ну вот случилось:
Date/Time Facility Severity Message
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 24
Jan 1 00:00:22 user warn kernel: Using noop io scheduler
Jan 1 00:00:22 user warn kernel: bcm963xx_mtd driver v1.0
Jan 1 00:00:22 user warn kernel: brcmboard: brcm_board_init entry
Jan 1 00:00:22 user warn kernel: SES: Button Interrupt 0x0 is enabled
Jan 1 00:00:22 user warn kernel: SES: LED GPIO 0x8005 is enabled
Jan 1 00:00:22 user info kernel: Serial: BCM63XX driver $Revision: 3.00 $
Jan 1 00:00:22 user warn kernel: ttyS0 at MMIO 0xfffe0300 (irq = 10) is a BCM63XX
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 2
Jan 1 00:00:22 user info kernel: IP: routing cache hash table of 512 buckets, 4Kbytes
Jan 1 00:00:22 user info kernel: TCP: Hash tables configured (established 512 bind 1024)
Jan 1 00:00:22 user info kernel: Initializing IPsec netlink socket
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 1
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 17
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 15
Jan 1 00:00:22 user notice kernel: Ebtables v2.0 registered
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 8
Jan 1 00:00:22 user info kernel: NET: Registered protocol family 20
Jan 1 00:00:22 user info kernel: 802.1Q VLAN Support v1.8 Ben Greear
Jan 1 00:00:22 user info kernel: All bugs added by David S. Miller
Jan 1 00:00:22 user warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan 1 00:00:22 user info kernel: Freeing unused kernel memory: 68k freed
Jan 1 00:00:22 user warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Jan 1 00:00:22 user warn kernel: atmapi: module license 'Proprietary' taints kernel.
Jan 1 00:00:22 user warn kernel: adsl: adsl_init entry
Jan 1 00:00:22 user warn kernel: blaadd: blaa_detect entry
Jan 1 00:00:22 user info kernel: Broadcom BCMPROCFS v1.0 initialized
Jan 1 00:00:22 user warn kernel: SDIOH mode switch from 1 to 2
Jan 1 00:00:22 user warn kernel: available commands: sdio sdioh
Jan 1 00:00:22 user warn kernel:
Jan 1 00:00:22 user warn kernel: ---SDIO init SUCCEEDED--- blockmode capable
Jan 1 00:00:22 user warn kernel:
Jan 1 00:00:22 user warn kernel: chipid 0x4014312
Jan 1 00:00:22 user warn kernel: chip is bcm4312, use 512 bytes blksize
Jan 1 00:00:22 user warn kernel: bcmsdh_attach, sdioh_attach successful, bcmsdh->sdioh 0x80e58bf0
Jan 1 00:00:22 user warn kernel: wl: srom not detected, using main memory mapped srom info (wombo board)
Jan 1 00:00:22 user warn kernel: wl0: wlc_attach: use mac addr from the system pool by id: 0x776c0000
Jan 1 00:00:22 user warn kernel: wl0: MAC Address: 00:22:B0:C1:27:5D
Jan 1 00:00:22 user warn kernel: wl0: Broadcom BCM4318 802.11 Wireless Controller 4.170.16.0.cpe2.1sd1
Jan 1 00:00:22 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: wl0 registered
Jan 1 00:00:22 user warn kernel: Trying to free free IRQ25
Jan 1 00:00:22 user warn kernel: Broadcom BCM6338A2 Ethernet Network Device v0.3 Jan 19 2009 17:56:08
Jan 1 00:00:22 user warn kernel: Config Ethernet Switch Through MDIO Pseudo PHY Interface
Jan 1 00:00:22 user warn kernel: ethsw: found bcm5325e!
Jan 1 00:00:22 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: eth0 registered
Jan 1 00:00:22 user warn kernel: eth0: MAC Address: 00:22:B0:C1:27:5E
Jan 1 00:00:22 user warn kernel: BcmAdsl_Initialize=0xC00663E8, g_pFnNotifyCallback=0xC0080FE4
Jan 1 00:00:22 user warn kernel: AnnexCParam=0x7FFF7EB8 AnnexAParam=0x00000983 adsl2=0x00000000
Jan 1 00:00:22 user warn kernel: pSdramPHY=0xA0FFFFF8, 0x1B7777 0xDEADBEEF
Jan 1 00:00:22 user crit kernel: eth0 Link UP.
Jan 1 00:00:22 user warn kernel: AdslCoreHwReset: AdslOemDataAddr = 0xA0FEF96C
Jan 1 00:00:22 user warn kernel: 0000000
Jan 1 00:00:22 user warn kernel: dgasp: kerSysRegisterDyingGaspHandler: dsl0 registered
Jan 1 00:00:22 user warn kernel: ATM proc init !!!
