Пришел с работы,инет завелся без перезагрузки=)))Супер.Огромное спасибо!!!Жду обновлений на 2520.
Только вот лог странный.Прилагаю
System Log
Date/Time Facility Severity Message
Jan 1 00:00:14 user warn kernel: usb0: Host MAC Address: 00 1C F0 28 E0 D5
Jan 1 00:00:14 user crit kernel: eth0 Link UP.
Jan 1 00:00:14 user warn kernel: BcmAdsl_Initialize=0xC00733F8, g_pFnNotifyCallback=0xC008BC64
Jan 1 00:00:14 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00003980 adsl2=0x00000000
Jan 1 00:00:14 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x1B7740 0xDEADBEEF
Jan 1 00:00:14 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FFD3D4
Jan 1 00:00:14 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00003980 adsl2=0x00000000
Jan 1 00:00:14 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:14 user warn kernel: ATM proc init !!!
Jan 1 00:00:14 user err kernel: Module len 6399 truncated
Jan 1 00:00:14 user warn kernel: ip_conntrack_pptp: Unknown symbol ip_ct_gre_keymap_add
Jan 1 00:00:14 user warn kernel: ip_conntrack_pptp: Unknown symbol ip_ct_gre_keymap_destroy
Jan 1 00:00:14 user warn kernel: ip_nat_pptp: Unknown symbol ip_ct_gre_keymap_change
Jan 1 00:00:14 user warn kernel: ip_conntrack_pptp: Unknown symbol ip_ct_gre_keymap_add
Jan 1 00:00:14 user warn kernel: ip_conntrack_pptp: Unknown symbol ip_ct_gre_keymap_destroy
Jan 1 00:00:14 user err kernel: Module len 6399 truncated
Jan 1 00:00:14 user warn kernel: ip_nat_pptp: Unknown symbol ip_ct_gre_keymap_change
Jan 1 00:00:14 user crit kernel: ADSL G.994 training
Jan 1 00:00:14 user info kernel: device usb0 entered promiscuous mode
Jan 1 00:00:14 user info kernel: br0: port 1(usb0) entering learning state
Jan 1 00:00:14 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:14 user info kernel: te
Jan 1 00:00:14 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:14 user info kernel: br0: port 2(eth0) entering learning state
Jan 1 00:00:14 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:14 user info kernel: br0: port 2(eth0) entering forwarding state
Jan 1 00:00:14 user info kernel: device nas_0_0_35 entered promiscuous mode
Jan 1 00:00:14 user info kernel: br0: port 3(nas_0_0_35) entering learning state
Jan 1 00:00:14 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:14 user info kernel: br0: port 3(nas_0_0_35) entering forwarding state
Jan 1 00:00:14 user info kernel: device usb0 left promiscuous mode
Jan 1 00:00:14 user info kernel: br0: port 1(usb0) entering disabled state
Jan 1 00:00:14 user info kernel: device eth0 left promiscuous mode
Jan 1 00:00:14 user info kernel: br0: port 2(eth0) entering disabled state
Jan 1 00:00:14 user info kernel: device usb0 entered promiscuous mode
Jan 1 00:00:14 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:14 user info kernel: br0: port 2(eth0) entering learning state
Jan 1 00:00:14 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:14 user info kernel: br0: port 2(eth0) entering forwarding state
Jan 1 00:00:15 user debug syslog: echo > /var/hosts
Jan 1 00:00:15 user warn kernel:
Jan 1 00:00:15 user warn kernel: ioctl, p_name=diapd
Jan 1 00:00:15 user debug syslog: pppd plugin pppoe nas_0_0_35 nodetach user 'szt' password ***** interface_name 0_0_35_1 usepeerdns refuse-eap persist lcp-echo-interval 30 holdoff 3 lcp-echo-failure 3 maxfail 0 nomppc nomppe mtu 1492 mru
Jan 1 00:00:16 daemon info pppd[298]: RP-PPPoE plugin version 3.3 compiled against pppd 2.4.3
Jan 1 00:00:16 daemon info pppd[298]: Plugin pppoe called.
