faq обучение настройка
Текущее время: Сб июн 28, 2025 23:29

Часовой пояс: UTC + 3 часа




Начать новую тему Ответить на тему  [ Сообщений: 20 ]  На страницу 1, 2  След.
Автор Сообщение
 Заголовок сообщения: Лог ,посмотрите
СообщениеДобавлено: Пн окт 03, 2011 19:01 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
Посмотрите пожалуйста эти ошибки ,после них у меня прерывается интернет,или падает скорость
igmp[1002]: setsockopt IP_MSFILTER
dnsprobe[1082]: dns query failed
kernel: OAM loopback response not received on PORT/VPI/VCI 0/0/35.
Что они значат и как бороться?
И еще когда интернет пропадает или падает скорость в диагностике фэйлятся две проверки
Ping primary Domain Name Server:
Ping default gateway:
Также объясните что значат и как исправить
Заранее спасибо)


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Вт окт 04, 2011 09:33 
Не в сети
Сотрудник D-LINK
Сотрудник D-LINK

Зарегистрирован: Вт мар 01, 2011 22:06
Сообщений: 2025
Drevvv писал(а):
Посмотрите пожалуйста эти ошибки ,после них у меня прерывается интернет,или падает скорость
igmp[1002]: setsockopt IP_MSFILTER
dnsprobe[1082]: dns query failed
kernel: OAM loopback response not received on PORT/VPI/VCI 0/0/35.
Что они значат и как бороться?
И еще когда интернет пропадает или падает скорость в диагностике фэйлятся две проверки
Ping primary Domain Name Server:
Ping default gateway:
Также объясните что значат и как исправить
Заранее спасибо)


Что за модель, какая прошивка? Вышлите полный лог в моменты разрывов.


