когда делал это:
Цитата:
В Routing прописывается Static Route в сеть зоны local (IP 10.152.0.0 маска 255.255.0.0) через второй интерфейс.
получил вот что (может это из-за того, что второе соединение находится в Status = PPP Down)
Код:
Static Route Add Error
Configure route for address = 10.152.0.0 and subnet mask = 255.255.0.0 failed. Status: 1
Вот Лог:
Код:
Jan 1 00:00:21 user warn kernel: PID hash table entries: 64 (order 6: 512 bytes)
Jan 1 00:00:21 user warn kernel: Using 120.000 MHz high precision timer.
Jan 1 00:00:21 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)
Jan 1 00:00:21 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)
Jan 1 00:00:21 user info kernel: Memory: 13924k/16000k available (1439k kernel code, 2056k reserved, 208k data, 68k init, 0k highmem)
Jan 1 00:00:21 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80e00000 ... 0x80f00000>
Jan 1 00:00:21 user warn kernel: Calibrating delay loop... 239.20 BogoMIPS
Jan 1 00:00:21 user warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
Jan 1 00:00:21 user warn kernel: Checking for 'wait' instruction... unavailable.
Jan 1 00:00:21 user info kernel: NET: Registered protocol family 16
Jan 1 00:00:21 user warn kernel: Total Flash size: 4096K with 71 sectors
Jan 1 00:00:21 user warn kernel: File system address: 0xbfc10100
Jan 1 00:00:21 user warn kernel: Blk# BlkOff Blks MemLen Partition Name
Jan 1 00:00:21 user warn kernel: 0 1408 1 1024 NVRAM
Jan 1 00:00:21 user warn kernel: 69 40960 1 24576 Config 2
Jan 1 00:00:21 user warn kernel: 70 32768 1 8192 Scratch PAD
Jan 1 00:00:21 user warn kernel: 70 40960 1 24576 Config 1
Jan 1 00:00:21 user warn kernel: Can't analyze prologue code at 801766b4
Jan 1 00:00:21 user info kernel: Initializing Cryptographic API
Jan 1 00:00:21 user info kernel: PPP generic driver version 2.4.2
Jan 1 00:00:21 user info kernel: NET: Registered protocol family 24
Jan 1 00:00:21 user warn kernel: Using noop io scheduler
Jan 1 00:00:21 user warn kernel: bcm963xx_mtd driver v1.0
Jan 1 00:00:21 user warn kernel: brcmboard: brcm_board_init entry
Jan 1 00:00:21 user warn kernel: SES: Button Interrupt 0x0 is enabled
Jan 1 00:00:21 user warn kernel: SES: LED GPIO 0x8005 is enabled
Jan 1 00:00:21 user info kernel: Serial: BCM63XX driver $Revision: 3.00 $
Jan 1 00:00:21 user warn kernel: ttyS0 at MMIO 0xfffe0300 (irq = 10) is a BCM63XX
Jan 1 00:00:21 user info kernel: NET: Registered protocol family 2
Jan 1 00:00:21 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes
Jan 1 00:00:21 user info kernel: TCP: Hash tables configured (established 512 bind 1024)
Jan 1 00:00:21 user info kernel: Initializing IPsec netlink socket
Jan 1 00:00:21 user info kernel: NET: Registered protocol family 1
Jan 1 00:00:21 user info kernel: NET: Registered protocol family 17
Jan 1 00:00:21 user info kernel: NET: Registered protocol family 15
Jan 1 00:00:21 user notice kernel: Ebtables v2.0 registered
Jan 1 00:00:21 user info kernel: NET: Registered protocol family 8
Jan 1 00:00:21 user info kernel: NET: Registered protocol family 20
Jan 1 00:00:21 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear
Jan 1 00:00:21 user info kernel: All bugs added by David S. Miller
Jan 1 00:00:21 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan 1 00:00:21 user info kernel: Freeing unused kernel memory: 68k freed
Jan 1 00:00:21 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Jan 1 00:00:21 user warn kernel: atmapi: module license 'Proprietary' taints kernel.
