что означает сей фидбек от модема?
System Log
Date/Time Facility Severity Message
Dec 28 21:58:38 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=95.55.38.41 DST=95.132.41.106 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=20910 DF PROTO=TCP SPT=4759 DPT=42157 WINDOW=65535 RES=0x00 SYN URGP=0
Dec 28 22:08:43 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=109.68.174.4 DST=95.132.41.106 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=30991 DF PROTO=TCP SPT=59036 DPT=42157 WINDOW=8192 RES=0x00 SYN URGP=0
Dec 28 22:17:34 daemon info pppd[282]: LCP terminated by peer
Dec 28 22:17:34 daemon info pppd[282]: Connect time 5255896.6 minutes.
Dec 28 22:17:34 daemon info pppd[282]: Sent 3992076562 bytes, received 1019062974 bytes.
Dec 28 22:17:34 daemon warn pppd[282]: Couldn't increase MRU to 1500
Dec 28 22:17:37 daemon notice pppd[282]: Connection terminated....
Dec 28 22:17:40 daemon info pppd[282]: Sent PADT
Dec 28 22:17:43 daemon info pppd[282]: PPP session is 4324
Dec 28 22:17:43 daemon info pppd[282]: Using interface ppp0_1_32_1
Dec 28 22:17:43 daemon notice pppd[282]: Connect: ppp_0_1_32_1 <--> nas_0_1_32
Dec 28 22:17:43 daemon warn pppd[282]: Couldn't increase MRU to 1500
Dec 28 22:17:44 daemon notice pppd[282]: PAP authentication succeeded
Dec 28 22:17:44 daemon notice pppd[282]: peer from calling number 00:90:1A:42:01:C3 authorized
Dec 28 22:17:44 daemon notice pppd[282]: local IP address 95.132.190.109
Dec 28 22:17:44 daemon notice pppd[282]: remote IP address 195.5.5.184
Dec 28 22:17:44 daemon notice pppd[282]: primary DNS address 213.179.249.134
Dec 28 22:17:44 daemon notice pppd[282]: secondary DNS address 213.179.249.131
Dec 28 22:17:44 user debug syslog: route add default gw 195.5.5.184 2>/dev/null
Dec 28 22:17:44 user debug syslog: iptables -A FORWARD -o ppp_0_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Dec 28 22:17:44 user debug syslog: iptables -A FORWARD -i ppp_0_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Dec 28 22:17:44 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Dec 28 22:17:44 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Dec 28 22:17:45 user debug syslog: echo 4096 > /proc/sys/net/ipv4/ipfrag_high_thresh
Dec 28 22:17:45 user debug syslog: echo 1024 > /proc/sys/net/ipv4/ipfrag_low_thresh
Dec 28 22:17:45 user debug syslog: echo 5 > /proc/sys/net/ipv4/ipfrag_time
Dec 28 22:17:54 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=77.85.137.186 DST=95.132.190.109 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=10627 DF PROTO=TCP SPT=2539 DPT=28167 WINDOW=65535 RES=0x00 SYN URGP=0
Dec 28 22:18:00 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=77.85.137.186 DST=95.132.190.109 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=11705 DF PROTO=TCP SPT=2539 DPT=28167 WINDOW=65535 RES=0x00 SYN URGP=0
Dec 28 22:18:06 syslog info -- MARK --
Dec 28 22:19:25 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=188.64.177.137 DST=95.132.190.109 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=18260 DF PROTO=TCP SPT=1238 DPT=52350 WINDOW=65535 RES=0x00 SYN URGP=0
Dec 28 22:19:25 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=91.37.118.218 DST=95.132.190.109 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=29098 DF PROTO=TCP SPT=1181 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Dec 28 22:19:25 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=188.162.147.235 DST=95.132.190.109 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=24460 DF PROTO=TCP SPT=62430 DPT=443 WINDOW=8192 RES=0x00 SYN
торент качает а интернет не открывается и нтв+ в дауне
каждый вечер в одно и тоже время, уже зае-ть начинает, то работало а это опять.......
написал потом увидел что отстаю по прошивкам(1.53 бета) перешил на 1.54 посмотрим как оно будет