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Вт окт 04, 2011 15:12 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
Скрытый текст: показать
Jan 1 00:00:54 user debug tr64[2283]: iptables -A FORWARD -o ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:54 user debug tr64[2285]: iptables -A FORWARD -i ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Jan 1 00:00:54 user debug tr64[2287]: echo > /proc/net/ip_conntrack
Jan 1 00:00:54 user debug tr64[2289]: echo "2000" > /proc/sys/net/ipv4/ip_conntrack_max
Jan 1 00:00:54 user debug tr64[2291]: echo 2000 > /proc/sys/net/ipv4/netfilter/ip_conntrack_generic_timeout
Jan 1 00:00:54 user debug tr64[2293]: echo 1400 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_established
Jan 1 00:00:54 user debug tr64[2295]: echo 1400 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_fin_wait
Jan 1 00:00:54 user debug tr64[2297]: echo 2000 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_timeout_time_wait
Jan 1 00:00:54 user debug tr64[2299]: echo 4096 > /proc/sys/net/ipv4/ipfrag_high_thresh
Jan 1 00:00:54 user debug tr64[2301]: echo 1024 > /proc/sys/net/ipv4/ipfrag_low_thresh
Jan 1 00:00:54 user debug tr64[2303]: echo 5 > /proc/sys/net/ipv4/ipfrag_time
Jan 1 00:00:54 user debug tr64[2305]: iptables -t nat -D PREROUTING -i br0 -d 10.0.0.138 -p udp --dport 53 -j DNAT --to 128.9.0.107 2>/dev/null
Jan 1 00:00:54 user debug tr64[2307]: iptables -t nat -D POSTROUTING -o ppp_0_0_35_1 -s 10.0.0.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Jan 1 00:00:54 user debug tr64[2309]: iptables -t nat -A POSTROUTING -o ppp_0_0_35_1 -s 10.0.0.0/255.255.255.0 -j MASQUERADE
Jan 1 00:00:54 user debug tr64[2311]: iptables -t nat -D PREROUTING -i br0 -d 10.0.0.138 -p udp --dport 53 -j DNAT --to 80.254.108.194 2>/dev/null
Jan 1 00:00:54 user debug tr64[2313]: iptables -t nat -A PREROUTING -i br0 -d 10.0.0.138 -p udp --dport 53 -j DNAT --to 80.254.108.194
Jan 1 00:00:54 user debug tr64[2315]: /bin/dnsprobe &
Jan 1 00:00:54 user debug tr64[2317]: upnp -L br0 -W ppp_0_0_35_1 -D
Jan 1 00:00:55 user debug tr64[2321]: iptables -t filter -I OUTPUT -o ppp_0_0_35_1 -d 239.255.255.250 -j DROP 2>/dev/null
Jan 1 00:00:55 user notice dnsprobe[2316]: dnsprobe started!
Jan 1 00:00:55 user debug tr64[2337]: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_35_1 -p tcp --dport 30005
Jan 1 00:00:55 user debug tr64[2339]: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_35_1 -p tcp --dport 30005
Jan 1 00:00:55 user debug tr64[2341]: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_35_1 -p udp -s 10.0.0.138/24 --dport 30006
Jan 1 00:00:55 user debug tr64[2343]: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_35_1 -p udp -s 10.0.0.138/24 --dport 30006
Jan 1 00:00:55 daemon err user: No server certificate found. Skip checking on certificate.
Jan 1 00:00:56 user debug tr64[2355]: /bin/igmp ppp_0_0_35_1 &
Jan 1 00:00:56 daemon debug user: wlctl -i wl0 authe_sta_list > /var/wl0_authe
Jan 1 00:00:56 daemon debug user: wlctl -i wl0 assoclist > /var/wl0_assoc
Jan 1 00:00:56 daemon debug user: wlctl -i wl0 autho_sta_list > /var/wl0_autho
Jan 1 00:00:57 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.118.79.30 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=23450 DF PROTO=TCP SPT=24812 DPT=51903 WINDOW=16384 RES=0x00 SYN URGP=0
Jan 1 00:00:57 user notice igmp[2363]: igmp started!
Oct 4 13:51:46 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Oct 4 13:51:46 daemon err user: Stored Parameter Attribute data is corrupt or missing
Oct 4 13:51:46 user debug igmp[2418]: iptables -D FORWARD -i ppp_0_0_35_1 -d 224.0.0.252 -j DROP 2>/dev/null
Oct 4 13:51:46 user debug igmp[2420]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 224.0.0.252 -j ACCEPT 2>/dev/null
Oct 4 13:51:46 user debug igmp[2422]: iptables -D FORWARD -i ppp_0_0_35_1 -d 239.255.255.250 -j DROP 2>/dev/null
Oct 4 13:51:46 user debug igmp[2424]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 239.255.255.250 -j ACCEPT 2>/dev/null
Oct 4 13:51:46 daemon debug user: found route to name ppp_0_0_35_1 ipAdress 31.23.81.56
Oct 4 13:51:47 daemon debug user: dns_lookup(acs.bezek.com) = 147.235.246.93
Oct 4 13:51:47 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.118.79.30 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=23499 DF PROTO=TCP SPT=24812 DPT=51903 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 4 13:51:48 daemon debug user: wlctl -i wl0 authe_sta_list > /var/wl0_authe
Oct 4 13:51:48 daemon debug user: wlctl -i wl0 assoclist > /var/wl0_assoc
Oct 4 13:51:48 daemon debug user: wlctl -i wl0 autho_sta_list > /var/wl0_autho
Oct 4 13:51:50 daemon debug user: wlctl -i wl0 authe_sta_list > /var/wl0_authe
Oct 4 13:51:50 daemon debug user: wlctl -i wl0 assoclist > /var/wl0_assoc
Oct 4 13:51:50 daemon debug user: wlctl -i wl0 autho_sta_list > /var/wl0_autho
Oct 4 13:51:52 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=41.201.204.143 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=12767 DF PROTO=TCP SPT=54123 DPT=51903 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 13:51:54 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.118.79.30 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=23610 DF PROTO=TCP SPT=24813 DPT=51903 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 4 13:51:54 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=41.201.204.143 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=12816 DF PROTO=TCP SPT=54123 DPT=51903 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 13:52:00 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=41.201.204.143 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=12897 DF PROTO=TCP SPT=54123 DPT=51903 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 13:52:05 user debug tr64[2534]: wlctl -i wl0 phytype > /var/wl0
Oct 4 13:52:05 user debug tr64[2536]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 13:52:05 user debug tr64[2538]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 13:52:05 user debug tr64[2540]: wlctl -i wl0 phytype > /var/wl0
Oct 4 13:52:05 user debug tr64[2542]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 13:52:05 user debug tr64[2544]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 13:56:05 user notice igmp[2363]: setsockopt- MRT_DEL_MFC
Oct 4 13:56:05 user notice igmp[2363]: setsockopt- MRT_DEL_MFC
Oct 4 13:56:05 user notice igmp[2363]: setsockopt- MRT_DEL_MFC
Oct 4 13:56:05 user notice igmp[2363]: setsockopt- MRT_DEL_MFC
Oct 4 13:56:49 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=59.94.96.48 DST=31.23.81.56 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=21918 DF PROTO=TCP SPT=53501 DPT=51903 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 13:56:50 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=219.90.155.104 DST=31.23.81.56 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=29191 DF PROTO=TCP SPT=53604 DPT=51903 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 13:56:51 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.195.30.95 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=21236 DF PROTO=TCP SPT=4713 DPT=20110 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 13:56:53 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.105.85.13 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=47310 DF PROTO=TCP SPT=3420 DPT=51903 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 13:56:55 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=82.8.61.243 DST=31.23.81.56 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=12365 DF PROTO=TCP SPT=55638 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 13:56:55 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=59.94.96.48 