При работе с модемом DSL-2500U/BRU/D (версия прошивки RU_DSL-2500U_1.10_03182008) столкнулся со следующей проблемой:
С периодичностью в 2-4 часа происходит обрыв PPP соединения (ADSL-соединение судя по индикаторам и логам не рвется). После обрыва соединение восстанавливается в течении пары минут с помощью KeepAlive.
При этом для каждого соединения в логах отражается следующее:
Код:
...............................
May 8 18:10:13 daemon info pppd[237]: Sent PADT
May 8 18:10:14 daemon info pppd[237]: PPP session is 1378
May 8 18:10:14 daemon info pppd[237]: Using interface ppp0_10_40_1
May 8 18:10:14 daemon notice pppd[237]: Connect: ppp_0_10_40_1 <--> nas_0_10_40
May 8 18:10:14 daemon warn pppd[237]: Couldn't increase MRU to 1500
May 8 18:10:16 daemon warn pppd[237]: Couldn't increase MRU to 1500
May 8 18:10:16 daemon info pppd[237]: CHAP authentication succeeded
May 8 18:10:16 daemon notice pppd[237]: peer from calling number 00:15:FA:1C:B7:3C authorized
May 8 18:10:16 daemon notice pppd[237]: local IP address 77.45.XX.XX
May 8 18:10:16 daemon notice pppd[237]: remote IP address 80.82.53.125
May 8 18:10:16 daemon notice pppd[237]: primary DNS address 80.82.32.9
May 8 18:10:16 daemon notice pppd[237]: secondary DNS address 80.82.33.65
May 8 18:10:28 user debug syslog: route add default gw 80.82.53.125 2>/dev/null
May 8 18:10:30 user debug syslog: iptables -A FORWARD -o ppp_0_10_40_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
May 8 18:10:30 user debug syslog: iptables -A FORWARD -i ppp_0_10_40_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
May 8 18:10:31 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_10_40_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
May 8 18:10:32 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_10_40_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
May 8 18:10:50 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.168.58 DST=77.45.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=45160 DF PROTO=TCP SPT=2500 DPT=33456 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 18:10:53 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.168.58 DST=77.45.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=45882 DF PROTO=TCP SPT=2500 DPT=33456 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 18:13:35 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.168.58 DST=77.45.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=12581 DF PROTO=TCP SPT=2718 DPT=33456 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 18:13:38 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.168.58 DST=77.45.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=13122 DF PROTO=TCP SPT=2718 DPT=33456 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 18:22:42 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.225.5 DST=77.45.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=6030 DF PROTO=TCP SPT=1692 DPT=33456 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 18:22:45 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.225.5 DST=77.45.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=6386 DF PROTO=TCP SPT=1692 DPT=33456 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 18:31:29 syslog info -- MARK --
May 8 18:44:33 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.241.188 DST=77.45.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=47793 DF PROTO=TCP SPT=11465 DPT=33456 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 18:44:35 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.241.188 DST=77.45.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=47917 DF PROTO=TCP SPT=11465 DPT=33456 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 18:50:51 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.152.79 DST=77.45.XX.XX LEN=52 TOS=0x00 PREC=0x00 TTL=126 ID=59491 DF PROTO=TCP SPT=2793 DPT=32459 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 19:03:15 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.152.79 DST=77.45.XX.XX LEN=52 TOS=0x00 PREC=0x00 TTL=126 ID=55017 DF PROTO=TCP SPT=1379 DPT=32459 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 19:12:51 user debug syslog: ethctl vport query 2>/var/vcfgerr
May 8 19:12:52 user debug syslog: rm /var/vcfgerr
May 8 19:12:56 user crit kernel: OAM loopback response not received on PORT/VPI/VCI 0/10/40.
May 8 19:12:58 user crit kernel: OAM loopback response not received on PORT/VPI/VCI 0/10/40.
