faq обучение настройка
Текущее время: Вс авг 10, 2025 02:34

Часовой пояс: UTC + 3 часа




Начать новую тему Ответить на тему  [ Сообщений: 10 ] 
Автор Сообщение
 Заголовок сообщения: проблемы подключения adsl на 2540u
СообщениеДобавлено: Пн июл 05, 2010 00:20 
Не в сети

Зарегистрирован: Пн июл 05, 2010 00:16
Сообщений: 7
Часто происходят обрывы связи в логе
RS Correctable Errors: 25 0

После перезагрузки модема становится 0 0, но через некоторое время ошибки Downstream вновь появляются, как видно выше. Кто может сказать что происходит и как решить ?


Вернуться наверх
 Профиль  
 
 Заголовок сообщения:
СообщениеДобавлено: Пн июл 05, 2010 09:12 
Не в сети
Сотрудник D-LINK
Сотрудник D-LINK

Зарегистрирован: Пт апр 01, 2005 12:35
Сообщений: 8492
Откуда: Москва
Прежде всего включите логирование на устройстве (в режиме debugging/debugging) и приведите лог устройства здесь.

_________________
С уважением, Давыдов Денис.


Вернуться наверх
 Профиль  
 
 Заголовок сообщения:
СообщениеДобавлено: Пн июл 05, 2010 23:22 
Не в сети

Зарегистрирован: Пн июл 05, 2010 00:16
Сообщений: 7
Date/Time Facility Severity Message
Jan 1 00:00:22 syslog emerg BCM96345 started: BusyBox v1.00 (2008.01.11-03:24+0000)
Jan 1 00:00:22 user notice kernel: klogd started: BusyBox v1.00 (2008.01.11-03:24+0000)
Jan 1 00:00:22 user warn kernel: Linux version 2.6.8.1 (jenny@BS5) (gcc version 3.4.2) #1 Fri Jan 11 11:23:01 CST 2008
Jan 1 00:00:22 user warn kernel: Parallel flash device: name AM29LV160B, id 0x2249, size 2048KB
Jan 1 00:00:22 user warn kernel: DSL-2540U prom init
Jan 1 00:00:22 user warn kernel: CPU revision is: 00029010
Jan 1 00:00:22 user warn kernel: Determined physical RAM map:
Jan 1 00:00:22 user warn kernel: memory: 007a0000 @ 00000000 (usable)
Jan 1 00:00:22 user debug kernel: On node 0 totalpages: 1952
Jan 1 00:00:22 user debug kernel: DMA zone: 1952 pages, LIFO batch:1
Jan 1 00:00:22 user debug kernel: Normal zone: 0 pages, LIFO batch:1
Jan 1 00:00:22 user debug syslog: echo > /var/snmpd.conf
Jan 1 00:00:22 user debug kernel: HighMem zone: 0 pages, LIFO batch:1
Jan 1 00:00:22 user warn kernel: Built 1 zonelists
Jan 1 00:00:22 user warn kernel: Kernel command line: root=31:0 ro noinitrd console=ttyS0,115200
Jan 1 00:00:22 user warn kernel: brcm mips: enabling icache and dcache...
Jan 1 00:00:22 user warn kernel: Primary instruction cache 16kB, physically tagged, 2-way, linesize 16 bytes.
Jan 1 00:00:22 user warn kernel: Primary data cache 8kB 2-way, linesize 16 bytes.
Jan 1 00:00:22 user warn kernel: PID hash table entries: 32 (order 5: 256 bytes)
Jan 1 00:00:22 user warn kernel: Using 120.000 MHz high precision timer.
Jan 1 00:00:22 user warn kernel: Dentry cache hash table entries: 2048 (order: 1, 8192 bytes)
Jan 1 00:00:22 user warn kernel: Inode-cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:22 user info kernel: Memory: 5808k/7808k available (1437k kernel code, 1980k reserved, 210k data, 68k init, 0k highmem)
Jan 1 00:00:22 user warn kernel: Calibrating delay loop... 239.20 BogoMIPS
Jan 1 00:00:22 user warn kernel: Mount-cache hash table entries: 512 (order: 0, 4096 bytes)
Jan 1 00:00:22 user warn kernel: Checking for 'wait' instruction... unavailable.
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 16
Jan 1 00:00:22 user warn kernel: Total Flash size: 2048K with 35 sectors
Jan 1 00:00:22 user warn kernel: File system address: 0xbfc10100
Jan 1 00:00:22 user warn kernel: Can't analyze prologue code at 80175dd4
Jan 1 00:00:22 user info kernel: Initializing Cryptographic API
Jan 1 00:00:22 user info kernel: PPP generic driver version 2.4.2
Jan 1 00:00:22 user info kernel: PPP Deflate Compression module registered
Jan 1 00:00:22 user info kernel: PPP BSD Compression module registered
Jan 1 00:00:22 user info kernel: MPPE/MPPC encryption/compression module registered
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 24
Jan 1 00:00:22 user warn kernel: Using noop io scheduler
Jan 1 00:00:22 user warn kernel: bcm963xx_mtd driver v1.0
Jan 1 00:00:22 user warn kernel: brcmboard: brcm_board_init entry
Jan 1 00:00:22 user warn kernel:
Jan 1 00:00:22 user warn kernel: ======= GPIO CONFIG_BCM96338 inited ========
Jan 1 00:00:22 user info kernel: Serial: BCM63XX driver $Revision: 3.00 $
