Почитав форум и увидев до каких размеров разрослась эта тема, "родился" следующий ответ:
Собственно зачем вам нужен этот "кип алив"? Чтобы восстанавливать разрыв связи, правильно? Так вот я пользуюсь версией прошивки в которой вообще еще нет данной опции и все прекрасно работает.
Приведу здесь свои настройки. И так по порядку...
Версия прошивки:
RU_DSL-2500U_1.00_11162007
Оператор:
Домолинк-Московская область
Скорость на порту:
6144/640
Настройки WAN:
PORT:
0
VPI:
0
VCI:
35
Service Category -
UBR Without PCR
Enable Quality Of Service -
Выкл
Connection Type -
PPP over Ethernet (PPPoE)
Encapsulation Mode -
LLC/SNAP-BRIDGING
PPP Username and Password
Так так возникает проблема с DNS сделал еще следущее...прописал DNS вручную:
Не уверен что эта настройка на что-то влияет, но все же...
Модуляция -
Только G.Dmt
Роутер работает уже 10-е сутки в режиме 24/7. Раздает инет на 2 компа(я и сосед). Активно пользуюсь торретом. При потере коннекта связь восстанавливается (оператор сам рвет связь раз в сутки, пробовал выдергивать телефонный провод).
Так что "кип алив" нафиг не нужен, по крайней мере пока он так хреново работает)))))) Шейтесь обратно на
RU_DSL-2500U_1.00_11162007 и будет вам счастье.
В подтверждение, лог:
Цитата:
Jun 28 03:34:33 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=41.241.245.182 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=15267 DF PROTO=TCP SPT=3736 DPT=4899 WINDOW=16384 RES=0x00 SYN URGP=0
Jun 28 03:41:20 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.234.219.105 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=62253 PROTO=TCP SPT=46905 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 03:48:55 syslog info -- MARK --
Jun 28 04:04:57 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.234.219.107 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=10939 PROTO=TCP SPT=6773 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 04:34:36 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=218.6.19.7 DST=77.51.88.226 LEN=40 TOS=0x00 PREC=0x00 TTL=102 ID=62252 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0
Jun 28 04:37:31 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=85.25.6.41 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=36330 DF PROTO=TCP SPT=4496 DPT=22 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 04:48:54 syslog info -- MARK --
Jun 28 05:13:03 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=193.138.232.17 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=24240 PROTO=TCP SPT=20513 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 05:26:59 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=219.234.86.67 DST=77.51.88.226 LEN=40 TOS=0x00 PREC=0x00 TTL=101 ID=256 PROTO=TCP SPT=6000 DPT=2967 WINDOW=16384 RES=0x00 SYN URGP=0
Jun 28 05:47:09 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.234.219.105 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=63933 PROTO=TCP SPT=46905 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 05:48:55 syslog info -- MARK --
Jun 28 06:10:40 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.234.219.107 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=46013 PROTO=TCP SPT=6773 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 06:14:30 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.121.163.54 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=22657 DF PROTO=TCP SPT=2476 DPT=5900 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 06:14:33 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.121.163.54 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=23920 DF PROTO=TCP SPT=2476 DPT=5900 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 06:21:20 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=61.9.218.191 DST=77.51.88.226 LEN=60 TOS=0x00 PREC=0x00 TTL=33 ID=46203 DF PROTO=TCP SPT=2067 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jun 28 06:48:55 syslog info -- MARK --
Jun 28 06:55:10 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=220.232.96.29 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=104 ID=1877 DF PROTO=TCP SPT=1578 DPT=23710 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 06:55:13 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=220.232.96.29 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=104 ID=2115 DF PROTO=TCP SPT=1578 DPT=23710 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 06:55:20 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=220.232.96.29 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=104 ID=2555 DF PROTO=TCP SPT=1578 DPT=23710 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 06:57:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=202.33.24.134 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=23936 DF PROTO=TCP SPT=33434 DPT=19059 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 06:57:59 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=202.33.24.134 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=24039 DF PROTO=TCP SPT=33434 DPT=19059 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 07:19:32 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=193.138.232.15 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=57490 PROTO=TCP SPT=17330 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 07:48:55 syslog info -- MARK --
Тут оператор порвал соединение
Jun 28 07:51:11 daemon info pppd[248]: LCP terminated by peer
Jun 28 07:51:11 daemon info pppd[248]: Connect time 1440.0 minutes.
Jun 28 07:51:11 daemon info pppd[248]: Sent 474747812 bytes, received 3834844979 bytes.
Jun 28 07:51:16 daemon warn pppd[248]: Couldn't increase MRU to 1500
Jun 28 07:51:19 daemon notice pppd[248]: Connection terminated....
