Alexander Gorelik писал(а):
vas_kib писал(а):
приведу как в след раз оборвется
Предварительно системный лог нужно будет включить и выбрать уровень логирования Debugging.
Для этого в меню
Management > System Log нажмите на кнопку
Configure System Log. На странице выберите:
Log: Enable
Log Level: Debugging
Display Level: Debugging
Mode: Local
После чего нажмите
Save/Apply.
Чтобы посмотреть лог в
Management > System Log нажмите кнопку
View System Log.
System Log
Date/Time Facility Severity Message
Jan 1 00:00:20 user warn kernel: CPU revision is: 00029010
Jan 1 00:00:20 user warn kernel: Determined physical RAM map:
Jan 1 00:00:20 user warn kernel: memory: 007a0000 @ 00000000 (usable)
Jan 1 00:00:20 user debug kernel: On node 0 totalpages: 1952
Jan 1 00:00:20 user debug kernel: DMA zone: 1952 pages, LIFO batch:1
Jan 1 00:00:20 user debug kernel: Normal zone: 0 pages, LIFO batch:1
Jan 1 00:00:20 user debug kernel: HighMem zone: 0 pages, LIFO batch:1
Jan 1 00:00:20 user warn kernel: Built 1 zonelists
Jan 1 00:00:20 user warn kernel: Kernel command line: root=31:0 ro noinitrd console=ttyS0,115200
Jan 1 00:00:20 user warn kernel: brcm mips: enabling icache and dcache...
Jan 1 00:00:20 user warn kernel: Primary instruction cache 16kB, physically tagged, 2-way, linesize 16 bytes.
Jan 1 00:00:20 user warn kernel: Primary data cache 8kB 2-way, linesize 16 bytes.
Jan 1 00:00:20 user warn kernel: PID hash table entries: 32 (order 5: 256 bytes)
Jan 1 00:00:20 user warn kernel: Using 120.000 MHz high precision timer.
Jan 1 00:00:20 user warn kernel: Dentry cache hash table entries: 2048 (order: 1, 8192 bytes)
Jan 1 00:00:20 user warn kernel: Inode-cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:20 user info kernel: Memory: 5800k/7808k available (1441k kernel code, 1988k reserved, 210k data, 68k init, 0k highmem)
Jan 1 00:00:20 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80600000 ... 0x80700000>
Jan 1 00:00:20 user warn kernel: Calibrating delay loop... 239.20 BogoMIPS
Jan 1 00:00:20 user warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
Jan 1 00:00:20 user warn kernel: Checking for 'wait' instruction... unavailable.
Jan 1 00:00:20 user info kernel: NET: Registered protocol family 16
Jan 1 00:00:20 user warn kernel: Total Flash size: 2048K with 512 sectors
Jan 1 00:00:20 user warn kernel: File system address: 0xbfc10100
Jan 1 00:00:20 user warn kernel: Blk# BlkOff Blks MemLen Partition Name
Jan 1 00:00:20 user warn kernel: 0 1408 1 1024 NVRAM
Jan 1 00:00:20 user warn kernel: 498 0 6 24576 Config 2
Jan 1 00:00:20 user warn kernel: 504 0 2 8192 Scratch PAD
Jan 1 00:00:20 user warn kernel: 506 0 6 24576 Config 1
Jan 1 00:00:20 user warn kernel: Can't analyze prologue code at 80176fa4
Jan 1 00:00:20 user info kernel: Initializing Cryptographic API
Jan 1 00:00:20 user info kernel: PPP generic driver version 2.4.2
Jan 1 00:00:20 user info kernel: PPP Deflate Compression module registered
Jan 1 00:00:20 user info kernel: PPP BSD Compression module registered
Jan 1 00:00:20 user info kernel: NET: Registered protocol family 24
Jan 1 00:00:20 user warn kernel: Using noop io scheduler
Jan 1 00:00:20 user warn kernel: bcm963xx_mtd driver v1.0
Jan 1 00:00:20 user warn kernel: brcmboard: brcm_board_init entry
Jan 1 00:00:20 user info kernel: Serial: BCM63XX driver $Revision: 3.00 $
Jan 1 00:00:20 user warn kernel: ttyS0 at MMIO 0xfffe0300 (irq = 10) is a BCM63XX
Jan 1 00:00:20 user info kernel: NET: Registered protocol family 2
Jan 1 00:00:20 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes
Jan 1 00:00:20 user info kernel: TCP: Hash tables configured (established 512 bind 1024)
Jan 1 00:00:20 user info kernel: Initializing IPsec netlink socket
Jan 1 00:00:20 user info kernel: NET: Registered protocol family 1
Jan 1 00:00:20 user info kernel: NET: Registered protocol family 17
Jan 1 00:00:20 user info kernel: NET: Registered protocol family 15
Jan 1 00:00:20 user notice kernel: Ebtables v2.0 registered
Jan 1 00:00:20 user info kernel: NET: Registered protocol family 8
Jan 1 00:00:20 user info kernel: NET: Registered protocol family 20
Jan 1 00:00:20 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan 1 00:00:20 user info kernel: Freeing unused kernel memory: 68k freed
Jan 1 00:00:20 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Jan 1 00:00:20 user warn kernel: atmapi: module license 'Proprietary' taints kernel.
