LINUX.ORG.RU
ФорумAdmin

dd-wrt: pptpd server 619 ошибка

 , ,


1

1

Всем привет, не знаю, что уже делать. Подскажите, плз. У меня прошивка: DD-WRT v24-sp2 (04/07/12) big Интернет поднят через Установка / Основные установки/ Тип соединения: PPTP. С этим проблем нет, имею доступ как к внешним ресурсам, так и к внутренним ресурсам провайдера, торренты и DC++ работают без проблем.

Пытаюсь поднять Vpn с Windows 7 ( firewall - окл.) из локальной сети через внутренний IP - ошибка 619.

cat /tmp/var/log/messages | egrep 'pptp|vpn|pppd'

Jan  1 00:00:11 DD-WRT daemon.info pptpd[880]: MGR: Maximum of 100 connections reduced to 12, not enough IP addresses given
Jan  1 00:00:11 DD-WRT daemon.info pptpd[905]: MGR: Manager process started
Jan  1 00:00:11 DD-WRT daemon.info pptpd[905]: MGR: Maximum of 12 connections available
Jan  1 00:00:11 DD-WRT user.info syslog: pptpd : pptp daemon successfully started
Jan  1 00:00:11 DD-WRT user.info syslog: vpn modules : vpn modules successfully unloaded
Jan  1 00:00:12 DD-WRT user.info syslog: vpn modules : vpn modules successfully unloaded
Jan  1 00:00:13 DD-WRT user.info syslog: vpn modules : nf_conntrack_proto_gre successfully loaded
Jan  1 00:00:13 DD-WRT user.info syslog: vpn modules : nf_nat_proto_gre successfully loaded
Jan  1 00:00:13 DD-WRT user.info syslog: vpn modules : nf_conntrack_pptp successfully loaded
Jan  1 00:00:13 DD-WRT user.info syslog: vpn modules : nf_nat_pptp successfully loaded
Jan  1 00:00:14 DD-WRT daemon.notice pppd[1106]: pppd 2.4.4 started by root, uid 0
Jan  1 00:00:17 DD-WRT user.info syslog: vpn modules : vpn modules successfully unloaded
Jan  1 00:00:17 DD-WRT user.info syslog: vpn modules : nf_conntrack_proto_gre successfully loaded
Jan  1 00:00:17 DD-WRT user.info syslog: vpn modules : nf_nat_proto_gre successfully loaded
Jan  1 00:00:17 DD-WRT user.info syslog: vpn modules : nf_conntrack_pptp successfully loaded
Jan  1 00:00:17 DD-WRT user.info syslog: vpn modules : nf_nat_pptp successfully loaded
Jan  1 00:00:25 DD-WRT user.info syslog: vpn modules : vpn modules successfully unloaded
Jan  1 00:00:26 DD-WRT user.info syslog: vpn modules : nf_conntrack_proto_gre successfully loaded
Jan  1 00:00:26 DD-WRT user.info syslog: vpn modules : nf_nat_proto_gre successfully loaded
Jan  1 00:00:26 DD-WRT user.info syslog: vpn modules : nf_conntrack_pptp successfully loaded
Jan  1 00:00:26 DD-WRT user.info syslog: vpn modules : nf_nat_pptp successfully loaded
Jun  7 13:32:18 DD-WRT user.info syslog: vpn modules : vpn modules successfully unloaded
Jun  7 13:32:19 DD-WRT user.info syslog: vpn modules : nf_conntrack_proto_gre successfully loaded
Jun  7 13:32:19 DD-WRT user.info syslog: vpn modules : nf_nat_proto_gre successfully loaded
Jun  7 13:32:19 DD-WRT user.info syslog: vpn modules : nf_conntrack_pptp successfully loaded
Jun  7 13:32:19 DD-WRT user.info syslog: vpn modules : nf_nat_pptp successfully loaded
Jun  7 13:32:20 DD-WRT user.info syslog: vpn modules : vpn modules successfully unloaded
Jun  7 13:32:20 DD-WRT user.info syslog: vpn modules : nf_conntrack_proto_gre successfully loaded
Jun  7 13:32:20 DD-WRT user.info syslog: vpn modules : nf_nat_proto_gre successfully loaded
Jun  7 13:32:20 DD-WRT user.info syslog: vpn modules : nf_conntrack_pptp successfully loaded
Jun  7 13:32:20 DD-WRT user.info syslog: vpn modules : nf_nat_pptp successfully loaded
Jun  7 13:41:24 DD-WRT daemon.info pptpd[2505]: CTRL: Client 192.168.1.105 control connection started
Jun  7 13:41:24 DD-WRT daemon.info pptpd[2505]: CTRL: Starting call (launching pppd, opening GRE)
Jun  7 13:41:24 DD-WRT daemon.notice pppd[2507]: pppd 2.4.4 started by root, uid 0
Jun  7 13:41:24 DD-WRT daemon.err pptpd[2505]: GRE: read(fd=8,buffer=41fe30,len=8196) from PTY failed: status = -1 error = Input/output error, usually caused by unexpected termination of pppd, check option syntax and pppd logs
