 DST=109.165.72.119 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=16873 DF PROTO=TCP SPT=51090 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x8000000
Oct 1 15:19:40 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54
Oct 1 15:24:14 daemon warn radvd[889]: received RA from fe80::1ad6:c7ff:fe80:cb54

Alexandr.Kustov
Сообщения: 15
Зарегистрирован: 02 авг 2017, 21:35

Re: нестабильное соединение ADSL

Сообщение Alexandr.Kustov » 21 ноя 2017, 19:50

Проявился еще один "интересный" момент, при выключении компьютера, подключенного к данному устройству сетевым кабелем, роутер перезагружается. Впервые встречаю нечто подобное, как это объясняется? Менял прошивку на эту: 1.0.5 Build 150504 Rel.57027, что не изменило положения и не помогло в решении данной проблемы, так и не улучшило работу устройства в целом. Сканировал различными антивирусными программами, тоже ничего.

Ответить

Вернуться в «TD-W8968»