Соединение восстанавливается
Jun 28 07:51:42 daemon info pppd[248]: Starting link
Jun 28 07:51:43 daemon info pppd[248]: Sent PADT
Jun 28 07:51:43 daemon info pppd[248]: PPP session is 28387
Jun 28 07:51:44 daemon notice pppd[248]: Connect: ppp_0_0_35_1 <--> nas_0_0_35
Jun 28 07:51:44 daemon warn pppd[248]: Couldn't increase MRU to 1500
Jun 28 07:51:44 user warn syslog: dns query failed
Jun 28 07:51:45 daemon warn pppd[248]: Couldn't increase MRU to 1500
Jun 28 07:51:46 daemon info pppd[248]: CHAP authentication succeeded
Jun 28 07:51:46 daemon notice pppd[248]: peer from calling number 00:13:C3:B5:22:1B authorized
Jun 28 07:51:46 user warn syslog: dns query failed
Jun 28 07:52:04 user debug syslog: iptables -A FORWARD -o ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jun 28 07:52:09 user debug syslog: iptables -A FORWARD -i ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jun 28 07:52:13 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jun 28 07:52:19 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jun 28 07:52:58 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=213.234.219.105 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=61040 PROTO=TCP SPT=46905 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 08:48:55 syslog info -- MARK --
Jun 28 09:00:59 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=118.161.241.192 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=19192 DF PROTO=TCP SPT=61908 DPT=8080 WINDOW=8192 RES=0x00 SYN URGP=0
Jun 28 09:01:02 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=118.161.241.192 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=25530 DF PROTO=TCP SPT=61908 DPT=8080 WINDOW=8192 RES=0x00 SYN URGP=0
Jun 28 09:01:08 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=118.161.241.192 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=5512 DF PROTO=TCP SPT=61908 DPT=8080 WINDOW=8192 RES=0x00 SYN URGP=0
Jun 28 09:01:34 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=202.33.24.134 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=37046 DF PROTO=TCP SPT=33490 DPT=19059 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 09:24:57 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=193.138.232.15 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=16138 PROTO=TCP SPT=17330 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 09:48:54 syslog info -- MARK --
Jun 28 10:09:49 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=118.161.241.192 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=10291 DF PROTO=TCP SPT=51518 DPT=8080 WINDOW=8192 RES=0x00 SYN URGP=0
Jun 28 10:09:58 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=118.161.241.192 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=28984 DF PROTO=TCP SPT=51518 DPT=8080 WINDOW=8192 RES=0x00 SYN URGP=0
Jun 28 10:11:24 user warn syslog: dns query failed
Jun 28 10:12:28 user warn syslog: dns query failed
Jun 28 10:13:03 user warn syslog: dns query failed
Jun 28 10:13:05 user warn syslog: dns query failed
Jun 28 10:15:44 user warn syslog: dns query failed
Jun 28 10:17:52 user warn syslog: dns query failed
Jun 28 10:38:17 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=221.221.24.4 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=4521 DF PROTO=TCP SPT=62573 DPT=3931 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 10:38:17 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=85.238.125.125 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=53 ID=17341 DF PROTO=TCP SPT=61161 DPT=3993 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 10:38:18 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=85.238.125.125 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=53 ID=34039 DF PROTO=TCP SPT=61161 DPT=3993 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 10:38:18 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=221.221.24.4 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=10969 DF PROTO=TCP SPT=62573 DPT=3931 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 10:38:18 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=221.221.24.4 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=57080 DF PROTO=TCP SPT=62573 DPT=3931 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 10:48:16 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=221.221.24.4 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=13611 DF PROTO=TCP SPT=61789 DPT=3931 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 10:48:55 syslog info -- MARK --
Jun 28 11:08:17 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=85.238.125.125 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=53 ID=234 DF PROTO=TCP SPT=61529 DPT=3993 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 11:08:18 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=221.221.24.4 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=38392 DF PROTO=TCP SPT=62317 DPT=3931 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 11:30:31 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=193.138.232.15 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=36075 PROTO=TCP SPT=17330 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 11:38:17 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=85.238.125.125 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=53 ID=34522 DF PROTO=TCP SPT=61993 DPT=3993 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 11:38:18 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=85.238.125.125 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=53 ID=60394 DF PROTO=TCP SPT=61993 DPT=3993 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 11:48:55 syslog info -- MARK --
Jun 28 12:06:05 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=221.221.24.4 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=59186 DF PROTO=TCP SPT=60177 DPT=3931 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 12:06:06 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=221.221.24.4 DST=77.51.88.226 LEN=64 TOS=0x00 PREC=0x00 TTL=43 ID=31583 DF PROTO=TCP SPT=60177 DPT=3931 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 12:09:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=118.161.241.192 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=14019 DF PROTO=TCP SPT=63127 DPT=8080 WINDOW=8192 RES=0x00 SYN URGP=0
Jun 28 12:48:55 syslog info -- MARK --
Jun 28 13:09:51 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=118.161.241.192 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=3119 DF PROTO=TCP SPT=57205 DPT=8080 WINDOW=8192 RES=0x00 SYN URGP=0
Jun 28 13:09:53 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=118.161.241.192 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=9147 DF PROTO=TCP SPT=57205 DPT=8080 WINDOW=8192 RES=0x00 SYN URGP=0
Jun 28 13:09:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=70.68.251.126 DST=77.51.88.226 LEN=52 TOS=0x00 PREC=0x00 TTL=228 ID=0 DF PROTO=TCP SPT=21722 DPT=3128 WINDOW=52277 RES=0x00 SYN URGP=0
Тут выдернул телефонный провод
Jun 28 13:24:45 user crit kernel: ADSL link down
Jun 28 13:24:57 daemon notice pppd[248]: Terminating connection due to link down.