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=21992 DF PROTO=TCP SPT=53501 DPT=51903 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 14:06:51 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.221.60.84 DST=31.23.81.56 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=46965 DF PROTO=TCP SPT=42866 DPT=10719 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 4 14:16:51 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.110.29.38 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=57257 DF PROTO=TCP SPT=1480 DPT=51903 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 14:17:49 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.219.136.15 DST=31.23.81.56 LEN=52 TOS=0x02 PREC=0x00 TTL=115 ID=25903 DF PROTO=TCP SPT=64199 DPT=51903 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 14:17:49 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.169.13.103 DST=31.23.81.56 LEN=52 TOS=0x00 PREC=0x00 TTL=121 ID=26965 DF PROTO=TCP SPT=52552 DPT=51903 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 14:17:52 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=91.219.136.15 DST=31.23.81.56 LEN=52 TOS=0x02 PREC=0x00 TTL=115 ID=26270 DF PROTO=TCP SPT=64199 DPT=51903 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 14:17:54 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.24.251.120 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=16285 DF PROTO=TCP SPT=61458 DPT=6881 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 14:17:55 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.169.13.103 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=27252 DF PROTO=TCP SPT=52552 DPT=51903 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 14:17:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.187.187.35 DST=31.23.81.56 LEN=64 TOS=0x00 PREC=0x00 TTL=55 ID=25225 DF PROTO=TCP SPT=44269 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 14:17:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.28.16.126 DST=31.23.81.56 LEN=52 TOS=0x00 PREC=0x00 TTL=119 ID=1491 DF PROTO=TCP SPT=50284 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 14:17:57 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=93.187.187.35 DST=31.23.81.56 LEN=64 TOS=0x00 PREC=0x00 TTL=55 ID=40666 DF PROTO=TCP SPT=44269 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 14:27:55 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.118.90.169 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=6407 DF PROTO=TCP SPT=15880 DPT=51903 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 14:37:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.187.15.40 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=36363 DF PROTO=TCP SPT=2902 DPT=51903 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 14:47:58 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=62.122.245.74 DST=31.23.81.56 LEN=40 TOS=0x00 PREC=0x00 TTL=111 ID=256 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 4 14:51:10 syslog info -- MARK --
Oct 4 14:57:55 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=195.182.194.223 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=37557 DF PROTO=TCP SPT=2332 DPT=51903 WINDOW=64380 RES=0x00 SYN URGP=0
Oct 4 15:07:57 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.186.52.29 DST=31.23.81.56 LEN=52 TOS=0x00 PREC=0x00 TTL=121 ID=14914 DF PROTO=TCP SPT=65035 DPT=51903 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 15:17:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=221.10.129.107 DST=31.23.81.56 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=57837 DF PROTO=TCP SPT=31440 DPT=41013 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 4 15:27:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.105.85.13 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=64806 DF PROTO=TCP SPT=1214 DPT=51903 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 15:37:54 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=217.118.90.169 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=20328 DF PROTO=TCP SPT=16219 DPT=51903 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 15:47:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=190.12.97.201 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=62193 DF PROTO=TCP SPT=20355 DPT=51903 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 15:51:10 syslog info -- MARK --
Oct 4 15:57:58 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=79.25.71.28 DST=31.23.81.56 LEN=52 TOS=0x00 PREC=0x00 TTL=114 ID=946 DF PROTO=TCP SPT=56517 DPT=51903 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 16:07:55 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=180.253.234.3 DST=31.23.81.56 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=3170 DF PROTO=TCP SPT=52137 DPT=51903 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 16:09:28 user debug tr64[2578]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:09:28 user debug tr64[2580]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:09:28 user debug tr64[2582]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:09:28 user debug tr64[2584]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:09:28 user debug tr64[2586]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:09:28 user debug tr64[2588]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:09:28 user debug tr64[2590]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:09:28 user debug tr64[2592]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:09:28 user debug tr64[2594]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:09:29 user debug tr64[2596]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:09:29 user debug tr64[2598]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:09:29 user debug tr64[2600]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:09:29 user debug tr64[2602]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:09:29 user debug tr64[2604]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:09:29 user debug tr64[2606]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:10:19 user debug tr64[2608]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:10:19 user debug tr64[2610]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:10:19 user debug tr64[2612]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:10:19 user debug tr64[2614]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:10:19 user debug tr64[2616]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:10:19 user debug tr64[2618]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:10:19 user debug tr64[2620]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:10:19 user debug tr64[2622]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:10:19 user debug tr64[2624]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:10:20 user debug tr64[2626]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:10:20 user debug tr64[2628]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:10:20 user debug tr64[2630]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:10:20 user debug tr64[2632]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:10:20 user debug tr64[2634]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:10:20 user debug tr64[2636]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:10:31 user debug tr64[2638]: ethctl vport query 2>/var/vcfgerr
Oct 4 16:10:31 user debug tr64[2640]: rm /var/vcfgerr
Oct 4 16:10:32 user crit kernel: OAM loopback response not received on PORT/VPI/VCI 0/0/35.
Oct 4 16:10:34 user debug tr64[2646]: ping 83.221.214.193
Oct 4 16:10:34 user crit kernel: OAM loopback response not received on PORT/VPI/VCI 0/0/35.
Oct 4 16:10:39 user debug tr64[2648]: ping 80.254.108.194


