Не могу понять почему постоянно мигает LAN, как-будто идет передача данных, хотя в это время ничего не качается.И при этом мигании пропадает интернет(лампочка интернет на модеме горит а его нет),причем к этому жемодему присоединен второй комп и его LAN мигает тоже, хотя он выключен вообще.В чем может быть причина? Иногда мигание пропадает.
RU_DSL-2540U_3-06-04-1800.A2pB021c.d19b
Модем новый, есть возможность замены, есть ли смысл менять его?
мои настройки
http://chairday.narod.ru/ukrtel/DSL-2500U_Ukrtelecom.html
System Log
Date/Time Facility Severity Message
Jan 1 00:00:11 user debug syslog: pppd
Jan 1 00:00:11 user crit kernel: ADSL link down
Jan 1 00:00:11 daemon notice pppd[250]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:14 user crit kernel: ADSL G.994 training
Jan 1 00:00:16 user crit kernel: ADSL G.992 started
Jan 1 00:00:19 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:23 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:24 user crit kernel: ADSL link up, interleaved, us=160, ds=320
Jan 1 00:00:24 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:25 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:25 daemon notice pppd[250]: PPP: Start to connect ...
Jan 1 00:00:27 daemon crit pppd[250]: PPP server detected.
Jan 1 00:00:27 daemon crit pppd[250]: PPP session established.
Jan 1 00:00:29 daemon crit pppd[250]: PPP LCP UP.
Jan 1 00:00:30 daemon err pppd[250]: User name and password authentication failed.
Jan 1 00:00:33 daemon notice pppd[250]: PPP: Start to connect ...
Jan 1 00:00:33 daemon crit pppd[250]: PPP server detected.
Jan 1 00:00:33 daemon crit pppd[250]: PPP session established.
Jan 1 00:00:35 daemon crit pppd[250]: PPP LCP UP.
Jan 1 00:00:35 daemon err pppd[250]: User name and password authentication failed.
Jan 1 00:00:38 daemon notice pppd[250]: PPP: Start to connect ...
Jan 1 00:00:38 daemon crit pppd[250]: PPP server detected.
Jan 1 00:00:38 daemon crit pppd[250]: PPP session established.
Jan 1 00:00:40 daemon crit pppd[250]: PPP LCP UP.
Jan 1 00:00:40 daemon err pppd[250]: User name and password authentication failed.
Jan 1 00:00:43 daemon notice pppd[250]: PPP: Start to connect ...
Jan 1 00:00:43 daemon crit pppd[250]: PPP server detected.
Jan 1 00:00:43 daemon crit pppd[250]: PPP session established.
Jan 1 00:00:45 daemon crit pppd[250]: PPP LCP UP.
Jan 1 00:00:48 daemon crit pppd[250]: Received valid IP address from server. Connection UP.
Jan 1 00:00:48 user debug syslog: route add default gw 195.5.5.10 2>/dev/null
Jan 1 00:00:48 user debug syslog: iptables -A FORWARD -o ppp_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:48 user debug syslog: iptables -A FORWARD -i ppp_1_32_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:48 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:48 user debug syslog: echo "512" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:48 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:48 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:48 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_1_32_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:48 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 195.5.46.12 2>/dev/null
Jan 1 00:00:48 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 195.5.46.12
Jan 1 00:00:48 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:49 user notice dnsprobe[862]: dnsprobe started!
Jan 1 00:00:49 user debug syslog: upnp -L br0 -W ppp_1_32_1 -D
Jan 1 00:00:49 user debug syslog: iptables -t filter -I OUTPUT -o ppp_1_32_1 -d 239.255.255.250 -j DROP 2>/dev/null
Jan 1 00:00:49 user debug syslog: iptables -D INPUT -i ppp_1_32_1 -j DROP
Jan 1 00:00:49 user debug syslog: iptables -A INPUT -i ppp_1_32_1 -j DROP
Jan 1 00:01:21 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.178.5 DST=91.124.198.154 LEN=64 TOS=0x00 PREC=0x00 TTL=41 ID=15579 DF PROTO=TCP SPT=4077 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0
Jan 1 00:01:24 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.178.5 DST=91.124.198.154 LEN=64 TOS=0x00 PREC=0x00 TTL=41 ID=15782 DF PROTO=TCP SPT=4077 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0
Jan 1 00:02:00 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.215.174 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=48034 DF PROTO=TCP SPT=2238 DPT=139 WINDOW=64800 RES=0x00 SYN URGP=0
Jan 1 00:02:10 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.112.22 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=20566 DF PROTO=TCP SPT=3534 DPT=445 WINDOW=8760 RES=0x00 SYN URGP=0
Jan 1 00:02:11 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.112.22 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=20617 DF PROTO=TCP SPT=3547 DPT=445 WINDOW=8760 RES=0x00 SYN URGP=0
Jan 1 00:02:13 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.112.22 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=20698 DF PROTO=TCP SPT=3534 DPT=445 WINDOW=8760 RES=0x00 SYN URGP=0
Jan 1 00:02:14 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.112.22 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=20753 DF PROTO=TCP SPT=3547 DPT=445 WINDOW=8760 RES=0x00 SYN URGP=0
Jan 1 00:03:01 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.12.243 DST=91.124.198.154 LEN=44 TOS=0x00 PREC=0x00 TTL=121 ID=64165 PROTO=TCP SPT=3315 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:03:04 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.12.243 DST=91.124.198.154 LEN=44 TOS=0x00 PREC=0x00 TTL=121 ID=64369 PROTO=TCP SPT=3315 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:03:06 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.164.39 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=30992 DF PROTO=TCP SPT=1983 DPT=139 WINDOW=64800 RES=0x00 SYN URGP=0
Jan 1 00:04:42 user debug igmp[909]: iptables -t filter -I FORWARD 1 -i br0 -d 224.0.0.22 -j DROP 2>/dev/null
Jan 1 00:04:42 user debug igmp[911]: iptables -t filter -D FORWARD -i br0 -d 224.0.0.22 -j ACCEPT 2>/dev/null
Jan 1 00:04:55 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.149.21 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=49357 DF PROTO=TCP SPT=4415 DPT=445 WINDOW=64800 RES=0x00 SYN URGP=0
Jan 1 00:04:58 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.149.21 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=49523 DF PROTO=TCP SPT=4415 DPT=445 WINDOW=64800 RES=0x00 SYN URGP=0
Jan 1 00:05:29 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.38.154 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=53136 DF PROTO=TCP SPT=4286 DPT=139 WINDOW=8760 RES=0x00 SYN URGP=36901
Jan 1 00:05:31 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.38.154 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=53456 DF PROTO=TCP SPT=4286 DPT=139 WINDOW=8760 RES=0x00 SYN URGP=0
Jan 1 00:05:42 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.181.101 DST=91.124.198.154 LEN=44 TOS=0x00 PREC=0x00 TTL=121 ID=12636 PROTO=TCP SPT=2244 DPT=139 WINDOW=8760 RES=0x00 SYN URGP=0
Jan 1 00:15:07 user alert kernel: Intrusion -> IN=ppp_1_32_1 OUT= MAC= SRC=91.124.149.25 DST=91.124.198.154 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=51362 DF PROTO=TCP SPT=3384 DPT=139 WINDOW=64800 RES=0x00 SYN URGP=0