Jun 28 13:24:57 daemon info pppd[248]: Connect time 333.2 minutes.
Jun 28 13:24:57 daemon info pppd[248]: Sent 70603540 bytes, received 306320802 bytes.
Jun 28 13:25:01 user warn syslog: dns query failed
Jun 28 13:25:01 daemon warn pppd[248]: Couldn't increase MRU to 1500
Jun 28 13:25:04 user warn syslog: dns query failed
Jun 28 13:25:06 user warn syslog: dns query failed
Jun 28 13:25:08 user warn syslog: dns query failed
Jun 28 13:25:09 daemon notice pppd[248]: Connection terminated....
Jun 28 13:25:11 user warn syslog: dns query failed
Jun 28 13:25:13 user warn syslog: dns query failed
Где-то тут вставил обратно))
Jun 28 13:25:42 user crit kernel: ADSL G.994 training
Jun 28 13:25:51 user warn syslog: dns query failed
Jun 28 13:25:52 user crit kernel: ADSL G.992 started
Jun 28 13:25:54 user warn syslog: dns query failed
Jun 28 13:25:54 user crit kernel: ADSL G.992 channel analysis
Jun 28 13:25:56 user warn syslog: dns query failed
Jun 28 13:25:58 user warn syslog: dns query failed
Jun 28 13:25:59 user crit kernel: ADSL G.992 message exchange
Jun 28 13:25:59 user crit kernel: ADSL link up, interleaved, us=640, ds=6144
Jun 28 13:26:00 user warn syslog: dns query failed
Jun 28 13:26:02 user warn syslog: dns query failed
Jun 28 13:26:03 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jun 28 13:26:05 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jun 28 13:26:12 user debug syslog: route add default dev ppp_0_0_35_1 2>/dev/null
Соединение восстанавливается
Jun 28 13:26:34 daemon info pppd[248]: Starting link
Jun 28 13:26:35 daemon info pppd[248]: Sent PADT
Jun 28 13:26:35 daemon info pppd[248]: PPP session is 33266
Jun 28 13:26:35 daemon notice pppd[248]: Connect: ppp_0_0_35_1 <--> nas_0_0_35
Jun 28 13:26:35 daemon warn pppd[248]: Couldn't increase MRU to 1500
Jun 28 13:26:36 user warn syslog: dns query failed
Jun 28 13:26:37 daemon warn pppd[248]: Couldn't increase MRU to 1500
Jun 28 13:26:38 user warn syslog: dns query failed
Jun 28 13:26:38 daemon info pppd[248]: CHAP authentication succeeded
Jun 28 13:26:38 daemon notice pppd[248]: peer from calling number 00:13:C3:B5:22:1B authorized
Jun 28 13:27:21 user debug syslog: iptables -A FORWARD -o ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jun 28 13:27:25 user debug syslog: iptables -A FORWARD -i ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jun 28 13:27:29 user debug syslog: echo > /proc/net/ip_conntrack
Jun 28 13:27:32 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jun 28 13:27:34 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jun 28 13:27:35 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jun 28 13:27:35 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jun 28 13:27:37 user debug syslog: kill -9 489
Jun 28 13:27:38 user debug syslog: echo > /var/hosts
Jun 28 13:33:09 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=60.213.191.83 DST=77.51.88.226 LEN=40 TOS=0x00 PREC=0x00 TTL=99 ID=256 PROTO=TCP SPT=6000 DPT=2967 WINDOW=16384 RES=0x00 SYN URGP=0
Jun 28 13:33:45 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.115.95.130 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=6387 PROTO=TCP SPT=52555 DPT=10000 WINDOW=65535 RES=0x00 SYN URGP=0
Jun 28 13:36:04 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=193.138.232.15 DST=77.51.88.226 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=23228 PROTO=TCP SPT=17330 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
Как видно, ошибки ДНС проскакивают, но в общем все работает. Ни я ни сосед пока не жаловались, когда нужен инет - он работает))
Вообщем, пробуйте! Буду рад, если кому-то поможет. Удачи!!!