Jun  7 13:41:24 DD-WRT daemon.err pptpd[2505]: CTRL: PTY read or GRE write failed (pty,gre)=(8,9)
Jun  7 13:41:24 DD-WRT daemon.debug pptpd[2505]: CTRL: Reaping child PPP[2506]
Jun  7 13:41:24 DD-WRT daemon.info pptpd[2505]: CTRL: Client 192.168.1.105 control connection finished
Jun  7 13:41:24 DD-WRT daemon.info pppd[2507]: Exit.
Jun  7 13:41:26 DD-WRT daemon.info pptpd[2514]: CTRL: Client 192.168.1.105 control connection started
Jun  7 13:41:26 DD-WRT daemon.info pptpd[2514]: CTRL: Starting call (launching pppd, opening GRE)
Jun  7 13:41:26 DD-WRT daemon.err pptpd[2514]: GRE: read(fd=8,buffer=41fe30,len=8196) from PTY failed: status = -1 error = Input/output error, usually caused by unexpected termination of pppd, check option syntax and pppd logs
Jun  7 13:41:26 DD-WRT daemon.err pptpd[2514]: CTRL: PTY read or GRE write failed (pty,gre)=(8,9)
Jun  7 13:41:26 DD-WRT daemon.debug pptpd[2514]: CTRL: Reaping child PPP[2515]
Jun  7 13:41:26 DD-WRT daemon.notice pppd[2516]: pppd 2.4.4 started by root, uid 0
Jun  7 13:41:26 DD-WRT daemon.info pptpd[2514]: CTRL: Client 192.168.1.105 control connection finished
Jun  7 13:41:26 DD-WRT daemon.info pppd[2516]: Exit.
Jun  7 13:41:26 DD-WRT daemon.info pptpd[2523]: CTRL: Client 192.168.1.105 control connection started
Jun  7 13:41:26 DD-WRT daemon.info pptpd[2523]: CTRL: Starting call (launching pppd, opening GRE)
Jun  7 13:41:26 DD-WRT daemon.err pptpd[2523]: GRE: read(fd=8,buffer=41fe30,len=8196) from PTY failed: status = -1 error = Input/output error, usually caused by unexpected termination of pppd, check option syntax and pppd logs
Jun  7 13:41:26 DD-WRT daemon.err pptpd[2523]: CTRL: PTY read or GRE write failed (pty,gre)=(8,9)
Jun  7 13:41:26 DD-WRT daemon.debug pptpd[2523]: CTRL: Reaping child PPP[2524]
Jun  7 13:41:26 DD-WRT daemon.info pptpd[2523]: CTRL: Client 192.168.1.105 control connection finished
Jun  7 13:41:26 DD-WRT daemon.notice pppd[2525]: pppd 2.4.4 started by root, uid 0
Jun  7 13:41:27 DD-WRT daemon.info pppd[2525]: Exit.
Jun  7 13:41:27 DD-WRT daemon.info pptpd[2532]: CTRL: Client 192.168.1.105 control connection started
Jun  7 13:41:27 DD-WRT daemon.info pptpd[2532]: CTRL: Starting call (launching pppd, opening GRE)
Jun  7 13:41:27 DD-WRT daemon.err pptpd[2532]: GRE: read(fd=8,buffer=41fe30,len=8196) from PTY failed: status = -1 error = Input/output error, usually caused by unexpected termination of pppd, check option syntax and pppd logs
Jun  7 13:41:27 DD-WRT daemon.err pptpd[2532]: CTRL: PTY read or GRE write failed (pty,gre)=(8,9)
Jun  7 13:41:27 DD-WRT daemon.debug pptpd[2532]: CTRL: Reaping child PPP[2533]
Jun  7 13:41:27 DD-WRT daemon.notice pppd[2534]: pppd 2.4.4 started by root, uid 0
Jun  7 13:41:27 DD-WRT daemon.info pptpd[2532]: CTRL: Client 192.168.1.105 control connection finished
Jun  7 13:41:27 DD-WRT daemon.info pppd[2534]: Exit.
Jun  7 13:41:27 DD-WRT daemon.info pptpd[2541]: CTRL: Client 192.168.1.105 control connection started
Jun  7 13:41:27 DD-WRT daemon.info pptpd[2541]: CTRL: Starting call (launching pppd, opening GRE)
Jun  7 13:41:27 DD-WRT daemon.err pptpd[2541]: GRE: read(fd=8,buffer=41fe30,len=8196) from PTY failed: status = -1 error = Input/output error, usually caused by unexpected termination of pppd, check option syntax and pppd logs
Jun  7 13:41:27 DD-WRT daemon.err pptpd[2541]: CTRL: PTY read or GRE write failed (pty,gre)=(8,9)
Jun  7 13:41:27 DD-WRT daemon.notice pppd[2543]: pppd 2.4.4 started by root, uid 0
Jun  7 13:41:27 DD-WRT daemon.debug pptpd[2541]: CTRL: Reaping child PPP[2542]
Jun  7 13:41:27 DD-WRT daemon.info pptpd[2541]: CTRL: Client 192.168.1.105 control connection finished
Jun  7 13:41:27 DD-WRT daemon.info pppd[2543]: Exit.

