DSL-2600U
H/W Ver.:C2
F/W Ver.:RU_2.02 (26.04.2010)
Проблема состоит в том, что компьютеру, подключенному через Ethernet не выдаётся IP-адрес. (Насколько я понял, в логе роутер это называет так: "
kernel: br0: port 1(eth0) entering disabled state").
Пользуюсь данным девайсом второй месяц. Настроен для работы в режиме роутер: по wi-fi 1-3 компьютера + один стационарный через ethernet. Нареканий не было первый месяц. Потом возникла проблема с Ethernet: стационарному компьютеру не выдавался IP и в результате он не мог подключиться. Первый раз помогла перепрошивка в RU_2.02 (тогда на сайте была какая-то за март 2010) и сброс настроек. Через две недели проблема повторилась. Перепрошивка и сброс настроек не помогли. Удалось решить проблему ручным вводом компьютера по MAC-адресу в Static IP Lease List и настройкой на использование выбранного IP (192.168.1.2) самого ПК (в свойствах протокола Internet (TCP/IP)).
Через неделю опять тоже самое. Перепрошивку в 2.02 от 26.04.2010 не помогла и сброс настроек также. Надеюсь на Вашу помощь для решения проблемы.
Результаты из раздела Diagnostics:
Код:
Test the connection to your local network
Test your ENET Connection: FAIL
Test your Wireless Connection: PASS
Test the connection to your DSL service provider
Test ADSL Synchronization: PASS
Test ATM OAM F5 segment ping: FAIL
Test ATM OAM F5 end-to-end ping: FAIL
Test the connection to your Internet service provider
Test PPP server connection: PASS
Test authentication with ISP: PASS
Test the assigned IP address: PASS
Ping default gateway: PASS
Ping primary Domain Name Server: PASS
Выдержка из лога за последнюю загрузку:
Код:
Date/Time Facility Severity Message
Jan 1 00:00:29 syslog emerg BCM96345 started: BusyBox v1.00 (2010.04.21-14:32+0000)
Jan 1 00:00:29 user warn kernel: Dentry cache hash table entries: 4096 (order: 2, 16384 bytes)
Jan 1 00:00:29 user warn kernel: Inode-cache hash table entries: 2048 (order: 1, 8192 bytes)
Jan 1 00:00:29 user info kernel: Memory: 13828k/16000k available (1508k kernel code, 2152k reserved, 227k data, 72k init, 0k highmem)
Jan 1 00:00:29 user warn kernel: KLOB Pool 1 Initialized: 1048576 bytes <0x80e00000 ... 0x80f00000>
Jan 1 00:00:29 user warn kernel: Calibrating delay loop... 239.20 BogoMIPS
Jan 1 00:00:29 user warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
Jan 1 00:00:29 user warn kernel: Checking for 'wait' instruction... unavailable.
Jan 1 00:00:29 user info kernel: NET: Registered protocol family 16
Jan 1 00:00:29 user warn kernel: Total Flash size: 4096K with 1024 sectors
Jan 1 00:00:29 user warn kernel: File system address: 0xbfc10100
Jan 1 00:00:29 user warn kernel: Blk# BlkOff Blks MemLen Partition Name
Jan 1 00:00:29 user warn kernel: 0 1408 1 1024 NVRAM
Jan 1 00:00:29 user warn kernel: 1010 0 6 24576 Config 2
Jan 1 00:00:29 user warn kernel: 1016 0 2 8192 Scratch PAD
Jan 1 00:00:29 user warn kernel: 1018 0 6 24576 Config 1
Jan 1 00:00:29 user warn kernel: Can't analyze prologue code at 801879d4
Jan 1 00:00:29 user info kernel: Initializing Cryptographic API
Jan 1 00:00:29 user info kernel: PPP generic driver version 2.4.2
Jan 1 00:00:29 user info kernel: PPP Deflate Compression module registered
Jan 1 00:00:29 user info kernel: PPP BSD Compression module registered
Jan 1 00:00:29 user info kernel: MPPE/MPPC encryption/compression module registered
Jan 1 00:00:29 user info kernel: NET: Registered protocol family 24
Jan 1 00:00:29 user warn kernel: Using noop io scheduler
Jan 1 00:00:29 user warn kernel: bcm963xx_mtd driver v1.0
Jan 1 00:00:29 user warn kernel: brcmboard: brcm_board_init entry
Jan 1 00:00:29 user info kernel: Serial: BCM63XX driver $Revision: 3.00 $
Jan 1 00:00:29 user warn kernel: ttyS0 at MMIO 0xfffe0300 (irq = 10) is a BCM63XX
Jan 1 00:00:29 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3 Apr 21 2010 22:27:11
Jan 1 00:00:29 user warn kernel: Config Internal PHY Through MDIO
Jan 1 00:00:29 user info kernel: BCM63xx_ENET: Auto-negotiation timed-out
Jan 1 00:00:29 user info kernel: BCM63xx_ENET: 10 MB Half-Duplex (assumed)