Jan 1 00:00:22 user warn kernel: ttyS0 at MMIO 0xfffe0300 (irq = 10) is a BCM63XX
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 2
Jan 1 00:00:22 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes
Jan 1 00:00:22 user info kernel: TCP: Hash tables configured (established 512 bind 1024)
Jan 1 00:00:22 user info kernel: Initializing IPsec netlink socket
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 1
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 17
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 15
Jan 1 00:00:22 user notice kernel: Ebtables v2.0 registered
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 8
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 20
Jan 1 00:00:22 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear
Jan 1 00:00:22 user info kernel: All bugs added by David S. Miller
Jan 1 00:00:22 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan 1 00:00:22 user info kernel: Freeing unused kernel memory: 68k freed
Jan 1 00:00:22 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Jan 1 00:00:22 user warn kernel: atmapi: module license 'Proprietary' taints kernel.
Jan 1 00:00:22 user warn kernel: adsl: adsl_init entry
Jan 1 00:00:22 user warn kernel: blaadd: blaa_detect entry
Jan 1 00:00:22 user info kernel: Broadcom BCMPROCFS v1.0 initialized
Jan 1 00:00:22 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3 Jan 11 2008 11:21:58
Jan 1 00:00:22 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface
Jan 1 00:00:22 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered
Jan 1 00:00:22 user warn kernel: eth0: MAC Address: 00:1E:58:98:94:4F
Jan 1 00:00:22 user warn kernel: BcmAdsl_Initialize=0xC00673F8, g_pFnNotifyCallback=0xC007FC64
Jan 1 00:00:22 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:22 user warn kernel: pSdramPHY=0xA07FFFF8, 0x24A0A590 0x34802274
Jan 1 00:00:22 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA07FD3D4
Jan 1 00:00:22 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000980 adsl2=0x00000000
Jan 1 00:00:22 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:22 user warn kernel: ATM proc init !!!
Jan 1 00:00:22 user crit kernel: eth0 Link UP.
Jan 1 00:00:22 user crit kernel: ADSL G.994 training
Jan 1 00:00:22 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:22 user warn kernel: ip_conntrack version 2.1 (61 buckets, 0 max) - 376 bytes per conntrack
Jan 1 00:00:22 user warn kernel: ip_conntrack_pptp version 2.1 loaded
Jan 1 00:00:22 user warn kernel: ip_nat_pptp version 2.0 loaded
Jan 1 00:00:22 user warn kernel: ip_nat_ftp: Unknown symbol needs_ip_conntrack_ftp
Jan 1 00:00:22 user crit kernel: ADSL G.992 started
Jan 1 00:00:22 user warn kernel: ip_nat_sip: Unknown symbol sip_getpkt_type
Jan 1 00:00:22 user warn kernel: ip_nat_sip: Unknown symbol ct_sip_hdrs
Jan 1 00:00:22 user warn kernel: ip_nat_sip: Unknown symbol ct_sip_data
Jan 1 00:00:22 user warn kernel: ip_nat_sip: Unknown symbol ct_sip_get_info
Jan 1 00:00:22 user warn kernel: ip_nat_sip: Unknown symbol set_expected_rtp
Jan 1 00:00:22 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:22 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:22 user info kernel: device eth0 left promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 1(eth0) entering disabled state
Jan 1 00:00:22 user crit kernel: 1, ds=8133
Jan 1 00:00:22 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:22 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:23 user debug syslog: echo > /var/hosts
Jan 1 00:00:23 user warn kernel:
Jan 1 00:00:23 user warn kernel: ioctl, p_name=diapd
Jan 1 00:00:24 user debug syslog: pppd plugin pppoe nas_0_1_34 nodetach user '5604201' password ********* interface_name 0_1_34_1 usepeerdns refuse-eap persist lcp-echo-interval 30 holdoff 3 nomppc nomppe mtu 1492 &
Jan 1 00:00:29 daemon info pppd[300]: Plugin pppoe loaded.
Jan 1 00:00:29 daemon info pppd[300]: RP-PPPoE plugin version 3.3 compiled against pppd 2.4.3
Jan 1 00:00:29 daemon info pppd[300]: Plugin pppoe called.
Jan 1 00:00:31 daemon notice pppd[300]: pppd 2.4.3 started by admin, uid 0
Jan 1 00:00:33 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:38 daemon info pppd[300]: PPP session is 12829