cat /tmp/pptpd/options.pptpd

lock
name *
nobsdcomp
nodeflate
auth
refuse-pap
refuse-eap
refuse-chap
refuse-mschap
require-mschap-v2
mppe required,stateless
mppc
debug
logfd 2
ms-ignore-domain
chap-secrets /tmp/pptpd/chap-secrets
ip-up-script /tmp/pptpd/ip-up
ip-down-script /tmp/pptpd/ip-down
proxyarp
ipcp-accept-local
ipcp-accept-remote
lcp-echo-failure 10
lcp-echo-interval 6
mtu 1450
mru 1450
ms-dns 192.168.1.1

cat /tmp/pptpd/pptpd.conf

bcrelay br0
localip 192.168.1.1
remoteip 192.168.1.50-60
- причем DHCP локальной сети 192.168.1.100-150

cat /tmp/pptpd/chap-secrets

mcka * mcka *

cat /tmp/pptpd/ip-up

#!/bin/sh
startservice set_routes
echo $PPPD_PID $1 $5 $6 $PEERNAME >> /tmp/pptp_connected
iptables -I FORWARD -i $1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
iptables -I INPUT -i $1 -j ACCEPT
iptables -I FORWARD -i $1 -j ACCEPT
iptables -t nat -I PREROUTING -i $1 -p udp -m udp --sport 9 -j DNAT --to-destination 192.168.1.255
IN=`grep -i RP-Upstream-Speed-Limit /var/run/radattr.$1 | awk '{print $2}'`
OUT=`grep -i RP-Downstream-Speed-Limit /var/run/radattr.$1 | awk '{print $2}'`
if [ ! -z $IN ] && [ ! -z $OUT ] && [ $IN -gt 0 ] && [ $OUT -gt 0 ]
then	tc qdisc del root dev $1
	tc qdisc del dev $1 ingress
 	tc qdisc add dev $1 root tbf rate "$OUT"kbit latency 50ms burst "$OUT"kbit
 	tc qdisc add dev $1 handle ffff: ingress
 	tc filter add dev $1 parent ffff: protocol ip prio 50 u32 match ip src 0.0.0.0/0 police rate "$IN"kbit burst "$IN"kbit drop flowid :1
fi

