Скачал прошивку. Настройки не сбрасывал. Прошился. Модем ушел в ребут. Через пару минут инет уже поднялся. Настройки опять не сбрасывал.
Лог:
Код:
System Log
Date/Time Facility Severity Message
Jan 1 00:00:23 syslog emerg BCM96345 started: BusyBox v1.00 (2008.09.05-08:29+0000)
Jan 1 00:00:23 user debug syslog: echo > /var/snmpd.conf
Sep 10 09:45:26 user crit kernel: ADSL G.992 channel analysis
Sep 10 09:45:26 user debug syslog: echo > /var/hosts
Sep 10 09:45:26 user warn kernel:
Sep 10 09:45:26 user warn kernel: ioctl, p_name=diapd
Sep 10 09:45:27 user debug syslog: pppd plugin pppoe rp_pppoe_service WebStream nas_0_0_35 nodetach user '60793@256' password ********** interface_name 0_0_35_1 usepeerdns refuse-eap persist lcp-echo-interval 30 holdoff 3 lcp-echo-failure 3
Sep 10 09:45:30 user crit kernel: ADSL G.992 message exchange
Sep 10 09:45:30 user crit kernel: ADSL link up, interleaved, us=1120, ds=11552
Sep 10 09:45:30 user warn kernel: ATM Soft SAR: ATM link connected.
Sep 10 09:45:30 daemon info pppd[246]: RP-PPPoE plugin version 3.3 compiled against pppd 2.4.3
Sep 10 09:45:30 daemon info pppd[246]: Plugin pppoe called.
Sep 10 09:45:31 daemon notice pppd[246]: pppd 2.4.3 started by admin, uid 0
Sep 10 09:45:32 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.0.100 -p udp --dport 53 -j DNAT --to 128.9.0.107
Sep 10 09:45:40 daemon info pppd[246]: PPP session is 7975
Sep 10 09:45:41 daemon info pppd[246]: Using interface ppp0_0_35_1
Sep 10 09:45:41 daemon notice pppd[246]: Connect: ppp_0_0_35_1 <--> nas_0_0_35
Sep 10 09:45:41 daemon warn pppd[246]: Couldn't increase MRU to 1500
Sep 10 09:45:41 daemon warn pppd[246]: Couldn't increase MRU to 1500
Sep 10 09:45:42 daemon notice pppd[246]: PAP authentication succeeded
Sep 10 09:45:42 daemon notice pppd[246]: peer from calling number 00:90:1A:42:B8:EF authorized
Sep 10 09:45:42 daemon notice pppd[246]: local IP address 92.125.123.215
Sep 10 09:45:42 daemon notice pppd[246]: remote IP address 213.228.116.68
Sep 10 09:45:42 daemon notice pppd[246]: primary DNS address 212.94.96.124
Sep 10 09:45:42 daemon notice pppd[246]: secondary DNS address 212.94.96.70
Sep 10 09:45:49 user debug syslog: route add default gw 213.228.116.68 2>/dev/null
Sep 10 09:45:50 user debug syslog: iptables -A FORWARD -o ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Sep 10 09:45:50 user debug syslog: iptables -A FORWARD -i ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Sep 10 09:45:50 user debug syslog: echo > /proc/net/ip_conntrack
Sep 10 09:45:50 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Sep 10 09:45:50 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.0.100 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Sep 10 09:45:50 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_35_1 -s 192.168.0.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Sep 10 09:45:50 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_35_1 -s 192.168.0.0/255.255.255.0 -j MASQUERADE
Sep 10 09:45:51 user debug syslog: kill -9 244
Sep 10 09:45:51 user debug syslog: echo > /var/hosts
Sep 10 09:45:54 user debug syslog: iptables -I INPUT 1 -p tcp --dport 80 -i ppp_0_0_35_1 -j ACCEPT
Sep 10 09:45:54 user debug syslog: iptables -I INPUT 1 -p icmp --icmp-type echo-request -i ppp_0_0_35_1 -j ACCEPT
Sep 10 09:45:54 user debug syslog: iptables -I INPUT 1 -p udp --dport 161 -i ppp_0_0_35_1 -j ACCEPT
Sep 10 09:45:54 user debug syslog: iptables -I INPUT 1 -p tcp --dport 23 -i ppp_0_0_35_1 -j ACCEPT
Sep 10 09:48:03 user debug syslog: ddnsd /var/ddnsd.cfg /var/ddnsd.cache &
Sep 10 09:48:27 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.29.92 DST=92.125.123.215 LEN=52 TOS=0x00 PREC=0x00 TTL=252 ID=55491 DF PROTO=TCP SPT=32848 DPT=135 WINDOW=60352 RES=0x00 SYN URGP=0
Sep 10 09:48:52 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.61.206 DST=92.125.123.215 LEN=48 TOS=0x00 PREC=0x00 TTL=251 ID=20209 DF PROTO=TCP SPT=2739 DPT=1433 WINDOW=64800 RES=0x00 SYN URGP=0
Sep 10 09:48:55 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.61.206 DST=92.125.123.215 LEN=48 TOS=0x00 PREC=0x00 TTL=251 ID=20401 DF PROTO=TCP SPT=2739 DPT=1433 WINDOW=64800 RES=0x00 SYN URGP=0
Sep 10 09:50:18 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.69.18 DST=92.125.123.215 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=23778 DF PROTO=TCP SPT=1120 DPT=135 WINDOW=64800 RES=0x00 SYN URGP=0
Sep 10 09:52:19 user debug syslog: ethctl vport query 2>/var/vcfgerr
Sep 10 09:52:20 user debug syslog: rm /var/vcfgerr
Sep 10 09:52:23 user crit kernel: OAM loopback response not received on PORT/VPI/VCI 0/0/35.