Jan 1 00:00:39 daemon info pppd[300]: Using interface ppp0_1_34_1
Jan 1 00:00:39 daemon notice pppd[300]: Connect: ppp_0_1_34_1 <--> nas_0_1_34
Jan 1 00:00:39 daemon warn pppd[300]: Couldn't increase MRU to 1500
Jan 1 00:00:40 daemon warn pppd[300]: Couldn't increase MRU to 1500
Jan 1 00:00:40 daemon info pppd[300]: CHAP authentication succeeded
Jan 1 00:00:40 daemon notice pppd[300]: peer from calling number 00:26:99:D3:D0:1A authorized
Jan 1 00:00:41 daemon notice pppd[300]: local IP address 93.125.67.47
Jan 1 00:00:41 daemon notice pppd[300]: remote IP address 93.125.5.8
Jan 1 00:00:41 daemon notice pppd[300]: primary DNS address 213.184.225.37
Jan 1 00:00:41 daemon notice pppd[300]: secondary DNS address 213.184.224.254
Jan 1 00:00:53 user debug syslog: route add default gw 93.125.5.8 2>/dev/null
Jan 1 00:00:54 user debug syslog: iptables -A FORWARD -o ppp_0_1_34_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:55 user debug syslog: iptables -A FORWARD -i ppp_0_1_34_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:55 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:56 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:57 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:57 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_1_34_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:58 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_1_34_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:58 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 213.184.225.37 2>/dev/null
Jan 1 00:00:58 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 213.184.225.37
Jan 1 00:00:58 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:59 user debug syslog: kill -9 296
Jan 1 00:01:00 user debug syslog: echo > /var/hosts
Jan 1 00:01:00 user notice dnsprobe[417]: dnsprobe started!
Jan 1 00:03:33 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=92.36.108.166 DST=93.125.67.47 LEN=52 TOS=0x00 PREC=0x00 TTL=119 ID=928 DF PROTO=TCP SPT=53351 DPT=5181 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:03:33 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=151.48.75.188 DST=93.125.67.47 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=21704 DF PROTO=TCP SPT=64224 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:03:34 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=95.25.157.81 DST=93.125.67.47 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=895 DF PROTO=TCP SPT=1084 DPT=443 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:03:36 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=92.36.108.166 DST=93.125.67.47 LEN=52 TOS=0x00 PREC=0x00 TTL=119 ID=930 DF PROTO=TCP SPT=53351 DPT=5181 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:03:36 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=151.48.75.188 DST=93.125.67.47 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=21707 DF PROTO=TCP SPT=64224 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:30:00 user warn kernel: AdslCoreEcUpdTmr: timeMs=1800010 ecUpdMask=0x40000
Jan 1 00:33:28 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=87.252.255.75 DST=93.125.67.47 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=35762 DF PROTO=TCP SPT=54697 DPT=26757 WINDOW=5440 RES=0x00 SYN URGP=0
Jan 1 00:33:31 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=87.252.255.75 DST=93.125.67.47 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=35763 DF PROTO=TCP SPT=54697 DPT=26757 WINDOW=5440 RES=0x00 SYN URGP=0
Jan 1 00:33:37 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=87.252.255.75 DST=93.125.67.47 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=35764 DF PROTO=TCP SPT=54697 DPT=26757 WINDOW=5440 RES=0x00 SYN URGP=0
Jan 1 00:51:37 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=87.252.255.75 DST=93.125.67.47 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=5831 DF PROTO=TCP SPT=38752 DPT=26757 WINDOW=5440 RES=0x00 SYN URGP=0
Jan 1 01:00:22 syslog info -- MARK --
Jan 1 01:02:59 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=216.14.230.40 DST=93.125.67.47 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=54337 DF PROTO=TCP SPT=4562 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0