cat /tmp/pptpd/ip-down

#!/bin/sh
grep -v $PPPD_PID /tmp/pptp_connected > /tmp/pptp_connected.tmp
mv /tmp/pptp_connected.tmp /tmp/pptp_connected
CONTIME=$(($CONNECT_TIME+`grep $PEERNAME /tmp/pptp_peer.db | awk '{print $3}'`))
SENT=$(($BYTES_SENT+`grep $PEERNAME /tmp/pptp_peer.db | awk '{print $4}'`))
RCVD=$(($BYTES_RCVD+`grep $PEERNAME /tmp/pptp_peer.db | awk '{print $5}'`))
grep -v $PEERNAME /tmp/ppp_peer.db > /tmp/pptp_peer.db.tmp
mv /tmp/pptp_peer.db.tmp /tmp/pptp_peer.db
echo "$PEERNAME $CONTIME $SENT $RCVD" >> /tmp/pptp_peer.db
iptables -D FORWARD -i $1 -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
iptables -D INPUT -i $1 -j ACCEPT
iptables -D FORWARD -i $1 -j ACCEPT
iptables -t nat -D PREROUTING -i $1 -p udp -m udp --sport 9 -j DNAT --to-destination 192.168.1.255
tc qdisc del root dev $1
tc qdisc del ingress dev $1

разрешены GRE запросы в iptables (Сохранено в брандмауэре)

#VPN
iptables -A INPUT -i ppp+ -j ACCEPT
iptables -A OUTPUT -o ppp+ -j ACCEPT
iptables -A INPUT -p tcp --dport 1723 -j ACCEPT
iptables -A INPUT -p 47 -j ACCEPT
iptables -A OUTPUT -p 47 -j ACCEPT
iptables -F FORWARD
iptables -A FORWARD -j ACCEPT
iptables -A POSTROUTING -t nat -o br0 -j MASQUERADE
iptables -A POSTROUTING -t nat -o eth+ -j MASQUERADE
iptables -A POSTROUTING -t nat -o ppp+ -j MASQUERADE

#Torrents
iptables -t nat -i ppp0 -I PREROUTING -p tcp --dport 50847 -j DNAT --to 192.168.1.2:50847
iptables -I FORWARD -p tcp -d 192.168.1.2 --dport 50847 -j ACCEPT
iptables -t nat -i ppp0 -I PREROUTING -p udp --dport 50847 -j DNAT --to 192.168.1.2:50847
iptables -I FORWARD -p udp -d 192.168.1.2 --dport 50847 -j ACCEPT

iptables -L -n

Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
logdrop    tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:8080 
logdrop    tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80 
logdrop    tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:443 
logdrop    tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:69 
ACCEPT     0    --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:1723 
ACCEPT     47   --  0.0.0.0/0            0.0.0.0/0           
Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     udp  --  0.0.0.0/0            192.168.1.2         udp dpt:50847 
ACCEPT     tcp  --  0.0.0.0/0            192.168.1.2         tcp dpt:50847 
ACCEPT     0    --  0.0.0.0/0            0.0.0.0/0           
Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     0    --  0.0.0.0/0            0.0.0.0/0           
ACCEPT     47   --  0.0.0.0/0            0.0.0.0/0           
Chain advgrp_1 (0 references)
target     prot opt source               destination         
Chain advgrp_10 (0 references)
target     prot opt source               destination         
Chain advgrp_2 (0 references)
target     prot opt source               destination         
Chain advgrp_3 (0 references)
target     prot opt source               destination         
Chain advgrp_4 (0 references)
target     prot opt source               destination         
Chain advgrp_5 (0 references)
target     prot opt source               destination         
Chain advgrp_6 (0 references)
target     prot opt source               destination         
Chain advgrp_7 (0 references)
target     prot opt source               destination         
Chain advgrp_8 (0 references)
target     prot opt source               destination         
Chain advgrp_9 (0 references)
target     prot opt source               destination         
Chain grp_1 (0 references)
target     prot opt source               destination         
Chain grp_10 (0 references)
target     prot opt source               destination         
Chain grp_2 (0 references)
target     prot opt source               destination         
Chain grp_3 (0 references)
target     prot opt source               destination         
Chain grp_4 (0 references)
target     prot opt source               destination         
Chain grp_5 (0 references)
target     prot opt source               destination         
Chain grp_6 (0 references)
target     prot opt source               destination         
Chain grp_7 (0 references)
target     prot opt source               destination         
Chain grp_8 (0 references)
target     prot opt source               destination         
Chain grp_9 (0 references)
target     prot opt source               destination         
Chain lan2wan (0 references)
target     prot opt source               destination         
Chain logaccept (0 references)
target     prot opt source               destination         
ACCEPT     0    --  0.0.0.0/0            0.0.0.0/0           
Chain logbrute (0 references)
target     prot opt source               destination         
           0    --  0.0.0.0/0            0.0.0.0/0           recent: SET name: BRUTEFORCE side: source 
RETURN     0    --  0.0.0.0/0            0.0.0.0/0           !recent: UPDATE seconds: 60 hit_count: 4 name: BRUTEFORCE side: source 
RETURN     0    --  0.0.0.0/0            0.0.0.0/0           limit: avg 1/min burst 1 
logdrop    0    --  0.0.0.0/0            0.0.0.0/0           
Chain logdrop (5 references)
target     prot opt source               destination         
DROP       0    --  0.0.0.0/0            0.0.0.0/0           
Chain logreject (0 references)
target     prot opt source               destination         
REJECT     tcp  --  0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset 
Chain trigger_out (0 references)
target     prot opt source               destination         

