Привет.
вот что получается, надеюсь поможет:
1. Лог получился такой:
System Log
Date/Time Facility Severity Message
Jan 1 00:00:34 user warn kernel: Ethernet buffer TX:200, RX:80
Jan 1 00:00:34 user warn kernel: Config Internal PHY Through MDIO
Jan 1 00:00:34 user info kernel: BCM63xx_ENET: 100 MB Full-Duplex (auto-neg)
Jan 1 00:00:34 user warn kernel: eth0: MAC Address: 00:1E:58:E4:56:9F
Jan 1 00:00:34 user warn kernel: SDIOH mode switch from 1 to 2
Jan 1 00:00:34 user warn kernel: available commands: sdio sdioh
Jan 1 00:00:34 user warn kernel:
Jan 1 00:00:34 user warn kernel: ---SDIO init SUCCEEDED--- sromless
Jan 1 00:00:34 user warn kernel:
Jan 1 00:00:34 user warn kernel: chipid 0x4024318
Jan 1 00:00:34 user warn kernel: bcmsdh_attach, sdioh_attach successful, bcmsdh->sdioh 0x8028be00
Jan 1 00:00:34 user warn kernel: wl0: wlc_attach: use mac addr from the system pool by id: 0x776c0000
Jan 1 00:00:34 user warn kernel: wl0: MAC Address: 00:1E:58:E4:56:A0
Jan 1 00:00:34 user warn kernel: wl0: Broadcom BCM4318 802.11 Wireless Controller 3.131.35.6.cpe2.0a.sd-e1
Jan 1 00:00:34 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered
Jan 1 00:00:34 user warn kernel: Trying to free free IRQ25
Jan 1 00:00:34 user crit kernel: eth0 Link UP.
Jan 1 00:00:34 user warn kernel: BcmAdsl_Initialize=0xC00623F8, g_pFnNotifyCallback=0xC007A594
Jan 1 00:00:34 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:34 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x109FF5 0xDEADBEEF
Jan 1 00:00:34 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FFD274
Jan 1 00:00:34 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:34 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:34 user warn kernel: ATM proc init !!!
Jan 1 00:00:34 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:34 user warn kernel: ip_conntrack version 2.1 (125 buckets, 0 max) - 368 bytes per conntrack
Jan 1 00:00:34 user crit kernel: ADSL G.994 training
Jan 1 00:00:34 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 00:00:34 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 00:00:34 user warn kernel: ip_conntrack_h323: init
Jan 1 00:00:34 user warn kernel: ule!
Jan 1 00:00:34 user warn kernel: BRCM NAT Caching v0.1 Nov 18 2006 14:56:48
Jan 1 00:00:34 user warn kernel: BRCM NAT Cache: Hooking hit function @ c0046c64
Jan 1 00:00:34 user warn kernel: ip_conntrack_rtsp v0.01 loading
Jan 1 00:00:34 user warn kernel: ip_nat_rtsp v0.01 loading
Jan 1 00:00:34 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:34 user crit kernel: ADSL G.992 started
Jan 1 00:00:34 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 2(wl0) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 2(wl0) entering forwarding state
Jan 1 00:00:34 user info kernel: device wl0.1 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 3(wl0.1) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 3(wl0.1) entering forwarding state
Jan 1 00:00:34 user info kernel: device nas_0_32 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 4(nas_0_32) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 4(nas_0_32) entering forwarding state
Jan 1 00:00:34 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:34 user info kernel: device nas_8_35 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 5(nas_8_35) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 5(nas_8_35) entering forwarding state
Jan 1 00:00:34 user info kernel: device nas_0_35 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 6(nas_0_35) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 6(nas_0_35) entering forwarding state
Jan 1 00:00:34 user info kernel: device nas_8_81 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 7(nas_8_81) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 7(nas_8_81) entering forwarding state
Jan 1 00:00:34 user info kernel: device nas_14_24 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 8(nas_14_24) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 8(nas_14_24) entering forwarding state
Jan 1 00:00:34 user info kernel: device nas_0_100 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 9(nas_0_100) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 9(nas_0_100) entering forwarding state
Jan 1 00:00:34 user info kernel: device nas_1_32 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 10(nas_1_32) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 10(nas_1_32) entering forwarding state
Jan 1 00:00:34 user info kernel: device eth0 left promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 1(eth0) entering disabled state