Jan 1 00:00:20 user warn kernel: adsl: adsl_init entry
Jan 1 00:00:20 user warn kernel: blaadd: blaa_detect entry
Jan 1 00:00:20 user info kernel: Broadcom BCMPROCFS v1.0 initialized
Jan 1 00:00:20 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3 May 12 2009 15:58:28
Jan 1 00:00:20 user warn kernel: Config Internal PHY Through MDIO
Jan 1 00:00:20 user info kernel: BCM63xx_ENET: 100 MB Full-Duplex (auto-neg)
Jan 1 00:00:20 user warn kernel: eth0: MAC Address: 00:21:91:C7:F0:90
Jan 1 00:00:20 user crit kernel: eth0 Link UP.
Jan 1 00:00:20 user warn kernel: BcmAdsl_Initialize=0xC00643E8, g_pFnNotifyCallback=0xC007EFE4
Jan 1 00:00:20 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:20 user warn kernel: pSdramPHY=0xA07FFFF8, 0xFBFBFFFF 0xBF77FFBF
Jan 1 00:00:20 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA07EF96C
Jan 1 00:00:20 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:20 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:20 user warn kernel: ATM proc init !!!
Jan 1 00:00:20 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:20 user warn kernel: ip_conntrack version 2.1 (61 buckets, 0 max) - 384 bytes per conntrack
Jan 1 00:00:20 user crit kernel: ADSL G.994 training
Jan 1 00:00:20 user warn kernel: ip_ct_h323: init success
Jan 1 00:00:20 user warn kernel: ip_nat_h323: init success
Jan 1 00:00:20 user warn kernel: BRCM NAT Caching v1.0 Nov 20 2007 10:22:27
Jan 1 00:00:20 user warn kernel: BRCM NAT Cache: Hooking hit function @ c0060088
Jan 1 00:00:20 user warn kernel: ip_conntrack_rtsp v0.01 loading
Jan 1 00:00:20 user warn kernel: ip_nat_rtsp v0.01 loading
Jan 1 00:00:20 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:20 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:20 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:20 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:20 user info kernel: device nas_0_1_32 entered promiscuous mode
Jan 1 00:00:20 user info kernel: br0: port 2(nas_0_1_32) entering learning state
Jan 1 00:00:20 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:20 user info kernel: br0: port 2(nas_0_1_32) entering forwarding state
Jan 1 00:00:20 user crit kernel: ADSL G.992 started
Jan 1 00:00:20 user debug syslog: brctl addbr pppbr
Jan 1 00:00:21 user debug syslog: brctl addif pppbr nas_0_1_32
Jan 1 00:00:21 user debug syslog: pppd keepalive 0 0 -c 0.1.32.1 -i nas_0_1_32 -u "qrqsr_8071@dsl.ukrtel.net" -p ********** -f 0 -m 00901a422120/071e &
Jan 1 00:00:22 daemon notice pppd[250]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:24 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:30 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:30 user crit kernel: ADSL link up, interleaved, us=1244, ds=4895
Jan 1 00:00:30 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:32 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.10.100 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:33 daemon notice pppd[250]: PPP: Start to connect ...
Jan 1 00:00:34 daemon crit pppd[250]: PPP server detected.
Jan 1 00:00:37 daemon notice pppd[250]: PPP: Start to connect ...
Jan 1 00:00:38 daemon crit pppd[250]: PPP server detected.
Jan 1 00:00:38 daemon crit pppd[250]: PPP session established.
Jan 1 00:00:38 daemon crit pppd[250]: PPP LCP UP.
Jan 1 00:00:40 daemon crit pppd[250]: Received valid IP address from server. Connection UP.