Jan 1 00:00:29 user warn kernel: eth0: MAC Address: 00:26:5A:DB:93:2C
Jan 1 00:00:29 user info kernel: NET: Registered protocol family 2
Jan 1 00:00:29 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes
Jan 1 00:00:29 user info kernel: TCP: Hash tables configured (established 512 bind 1024)
Jan 1 00:00:29 user info kernel: Initializing IPsec netlink socket
Jan 1 00:00:29 user info kernel: NET: Registered protocol family 1
Jan 1 00:00:29 user info kernel: NET: Registered protocol family 17
Jan 1 00:00:29 user info kernel: NET: Registered protocol family 15
Jan 1 00:00:29 user notice kernel: Ebtables v2.0 registered
Jan 1 00:00:29 user info kernel: NET: Registered protocol family 8
Jan 1 00:00:29 user info kernel: NET: Registered protocol family 20
Jan 1 00:00:29 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear
Jan 1 00:00:29 user info kernel: All bugs added by David S. Miller
Jan 1 00:00:29 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan 1 00:00:29 user info kernel: Freeing unused kernel memory: 72k freed
Jan 1 00:00:29 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Jan 1 00:00:29 user warn kernel: atmapi: module license 'Proprietary' taints kernel.
Jan 1 00:00:29 user warn kernel: adsl: adsl_init entry
Jan 1 00:00:29 user warn kernel: blaadd: blaa_detect entry
Jan 1 00:00:29 user info kernel: Broadcom BCMPROCFS v1.0 initialized
Jan 1 00:00:29 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered
Jan 1 00:00:29 user warn kernel: Trying to free free IRQ25
Jan 1 00:00:29 user warn kernel: BcmAdsl_Initialize=0xC00663E8, g_pFnNotifyCallback=0xC0080FE4
Jan 1 00:00:29 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:29 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x1B77A9 0xDEADBEEF
Jan 1 00:00:29 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FEF96C
Jan 1 00:00:29 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:29 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:29 user warn kernel: ATM proc init !!!
Jan 1 00:00:29 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:29 user warn kernel: ip_conntrack version 2.1 (125 buckets, 0 max) - 384 bytes per conntrack
Jan 1 00:00:29 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 00:00:29 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 00:00:29 user crit kernel: ADSL G.994 training
Jan 1 00:00:29 user warn kernel: ip_ct_h323: init success
Jan 1 00:00:29 user warn kernel: ip_nat_h323: init success
Jan 1 00:00:29 user warn kernel: BRCM NAT Caching v1.0 Nov 20 2007 10:22:27
Jan 1 00:00:29 user warn kernel: BRCM NAT Cache: Hooking hit function @ c0098088
Jan 1 00:00:29 user warn kernel: ip_conntrack_rtsp v0.01 loading
Jan 1 00:00:29 user warn kernel: ip_nat_rtsp v0.01 loading
Jan 1 00:00:29 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:29 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:29 user info kernel: logy change detected, propagating
Jan 1 00:00:29 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:29 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:29 user crit kernel: ADSL G.992 started
Jan 1 00:00:29 user info kernel: br0: port 2(wl0) entering learning state
Jan 1 00:00:29 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:29 user info kernel: br0: port 2(wl0) entering forwarding state
Jan 1 00:00:29 user debug syslog: brctl addbr pppbr
Jan 1 00:00:30 user debug syslog: pppd keepalive 0 0 -c 0.1.32.1 -r OGO! -i nas_0_1_32 -u "261-611856lv@dsl.ukrtel.net" -p ************ -f 1 -m 00901a42bc11/1e33 &
Jan 1 00:00:30 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:30 daemon notice pppd[371]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:30 user info kernel: br0: port 1(eth0) entering disabled state
Jan 1 00:00:37 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:37 user crit kernel: ADSL link up, interleaved, us=927, ds=4904
Jan 1 00:00:37 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:38 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:39 daemon notice pppd[371]: PPP: Start to connect ...