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Вт окт 04, 2011 15:14 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
DSL-2650U\BRU\D2
прошивка BZ_1.15


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Вт окт 04, 2011 15:50 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
Скрытый текст: показать
Oct 4 16:12:29 user debug tr64[2708]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:12:29 user debug tr64[2710]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:12:29 daemon err user: tr69c: Unable to retrieve attributes in scratch PAD
Oct 4 16:12:29 daemon err user: Stored Parameter Attribute data is corrupt or missing
Oct 4 16:12:29 user debug tr64[2712]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:12:29 user debug tr64[2714]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:12:29 user debug tr64[2716]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:12:29 user debug tr64[2718]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:12:29 user debug tr64[2720]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:12:29 user debug tr64[2722]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:12:29 user debug igmp[2725]: iptables -D FORWARD -i ppp_0_0_35_1 -d 224.0.0.252 -j DROP 2>/dev/null
Oct 4 16:12:29 user debug tr64[2724]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:12:29 user debug igmp[2727]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 224.0.0.252 -j ACCEPT 2>/dev/null
Oct 4 16:12:29 user debug tr64[2730]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:12:29 user debug igmp[2733]: iptables -D FORWARD -i ppp_0_0_35_1 -d 239.255.255.250 -j DROP 2>/dev/null
Oct 4 16:12:29 user debug tr64[2732]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:12:29 user debug igmp[2735]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 239.255.255.250 -j ACCEPT 2>/dev/null
Oct 4 16:12:29 user debug tr64[2737]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:12:29 daemon debug user: found route to name ppp_0_0_35_1 ipAdress 31.23.35.97
Oct 4 16:12:29 user debug tr64[2740]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:12:30 user debug tr64[2742]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:12:30 daemon debug user: dns_lookup(acs.bezek.com) = 147.235.246.93
Oct 4 16:12:31 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.95.34.12 DST=31.23.35.97 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=41810 DF PROTO=TCP SPT=2455 DPT=35053 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 4 16:12:31 daemon debug user: wlctl -i wl0 authe_sta_list > /var/wl0_authe
Oct 4 16:12:31 daemon debug user: wlctl -i wl0 assoclist > /var/wl0_assoc
Oct 4 16:12:31 daemon debug user: wlctl -i wl0 autho_sta_list > /var/wl0_autho
Oct 4 16:12:33 daemon debug user: wlctl -i wl0 authe_sta_list > /var/wl0_authe
Oct 4 16:12:33 daemon debug user: wlctl -i wl0 assoclist > /var/wl0_assoc
Oct 4 16:12:34 daemon debug user: wlctl -i wl0 autho_sta_list > /var/wl0_autho
Oct 4 16:12:43 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.124.23.47 DST=31.23.35.97 LEN=40 TOS=0x00 PREC=0x00 TTL=112 ID=256 PROTO=TCP SPT=6000 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 4 16:12:43 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.124.23.47 DST=31.23.35.97 LEN=40 TOS=0x00 PREC=0x00 TTL=112 ID=256 PROTO=TCP SPT=6000 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 4 16:12:43 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=92.124.23.47 DST=31.23.35.97 LEN=40 TOS=0x00 PREC=0x00 TTL=112 ID=256 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 4 16:12:48 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=74.243.250.248 DST=31.23.35.97 LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=5561 DF PROTO=TCP SPT=50813 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 16:12:48 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=74.192.250.65 DST=31.23.35.97 LEN=64 TOS=0x00 PREC=0x00 TTL=44 ID=23672 DF PROTO=TCP SPT=52208 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 16:12:50 user debug tr64[2868]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:12:50 user debug tr64[2870]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:12:50 user debug tr64[2872]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:12:50 user debug tr64[2874]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:12:50 user debug tr64[2876]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:12:50 user debug tr64[2878]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:10 user debug tr64[2880]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:10 user debug tr64[2882]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:10 user debug tr64[2884]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:10 user debug tr64[2886]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:10 user debug tr64[2888]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:10 user debug tr64[2890]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:30 user debug tr64[2892]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:30 user debug tr64[2894]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:30 user debug tr64[2896]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:30 user debug tr64[2898]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:31 user debug tr64[2900]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:31 user debug tr64[2902]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:32 user debug tr64[2904]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:32 user debug tr64[2906]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:32 user debug tr64[2908]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:32 user debug tr64[2910]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:32 user debug tr64[2912]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:32 user debug tr64[2914]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:33 user debug tr64[2916]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:33 user debug tr64[2918]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:33 user debug tr64[2920]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:33 user debug tr64[2922]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:33 user debug tr64[2924]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:33 user debug tr64[2926]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:33 user debug tr64[2928]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:33 user debug tr64[2930]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:33 user debug tr64[2932]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:51 user debug tr64[2934]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:51 user debug tr64[2936]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:51 user debug tr64[2938]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:51 user debug tr64[2940]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:51 user debug tr64[2942]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:51 user debug tr64[2944]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:53 user debug tr64[2946]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:53 user debug tr64[2948]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:53 user debug tr64[2950]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:13:53 user debug tr64[2952]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:13:53 user debug tr64[2954]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:13:53 user debug tr64[2956]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:14:11 user debug tr64[2958]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:14:11 user debug tr64[2960]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:14:11 user debug tr64[2962]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:14:11 user debug tr64[2964]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:14:11 user debug tr64[2966]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:14:11 user debug tr64[2968]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:14:13 user debug tr64[2970]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:14:13 user debug tr64[2972]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:14:13 user debug tr64[2974]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:14:14 user debug tr64[2976]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:14:14 user debug tr64[2978]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:14:14 user debug tr64[2980]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:14:31 user debug tr64[2982]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:14:31 user debug tr64[2984]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:14:31 user debug tr64[2986]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:14:31 user debug tr64[2988]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:14:32 user debug tr64[2990]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:14:32 user debug tr64[2992]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:14:34 user debug tr64[2994]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:14:34 user debug tr64[2996]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:14:34 user debug tr64[2998]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:14:34 user debug tr64[3000]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:14:34 user debug tr64[3002]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:14:34 user debug tr64[3004]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:16:48 user notice igmp[2641]: setsockopt- MRT_DEL_MFC
Oct 4 16:16:48 user notice igmp[2641]: setsockopt- MRT_DEL_MFC
Oct 4 16:16:48 user notice igmp[2641]: setsockopt- MRT_DEL_MFC
Oct 4 16:16:48 user notice igmp[2641]: setsockopt- MRT_DEL_MFC
Oct 4 16:17:44 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:17:44 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:17:44 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:17:44 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:17:47 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:17:47 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:17:48 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:18:44 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:20:49 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:22:35 user debug tr64[3006]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:22:35 user debug tr64[3008]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:22:35 user debug tr64[3010]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:22:35 user debug tr64[3012]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:22:35 user debug tr64[3014]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:22:35 user debug tr64[3016]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:22:36 user debug tr64[3018]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:22:36 user debug tr64[3020]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:22:36 user debug tr64[3022]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:22:36 user debug tr64[3024]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:22:36 user debug tr64[3026]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:22:36 user debug tr64[3028]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:22:36 user debug tr64[3030]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:22:36 user debug tr64[3032]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:22:36 user debug tr64[3034]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:22:38 user debug tr64[3036]: ethctl vport query 2>/var/vcfgerr
Oct 4 16:22:38 user debug tr64[3038]: rm /var/vcfgerr
Oct 4 16:22:39 user crit kernel: OAM loopback response not received on PORT/VPI/VCI 0/0/35.
Oct 4 16:22:41 user debug tr64[3044]: ping 83.221.214.193
Oct 4 16:22:41 user crit kernel: OAM loopback response not received on PORT/VPI/VCI 0/0/35.
Oct 4 16:22:41 user debug tr64[3046]: ping 80.254.108.194
Oct 4 16:22:47 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=46.119.79.221 DST=31.23.35.97 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=36284 DF PROTO=TCP SPT=4023 DPT=35053 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 16:22:54 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:23:19 user debug tr64[3048]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:23:19 user debug tr64[3050]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:23:19 user debug tr64[3052]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:23:20 user debug tr64[3054]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:23:20 user debug tr64[3056]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:23:20 user debug tr64[3058]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:23:21 user debug tr64[3060]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:23:21 user debug tr64[3062]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:23:21 user debug tr64[3064]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:23:21 user debug tr64[3066]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:23:22 user debug tr64[3068]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:23:22 user debug tr64[3070]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:24:58 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:27:03 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:29:08 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:31:14 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:32:45 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.112.164 DST=31.23.35.97 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=23919 DF PROTO=TCP SPT=1152 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 16:33:19 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:35:24 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:37:29 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:39:34 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:41:39 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:43:08 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=46.119.79.221 DST=31.23.35.97 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=24802 DF PROTO=TCP SPT=2427 DPT=35053 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 16:43:44 user notice igmp[2641]: setsockopt IP_MSFILTER
Oct 4 16:44:37 user debug tr64[3072]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:44:37 user debug tr64[3074]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:44:37 user debug tr64[3076]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:44:37 user debug tr64[3078]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:44:37 user debug tr64[3080]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:44:37 user debug tr64[3082]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:44:38 user debug tr64[3084]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:44:38 user debug tr64[3086]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:44:38 user debug tr64[3088]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:44:38 user debug tr64[3090]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:44:38 user debug tr64[3092]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:44:38 user debug tr64[3094]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 16:44:38 user debug tr64[3096]: wlctl -i wl0 phytype > /var/wl0
Oct 4 16:44:38 user debug tr64[3098]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 16:44:38 user debug tr64[3100]: wlctl -i wl0 bands > /var/wl0bands
еще один обрыв