Jan 1 00:00:16 daemon notice pppd[298]: pppd 2.4.3 started by admin, uid 0
Jan 1 00:00:17 user crit kernel: ADSL G.992 started
Jan 1 00:00:21 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:28 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:29 user crit kernel: ADSL link up, interleaved, us=556, ds=2253
Jan 1 00:00:29 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:30 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:31 daemon info pppd[298]: PPP session is 3537
Jan 1 00:00:31 daemon info pppd[298]: Using interface ppp0_0_35_1
Jan 1 00:00:31 daemon notice pppd[298]: Connect: ppp_0_0_35_1 <--> nas_0_0_35
Jan 1 00:00:31 daemon warn pppd[298]: Couldn't increase MRU to 1500
Jan 1 00:00:31 daemon notice pppd[298]: PAP authentication succeeded
Jan 1 00:00:31 daemon notice pppd[298]: peer from calling number 00:90:1A:42:CD:DD authorized
Jan 1 00:00:31 daemon notice pppd[298]: local IP address 78.36.229.2
Jan 1 00:00:31 daemon notice pppd[298]: remote IP address 78.36.228.1
Jan 1 00:00:31 daemon notice pppd[298]: primary DNS address 81.9.64.67
Jan 1 00:00:31 daemon notice pppd[298]: secondary DNS address 81.9.67.34
Jan 1 00:00:34 user debug syslog: route add default gw 78.36.228.1 2>/dev/null
Jan 1 00:00:34 user debug syslog: iptables -A FORWARD -o ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:34 user debug syslog: iptables -A FORWARD -i ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:34 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:34 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:34 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:34 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:34 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:34 user debug syslog: kill -9 295
Jan 1 00:00:34 user debug syslog: echo > /var/hosts
Jan 1 00:00:34 user debug syslog: iptables -I INPUT 1 -p icmp --icmp-type echo-request -i ppp_0_0_35_1 -j ACCEPT
Sep 10 11:47:58 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.124.150.7 DST=78.36.229.2 LEN=64 TOS=0x00 PREC=0x00 TTL=51 ID=57653 DF PROTO=TCP SPT=34686 DPT=20942 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 11:48:00 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.124.150.7 DST=78.36.229.2 LEN=64 TOS=0x00 PREC=0x00 TTL=51 ID=3594 DF PROTO=TCP SPT=34686 DPT=20942 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 11:48:02 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.124.150.7 DST=78.36.229.2 LEN=48 TOS=0x00 PREC=0x00 TTL=51 ID=3072 DF PROTO=TCP SPT=34686 DPT=20942 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 11:48:03 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.124.150.7 DST=78.36.229.2 LEN=48 TOS=0x00 PREC=0x00 TTL=51 ID=51273 DF PROTO=TCP SPT=34686 DPT=20942 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 11:48:05 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.124.150.7 DST=78.36.229.2 LEN=48 TOS=0x00 PREC=0x00 TTL=51 ID=24114 DF PROTO=TCP SPT=34686 DPT=20942 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 12:06:38 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.13.82 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=59 ID=58 DF PROTO=TCP SPT=2324 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 12:09:10 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=118.161.43.240 DST=78.36.229.2 LEN=48 TOS=0x00 PREC=0x00 TTL=105 ID=21376 DF PROTO=TCP SPT=1151 DPT=25 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 12:22:03 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.96.4 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x20 TTL=59 ID=23210 DF PROTO=TCP SPT=4387 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 12:28:23 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.40.46 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=24000 DF PROTO=TCP SPT=3464 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 12:41:30 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=190.90.187.2 DST=78.36.229.2 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=57014 PROTO=TCP SPT=22303 DPT=10000 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 12:43:18 syslog info -- MARK --
Sep 10 12:48:59 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.62.101.22 DST=78.36.229.2 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=3569 PROTO=TCP SPT=4558 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 13:06:49 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.52.174 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=41903 DF PROTO=TCP SPT=2623 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 13:08:22 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.37.98 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=35661 DF PROTO=TCP SPT=4685 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 13:22:07 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.96.4 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x20 TTL=59 ID=36751 DF PROTO=TCP SPT=3711 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 13:34:40 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.40.46 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=33917 DF PROTO=TCP SPT=3779 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 13:37:58 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.33.243 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=16866 DF PROTO=TCP SPT=3232 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 13:43:19 syslog info -- MARK --