Jan 1 00:00:21 user warn kernel: adsl: adsl_init entry
Jan 1 00:00:21 user warn kernel: blaadd: blaa_detect entry
Jan 1 00:00:21 user info kernel: Broadcom BCMPROCFS v1.0 initialized
Jan 1 00:00:21 user warn kernel: SDIOH mode switch from 1 to 2
Jan 1 00:00:21 user warn kernel: available commands: sdio sdioh
Jan 1 00:00:21 user warn kernel:
Jan 1 00:00:21 user warn kernel: ---SDIO init SUCCEEDED--- blockmode capable
Jan 1 00:00:21 user warn kernel:
Jan 1 00:00:21 user warn kernel: chipid 0x4014312
Jan 1 00:00:21 user warn kernel: chip is bcm4312, use 512 bytes blksize
Jan 1 00:00:21 user warn kernel: bcmsdh_attach, sdioh_attach successful, bcmsdh->sdioh 0x80e58b70
Jan 1 00:00:21 user warn kernel: wl: srom not detected, using main memory mapped srom info (wombo board)
Jan 1 00:00:21 user warn kernel: wl0: wlc_attach: use mac addr from the system pool by id: 0x776c0000
Jan 1 00:00:21 user warn kernel: wl0: MAC Address: 00:21:91:CD:F1:35
Jan 1 00:00:21 user warn kernel: wl0: Broadcom BCM4318 802.11 Wireless Controller 4.170.16.0.cpe2.1sd1
Jan 1 00:00:21 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered
Jan 1 00:00:21 user warn kernel: Trying to free free IRQ25
Jan 1 00:00:21 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3 Aug 4 2008 02:14:54
Jan 1 00:00:21 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface
Jan 1 00:00:21 user warn kernel: ethsw: found bcm5325e!
Jan 1 00:00:21 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered
Jan 1 00:00:21 user warn kernel: eth0: MAC Address: 00:21:91:CD:F1:36
Jan 1 00:00:21 user crit kernel: eth0 Link UP.
Jan 1 00:00:21 user warn kernel: BcmAdsl_Initialize=0xC00663E8, g_pFnNotifyCallback=0xC0080FE4
Jan 1 00:00:21 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:21 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x1B77A9 0xDEADBEEF
Jan 1 00:00:21 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FFBB64
Jan 1 00:00:21 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:21 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:21 user warn kernel: ATM proc init !!!
Jan 1 00:00:21 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:21 user warn kernel: _conntrack version 2.1 (125 buckets, 0 max) - 384 bytes per conntrack
Jan 1 00:00:21 user warn kernel: ip_ct_h323: init success
Jan 1 00:00:21 user warn kernel: ip_nat_h323: init success
Jan 1 00:00:21 user crit kernel: ADSL G.994 training
Jan 1 00:00:21 user warn kernel: BRCM NAT Caching v1.0 Nov 20 2007 10:22:27
Jan 1 00:00:21 user warn kernel: BRCM NAT Cache: Hooking hit function @ c005f088
Jan 1 00:00:21 user warn kernel: ip_conntrack_rtsp v0.01 loading
Jan 1 00:00:21 user warn kernel: ip_nat_rtsp v0.01 loading
Jan 1 00:00:21 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:21 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:21 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:21 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:21 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:21 user info kernel: br0: port 2(wl0) entering learning state
Jan 1 00:00:21 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:21 user info kernel: br0: port 2(wl0) entering forwarding state
Jan 1 00:00:22 user debug syslog: pppd keepalive -c 0.0.67.1 -r Center-Telecom -i nas_0_0_67 -u sapfir-32dml -p ******** -f 0 -m 00229197841b/8494 &
Jan 1 00:00:22 user debug syslog: pppd keepalive -c 0.0.35.1 -r Local`ka -i nas_0_0_35 -u sapfir-32dml/local -p ******** -f 0 &
Jan 1 00:00:22 daemon notice pppd[348]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:27 user crit kernel: ADSL G.992 started
Jan 1 00:00:31 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:37 user crit kernel: ADSL link up, interleaved, us=769, ds=11553
Jan 1 00:00:37 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:39 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:39 daemon notice pppd[348]: PPP: Start to connect ...
Jan 1 00:00:40 daemon crit pppd[348]: PPP server detected.
Jan 1 00:00:40 daemon crit pppd[348]: PPP session established.
Jan 1 00:00:40 daemon crit pppd[348]: PPP LCP UP.
Jan 1 00:00:42 daemon crit pppd[348]: Received valid IP address from server. Connection UP.
Jan 1 00:00:43 user debug syslog: route add default dev ppp_0_0_67_1 2>/dev/null
Jan 1 00:00:43 user debug syslog: iptables -A FORWARD -o ppp_0_0_67_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:43 user debug syslog: iptables -A FORWARD -i ppp_0_0_67_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:43 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:43 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:43 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:44 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_67_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:44 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_67_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:44 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 62.148.128.1 2>/dev/null
Jan 1 00:00:44 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 62.148.128.1
Jan 1 00:00:44 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:44 user debug syslog: upnp -L br0 -W ppp_0_0_67_1 -D
Jan 1 00:00:44 user notice dnsprobe[744]: dnsprobe started!