Вернуться наверх
 Профиль  
 
 Заголовок сообщения:
СообщениеДобавлено: Пн июл 05, 2010 23:26 
Не в сети

Зарегистрирован: Пн июл 05, 2010 00:16
Сообщений: 7
Вот все что написалось в логе от рестарта модема до момента когда модем "завис" (т.е. инет пропал, соединение разорвалось, но лампочки DSL и Internet продолжали гореть зеленым) и инет дискнулся.

зы. сорри за 2 сообщения подряд


Вернуться наверх
 Профиль  
 
 Заголовок сообщения:
СообщениеДобавлено: Вт июл 06, 2010 09:52 
Не в сети
Сотрудник D-LINK
Сотрудник D-LINK

Зарегистрирован: Пт апр 01, 2005 12:35
Сообщений: 8492
Откуда: Москва
Какой именно у Вас ревижн DSL-2540U?
D1, C1, C2?

Посмотрите на стикере с обратной стороны устройства и напишите здесь.

_________________
С уважением, Давыдов Денис.


Вернуться наверх
 Профиль  
 
 Заголовок сообщения:
СообщениеДобавлено: Вт июл 06, 2010 10:14 
Не в сети

Зарегистрирован: Пн июл 05, 2010 00:16
Сообщений: 7
D1


Вернуться наверх
 Профиль  
 
 Заголовок сообщения:
СообщениеДобавлено: Вт июл 06, 2010 11:56 
Не в сети
Сотрудник D-LINK
Сотрудник D-LINK

Зарегистрирован: Пт апр 01, 2005 12:35
Сообщений: 8492
Откуда: Москва
Попробуйте использовать эту версию прошивки:
ftp://ftp.dlink.ru/pub/ADSL/DSL-2540U_B ... 062010.zip

_________________
С уважением, Давыдов Денис.


Вернуться наверх
 Профиль  
 
 Заголовок сообщения:
СообщениеДобавлено: Вт июл 06, 2010 14:06 
Не в сети

Зарегистрирован: Пн июл 05, 2010 00:16
Сообщений: 7
Спасибо попробую, а пока еще один дисконект :(