Security -> VPN Passthrough: IPSec Passthrough Disable PPTP Passthrough Enabled L2TP Passthrough Disable

cat /proc/sys/net/ipv4/ip_forward

1



Последнее исправление: cetjs2 (всего исправлений: 2)

tcpdump -i br0 -s 0 tcp port 1723 or proto 47

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on br0, link-type EN10MB (Ethernet), capture size 65535 bytes
11:25:00.353942 IP Andrei.59714 > DD-WRT.1723: Flags [S], seq 1180993212, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
11:25:00.354223 IP DD-WRT.1723 > Andrei.59714: Flags [S.], seq 1814682947, ack 1180993213, win 5840, options [mss 1460,nop,nop,sackOK,nop,wscale 1], length 0
11:25:00.354428 IP Andrei.59714 > DD-WRT.1723: Flags [.], ack 1, win 16660, length 0
11:25:00.354697 IP Andrei.59714 > DD-WRT.1723: Flags [P.], seq 1:157, ack 1, win 16660, length 156: pptp CTRL_MSGTYPE=SCCRQ PROTO_VER(1.0) FRAME_CAP(A) BEARER_CAP(A) MAX_CHAN(0) FIRM_REV(0) HOSTNAME() VENDOR(Microsoft)
11:25:00.354909 IP DD-WRT.1723 > Andrei.59714: Flags [.], ack 157, win 2920, length 0
11:25:00.361850 IP DD-WRT.1723 > Andrei.59714: Flags [P.], seq 1:157, ack 157, win 2920, length 156: pptp CTRL_MSGTYPE=SCCRP PROTO_VER(1.0) RESULT_CODE(1) ERR_CODE(0) FRAME_CAP() BEARER_CAP() MAX_CHAN(1) FIRM_REV(1) HOSTNAME(local) VENDOR(linux)
11:25:00.362203 IP Andrei.59714 > DD-WRT.1723: Flags [P.], seq 157:325, ack 157, win 16621, length 168: pptp CTRL_MSGTYPE=OCRQ CALL_ID(19576) CALL_SER_NUM(5) MIN_BPS(300) MAX_BPS(100000000) BEARER_TYPE(Any) FRAME_TYPE(E) RECV_WIN(64) PROC_DELAY(0) PHONE_NO_LEN(0) PHONE_NO() SUB_ADDR()
11:25:00.381328 IP DD-WRT.1723 > Andrei.59714: Flags [P.], seq 157:189, ack 325, win 2920, length 32: pptp CTRL_MSGTYPE=OCRP CALL_ID(512) PEER_CALL_ID(19576) RESULT_CODE(1) ERR_CODE(0) CAUSE_CODE(0) CONN_SPEED(100000000) RECV_WIN(64) PROC_DELAY(0) PHY_CHAN_ID(0)
11:25:00.384122 IP Andrei.59714 > DD-WRT.1723: Flags [P.], seq 325:349, ack 189, win 16613, length 24: pptp CTRL_MSGTYPE=SLI PEER_CALL_ID(512) SEND_ACCM(0xffffffff) RECV_ACCM(0xffffffff)
11:25:00.386685 IP DD-WRT.1723 > Andrei.59714: Flags [F.], seq 189, ack 349, win 2920, length 0
11:25:00.386876 IP Andrei.59714 > DD-WRT.1723: Flags [.], ack 190, win 16613, length 0
11:25:00.387161 IP Andrei.59714 > DD-WRT.1723: Flags [F.], seq 349, ack 190, win 16613, length 0
11:25:00.387353 IP DD-WRT.1723 > Andrei.59714: Flags [.], ack 350, win 2920, length 0