Jan 1 00:00:22 user warn kernel: ip_tables: (C) 2000-2002 Netfilter core team
Jan 1 00:00:22 user warn kernel: ip_conntrack version 2.1 (125 buckets, 0 max) - 384 bytes per conntrack
Jan 1 00:00:22 user warn kernel: ip_ct_h323: init success
Jan 1 00:00:22 user warn kernel: ip_nat_h323: init success
Jan 1 00:00:22 user warn kernel: BRCM NAT Caching v1.0 Nov 20 2007 10:22:27
Jan 1 00:00:22 user warn kernel: BRCM NAT Cache: Hooking hit function @ c005f088
Jan 1 00:00:22 user crit kernel: ADSL G.994 training
Jan 1 00:00:22 user warn kernel: ip_conntrack_rtsp v0.01 loading
Jan 1 00:00:22 user warn kernel: ip_nat_rtsp v0.01 loading
Jan 1 00:00:22 user crit kernel: ADSL G.992 started
Jan 1 00:00:22 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:22 user info kernel: device eth0 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 1(eth0) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 1(eth0) entering forwarding state
Jan 1 00:00:22 user info kernel: device wl0 entered promiscuous mode
Jan 1 00:00:22 user info kernel: br0: port 2(wl0) entering learning state
Jan 1 00:00:22 user info kernel: br0: topology change detected, propagating
Jan 1 00:00:22 user info kernel: br0: port 2(wl0) entering forwarding state
Jan 1 00:00:22 user crit kernel: ADSL link up, interleaved, us=768, ds=6144
Jan 1 00:00:22 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:23 user debug syslog: brctl addbr pppbr
Jan 1 00:00:23 user debug syslog: brctl addif pppbr nas_0_0_33
Jan 1 00:00:23 user info kernel: device nas_0_0_33 entered promiscuous mode
Jan 1 00:00:24 user debug syslog: pppd keepalive 0 0 -c 0.0.33.1 -i nas_0_0_33 -u "samdslano" -p *********** -f 0 -o 18000 -m 0018822c8c6b/11c4 &
Jan 1 00:00:24 daemon notice pppd[366]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:25 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.0.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:25 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_33_1 -s 192.168.0.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:26 user debug syslog: route add default dev ppp_0_0_33_1 2>/dev/null
Jan 1 00:00:26 daemon notice pppd[366]: PPP: Start to connect ...
Jan 1 00:04:55 daemon crit pppd[366]: PPP server detected.
Jan 1 00:04:55 daemon crit pppd[366]: PPP session established.
Jan 1 00:04:58 daemon crit pppd[366]: PPP LCP UP.
Jan 1 00:04:58 daemon crit pppd[366]: Clear IP addresses. PPP connection DOWN.
Jan 1 00:04:58 daemon crit pppd[366]: Received valid IP address from server. Connection UP.
Jan 1 00:04:59 user debug syslog: route add default gw 78.85.32.1 2>/dev/null
Jan 1 00:04:59 user debug syslog: iptables -A FORWARD -o ppp_0_0_33_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:04:59 user debug syslog: iptables -A FORWARD -i ppp_0_0_33_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:04:59 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:04:59 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:04:59 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.0.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:04:59 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_33_1 -s 192.168.0.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:04:59 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_33_1 -s 192.168.0.0/255.255.255.0 -j MASQUERADE
Jan 1 00:04:59 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.0.1 -p udp --dport 53 -j DNAT --to 78.85.0.1 2>/dev/null
Jan 1 00:04:59 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.0.1 -p udp --dport 53 -j DNAT --to 78.85.0.1
Jan 1 00:04:59 user debug syslog: /bin/dnsprobe &
Jan 1 00:04:59 user debug syslog: upnp -L br0 -W ppp_0_0_33_1 -D
Jan 1 00:04:59 user notice dnsprobe[635]: dnsprobe started!
Jan 1 00:04:59 user debug syslog: iptables -t filter -I OUTPUT -o ppp_0_0_33_1 -d 239.255.255.250 -j DROP 2>/dev/null
Jan 1 00:05:00 user debug syslog: iptables -I INPUT 1 -i ppp_0_0_33_1 -p udp --dport 5060 -j ACCEPT 2>/dev/null
Jan 1 00:05:00 user debug syslog: iptables -I INPUT 1 -i ppp_0_0_33_1 -p udp --dport 7070:7079 -j ACCEPT 2>/dev/null
Jan 1 00:05:00 user debug syslog: iptables -t nat -A PREROUTING -i br0 -p udp --dport 5060 -j REDIRECT --to-ports 5060 2>/dev/null
Jan 1 00:05:00 user debug syslog: siproxd --config /var/siproxd/siproxd.conf &
Jan 1 00:05:00 user notice syslog: siproxd.c:192 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu starting up
Jan 1 00:05:00 user notice syslog: siproxd.c:218 INFO:daemonized, pid=655
Jan 1 00:05:00 user notice syslog: sock.c:65 INFO:bound to port 5060
Jan 1 00:05:00 user notice syslog: register.c:65 WARNING:registration file not found, starting with empty table
Jan 1 00:05:00 user notice syslog: siproxd.c:265 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu started
Jan 1 00:05:01 user debug syslog: setkey -f /var/setkey.conf
Feb 27 01:35:35 daemon err user: No server certificate found. Skip checking on certificate.