Jan 1 00:00:34 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:34 user info kernel: device wl0 left promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 2(wl0) entering disabled state
Jan 1 00:00:34 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 2(wl0) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 2(wl0) entering forwarding state
Jan 1 00:00:34 user info kernel: device wl0.1 left promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 3(wl0.1) entering disabled state
Jan 1 00:00:34 user info kernel: device wl0.1 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 3(wl0.1) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 3(wl0.1) entering forwarding state
Jan 1 00:00:34 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:34 user info kernel: device nas_0_32 left promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 4(nas_0_32) entering disabled state
Jan 1 00:00:34 user info kernel: device nas_0_32 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 4(nas_0_32) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 4(nas_0_32) entering forwarding state
Jan 1 00:00:34 user crit kernel: ADSL link up, interleaved, us=606, ds=2462
Jan 1 00:00:34 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:34 user info kernel: device nas_8_35 left promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 5(nas_8_35) entering disabled state
Jan 1 00:00:34 user info kernel: device nas_8_35 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 5(nas_8_35) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 5(nas_8_35) entering forwarding state
Jan 1 00:00:34 user info kernel: device nas_0_35 left promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 6(nas_0_35) entering disabled state
Jan 1 00:00:34 user info kernel: device nas_0_35 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 6(nas_0_35) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 6(nas_0_35) entering forwarding state
Jan 1 00:00:34 user info kernel: device nas_8_81 left promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 7(nas_8_81) entering disabled state
Jan 1 00:00:34 user info kernel: device nas_8_81 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 7(nas_8_81) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: ng state
Jan 1 00:00:34 user info kernel: device nas_14_24 left promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 8(nas_14_24) entering disabled state
Jan 1 00:00:34 user info kernel: device nas_14_24 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 8(nas_14_24) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 8(nas_14_24) entering forwarding state
Jan 1 00:00:34 user info kernel: device nas_0_100 left promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 9(nas_0_100) entering disabled state
Jan 1 00:00:34 user info kernel: device nas_0_100 entered promiscuous mode
Jan 1 00:00:34 user info kernel: br0: port 9(nas_0_100) entering learning state
Jan 1 00:00:34 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:34 user info kernel: br0: port 9(nas_0_100) entering forwarding state
Jan 1 00:00:35 user debug syslog: pppd -c 1.32.1 -i nas_1_32 -u
xxxxxxx@dsl.ukrtel.net -p ******** -f 0 -m 00901a426852/157b &
Jan 1 00:00:35 daemon notice pppd[847]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:36 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:37 daemon notice pppd[847]: PPP: Start to connect ...
Jan 1 00:00:51 daemon notice pppd[847]: PPP: Start to connect ...
Jan 1 00:00:51 daemon crit pppd[847]: PPP server detected.
Jan 1 00:00:51 daemon crit pppd[847]: PPP session established.
Jan 1 00:00:51 daemon crit pppd[847]: PPP LCP UP.
Jan 1 00:00:52 daemon crit pppd[847]: Received valid IP address from server. Connection UP.
Jan 1 00:00:52 user debug syslog: route add default gw 195.5.5.202 2>/dev/null
Jan 1 00:00:53 user debug syslog: iptables -A FORWARD -o ppp_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:53 user debug syslog: iptables -A FORWARD -i ppp_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:53 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:53 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:53 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:53 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:53 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:53 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 195.5.46.12 2>/dev/null
Jan 1 00:00:53 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 195.5.46.12
Jan 1 00:00:53 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:53 user notice dnsprobe[1016]: dnsprobe started!