Sep 10 13:47:59 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.124.150.7 DST=78.36.229.2 LEN=64 TOS=0x00 PREC=0x00 TTL=51 ID=19407 DF PROTO=TCP SPT=44464 DPT=20942 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 14:06:25 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.195.120 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=4034 DF PROTO=TCP SPT=4857 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 14:16:30 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=89.169.39.228 DST=78.36.229.2 LEN=64 TOS=0x00 PREC=0x00 TTL=57 ID=16365 DF PROTO=TCP SPT=58425 DPT=55475 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 14:22:42 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.32.120 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=17862 DF PROTO=TCP SPT=2952 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 14:31:11 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=222.252.167.149 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=41 ID=15901 DF PROTO=TCP SPT=4043 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 14:38:36 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.62.101.20 DST=78.36.229.2 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=45899 PROTO=TCP SPT=22939 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 14:43:18 syslog info -- MARK --
Sep 10 14:50:24 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.39.132 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=54456 DF PROTO=TCP SPT=3930 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 15:01:00 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=24.87.47.46 DST=78.36.229.2 LEN=52 TOS=0x00 PREC=0x00 TTL=232 ID=0 DF PROTO=TCP SPT=18853 DPT=3128 WINDOW=25254 RES=0x00 SYN URGP=0
Sep 10 15:08:03 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.52.219 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=50271 DF PROTO=TCP SPT=4814 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 15:22:23 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.52.174 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=7970 DF PROTO=TCP SPT=3743 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 15:37:11 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.50.253 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=65143 DF PROTO=TCP SPT=3923 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 15:38:01 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.33.243 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=63445 DF PROTO=TCP SPT=3127 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 15:43:18 syslog info -- MARK --
Sep 10 15:48:03 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.124.150.7 DST=78.36.229.2 LEN=64 TOS=0x00 PREC=0x00 TTL=51 ID=26184 DF PROTO=TCP SPT=34658 DPT=20942 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 16:00:02 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.40.46 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=53902 DF PROTO=TCP SPT=3540 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 16:08:00 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.52.219 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=35969 DF PROTO=TCP SPT=4115 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 16:22:05 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=60.49.12.1 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=32663 DF PROTO=TCP SPT=44967 DPT=22 WINDOW=5840 RES=0x00 SYN URGP=0
Sep 10 16:29:37 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.124.160.84 DST=78.36.229.2 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=55049 DF PROTO=TCP SPT=1646 DPT=46438 WINDOW=65535 RES=0x00 SYN URGP=0
Sep 10 16:38:12 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.33.243 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=60908 DF PROTO=TCP SPT=2560 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 16:43:19 syslog info -- MARK --
Sep 10 17:06:53 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.48.146 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=24032 DF PROTO=TCP SPT=3139 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 17:06:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.48.146 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=24033 DF PROTO=TCP SPT=3139 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 17:08:01 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.52.219 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=9733 DF PROTO=TCP SPT=3594 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 17:22:58 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.32.120 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=39337 DF PROTO=TCP SPT=4082 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 17:37:20 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.40.55 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=63908 DF PROTO=TCP SPT=2902 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 17:38:29 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=78.36.33.243 DST=78.36.229.2 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=48714 DF PROTO=TCP SPT=2068 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Sep 10 17:43:18 syslog info -- MARK --
Sep 10 17:48:04 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.124.150.7 DST=78.36.229.2 LEN=64 TOS=0x00 PREC=0x00 TTL=51 ID=49257 DF PROTO=TCP SPT=42876 DPT=20942 WINDOW=65535 RES=0x00 SYN URGP=0