Date/Time Facility Severity Message
Jan 1 03:36:37 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=125.27.13.245 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=2105 DF PROTO=TCP SPT=4590 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 03:39:37 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=189.15.148.52 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=55 ID=46864 DF PROTO=TCP SPT=2828 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 03:47:32 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=93.148.8.50 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=14953 DF PROTO=TCP SPT=3778 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 03:52:44 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=210.24.211.184 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=25613 DF PROTO=TCP SPT=2921 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 03:54:55 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=79.171.127.247 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=40676 PROTO=TCP SPT=51649 DPT=33155 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 04:00:22 syslog info -- MARK --
Jan 1 04:02:23 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=94.251.102.131 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=18189 DF PROTO=TCP SPT=2175 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 04:26:59 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=90.12.243.120 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=61225 DF PROTO=TCP SPT=3345 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 04:28:59 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=178.18.17.50 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=40932 PROTO=TCP SPT=43104 DPT=22 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 04:31:57 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=41.130.57.98 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=63245 DF PROTO=TCP SPT=2107 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 04:43:47 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=190.232.214.28 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=62813 DF PROTO=TCP SPT=3602 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 04:53:56 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=118.161.233.91 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=49 ID=4314 DF PROTO=TCP SPT=3427 DPT=1080 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 05:00:22 syslog info -- MARK --
Jan 1 05:03:17 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=190.42.36.203 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=44 ID=51805 DF PROTO=TCP SPT=3655 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 05:14:32 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=78.101.137.187 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=34417 DF PROTO=TCP SPT=2814 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 05:23:56 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=190.128.108.48 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=26957 DF PROTO=TCP SPT=2410 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 05:33:52 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=188.153.0.54 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=39 ID=50929 DF PROTO=TCP SPT=3202 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 05:42:18 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=222.253.187.130 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=6082 DF PROTO=TCP SPT=4266 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 05:54:55 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=79.171.127.247 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=48738 PROTO=TCP SPT=52975 DPT=33155 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 06:00:22 syslog info -- MARK --
Jan 1 06:02:44 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=89.252.203.76 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=27892 DF PROTO=TCP SPT=2863 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 06:11:50 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=85.105.40.222 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=26419 DF PROTO=TCP SPT=4426 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 06:21:58 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=86.66.206.88 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=34215 DF PROTO=TCP SPT=3780 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 06:36:16 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=80.25.162.180 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=48544 DF PROTO=TCP SPT=4629 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 06:45:02 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=125.237.25.123 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=20278 DF PROTO=TCP SPT=2468 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 06:54:15 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=83.195.142.55 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=41037 DF PROTO=TCP SPT=2923 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 07:00:22 syslog info -- MARK --
Jan 1 07:07:37 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=82.63.221.186 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=492 DF PROTO=TCP SPT=4003 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 07:12:27 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=90.12.159.127 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=30175 DF PROTO=TCP SPT=4024 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 07:22:08 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=123.2.195.122 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=20716 DF PROTO=TCP SPT=4301 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 07:33:52 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=90.22.242.7 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=65206 DF PROTO=TCP SPT=3482 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 07:47:21 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=86.75.58.125 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=4789 DF PROTO=TCP SPT=3573 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 07:54:10 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=213.154.215.202 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=16266 DF PROTO=TCP SPT=2553 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 08:00:22 syslog info -- MARK --
Jan 1 08:01:46 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=121.73.210.98 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=39821 DF PROTO=TCP SPT=2432 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 08:28:48 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=90.38.224.109 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=12305 DF PROTO=TCP SPT=4685 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 08:30:03 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=212.86.231.96 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=38528 DF PROTO=TCP SPT=3383 DPT=23 WINDOW=5772 RES=0x00 SYN URGP=0
Jan 1 08:34:43 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=90.13.182.246 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=11899 DF PROTO=TCP SPT=3785 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 08:48:12 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=90.21.88.169 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=52296 DF PROTO=TCP SPT=3083 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 08:51:43 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=83.21.102.166 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=30842 DF PROTO=TCP SPT=3710 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 09:00:22 syslog info -- MARK --