Jan 1 00:00:54 user debug syslog: iptables -I INPUT 1 -p icmp --icmp-type echo-request -i ppp_1_32_1 -j ACCEPT
Jan 1 00:00:54 user debug syslog: iptables -I INPUT 1 -i ppp_1_32_1 -p udp --dport 5060 -j ACCEPT 2>/dev/null
Jan 1 00:00:54 user debug syslog: iptables -I INPUT 1 -i ppp_1_32_1 -p udp --dport 7070:7079 -j ACCEPT 2>/dev/null
Jan 1 00:00:54 user debug syslog: iptables -t nat -A PREROUTING -i br0 -p udp --dport 5060 -j REDIRECT --to-ports 5060 2>/dev/null
Jan 1 00:00:54 user debug syslog: siproxd --config /var/siproxd/siproxd.conf &
Jan 1 00:00:54 user notice syslog: siproxd.c:192 INFO:siproxd-0.5.10-2841 i686-redhat-linux-gnu starting up
Jan 1 00:00:54 user notice syslog: siproxd.c:218 INFO:daemonized, pid=1052
Jan 1 00:00:54 user notice syslog: sock.c:65 INFO:bound to port 5060
Jan 1 00:00:54 user notice syslog: register.c:65 WARNING:registration file not found, starting with empty table
Jan 1 00:00:54 user notice syslog: siproxd.c:265 INFO:siproxd-0.5.10-2841 i686-redhat-linux-gnu started
Jan 1 00:00:55 user debug syslog: setkey -f /var/setkey.conf
Jan 1 00:00:55 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_1_32_1 -p tcp --dport 30005
Jan 1 00:00:55 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_1_32_1 -p tcp --dport 30005
Jan 1 00:00:55 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_1_32_1 -p udp -s 192.168.1.1/24 --dport 30006
Jan 1 00:00:55 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_1_32_1 -p udp -s 192.168.1.1/24 --dport 30006
Jan 1 00:00:59 daemon debug user: wlctl authe_sta_list > /var/wl_authe
Jan 1 00:01:00 daemon debug user: wlctl assoclist > /var/wl_assoc
Jan 1 00:01:00 daemon debug user: wlctl autho_sta_list > /var/wl_autho
Jan 1 00:01:00 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Jan 1 00:01:00 daemon err user: Stored Parameter Attribute data is corrupt or missing
Jan 1 00:01:02 daemon debug user: wlctl authe_sta_list > /var/wl_authe
Jan 1 00:01:02 daemon debug user: wlctl assoclist > /var/wl_assoc
Jan 1 00:01:02 daemon debug user: wlctl autho_sta_list > /var/wl_autho
2. У меня тоже синее окно.
В предпоследнем окне настройки есть Enable PPP Debug Mode
Ещё если делать как на первом модеме то аутентификация PAP, в то время как DCC_DSL-2600U создает создает с Auto аутентификацией.
И в том и в том случае на D-link проблема остается актуальной.
Инкапсуляция LLC
MTU - 1492
3. Статистика такая (Device Info>Statistics>WAN):
Statistics -- WAN
Service VPI/VCI Protocol Interface Received Transmitted
Bytes Pkts Errs Drops Bytes Pkts Errs Drops
br_0_32 0/32 Bridge nas_0_32 0 0 0 0 5283 47 0 20
br_8_35 8/35 Bridge nas_8_35 0 0 0 0 5213 46 0 19
br_0_35 0/35 Bridge nas_0_35 0 0 0 0 5213 46 0 17
br_8_81 8/81 Bridge nas_8_81 0 0 0 0 5213 46 0 15
br_14_24 14/24 Bridge nas_14_24 0 0 0 0 5213 46 0 13
br_0_100 0/100 Bridge nas_0_100 0 0 0 0 5213 46 0 11
pppoe_0_1_32_1 1/32 PPPoE ppp_1_32_1 2077 5 0 0 94 4 0 0
4. VPI/VCI взял с настроек на первом модеме. Нигде не уточнял. Могут ли они зависеть от самого модема(модели)?
Если параметры неправильны, должна ли проходить авторизация?
5. Инструкции по настройки ОГО на сайте читал.
Из различий нашел только что они там убирают галочки в DSL настройках с двух пунктов.
Но это не помогло.