lsmod

Module                  Size  Used by
ipt_ipp2p               8192  2
ipt_IMQ                 4096  2
imq                     4096  0
ipt_layer7             12288  13
xt_mac                  4096  0
xt_mark                 4096  4
nf_nat_pptp             4096  0
nf_conntrack_pptp       4096  1 nf_nat_pptp
nf_nat_proto_gre        4096  1 nf_nat_pptp
nf_conntrack_proto_gre     4096  1 nf_conntrack_pptp
switch_robo             4096  0
switch_core             8192  1 switch_robo
bcm57xx               102400  0

ifconfig

br0       Link encap:Ethernet  HWaddr 58:6D:8F:33:C8:04
          inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:436836 errors:0 dropped:0 overruns:0 frame:0
          TX packets:153097 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:306095462 (291.9 MiB)  TX bytes:81151243 (77.3 MiB)

br0:0     Link encap:Ethernet  HWaddr 58:6D:8F:33:C8:04
          inet addr:169.254.255.1  Bcast:169.254.255.255  Mask:255.255.0.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1

eth0      Link encap:Ethernet  HWaddr 58:6D:8F:33:C8:04
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:595286 errors:0 dropped:0 overruns:0 frame:0
          TX packets:568522 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:401998380 (383.3 MiB)  TX bytes:396767847 (378.3 MiB)
          Interrupt:4 Base address:0x2000

eth1      Link encap:Ethernet  HWaddr 58:6D:8F:33:C8:06
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:192 errors:0 dropped:0 overruns:0 frame:8762
          TX packets:458 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:17259 (16.8 KiB)  TX bytes:74177 (72.4 KiB)
          Interrupt:3 Base address:0x1000

eth2      Link encap:Ethernet  HWaddr 58:6D:8F:33:C8:07
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:256
          TX packets:0 errors:25 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)
          Interrupt:6 Base address:0x8000

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING MULTICAST  MTU:16436  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

ppp0      Link encap:Point-to-Point Protocol
          inet addr:193.58.xxx.xxx  P-t-P:10.32.0.2  Mask:255.255.255.255
          UP POINTOPOINT RUNNING MULTICAST  MTU:1400  Metric:1
          RX packets:158233 errors:0 dropped:0 overruns:0 frame:0
          TX packets:411124 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:3
          RX bytes:76730606 (73.1 MiB)  TX bytes:292168878 (278.6 MiB)

vlan1     Link encap:Ethernet  HWaddr 58:6D:8F:33:C8:04
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:436207 errors:0 dropped:0 overruns:0 frame:0
          TX packets:153013 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:307760169 (293.5 MiB)  TX bytes:81747039 (77.9 MiB)

vlan2     Link encap:Ethernet  HWaddr 00:15:F2:78:94:9A
          inet addr:10.70.36.25  Bcast:10.70.37.255  Mask:255.255.254.0
          UP BROADCAST RUNNING PROMISC ALLMULTI MULTICAST  MTU:1500  Metric:1
          RX packets:159042 errors:0 dropped:0 overruns:0 frame:0
          TX packets:415509 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:83518041 (79.6 MiB)  TX bytes:315020808 (300.4 MiB)

route

Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
10.70.255.253   10.70.36.1      255.255.255.255 UGH   0      0        0 vlan2
10.70.255.254   10.70.36.1      255.255.255.255 UGH   0      0        0 vlan2
193.58.xxx.xxx  *               255.255.255.255 UH    0      0        0 ppp0
193.58.255.0    10.70.36.1      255.255.255.224 UG    0      0        0 vlan2
192.168.1.0     *               255.255.255.0   U     0      0        0 br0
10.70.36.0      *               255.255.254.0   U     0      0        0 vlan2
10.70.0.0       10.70.36.1      255.255.0.0     UG    0      0        0 vlan2
169.254.0.0     *               255.255.0.0     U     0      0        0 br0
127.0.0.0       *               255.0.0.0       U     0      0        0 lo
default         202-dynamic-eth 0.0.0.0         UG    0      0        0 ppp0

Вот что еще менял: FireWall Отк.

DNSMasq No DNS Rebind Отк.

UPnP Вкл.

mcka
() автор топика
Вы не можете добавлять комментарии в эту тему. Тема перемещена в архив.