Jan 1 09:03:11 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=189.26.135.59 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=46692 DF PROTO=TCP SPT=4281 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 09:12:53 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=58.11.70.19 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=45001 DF PROTO=TCP SPT=2421 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 09:25:39 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=151.48.59.128 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=35341 DF PROTO=TCP SPT=3226 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 09:31:49 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=41.191.53.95 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=38534 DF PROTO=TCP SPT=3262 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 09:42:02 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=118.172.25.1 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=43 ID=18558 DF PROTO=TCP SPT=4114 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 09:52:25 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=93.184.238.187 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=5942 DF PROTO=TCP SPT=3946 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 10:00:22 syslog info -- MARK --
Jan 1 10:02:51 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=85.237.54.13 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=55 ID=36205 DF PROTO=TCP SPT=2505 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 10:12:08 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=201.236.246.55 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=14695 DF PROTO=TCP SPT=4303 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 10:22:26 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=85.110.8.23 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=63086 DF PROTO=TCP SPT=3550 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 10:33:45 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=115.135.251.15 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=55 ID=10701 DF PROTO=TCP SPT=3998 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 10:42:39 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=200.111.213.106 DST=91.149.190.20 LEN=56 TOS=0x00 PREC=0x00 TTL=52 ID=65311 DF PROTO=TCP SPT=2890 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 10:52:56 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=87.10.67.235 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=42572 DF PROTO=TCP SPT=4509 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 10:59:33 user debug kernel: net/ipv4/netfilter/./broadcom/ip_nat_ipsec.c:ipsec_nat_help Out of table entries
Jan 1 11:00:22 syslog info -- MARK --
Jan 1 11:02:18 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=190.234.164.141 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=45 ID=30853 DF PROTO=TCP SPT=2620 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 11:11:43 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=188.186.193.216 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=50147 DF PROTO=TCP SPT=1815 DPT=27467 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 11:21:43 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=217.146.243.34 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=45820 DF PROTO=TCP SPT=4651 DPT=27467 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 11:31:44 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=94.158.182.57 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=19766 DF PROTO=TCP SPT=56199 DPT=27467 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 11:41:46 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=94.75.153.251 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=3314 DF PROTO=TCP SPT=1654 DPT=27467 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 11:51:43 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=91.211.12.125 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=11548 DF PROTO=TCP SPT=1885 DPT=27467 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 12:00:22 syslog info -- MARK --
Jan 1 12:01:44 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=95.37.214.223 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=14812 DF PROTO=TCP SPT=2616 DPT=27467 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 12:02:06 user warn dnsprobe[417]: dns query failed
Jan 1 12:12:07 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=91.211.12.125 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=49009 DF PROTO=TCP SPT=1286 DPT=27467 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 12:21:47 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=195.211.237.26 DST=91.149.190.20 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=4725 DF PROTO=TCP SPT=58605 DPT=27467 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 12:32:11 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=94.39.238.33 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=37980 DF PROTO=TCP SPT=2327 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 12:42:15 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=92.113.186.38 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=24762 DF PROTO=TCP SPT=4384 DPT=27467 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 12:52:22 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=201.86.8.37 DST=91.149.190.20 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=53106 DF PROTO=TCP SPT=3680 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 13:00:22 syslog info -- MARK --
Jan 1 13:02:13 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=178.49.253.32 DST=91.149.190.20 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=10416 DF PROTO=TCP SPT=39148 DPT=27467 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 13:12:24 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=92.62.62.66 DST=91.149.190.20 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=16602 DF PROTO=TCP SPT=1725 DPT=27467 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 13:32:17 user warn dnsprobe[417]: dns query failed
Jan 1 13:32:19 user warn dnsprobe[417]: dns query failed
Jan 1 13:32:21 user warn dnsprobe[417]: dns query failed
Jan 1 13:32:21 user notice dnsprobe[417]: Primary DNS server Is Down... Switching To Secondary DNS server
Jan 1 13:42:24 user warn dnsprobe[417]: dns query failed
Jan 1 13:42:26 user warn dnsprobe[417]: dns query failed
Jan 1 13:42:28 user warn dnsprobe[417]: dns query failed
Jan 1 13:52:30 user warn dnsprobe[417]: dns query failed
Jan 1 13:52:32 user warn dnsprobe[417]: dns query failed
Jan 1 13:52:34 user warn dnsprobe[417]: dns query failed
Jan 1 14:00:22 syslog info -- MARK --
Jan 1 14:02:36 user warn dnsprobe[417]: dns query failed
Jan 1 14:02:38 user warn dnsprobe[417]: dns query failed
Jan 1 14:02:40 user warn dnsprobe[417]: dns query failed
Jan 1 14:12:42 user warn dnsprobe[417]: dns query failed
Jan 1 14:12:44 user warn dnsprobe[417]: dns query failed
Jan 1 14:12:46 user warn dnsprobe[417]: dns query failed
Jan 1 14:22:48 user warn dnsprobe[417]: dns query failed
Jan 1 14:22:50 user warn dnsprobe[417]: dns query failed
Jan 1 14:22:52 user warn dnsprobe[417]: dns query failed
Jan 1 14:32:54 user warn dnsprobe[417]: dns query failed
Jan 1 14:32:56 user warn dnsprobe[417]: dns query failed
Jan 1 14:32:58 user warn dnsprobe[417]: dns query failed