Sep 10 09:52:24 user debug syslog: ping 213.228.116.68
Sep 10 09:52:24 user debug syslog: ping 212.94.96.124
Sep 10 09:52:28 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.46.236 DST=92.125.123.215 LEN=48 TOS=0x00 PREC=0x00 TTL=251 ID=34929 DF PROTO=TCP SPT=3670 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 09:53:46 user debug syslog: ethctl vport query 2>/var/vcfgerr
Sep 10 09:53:47 user debug syslog: rm /var/vcfgerr
Sep 10 09:53:50 user crit kernel: OAM loopback response not received on PORT/VPI/VCI 0/0/35.
Sep 10 09:53:51 user debug syslog: ping 213.228.116.68
Sep 10 09:53:51 user debug syslog: ping 212.94.96.124
Sep 10 09:54:00 user debug syslog: sendarp -s br0 -d br0
Sep 10 09:54:01 user debug syslog: ethctl eth0 vport query 2>/var/vcfgerr
Sep 10 09:54:01 user debug syslog: rm /var/vcfgerr
Sep 10 09:59:46 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.77.143 DST=92.125.123.215 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=41011 DF PROTO=TCP SPT=2179 DPT=135 WINDOW=64800 RES=0x00 SYN URGP=0
Sep 10 10:10:03 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.233.221 DST=92.125.123.215 LEN=48 TOS=0x00 PREC=0x00 TTL=252 ID=55922 DF PROTO=TCP SPT=4150 DPT=445 WINDOW=64800 RES=0x00 SYN URGP=0
Sep 10 10:20:21 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.65.119 DST=92.125.123.215 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=12887 DF PROTO=TCP SPT=43023 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 10:29:36 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.125.65.119 DST=92.125.123.215 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=25950 DF PROTO=TCP SPT=46107 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Телнет:
ДДНС справляется (тоесть работает - версия от dlinkddns.com)
Время синхронизируется... Инет работает... Проброску портов пока проверить не могу...
Статистика ДСЛ:
Statistics -- ADSL
Mode: G.DMT
Type: Interleave
Line Coding: Trellis On
Status: No Defect
Link Power State: L0
Downstream Upstream
SNR Margin (dB): 12.9 13.0
Attenuation (dB): 14.0 6.5
Output Power (dBm): 10.5 19.8
Attainable Rate (Kbps): 12512 1284
Rate (Kbps): 11552 1120
K (number of bytes in DMT frame): 362 36
R (number of check bytes in RS code word): 14 8
S (RS code word size in DMT frame): 0.5 4
D (interleaver depth): 64 8
Delay (msec): 8 8
Super Frames: 173341 173282
Super Frame Errors: 0 19
RS Words: 23574440 2945794
RS Correctable Errors: 2012 11
RS Uncorrectable Errors: 0 N/A
HEC Errors: 0 14
OCD Errors: 0 0
LCD Errors: 0 0
Total Cells: 80287245 0
Data Cells: 137695 0
Bit Errors: 0 0
Total ES: 0 0
Total SES: 0 0
Total UAS: 12 0
Ну не знаю... Особых нареканий нет... Посмотрим как завтра он справится с биллингом.