Feb 27 01:35:35 user debug syslog: ifconfig ppp_0_0_33_1 mtu 1492
Feb 27 01:35:36 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Feb 27 01:35:36 daemon err user: Stored Parameter Attribute data is corrupt or missing
Feb 27 02:30:54 syslog info -- MARK --
Feb 27 03:21:38 user crit kernel: ADSL link down
Feb 27 03:21:39 daemon crit pppd[366]: Clear IP addresses. Connection DOWN.
Feb 27 03:21:40 user crit kernel: ADSL G.994 training
Feb 27 03:21:43 user crit kernel: ADSL G.992 started
Feb 27 03:21:46 user crit kernel: ADSL G.992 channel analysis
Feb 27 03:21:50 user crit kernel: ADSL G.992 message exchange
Feb 27 03:21:50 user crit kernel: ADSL link up, interleaved, us=672, ds=3072
Feb 27 03:21:51 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.0.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Feb 27 03:21:51 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_33_1 -s 192.168.0.0/255.255.255.0 -j MASQUERADE
Feb 27 03:21:51 user debug syslog: route add default dev ppp_0_0_33_1 2>/dev/null
Feb 27 03:21:52 daemon notice pppd[366]: PPP: Start to connect ...
Feb 27 03:22:33 user crit kernel: ADSL link down
Feb 27 03:22:36 user crit kernel: ADSL G.994 training
Feb 27 03:22:39 user crit kernel: ADSL G.992 started
Feb 27 03:22:41 user crit kernel: ADSL G.992 channel analysis
Feb 27 03:22:46 user crit kernel: ADSL link up, interleaved, us=768, ds=6144
Feb 27 03:22:47 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.0.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Feb 27 03:22:47 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_33_1 -s 192.168.0.0/255.255.255.0 -j MASQUERADE
Feb 27 03:22:47 user debug syslog: route add default dev ppp_0_0_33_1 2>/dev/null
Feb 27 03:23:40 daemon crit pppd[366]: PPP server detected.
Feb 27 03:23:40 daemon crit pppd[366]: PPP session established.
Feb 27 03:23:43 daemon crit pppd[366]: PPP LCP UP.
Feb 27 03:23:43 daemon crit pppd[366]: Clear IP addresses. PPP connection DOWN.
Feb 27 03:23:43 daemon crit pppd[366]: Received valid IP address from server. Connection UP.
Feb 27 03:23:44 user debug syslog: route add default gw 78.85.32.1 2>/dev/null
Feb 27 03:23:44 user debug syslog: iptables -A FORWARD -o ppp_0_0_33_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Feb 27 03:23:44 user debug syslog: iptables -A FORWARD -i ppp_0_0_33_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Feb 27 03:23:44 user debug syslog: echo > /proc/net/ip_conntrack
Feb 27 03:23:44 user debug syslog: echo "1000" > /proc/sys/net/ipv4/ip_conntrack_max
Feb 27 03:23:44 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.0.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Feb 27 03:23:44 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_0_33_1 -s 192.168.0.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Feb 27 03:23:44 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_0_33_1 -s 192.168.0.0/255.255.255.0 -j MASQUERADE
Feb 27 03:23:44 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.0.1 -p udp --dport 53 -j DNAT --to 78.85.0.1 2>/dev/null
Feb 27 03:23:44 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.0.1 -p udp --dport 53 -j DNAT --to 78.85.0.1
Feb 27 03:23:45 user debug syslog: kill -9 655
Feb 27 03:23:45 user debug syslog: kill -9 656
Feb 27 03:23:45 user debug syslog: kill -9 657
Feb 27 03:23:45 user debug syslog: iptables -D INPUT -i ppp_0_0_33_1 -p udp --dport 5060 -j ACCEPT 2>/dev/null
Feb 27 03:23:45 user debug syslog: iptables -D INPUT -i ppp_0_0_33_1 -p udp --dport 7070:7079 -j ACCEPT 2>/dev/null
