BCM96338 ADSL Router
Login: admin
Password:
> sysinfo
Number of processes: 31
6:39pm
up 1 day, 6:30,
load average: 1 min:0.07, 5 min:0.04, 15 min:0.00
total used free shared buffers
Mem: 13952 13356 596 0 848
Swap: 0 0 0
Total: 13952 13356 596
>
Код:
...
Nov 24 12:01:58 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=91.124.93.7 DST=91.124.187.243 LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=58741 DF PROTO=TCP SPT=3013 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0
Nov 24 12:07:56 daemon crit pppd[469]: Clear IP addresses. Connection DOWN.
Nov 24 12:07:56 daemon crit pppd[469]: Clear IP addresses. PPP connection DOWN.
Nov 24 12:08:02 daemon notice pppd[469]: PPP: Start to connect ...
Nov 24 12:08:02 daemon crit pppd[469]: PPP server detected.
Nov 24 12:08:03 daemon crit pppd[469]: PPP session established.
Nov 24 12:08:06 daemon notice pppd[469]: PPP: Start to connect ...
Nov 24 12:08:06 daemon crit pppd[469]: PPP server detected.
Nov 24 12:08:07 daemon crit pppd[469]: PPP session established.
Nov 24 12:08:07 daemon crit pppd[469]: PPP LCP UP.
Nov 24 12:08:07 daemon crit pppd[469]: Received valid IP address from server. Connection UP.
Nov 24 12:08:07 user debug syslog: route add default gw 195.5.5.209 2>/dev/null
Nov 24 12:08:07 user debug syslog: iptables -A FORWARD -o ppp_0_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Nov 24 12:08:07 user debug syslog: iptables -A FORWARD -i ppp_0_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Nov 24 12:08:08 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Nov 24 12:08:08 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Nov 24 12:08:10 user debug syslog: setkey -f /var/setkey.conf
Nov 24 12:08:10 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_1_32_1 -p tcp --dport 30005
Nov 24 12:08:10 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_1_32_1 -p tcp --dport 30005
Nov 24 12:08:10 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_1_32_1 -p udp -s 192.168.1.1/24 --dport 30006
Nov 24 12:08:10 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_1_32_1 -p udp -s 192.168.1.1/24 --dport 30006
Nov 24 12:08:11 user debug syslog: ifconfig ppp_0_1_32_1 mtu 1464
Nov 24 12:08:22 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=91.124.124.40 DST=91.124.180.219 LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=44475 DF PROTO=TCP SPT=3215 DPT=445 WINDOW=64800 RES=0x00 SYN URGP=0
Nov 24 12:08:44 syslog info -- MARK --
Nov 24 12:09:32 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=91.124.32.138 DST=91.124.180.219 LEN=64 TOS=0x00 PREC=0x00 TTL=46 ID=61056 DF PROTO=TCP SPT=3007 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0
...
Ну что я могу сказать))), биллинг успешно пережит, сессия поднялась.
Итог:
Bridge PPPoE Frames Between WAN and Local Ports (Default Disable) ставить (методом редактирования конфига) обязательно, если нужна нормальная работа. Если не нужна, можно не ставить