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Вт окт 04, 2011 18:12 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
Скрытый текст: показать
Oct 4 17:54:02 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.26.160 DST=31.23.13.230 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=61828 DF PROTO=TCP SPT=2677 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 17:54:17 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 17:55:21 syslog info -- MARK --
Oct 4 17:56:22 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 17:58:27 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 18:00:32 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 18:02:37 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 18:03:47 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=178.178.47.2 DST=31.23.13.230 LEN=52 TOS=0x00 PREC=0x00 TTL=114 ID=16699 DF PROTO=TCP SPT=56174 DPT=11272 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 18:04:42 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 18:06:47 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 18:08:52 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 18:10:57 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 18:13:02 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 18:15:07 user notice igmp[2383]: setsockopt IP_MSFILTER
Oct 4 18:15:16 user crit kernel: eth0 Link DOWN.
Oct 4 18:15:16 user info kernel: br0: port 2(eth0) entering disabled state
Oct 4 18:15:18 user crit kernel: eth0 Link UP.
Oct 4 18:15:19 user info kernel: br0: port 2(eth0) entering learning state
Oct 4 18:15:19 user info kernel: br0: topology change detected, propagating
Oct 4 18:15:19 user info kernel: br0: port 2(eth0) entering forwarding state
Oct 4 18:16:07 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.117.140 DST=31.23.13.230 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=48286 DF PROTO=TCP SPT=2527 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:19:27 user debug igmp[2952]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 239.255.255.250 -j DROP 2>/dev/null
Oct 4 18:19:27 user debug igmp[2954]: iptables -t filter -D FORWARD -i ppp_0_0_35_1 -d 239.255.255.250 -j ACCEPT 2>/dev/null
Oct 4 18:19:27 user notice igmp[2383]: setsockopt- MRT_DEL_MFC
Oct 4 18:19:27 user notice igmp[2383]: perror:setsockopt - IP_DROP_MEMBERSHIP
Oct 4 18:19:27 user debug igmp[2956]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 224.0.0.252 -j DROP 2>/dev/null
Oct 4 18:19:27 user debug igmp[2958]: iptables -t filter -D FORWARD -i ppp_0_0_35_1 -d 224.0.0.252 -j ACCEPT 2>/dev/null
Oct 4 18:19:27 user notice igmp[2383]: setsockopt- MRT_DEL_MFC
Oct 4 18:19:53 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.23.72 DST=31.23.13.230 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=62089 DF PROTO=TCP SPT=47076 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:19:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.23.72 DST=31.23.13.230 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=62198 DF PROTO=TCP SPT=47076 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:20:39 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.46.109 DST=31.23.13.230 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=50408 DF PROTO=TCP SPT=2429 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:20:40 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.46.109 DST=31.23.13.230 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=50595 DF PROTO=TCP SPT=2692 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:21:04 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.114.25 DST=31.23.13.230 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=43218 DF PROTO=TCP SPT=2819 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:31:45 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.63.90 DST=31.23.13.230 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=36595 DF PROTO=TCP SPT=3826 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:41:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=95.78.150.194 DST=31.23.13.230 LEN=40 TOS=0x00 PREC=0x00 TTL=114 ID=256 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 4 18:50:04 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.46.109 DST=31.23.13.230 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=38514 DF PROTO=TCP SPT=2115 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:54:59 daemon info pppd[730]: No response to 5 echo-requests
Oct 4 18:54:59 daemon notice pppd[730]: Serial link appears to be disconnected.
Oct 4 18:54:59 daemon info pppd[730]: Connect time 6184494.1 minutes.
Oct 4 18:54:59 daemon info pppd[730]: Sent 10778189 bytes, received 253800576 bytes.
Oct 4 18:54:59 daemon warn pppd[730]: Couldn't increase MRU to 1500
Oct 4 18:55:05 daemon notice pppd[730]: Connection terminated....
Oct 4 18:55:08 daemon info pppd[730]: Sent PADT
Oct 4 18:55:18 daemon info pppd[730]: PPP session is 15018
Oct 4 18:55:18 daemon info pppd[730]: Using interface ppp0_0_35_1
Oct 4 18:55:18 daemon notice pppd[730]: Connect: ppp_0_0_35_1 <--> nas_0_0_35
Oct 4 18:55:18 daemon warn pppd[730]: Couldn't increase MRU to 1500
Oct 4 18:55:21 syslog info -- MARK --
Oct 4 18:55:25 daemon notice pppd[730]: PAP authentication succeeded
Oct 4 18:55:25 daemon notice pppd[730]: peer from calling number 00:90:1A:A3:42:A1 authorized
Oct 4 18:55:38 daemon notice pppd[730]: local IP address 109.165.124.201
Oct 4 18:55:38 daemon notice pppd[730]: remote IP address 83.221.214.195
Oct 4 18:55:38 daemon notice pppd[730]: primary DNS address 80.254.108.198
Oct 4 18:55:38 daemon notice pppd[730]: secondary DNS address 80.254.108.206
Oct 4 18:55:38 user debug tr64[7266]: route add default gw 83.221.214.195 2>/dev/null
Oct 4 18:55:38 user debug tr64[7268]: iptables -A FORWARD -o ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Oct 4 18:55:38 user debug tr64[7270]: iptables -A FORWARD -i ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Oct 4 18:55:38 user debug tr64[7272]: iptables -t nat -D POSTROUTING -o ppp_0_0_35_1 -s 10.0.0.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Oct 4 18:55:38 user debug tr64[7274]: iptables -t nat -A POSTROUTING -o ppp_0_0_35_1 -s 10.0.0.0/255.255.255.0 -j MASQUERADE
Oct 4 18:55:39 user debug tr64[7290]: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_35_1 -p tcp --dport 30005
Oct 4 18:55:39 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=77.93.20.76 DST=109.165.124.201 LEN=60 TOS=0x00 PREC=0x00 TTL=117 ID=3944 DF PROTO=TCP SPT=57898 DPT=19396 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 18:55:39 user debug tr64[7292]: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_35_1 -p tcp --dport 30005
Oct 4 18:55:39 user debug tr64[7294]: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_35_1 -p udp -s 10.0.0.138/24 --dport 30006
Oct 4 18:55:39 user debug tr64[7296]: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_35_1 -p udp -s 10.0.0.138/24 --dport 30006
Oct 4 18:55:41 user debug tr64[7300]: kill -SIGTERM 2383
Oct 4 18:55:41 user debug tr64[7302]: /bin/igmp ppp_0_0_35_1 &
Oct 4 18:55:41 user notice igmp[7303]: igmp started!
Oct 4 18:55:41 user notice igmp[7303]: setsockopt - MRT_ADD_VIF