Jan 1 00:00:40 user debug syslog: route add default gw 195.5.5.203 2>/dev/null
Jan 1 00:00:41 user debug syslog: iptables -A FORWARD -o ppp_0_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:41 user debug syslog: iptables -A FORWARD -i ppp_0_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:41 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:41 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:42 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.10.100 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:42 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_1_32_1 -s 192.168.10.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:42 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_1_32_1 -s 192.168.10.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:42 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.10.100 -p udp --dport 53 -j DNAT --to 212.113.36.14 2>/dev/null
Jan 1 00:00:42 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.10.100 -p udp --dport 53 -j DNAT --to 212.113.36.14
Jan 1 00:00:42 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:43 user notice dnsprobe[486]: dnsprobe started!
Jan 1 00:00:44 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=92.100.174.171 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=30453 DF PROTO=TCP SPT=2585 DPT=50457 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:44 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=93.100.179.211 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=4570 DF PROTO=TCP SPT=2020 DPT=23544 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:44 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=92.100.174.171 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=30490 DF PROTO=TCP SPT=2585 DPT=50457 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:44 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=95.55.68.243 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=9546 DF PROTO=TCP SPT=62617 DPT=35691 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:00:44 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=94.188.32.229 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=38055 DF PROTO=TCP SPT=59815 DPT=21772 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:44 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=78.109.142.38 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=6896 DF PROTO=TCP SPT=61793 DPT=21772 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:00:44 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_1_32_1 -p tcp --dport 30005
Jan 1 00:00:45 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_1_32_1 -p tcp --dport 30005
Jan 1 00:00:45 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=213.179.227.238 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=64273 DF PROTO=TCP SPT=1052 DPT=23544 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:45 user warn dnsprobe[486]: dns query failed
Jan 1 00:00:45 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=84.131.198.159 DST=94.179.14.0 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=7577 DF PROTO=TCP SPT=4775 DPT=23544 WINDOW=32767 RES=0x00 SYN URGP=0
Jan 1 00:00:45 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=62.118.146.34 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=62376 DF PROTO=TCP SPT=1908 DPT=49545 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:45 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=85.141.180.191 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=54908 DF PROTO=TCP SPT=6187 DPT=21772 WINDOW=64512 RES=0x00 SYN URGP=0
Jan 1 00:00:45 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_1_32_1 -p udp -s 192.168.10.100/24 --dport 30006
Jan 1 00:00:45 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_1_32_1 -p udp -s 192.168.10.100/24 --dport 30006
Jan 1 00:00:45 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=92.112.243.64 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=62306 DF PROTO=TCP SPT=1054 DPT=46353 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:45 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=89.179.112.158 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=32054 DF PROTO=TCP SPT=3009 DPT=46353 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:00:46 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=77.47.177.235 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=38542 DF PROTO=TCP SPT=1456 DPT=23544 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:00:46 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=78.106.202.141 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=64942 DF PROTO=TCP SPT=1520 DPT=35691 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:00:47 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=93.159.243.50 DST=94.179.14.0 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=22756 DF PROTO=TCP SPT=56593 DPT=49545 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:47 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=93.84.32.50 DST=94.179.14.0 LEN=52 TOS=0x00 PREC=0x00 TTL=114 ID=12284 DF PROTO=TCP SPT=1519 DPT=32437 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:49 user debug syslog: ifconfig ppp_0_1_32_1 mtu 1492
Jan 1 00:00:58 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Jan 1 00:00:58 daemon err user: Stored Parameter Attribute data is corrupt or missing
Jan 1 00:03:54 user crit kernel: eth0 Link DOWN.
Jan 1 00:03:56 user info kernel: br0: port 1(eth0) entering disabled state
Jan 1 00:03:58 user info kernel: br0: port 1(eth0) entering disabled state
Jan 1 00:03:58 user crit kernel: eth0 Link UP.
Jan 1 00:04:05 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:04:05 user info kernel: br0: topology change detected, propagating
Jan 1 00:04:05 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:05:30 user crit kernel: eth0 Link DOWN.
Jan 1 00:05:30 user info kernel: br0: port 1(eth0) entering disabled state
Jan 1 00:05:37 user info kernel: br0: port 1(eth0) entering disabled state
Jan 1 00:05:42 user crit kernel: eth0 Link UP.
Jan 1 00:05:52 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:05:52 user info kernel: br0: topology change detected, propagating
Jan 1 00:05:52 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:10:45 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=95.134.146.132 DST=94.179.14.0 LEN=52 TOS=0x00 PREC=0x00 TTL=126 ID=10517 DF PROTO=TCP SPT=49991 DPT=49545 WINDOW=8192 RES=0x00 SYN URGP=0