May 8 19:13:00 user debug syslog: ping 80.82.53.125
May 8 19:13:00 user debug syslog: ping 80.82.33.65
May 8 19:13:43 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.223.146 DST=77.45.XX.XX LEN=52 TOS=0x00 PREC=0x00 TTL=62 ID=2979 DF PROTO=TCP SPT=4191 DPT=33456 WINDOW=48960 RES=0x00 SYN URGP=0
May 8 19:21:42 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.237.235 DST=77.45.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=673 DF PROTO=TCP SPT=2168 DPT=33456 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 19:31:29 syslog info -- MARK --
May 8 19:31:33 user alert kernel: Intrusion -> IN=ppp_0_10_40_1 OUT= MAC= SRC=77.45.163.212 DST=77.45.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=1352 DF PROTO=TCP SPT=25633 DPT=33456 WINDOW=65535 RES=0x00 SYN URGP=0
May 8 19:32:59 user warn syslog: dns query failed
May 8 19:33:01 user warn syslog: dns query failed
May 8 19:33:03 user warn syslog: dns query failed
May 8 19:33:05 user warn syslog: dns query failed
May 8 19:33:07 user warn syslog: dns query failed
May 8 19:33:09 user warn syslog: dns query failed
May 8 19:33:41 user warn syslog: dns query failed
May 8 19:33:43 user warn syslog: dns query failed
May 8 19:33:45 user warn syslog: dns query failed
May 8 19:33:47 user warn syslog: dns query failed
May 8 19:33:49 user warn syslog: dns query failed
May 8 19:33:51 user warn syslog: dns query failed
May 8 19:34:17 daemon info pppd[237]: No response to 3 echo-requests
May 8 19:34:17 daemon notice pppd[237]: Serial link appears to be disconnected.
May 8 19:34:17 daemon info pppd[237]: Connect time 84.1 minutes.
May 8 19:34:17 daemon info pppd[237]: Sent 1490405 bytes, received 11734590 bytes.
May 8 19:34:20 daemon warn pppd[237]: Couldn't increase MRU to 1500
May 8 19:34:27 daemon notice pppd[237]: Connection terminated....
May 8 19:34:31 daemon info pppd[237]: PPP session is 60257
May 8 19:34:31 daemon info pppd[237]: Using interface ppp0_10_40_1
May 8 19:34:31 daemon notice pppd[237]: Connect: ppp_0_10_40_1 <--> nas_0_10_40
May 8 19:34:31 daemon warn pppd[237]: Couldn't increase MRU to 1500
May 8 19:34:33 daemon warn pppd[237]: Couldn't increase MRU to 1500
May 8 19:34:33 daemon info pppd[237]: CHAP authentication succeeded
.............................
И так далее циклически повторяется примерно одно и то же.
Статистика адсл (привожу с максимальными настройками, включая задействованный AnnexM) указана ниже.
Пробовал отключать все виды модуляции и оставлять только G.Dmt - никакого результата. Обращался в техподдержку провайдера, мне
уменьшали скорость - и все равно безрезультатно, проблема не исчезает. В техподдержке также сказали, что параметры телефонной линии в норме.
Код:
Statistics -- ADSL
Mode: ADSL2+ AnnexM EU-60
Type: Fast
Line Coding: Trellis On
Status: No Defect
Link Power State: L0
Downstream Upstream
SNR Margin (dB): 14.5 11.5
Attenuation (dB): 37.0 15.6
Output Power (dBm): 13.1 2.6
Attainable Rate (Kbps): 12968 1708
Rate (Kbps): 11233 1542
K (number of bytes in DMT frame): 247 29
R (number of check bytes in RS code word): 8 16
S (RS code word size in DMT frame): 1 8
D (interleaver depth): 64 8
Delay (msec): 16 16
Super Frames: 5517622 5231420
Super Frame Errors: 3071 1
RS Words: 507621274 3468920
RS Correctable Errors: 211661 2
RS Uncorrectable Errors: 69450 N/A
HEC Errors: 2778 0
OCD Errors: 0 0
LCD Errors: 0 0
Total Cells: 2356086333 323583370
Data Cells: 2538451 423480
Bit Errors: 0 0
Total ES: 1975 1
Total SES: 0 0
Total UAS: 23 41
Видел описание некоторых похожих проблем в других темах, но подходящих способов устранения не нашел...
Можно ли еще как-нибудь попробовать исправить это? Или это проблема провайдера?