Oct 4 18:55:45 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=85.232.130.153 DST=109.165.124.201 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=60487 DF PROTO=TCP SPT=2795 DPT=19396 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:55:47 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=77.108.110.162 DST=109.165.124.201 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=29148 DF PROTO=TCP SPT=53192 DPT=19396 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:55:48 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=77.93.20.76 DST=109.165.124.201 LEN=56 TOS=0x00 PREC=0x00 TTL=117 ID=9973 DF PROTO=TCP SPT=57898 DPT=19396 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 18:55:51 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=85.232.130.153 DST=109.165.124.201 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=60582 DF PROTO=TCP SPT=2795 DPT=19396 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 18:55:52 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=77.52.120.140 DST=109.165.124.201 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=9804 DF PROTO=TCP SPT=1840 DPT=42264 WINDOW=64380 RES=0x00 SYN URGP=0
Oct 4 18:56:00 daemon debug user: found route to name ppp_0_0_35_1 ipAdress 109.165.124.201
Oct 4 18:56:00 daemon debug user: dns_lookup(acs.bezek.com) = 147.235.246.93
Oct 4 19:00:01 user notice igmp[7303]: setsockopt- MRT_DEL_MFC
Oct 4 19:00:01 user notice igmp[7303]: setsockopt- MRT_DEL_MFC
Oct 4 19:00:01 user notice igmp[7303]: setsockopt- MRT_DEL_MFC
Oct 4 19:00:01 user notice igmp[7303]: setsockopt- MRT_DEL_MFC
Oct 4 19:03:19 daemon info pppd[730]: No response to 5 echo-requests
Oct 4 19:03:19 daemon notice pppd[730]: Serial link appears to be disconnected.
Oct 4 19:03:19 daemon info pppd[730]: Connect time 7.7 minutes.
Oct 4 19:03:19 daemon info pppd[730]: Sent 1727 bytes, received 25427 bytes.
Oct 4 19:03:19 daemon warn pppd[730]: Couldn't increase MRU to 1500
Oct 4 19:03:25 daemon notice pppd[730]: Connection terminated....
Oct 4 19:03:28 daemon info pppd[730]: Sent PADT
Oct 4 19:03:43 daemon info pppd[730]: PPP session is 13024
Oct 4 19:03:43 daemon info pppd[730]: Using interface ppp0_0_35_1
Oct 4 19:03:43 daemon notice pppd[730]: Connect: ppp_0_0_35_1 <--> nas_0_0_35
Oct 4 19:03:43 daemon warn pppd[730]: Couldn't increase MRU to 1500
Oct 4 19:03:46 daemon notice pppd[730]: PAP authentication succeeded
Oct 4 19:03:46 daemon notice pppd[730]: peer from calling number 00:90:1A:A4:49:E0 authorized
Oct 4 19:03:55 daemon notice pppd[730]: local IP address 31.23.107.127
Oct 4 19:03:55 daemon notice pppd[730]: remote IP address 83.221.214.193
Oct 4 19:03:55 daemon notice pppd[730]: primary DNS address 80.254.108.194
Oct 4 19:03:55 daemon notice pppd[730]: secondary DNS address 80.254.108.202
Oct 4 19:03:56 user debug tr64[11436]: route add default gw 83.221.214.193 2>/dev/null
Oct 4 19:03:56 user debug tr64[11438]: iptables -A FORWARD -o ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Oct 4 19:03:56 user debug tr64[11440]: iptables -A FORWARD -i ppp_0_0_35_1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Oct 4 19:03:56 user debug tr64[11442]: iptables -t nat -D POSTROUTING -o ppp_0_0_35_1 -s 10.0.0.0/255.255.255.0 -j MASQUERADE 2>/dev/null
Oct 4 19:03:56 user debug tr64[11444]: iptables -t nat -A POSTROUTING -o ppp_0_0_35_1 -s 10.0.0.0/255.255.255.0 -j MASQUERADE
Oct 4 19:03:56 user debug tr64[11460]: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_35_1 -p tcp --dport 30005
Oct 4 19:03:56 user debug tr64[11462]: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_35_1 -p tcp --dport 30005
Oct 4 19:03:56 user debug tr64[11464]: iptables -I INPUT 1 -j ACCEPT -i ppp_0_0_35_1 -p udp -s 10.0.0.138/24 --dport 30006
Oct 4 19:03:56 user debug tr64[11466]: iptables -I FORWARD 1 -j ACCEPT -i ppp_0_0_35_1 -p udp -s 10.0.0.138/24 --dport 30006
Oct 4 19:03:59 daemon info pppd[730]: Connect time 0.1 minutes.
Oct 4 19:03:59 daemon info pppd[730]: Sent 0 bytes, received 10 bytes.
Oct 4 19:03:59 daemon notice pppd[730]: local IP address 31.23.107.127
Oct 4 19:03:59 daemon notice pppd[730]: remote IP address 83.221.214.193
Oct 4 19:03:59 daemon notice pppd[730]: primary DNS address 80.254.108.194
Oct 4 19:03:59 daemon notice pppd[730]: secondary DNS address 80.254.108.202
Oct 4 19:06:09 user warn dnsprobe[2346]: dns query failed
Oct 4 19:06:11 user warn dnsprobe[2346]: dns query failed
Oct 4 19:06:13 user warn dnsprobe[2346]: dns query failed
Oct 4 19:06:13 user notice dnsprobe[2346]: Primary DNS server Is Down... Switching To Secondary DNS server
Oct 4 19:07:21 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=2.92.51.219 DST=31.23.107.127 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=27713 DF PROTO=TCP SPT=1898 DPT=6881 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:07:24 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=31.23.117.140 DST=31.23.107.127 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=15516 DF PROTO=TCP SPT=1460 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:08:37 user crit kernel: eth0 Link DOWN.
Oct 4 19:08:37 user info kernel: br0: port 2(eth0) entering disabled state
Oct 4 19:08:40 user crit kernel: eth0 Link UP.
Oct 4 19:08:40 user info kernel: br0: port 2(eth0) entering learning state
Oct 4 19:08:40 user info kernel: br0: topology change detected, propagating
Oct 4 19:08:40 user info kernel: br0: port 2(eth0) entering forwarding state
Oct 4 19:08:43 user notice igmp[7303]: setsockopt IP_MSFILTER
Oct 4 19:08:43 user notice igmp[7303]: setsockopt IP_MSFILTER
Oct 4 19:08:43 user notice igmp[7303]: setsockopt IP_MSFILTER
Oct 4 19:08:43 user notice igmp[7303]: setsockopt IP_MSFILTER
Oct 4 19:08:43 user notice igmp[7303]: igmp:IP_ADD_MEMBERSHIP Failed
Oct 4 19:08:43 user debug igmp[11722]: iptables -D FORWARD -i ppp_0_0_35_1 -d 239.255.255.250 -j DROP 2>/dev/null
Oct 4 19:08:43 user debug igmp[11724]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 239.255.255.250 -j ACCEPT 2>/dev/null
Oct 4 19:08:43 user notice igmp[7303]: setsockopt IP_MSFILTER
Oct 4 19:08:43 user notice igmp[7303]: setsockopt IP_MSFILTER
Oct 4 19:08:43 user notice igmp[7303]: setsockopt IP_MSFILTER
Oct 4 19:08:46 user notice igmp[7303]: setsockopt IP_MSFILTER
Oct 4 19:08:46 user notice igmp[7303]: setsockopt IP_MSFILTER
Oct 4 19:08:46 user notice igmp[7303]: setsockopt IP_MSFILTER
Oct 4 19:08:53 user debug tr64[11726]: wlctl -i wl0 phytype > /var/wl0
Oct 4 19:08:53 user debug tr64[11728]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 19:08:53 user debug tr64[11730]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 19:08:53 user debug tr64[11732]: wlctl -i wl0 phytype > /var/wl0
Oct 4 19:08:53 user debug tr64[11734]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 19:08:53 user debug tr64[11736]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 19:08:53 user debug tr64[11738]: wlctl -i wl0 phytype > /var/wl0
Oct 4 19:08:53 user debug tr64[11740]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 19:08:53 user debug tr64[11742]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 19:08:53 user debug tr64[11744]: wlctl -i wl0 phytype > /var/wl0
Oct 4 19:08:53 user debug tr64[11746]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 19:08:53 user debug tr64[11748]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 19:08:53 user debug tr64[11750]: wlctl -i wl0 phytype > /var/wl0
Oct 4 19:08:54 user debug tr64[11752]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 19:08:54 user debug tr64[11754]: wlctl -i wl0 bands > /var/wl0bands
и снова обрыв