Jan 1 00:00:44 user debug syslog: iptables -t filter -I OUTPUT -o ppp_0_0_67_1 -d 239.255.255.250 -j DROP 2>/dev/null
Jan 1 00:00:45 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=94.242.152.134 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=44984 DF PROTO=TCP SPT=2507 DPT=59039 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:45 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=62.148.133.124 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=44107 DF PROTO=TCP SPT=19879 DPT=59039 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:00:45 user debug syslog: iptables -I INPUT 1 -i ppp_0_0_67_1 -p udp --dport 5060 -j ACCEPT 2>/dev/null
Jan 1 00:00:45 user debug syslog: iptables -I INPUT 1 -i ppp_0_0_67_1 -p udp --dport 7070:7079 -j ACCEPT 2>/dev/null
Jan 1 00:00:45 user debug syslog: iptables -t nat -A PREROUTING -i br0 -p udp --dport 5060 -j REDIRECT --to-ports 5060 2>/dev/null
Jan 1 00:00:45 user debug syslog: siproxd --config /var/siproxd/siproxd.conf &
Jan 1 00:00:46 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=94.178.208.63 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=63821 DF PROTO=TCP SPT=1163 DPT=59039 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:46 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=78.36.147.60 DST=62.148.153.101 LEN=48 TOS=0x08 PREC=0x20 TTL=116 ID=30940 DF PROTO=TCP SPT=9010 DPT=59039 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:00:46 user notice syslog: siproxd.c:192 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu starting up
Jan 1 00:00:46 user notice syslog: siproxd.c:218 INFO:daemonized, pid=804
Jan 1 00:00:46 user notice syslog: sock.c:65 INFO:bound to port 5060
Jan 1 00:00:46 user notice syslog: register.c:65 WARNING:registration file not found, starting with empty table
Jan 1 00:00:46 user notice syslog: siproxd.c:265 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu started
Jan 1 00:00:46 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=212.106.49.27 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=51056 DF PROTO=TCP SPT=3638 DPT=59039 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:46 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=90.151.117.165 DST=62.148.153.101 LEN=60 TOS=0x08 PREC=0x20 TTL=115 ID=29560 DF PROTO=TCP SPT=1040 DPT=59039 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:47 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=188.163.32.93 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=53741 DF PROTO=TCP SPT=4390 DPT=59039 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:00:47 user debug syslog: setkey -f /var/setkey.conf
Jan 1 00:00:48 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_67_1 -p tcp --dport 30005
Jan 1 00:00:48 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_67_1 -p tcp --dport 30005
Jan 1 00:00:48 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=95.30.19.186 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=27111 DF PROTO=TCP SPT=2118 DPT=59039 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:00:48 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_67_1 -p udp -s 192.168.1.1/24 --dport 30006
Jan 1 00:00:48 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_67_1 -p udp -s 192.168.1.1/24 --dport 30006
Jan 1 00:00:48 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=62.148.133.124 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=45172 DF PROTO=TCP SPT=19879 DPT=59039 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:00:48 daemon err user: No server certificate found. Skip checking on certificate.
Jan 1 00:00:48 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=94.242.149.222 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=5843 DF PROTO=TCP SPT=3590 DPT=59039 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:48 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=212.106.37.94 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=51546 DF PROTO=TCP SPT=3587 DPT=59039 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:49 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=94.178.208.63 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=63928 DF PROTO=TCP SPT=1163 DPT=59039 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:49 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=90.151.117.165 DST=62.148.153.101 LEN=60 TOS=0x08 PREC=0x20 TTL=115 ID=29623 DF PROTO=TCP SPT=1040 DPT=59039 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:50 user debug syslog: ifconfig ppp_0_0_67_1 mtu 1492
Jan 1 00:00:52 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Jan 1 00:00:52 daemon err user: Stored Parameter Attribute data is corrupt or missing
Jan 1 00:10:49 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=95.30.19.186 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=33683 DF PROTO=TCP SPT=1133 DPT=59039 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:20:50 user alert kernel: Intrusion -> IN=ppp_0_0_67_1 OUT= MAC= SRC=212.106.60.196 DST=62.148.153.101 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=29675 DF PROTO=TCP SPT=58392 DPT=59039 WINDOW=65535 RES=0x00 SYN URGP=0