Те же проблемы, тот же ЮТК, те же вопросы
Есть ли документация поясняющая логи модемов серии 25хх ???
Докуметация по работе с модемом через телнет ??
Если возможно, поделитесь ссылкой, дабы не мучить одними и теми же вопросами по логам. Особенно если провайдер ЮТК
Часть ответов здесь
viewtopic.php?t=54057&highlight=2540U
лог такой (дата изменилась из-за синхронизации)
Jan 1 00:00:14 user debug syslog: ifconfig nas_0_35 mtu 1400
Jan 1 00:00:14 daemon notice pppd[279]: pppd 2.4.1 started by admin, uid 0
Jan 1 00:00:15 user crit kernel: ADSL G.992 started
Jan 1 00:00:19 user crit kernel: ADSL G.992 channel analysis
Jan 1 00:00:23 user crit kernel: ADSL G.992 message exchange
Jan 1 00:00:24 user crit kernel: ADSL link up, interleaved, us=1018, ds=7996
Jan 1 00:00:24 user warn kernel: ATM Soft SAR: ATM link connected.
Jan 1 00:00:25 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107
Jan 1 00:00:26 daemon notice pppd[279]: PPP: Start to connect ...
Jan 1 00:00:28 daemon crit pppd[279]: PPP server detected.
Jan 1 00:00:28 daemon crit pppd[279]: PPP session established.
Jan 1 00:00:30 daemon crit pppd[279]: PPP LCP UP.
Jan 1 00:00:30 daemon crit pppd[279]: Received valid IP address from server. Connection UP.
Jan 1 00:00:30 user debug syslog: route add default dev ppp_0_35_1 2>/dev/null
Jan 1 00:00:30 user debug syslog: iptables -A FORWARD -o ppp_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:30 user debug syslog: iptables -A FORWARD -i ppp_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:30 user debug syslog: echo > /proc/net/ip_conntrack
Jan 1 00:00:30 user debug syslog: echo "512" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:31 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:31 user debug syslog: iptables -t nat -D POSTROUTING -o ppp_0_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:31 user debug syslog: iptables -t nat -A POSTROUTING -o ppp_0_35_1 -s 192.168.1.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:31 user debug syslog: iptables -t nat -D PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 192.168.49.2 2>/dev/null
Jan 1 00:00:31 user debug syslog: iptables -t nat -A PREROUTING -i br0 -d 192.168.1.1 -p udp --dport 53 -j DNAT --to 192.168.49.2
Jan 1 00:00:31 user debug syslog: /bin/dnsprobe &
Jan 1 00:00:31 user debug syslog: upnp -L br0 -W ppp_0_35_1 -D
Jan 1 00:00:31 user notice dnsprobe[547]: dnsprobe started!
Jan 1 00:00:31 user debug syslog: iptables -t filter -I OUTPUT -o ppp_0_35_1 -d 239.255.255.250 -j DROP 2>/dev/null
Jan 1 00:00:32 user debug syslog: iptables -D INPUT -i ppp_0_35_1 -j DROP
Jan 1 00:00:32 user debug syslog: iptables -A INPUT -i ppp_0_35_1 -j DROP
Oct 23 20:38:07 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.101.31 DST=83.239.200.139 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=137 PROTO=TCP SPT=4103 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 23 20:38:10 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.101.31 DST=83.239.200.139 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=470 PROTO=TCP SPT=4103 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 23 20:41:42 user debug igmp[754]: iptables -t filter -I FORWARD 1 -i br0 -d 224.0.0.22 -j DROP 2>/dev/null
Oct 23 20:41:42 user debug igmp[756]: iptables -t filter -D FORWARD -i br0 -d 224.0.0.22 -j ACCEPT 2>/dev/null
Oct 23 20:41:57 user debug igmp[758]: iptables -t filter -I FORWARD 1 -i br0 -d 239.255.255.250 -j DROP 2>/dev/null
Oct 23 20:41:57 user debug igmp[760]: iptables -t filter -D FORWARD -i br0 -d 239.255.255.250 -j ACCEPT 2>/dev/null
Oct 23 20:42:20 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.56.21 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=8339 PROTO=TCP SPT=4751 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Oct 23 20:42:23 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.56.21 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=8340 PROTO=TCP SPT=4751 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Oct 23 20:43:21 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.13.94 DST=83.239.200.139 LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=65421 PROTO=TCP SPT=2221 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 23 20:59:54 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.22.122 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=59 ID=2219 PROTO=TCP SPT=2613 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 23 20:59:57 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.22.122 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=59 ID=2220 PROTO=TCP SPT=2613 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 23 21:00:13 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.101.31 DST=83.239.200.139 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=10280 PROTO=TCP SPT=4388 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 23 21:06:56 user warn kernel: AdslCoreEcUpdTmr: timeMs=1800400 ecUpdMask=0x40000
Oct 23 21:11:26 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.13.94 DST=83.239.200.139 LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=305 PROTO=TCP SPT=4659 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 23 21:14:24 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.101.31 DST=83.239.200.139 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=34573 PROTO=TCP SPT=1314 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 23 21:18:18 user warn dnsprobe[547]: dns query failed
Oct 23 21:30:46 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.36.226 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=59 ID=60424 PROTO=TCP SPT=3539 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 23 21:37:07 syslog info -- MARK --
Oct 23 21:39:52 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.239.174 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=59 ID=57182 PROTO=TCP SPT=2272 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Oct 23 21:44:06 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.214.22 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=52900 PROTO=TCP SPT=4071 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 23 21:55:52 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.101.31 DST=83.239.200.139 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=35011 PROTO=TCP SPT=4463 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 23 21:56:34 user warn dnsprobe[547]: dns query failed
Oct 23 22:08:03 auth info login[2316]: root login on `ttyp0'
Oct 23 22:12:31 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.209.122 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=39125 PROTO=TCP SPT=3115 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 23 22:12:34 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.209.122 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=39126 PROTO=TCP SPT=3115 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 23 22:28:13 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.4.26 DST=83.239.200.139 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=38025 PROTO=TCP SPT=4195 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 23 22:37:07 syslog info -- MARK --
Oct 23 22:41:57 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.61.166 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=60 ID=12737 PROTO=TCP SPT=3434 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0
Oct 23 22:42:39 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.38.134 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=57 ID=21327 PROTO=TCP SPT=4109 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 23 23:00:22 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.64.164 DST=83.239.200.139 LEN=48 TOS=0x00 PREC=0x00 TTL=124 ID=7221 PROTO=TCP SPT=4812 DPT=445 WINDOW=64800 RES=0x00 SYN URGP=0
Oct 23 23:05:02 user alert kernel: Intrusion -> IN=ppp_0_35_1 OUT= MAC= SRC=83.239.56.126 DST=83.239.200.139 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=11024 PROTO=TCP SPT=2441 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0