Jan 1 00:00:40 daemon crit pppd[371]: PPP server detected.
Jan 1 00:00:40 daemon crit pppd[371]: PPP session established.
Jan 1 00:00:40 daemon crit pppd[371]: PPP LCP UP.
Jan 1 00:00:41 daemon crit pppd[371]: Received valid IP address from server. Connection UP.
Jan 1 00:00:41 user debug syslog: route add default gw 195.5.5.206 2>/dev/null
Jan 1 00:00:41 user debug syslog: iptables -A FORWARD -o ppp_0_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:42 user debug syslog: iptables -A FORWARD -i ppp_0_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:42 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:42 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:42 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:42 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:42 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:42 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 213.179.249.133 2>/dev/null
Jan 1 00:00:42 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 213.179.249.133
Jan 1 00:00:42 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:42 user debug syslog: upnp -L br0 -W ppp_0_1_32_1 -D
Jan 1 00:00:42 user notice dnsprobe[700]: dnsprobe started!
Jan 1 00:00:42 user debug syslog: iptables -t filter -I OUTPUT -o ppp_0_1_32_1 -d 239.255.255.250 -j DROP 2>/dev/null
Jan 1 00:00:43 user debug syslog: iptables -I INPUT 1 -p icmp --icmp-type echo-request -i ppp_0_1_32_1 -j ACCEPT
Jan 1 00:00:43 user debug syslog: iptables -I INPUT 1 -i ppp_0_1_32_1 -p udp --dport 5060 -j ACCEPT 2>/dev/null
Jan 1 00:00:43 user debug syslog: iptables -I INPUT 1 -i ppp_0_1_32_1 -p udp --dport 7070:7079 -j ACCEPT 2>/dev/null
Jan 1 00:00:43 user debug syslog: iptables -t nat -A PREROUTING -i br0 -p udp --dport 5060 -j REDIRECT --to-ports 5060 2>/dev/null
Jan 1 00:00:44 user debug syslog: siproxd --config /var/siproxd/siproxd.conf &
Jan 1 00:00:44 user notice syslog: siproxd.c:192 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu starting up
Jan 1 00:00:44 user notice syslog: siproxd.c:218 INFO:daemonized, pid=750
Jan 1 00:00:44 user notice syslog: sock.c:65 INFO:bound to port 5060
Jan 1 00:00:44 user notice syslog: register.c:65 WARNING:registration file not found, starting with empty table
Jan 1 00:00:44 user notice syslog: siproxd.c:265 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu started
Jan 1 00:00:45 user debug syslog: setkey -f /var/setkey.conf
Jan 1 00:00:45 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_1_32_1 -p tcp --dport 30005
Jan 1 00:00:45 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_1_32_1 -p tcp --dport 30005
Jan 1 00:00:46 user debug syslog: iptables -I INPUT 1 -j ACCEPT -i ppp_0_1_32_1 -p udp -s 192.168.1.1/24 --dport 30006
Jan 1 00:00:46 user debug syslog: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_1_32_1 -p udp -s 192.168.1.1/24 --dport 30006
Jan 1 00:00:46 user debug syslog: ifconfig ppp_0_1_32_1 mtu 1492
Jan 1 00:00:48 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=213.56.77.185 DST=95.135.151.213 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=8678 DF PROTO=TCP SPT=1181 DPT=1433 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:48 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Jan 1 00:00:48 daemon err user: Stored Parameter Attribute data is corrupt or missing
Jan 1 00:00:51 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=213.56.77.185 DST=95.135.151.213 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=12433 DF PROTO=TCP SPT=1181 DPT=1433 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:00:59 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=95.132.175.163 DST=95.135.151.213 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=52670 DF PROTO=TCP SPT=2533 DPT=15492 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:01:02 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=95.132.175.163 DST=95.135.151.213 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=53305 DF PROTO=TCP SPT=2533 DPT=15492 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:01:06 user alert kernel: Intrusion -> IN=ppp_0_1_32_1 OUT= MAC= SRC=95.79.43.161 DST=95.135.151.213 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=30732 DF PROTO=TCP SPT=2323 DPT=15492 WINDOW=65535 RES=0x00 SYN URGP=0