Вернуться наверх
 Профиль  
 
 Заголовок сообщения:
СообщениеДобавлено: Вт июл 13, 2010 10:45 
Не в сети

Зарегистрирован: Пн июл 05, 2010 00:16
Сообщений: 7
После перепрошивки все равно дисконектит рандомно. Вот лог :


Jan 1 03:05:35 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=10.128.13.92 DST=213.184.233.167 LEN=60 TOS=0x00 PREC=0x00 TTL=61 ID=38284 DF PROTO=TCP SPT=52148 DPT=49521 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 03:11:02 user warn dnsprobe[451]: dns query failed
Jan 1 03:38:19 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=41.91.0.254 DST=213.184.233.167 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=28339 DF PROTO=TCP SPT=54575 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 03:38:21 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=41.91.0.254 DST=213.184.233.167 LEN=52 TOS=0x00 PREC=0x00 TTL=47 ID=18123 DF PROTO=TCP SPT=54576 DPT=80 WINDOW=50260 RES=0x00 SYN URGP=0
Jan 1 03:38:24 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=41.91.0.254 DST=213.184.233.167 LEN=52 TOS=0x00 PREC=0x00 TTL=47 ID=18124 DF PROTO=TCP SPT=54576 DPT=80 WINDOW=50260 RES=0x00 SYN URGP=0
Jan 1 03:42:55 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=79.163.19.62 DST=213.184.233.167 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=23465 DF PROTO=TCP SPT=4445 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 03:52:43 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=86.57.253.169 DST=213.184.233.167 LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=65263 DF PROTO=TCP SPT=45737 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 04:00:25 syslog info -- MARK --
Jan 1 04:02:41 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=189.76.38.113 DST=213.184.233.167 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=23989 DF PROTO=TCP SPT=2535 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 04:18:39 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=95.72.150.141 DST=213.184.233.167 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=32177 DF PROTO=TCP SPT=3694 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 04:37:52 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=61.138.179.46 DST=213.184.233.167 LEN=40 TOS=0x00 PREC=0x00 TTL=106 ID=256 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 04:55:40 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=89.148.31.66 DST=213.184.233.167 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=44919 DF PROTO=TCP SPT=4380 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 05:00:25 syslog info -- MARK --
Jan 1 05:09:41 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=189.59.100.173 DST=213.184.233.167 LEN=60 TOS=0x00 PREC=0x00 TTL=49 ID=22459 DF PROTO=TCP SPT=3744 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 05:16:58 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=87.82.16.35 DST=213.184.233.167 LEN=64 TOS=0x00 PREC=0x00 TTL=37 ID=10999 DF PROTO=TCP SPT=4753 DPT=113 WINDOW=53760 RES=0x00 SYN URGP=0
Jan 1 05:17:01 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=87.82.16.35 DST=213.184.233.167 LEN=64 TOS=0x00 PREC=0x00 TTL=37 ID=11085 DF PROTO=TCP SPT=4753 DPT=113 WINDOW=53760 RES=0x00 SYN URGP=0
Jan 1 05:20:17 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=79.120.192.190 DST=213.184.233.167 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=61420 PROTO=TCP SPT=48493 DPT=22 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 05:22:42 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=190.233.228.245 DST=213.184.233.167 LEN=60 TOS=0x00 PREC=0x00 TTL=44 ID=15394 DF PROTO=TCP SPT=4641 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 05:42:05 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=190.43.111.244 DST=213.184.233.167 LEN=60 TOS=0x00 PREC=0x00 TTL=44 ID=15286 DF PROTO=TCP SPT=2672 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 05:46:16 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=109.60.239.53 DST=213.184.233.167 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=33268 DF PROTO=TCP SPT=43871 DPT=49706 WINDOW=5840 RES=0x00 SYN URGP=0
Jan 1 05:56:05 user alert kernel: Intrusion -> IN=ppp_0_1_34_1 OUT= MAC= SRC=201.244.230.109 DST=213.184.233.167 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=36387 DF PROTO=TCP SPT=2541 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Jan 1 06:00:25 syslog info -- MARK --
Jan 1 06:01:21 user warn dnsprobe[451]: dns query failed
Jan 1 06:01:23 user warn dnsprobe[451]: dns query failed
Jan 1 06:01:25 user warn dnsprobe[451]: dns query failed
Jan 1 06:01:25 user notice dnsprobe[451]: Primary DNS server Is Down... Switching To Secondary DNS server
Jan 1 06:11:28 user warn dnsprobe[451]: dns query failed
Jan 1 06:11:30 user warn dnsprobe[451]: dns query failed
Jan 1 06:11:32 user warn dnsprobe[451]: dns query failed
Jan 1 06:21:34 user warn dnsprobe[451]: dns query failed
Jan 1 06:21:36 user warn dnsprobe[451]: dns query failed
Jan 1 06:21:38 user warn dnsprobe[451]: dns query failed
Jan 1 06:31:40 user warn dnsprobe[451]: dns query failed