Feb 27 03:23:45 user debug syslog: iptables -t nat -D PREROUTING -i br0 -p udp --dport 5060 -j REDIRECT --to-ports 5060 2>/dev/null
Feb 27 03:23:45 user debug syslog: iptables -I INPUT 1 -i ppp_0_0_33_1 -p udp --dport 5060 -j ACCEPT 2>/dev/null
Feb 27 03:23:45 user debug syslog: iptables -I INPUT 1 -i ppp_0_0_33_1 -p udp --dport 7070:7079 -j ACCEPT 2>/dev/null
Feb 27 03:23:45 user debug syslog: iptables -t nat -A PREROUTING -i br0 -p udp --dport 5060 -j REDIRECT --to-ports 5060 2>/dev/null
Feb 27 03:23:45 user debug syslog: siproxd --config /var/siproxd/siproxd.conf &
Feb 27 03:23:45 user notice syslog: siproxd.c:192 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu starting up
Feb 27 03:23:45 user notice syslog: siproxd.c:218 INFO:daemonized, pid=1580
Feb 27 03:23:45 user notice syslog: sock.c:65 INFO:bound to port 5060
Feb 27 03:23:45 user notice syslog: register.c:65 WARNING:registration file not found, starting with empty table
Feb 27 03:23:45 user notice syslog: siproxd.c:265 INFO:siproxd-0.5.10-2842 i686-redhat-linux-gnu started
Feb 27 03:23:46 user debug syslog: setkey -f /var/setkey.conf
Feb 27 03:23:47 user debug syslog: ifconfig ppp_0_0_33_1 mtu 1492
Feb 27 03:30:54 syslog info -- MARK --
Feb 27 04:30:53 syslog info -- MARK --
Feb 27 05:30:54 syslog info -- MARK --
Feb 27 06:30:54 syslog info -- MARK --
Feb 27 07:30:53 syslog info -- MARK --
Feb 27 08:30:54 syslog info -- MARK --
Напоминаю: WiFi виден, подключается. Пинг из LAN в WiFi проходит. На LAN инет работает. Из WiFi можно зайти в веб интерфей роутера. Из WiFi инета нет!
--------------------------------------
Device Info
BoardID: DSL-2640U
Software Version: RU_1.12
Bootloader (CFE) Version: 1.0.37-12.1
Wireless Driver Version: 4.170.16.0.cpe2.1sd1
This information reflects the current status of your DSL connection.
Line Rate - Upstream (Kbps): 768
Line Rate - Downstream (Kbps): 6144
LAN IPv4 Address: 192.168.0.1
MAC Address: 00-22-b0-c1-27-5d
Default Gateway: 78.85.32.1
Primary DNS Server: 78.85.0.1
Secondary DNS Server: 78.85.1.1
Date/Time: Fri Feb 27 08:49:29 2009
-------------------------------------
Statistics -- ADSL
Mode: G.DMT
Type: Interleave
Line Coding: Trellis On
Status: No Defect
Link Power State: L0
Downstream Upstream
SNR Margin (dB): 25.8 18.0
Attenuation (dB): 34.0 19.5
Output Power (dBm): 12.2 19.8
Attainable Rate (Kbps): 11712 1340
Rate (Kbps): 6144 768
K (number of bytes in DMT frame): 193 25
R (number of check bytes in RS code word): 0 0
S (RS code word size in DMT frame): 1 1
D (interleaver depth): 1 1
Delay (msec): 0 0
Super Frames: 1156340 1156298
Super Frame Errors: 17 0
RS Words: 0 0
RS Correctable Errors: 0 0
RS Uncorrectable Errors: 0 N/A
HEC Errors: 13 0
OCD Errors: 0 0
LCD Errors: 0 0
Total Cells: 284852824 0
Data Cells: 1399019 0
Bit Errors: 0 0
Total ES: 15 0
Total SES: 3 0
Total UAS: 30 0
-----------------------------------------------
WAN Info
Port/VPI/VCI VLAN Mux Con. ID Category Service Interface Protocol Igmp QoS State Status IPv4 Address
0/0/33 Off 1 UBR pppoe_0_0_33_1 ppp_0_0_33_1 PPPoE Disabled Enabled Enabled Up 78.85.150.82
-----------------------------------------------
Log Level: Debugging
Display Level: Debugging
-----------------------------------------------
Wireless -- Advanced
Band: 2.4GHz
Channel: Auto12345678910111213 Current: 11
54g™ Rate: Auto
Multicast Rate: Auto
Basic Rate: Default
Fragmentation Threshold: 2346
RTS Threshold: 2347
DTIM Interval: 1
Beacon Interval: 100
Global Max Clients: 16
XPress™ Technology: Disabled
54g™ Mode: 802.11b Only
54g™ Protection: Off
Preamble Type: long
Transmit Power: 100%
Что то ещё показать?
|