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Вт окт 04, 2011 19:50 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
Нету интернета после включения компа)
Скрытый текст: показать
Oct 4 19:11:16 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.171.44.207 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=31310 DF PROTO=TCP SPT=58511 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 19:11:27 user debug tr64[5258]: wlctl -i wl0 phytype > /var/wl0
Oct 4 19:11:27 user debug tr64[5260]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 19:11:27 user debug tr64[5262]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 19:11:27 user debug tr64[5264]: wlctl -i wl0 phytype > /var/wl0
Oct 4 19:11:27 user debug tr64[5266]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 19:11:27 user debug tr64[5268]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 19:11:47 user debug tr64[5270]: wlctl -i wl0 phytype > /var/wl0
Oct 4 19:11:47 user debug tr64[5272]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 19:11:47 user debug tr64[5274]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 19:11:47 user debug tr64[5276]: wlctl -i wl0 phytype > /var/wl0
Oct 4 19:11:47 user debug tr64[5278]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 19:11:47 user debug tr64[5280]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 19:14:09 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=46.61.99.243 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=34969 DF PROTO=TCP SPT=43487 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:14:12 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=46.61.99.243 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=35120 DF PROTO=TCP SPT=43487 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:15:18 user notice igmp[4942]: setsockopt- MRT_DEL_MFC
Oct 4 19:15:18 user notice igmp[4942]: setsockopt- MRT_DEL_MFC
Oct 4 19:15:18 user notice igmp[4942]: setsockopt- MRT_DEL_MFC
Oct 4 19:15:18 user notice igmp[4942]: setsockopt- MRT_DEL_MFC
Oct 4 19:26:26 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.150.168.163 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=26141 DF PROTO=TCP SPT=2222 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:33:17 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=182.71.248.162 DST=46.61.114.229 LEN=60 TOS=0x00 PREC=0x00 TTL=56 ID=63646 DF PROTO=TCP SPT=18187 DPT=3389 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 4 19:38:45 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:38:45 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:38:45 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:38:45 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:38:48 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:38:48 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:38:48 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:40:09 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:42:15 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:44:20 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:44:22 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.163.0.0 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=32958 DF PROTO=TCP SPT=1227 DPT=29442 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:46:25 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:48:06 user crit kernel: eth0 Link DOWN.
Oct 4 19:48:07 user info kernel: br0: port 2(eth0) entering disabled state
Oct 4 19:48:09 user crit kernel: eth0 Link UP.
Oct 4 19:48:09 user info kernel: br0: port 2(eth0) entering learning state
Oct 4 19:48:09 user info kernel: br0: topology change detected, propagating
Oct 4 19:48:09 user info kernel: br0: port 2(eth0) entering forwarding state
Oct 4 19:50:44 user debug igmp[5418]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 239.255.255.250 -j DROP 2>/dev/null
Oct 4 19:50:44 user debug igmp[5420]: iptables -t filter -D FORWARD -i ppp_0_0_35_1 -d 239.255.255.250 -j ACCEPT 2>/dev/null
Oct 4 19:50:44 user notice igmp[4942]: setsockopt- MRT_DEL_MFC
Oct 4 19:50:44 user notice igmp[4942]: perror:setsockopt - IP_DROP_MEMBERSHIP
Oct 4 19:50:44 user debug igmp[5422]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 224.0.0.252 -j DROP 2>/dev/null
Oct 4 19:50:44 user debug igmp[5424]: iptables -t filter -D FORWARD -i ppp_0_0_35_1 -d 224.0.0.252 -j ACCEPT 2>/dev/null
Oct 4 19:50:44 user notice igmp[4942]: setsockopt- MRT_DEL_MFC
Oct 4 19:58:14 user crit kernel: eth0 Link DOWN.
Oct 4 19:58:14 user info kernel: br0: port 2(eth0) entering disabled state
Oct 4 19:58:17 user crit kernel: eth0 Link UP.
Oct 4 19:58:17 user info kernel: br0: port 2(eth0) entering learning state
Oct 4 19:58:17 user info kernel: br0: topology change detected, propagating
Oct 4 19:58:17 user info kernel: br0: port 2(eth0) entering forwarding state
Oct 4 19:58:18 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:58:18 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:58:19 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:58:19 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:58:19 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:58:32 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.252.30.153 DST=46.61.114.229 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=50999 DF PROTO=TCP SPT=4304 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:58:35 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.252.30.153 DST=46.61.114.229 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=51006 DF PROTO=TCP SPT=4304 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:58:35 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.194.191.244 DST=46.61.114.229 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=3749 DF PROTO=TCP SPT=49881 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 19:58:41 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.252.30.153 DST=46.61.114.229 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=51007 DF PROTO=TCP SPT=4304 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:58:41 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.194.191.244 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=3888 DF PROTO=TCP SPT=49881 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 19:58:54 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 19:58:54 user debug igmp[5578]: iptables -D FORWARD -i ppp_0_0_35_1 -d 239.255.255.250 -j DROP 2>/dev/null
Oct 4 19:58:54 user debug igmp[5580]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 239.255.255.250 -j ACCEPT 2>/dev/null
Oct 4 19:59:08 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=46.61.99.144 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=64450 DF PROTO=TCP SPT=1473 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:59:09 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=46.61.99.144 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=64649 DF PROTO=TCP SPT=1647 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:59:10 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=46.61.99.144 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=64908 DF PROTO=TCP SPT=1829 DPT=1433 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 19:59:18 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.252.30.153 DST=46.61.114.229 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=51029 DF PROTO=TCP SPT=4304 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 20:01:00 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:03:05 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:05:10 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:06:56 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=46.61.103.58 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=18638 DF PROTO=TCP SPT=4199 DPT=135 WINDOW=64380 RES=0x00 SYN URGP=0
Oct 4 20:07:15 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:09:20 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:10:00 syslog info -- MARK --
Oct 4 20:11:24 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:13:29 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:13:51 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=109.242.203.0 DST=46.61.114.229 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=1511 DF PROTO=TCP SPT=64892 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0
Oct 4 20:15:34 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:17:40 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:19:45 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:21:07 user warn dnsprobe[4904]: dns query failed
Oct 4 20:21:50 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:22:01 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=83.221.216.249 DST=46.61.114.229 LEN=40 TOS=0x00 PREC=0x00 TTL=117 ID=256 PROTO=TCP SPT=6000 DPT=135 WINDOW=16384 RES=0x00 SYN URGP=0
Oct 4 20:23:55 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:26:00 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:28:04 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:28:19 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:28:19 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:28:19 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:28:19 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:28:19 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:29:20 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=46.61.99.144 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=45450 DF PROTO=TCP SPT=4855 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 20:30:09 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:30:34 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:30:34 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:30:34 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:30:34 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:30:34 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:30:36 user debug igmp[5582]: iptables -D FORWARD -i ppp_0_0_35_1 -d 239.192.152.143 -j DROP 2>/dev/null
Oct 4 20:30:36 user debug igmp[5584]: iptables -t filter -I FORWARD 1 -i ppp_0_0_35_1 -d 239.192.152.143 -j ACCEPT 2>/dev/null
Oct 4 20:30:37 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:30:37 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:30:37 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:32:14 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:32:14 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:32:23 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.163.0.0 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=37170 DF PROTO=TCP SPT=2214 DPT=29442 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 20:32:26 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.163.0.0 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=37665 DF PROTO=TCP SPT=2214 DPT=29442 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 20:32:32 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=188.163.0.0 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=38748 DF PROTO=TCP SPT=2214 DPT=29442 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 20:33:59 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=88.255.139.10 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=32162 DF PROTO=TCP SPT=3838 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 20:34:02 user alert kernel: Intrusion -> IN=ppp_0_0_35_1 OUT= MAC= SRC=88.255.139.10 DST=46.61.114.229 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=2144 DF PROTO=TCP SPT=3838 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 4 20:34:19 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:34:19 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:36:24 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:36:24 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:38:29 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:38:29 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:40:34 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:40:34 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:07 user crit kernel: eth0 Link DOWN.
Oct 4 20:42:07 user info kernel: br0: port 2(eth0) entering disabled state
Oct 4 20:42:09 user crit kernel: eth0 Link UP.
Oct 4 20:42:10 user info kernel: br0: port 2(eth0) entering learning state
Oct 4 20:42:10 user info kernel: br0: topology change detected, propagating
Oct 4 20:42:10 user info kernel: br0: port 2(eth0) entering forwarding state
Oct 4 20:42:28 user crit kernel: eth0 Link DOWN.
Oct 4 20:42:28 user info kernel: br0: port 2(eth0) entering disabled state
Oct 4 20:42:30 user crit kernel: eth0 Link UP.
Oct 4 20:42:31 user info kernel: br0: port 2(eth0) entering learning state
Oct 4 20:42:31 user info kernel: br0: topology change detected, propagating
Oct 4 20:42:31 user info kernel: br0: port 2(eth0) entering forwarding state
Oct 4 20:42:32 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:32 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:33 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:35 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:35 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:35 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:35 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:36 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:40 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:40 user notice igmp[4942]: setsockopt IP_MSFILTER
Oct 4 20:42:50 user debug tr64[5890]: wlctl -i wl0 phytype > /var/wl0
Oct 4 20:42:50 user debug tr64[5892]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 20:42:50 user debug tr64[5894]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 20:42:50 user debug tr64[5896]: wlctl -i wl0 phytype > /var/wl0
Oct 4 20:42:50 user debug tr64[5898]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 20:42:50 user debug tr64[5900]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 20:42:50 user debug tr64[5902]: wlctl -i wl0 phytype > /var/wl0
Oct 4 20:42:50 user debug tr64[5904]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 20:42:50 user debug tr64[5906]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 20:42:50 user debug tr64[5908]: wlctl -i wl0 phytype > /var/wl0
Oct 4 20:42:50 user debug tr64[5910]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 20:42:50 user debug tr64[5912]: wlctl -i wl0 bands > /var/wl0bands
Oct 4 20:42:51 user debug tr64[5914]: wlctl -i wl0 phytype > /var/wl0
Oct 4 20:42:51 user debug tr64[5916]: wlctl -i wl0 revinfo > /var/wl0
Oct 4 20:42:51 user debug tr64[5918]: wlctl -i wl0 bands > /var/wl0bands