Вернуться наверх
 Профиль  
 
 Заголовок сообщения:
СообщениеДобавлено: Ср июл 14, 2010 15:25 
Не в сети

Зарегистрирован: Пн июл 05, 2010 00:16
Сообщений: 7
Вот параметры еще

Statistics -- ADSL
Mode: G.DMT
Type: Interleave
Line Coding: Trellis On
Status: No Defect
Link Power State: L0

Downstream Upstream
SNR Margin (dB): 24.3 22.0
Attenuation (dB): 8.0 11.0
Output Power (dBm): 12.3 5.8
Attainable Rate (Kbps): 13498 1501
Rate (Kbps): 8133 761
K (number of bytes in DMT frame): 236 23
R (number of check bytes in RS code word): 20 12
S (RS code word size in DMT frame): 1 4
D (interleaver depth): 32 4
Delay (msec): 8 4

Super Frames: 321077 321033
Super Frame Errors: 3 10
RS Words: 43666568 5457561
RS Correctable Errors: 2527 88
RS Uncorrectable Errors: 28 N/A

HEC Errors: 2 6
OCD Errors: 0 0
LCD Errors: 0 0
Total Cells: 104705659 0
Data Cells: 198231 0
Bit Errors: 0 0

Total ES: 2 0
Total SES: 0 0
Total UAS: 12 0


Вернуться наверх
 Профиль  
 
Показать сообщения за:  Сортировать по:  
Начать новую тему Ответить на тему  [ Сообщений: 10 ] 

Часовой пояс: UTC + 3 часа


Кто сейчас на форуме

Сейчас этот форум просматривают: нет зарегистрированных пользователей и гости: 17


Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете добавлять вложения

Найти:
Перейти:  
Создано на основе phpBB® Forum Software © phpBB Group
Русская поддержка phpBB