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Ср окт 05, 2011 15:02 
Не в сети
Сотрудник D-LINK
Сотрудник D-LINK

Зарегистрирован: Вт мар 01, 2011 22:06
Сообщений: 2025
Drevvv писал(а):
DSL-2650U\BRU\D2
прошивка BZ_1.15


У Вас стоит Израильская прошивка.
Попробуйте прошить http://ftp.dlink.ru/pub/ADSL/DSL-2650U_ ... 032010.zip


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Ср окт 05, 2011 16:22 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
Oleg Syrbu писал(а):
Drevvv писал(а):
DSL-2650U\BRU\D2
прошивка BZ_1.15


У Вас стоит Израильская прошивка.
Попробуйте прошить http://ftp.dlink.ru/pub/ADSL/DSL-2650U_ ... 032010.zip

РУ 208 уже стояла,хотел попробовать Израиль))не чем не лучше)Щас старую поставил)


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Чт окт 06, 2011 10:32 
Не в сети
Сотрудник D-LINK
Сотрудник D-LINK

Зарегистрирован: Вт мар 01, 2011 22:06
Сообщений: 2025
Судя по логам у Вас периодически происходит обрыв ethernet соединения с ПК. Проверьте сетевую карту.
При обрывах связи как ведут себя индикатор интернет и dsl ?
При настройке pppoe соединения включите опцию Debug. ( для отображения отладочных сообщений ppp в логах )


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Чт окт 06, 2011 15:44 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
Oleg Syrbu писал(а):
Судя по логам у Вас периодически происходит обрыв ethernet соединения с ПК. Проверьте сетевую карту.
При обрывах связи как ведут себя индикатор интернет и dsl ?
При настройке pppoe соединения включите опцию Debug. ( для отображения отладочных сообщений ppp в логах )

Дсл - горит постоянно ,интернет - иногда просто гаснет(реже),иногда начинает медлено моргать(При рабочем интернете мигания активней)


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Чт окт 06, 2011 15:47 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
Oleg Syrbu писал(а):
Судя по логам у Вас периодически происходит обрыв ethernet соединения с ПК. Проверьте сетевую карту.
При обрывах связи как ведут себя индикатор интернет и dsl ?
При настройке pppoe соединения включите опцию Debug. ( для отображения отладочных сообщений ppp в логах )

Скорее всего это не проблема сетевой карты,это просто выключается компьютер,но после включения линия не поднимается((


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Чт окт 06, 2011 16:00 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
И еще) Что такое
Код:
Oct 6 16:53:37   syslog   info   -- MARK --

После этого интернет через жопу работает...


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Пт окт 07, 2011 13:18 
Не в сети
Сотрудник D-LINK
Сотрудник D-LINK

Зарегистрирован: Вт мар 01, 2011 22:06
Сообщений: 2025
Drevvv писал(а):
И еще) Что такое
Код:
Oct 6 16:53:37   syslog   info   -- MARK --

После этого интернет через жопу работает...


Действие MARK устанавливает специальную метку на пакет, которая затем может быть проверена другими правилами в iptables или другими программами, например iproute2. С помощью "меток" можно управлять маршрутизацией пакетов, ограничивать траффик и т.п.


Вернуться наверх
 Профиль  
 
 Заголовок сообщения: Re: Лог ,посмотрите
СообщениеДобавлено: Пт окт 07, 2011 14:02 
Не в сети

Зарегистрирован: Сб сен 24, 2011 16:53
Сообщений: 17
Oleg Syrbu писал(а):
Drevvv писал(а):
И еще) Что такое
Код:
Oct 6 16:53:37   syslog   info   -- MARK --

После этого интернет через жопу работает...


Действие MARK устанавливает специальную метку на пакет, которая затем может быть проверена другими правилами в iptables или другими программами, например iproute2. С помощью "меток" можно управлять маршрутизацией пакетов, ограничивать траффик и т.п.

как сделать так чтобы она не вылетала?И не резала скорость....вобщем как проблему решить то?


Вернуться наверх
 Профиль  
 
Показать сообщения за:  Сортировать по:  
Начать новую тему Ответить на тему  [ Сообщений: 20 ]  На страницу 1, 2  След.

Часовой пояс: UTC + 3 часа


Кто сейчас на форуме

Сейчас этот форум просматривают: нет зарегистрированных пользователей и гости: 9


Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете добавлять вложения

Найти:
Перейти:  
Создано на основе phpBB® Forum Software © phpBB Group
Русская поддержка phpBB